Greetings! We have setup captive portal on our network using local
authentication. For some reason, some devices that are suppose to login
first already show the Fortinet bar with a user logged in. Any ideas on
why this happens? Thank you all in adva...
Greetings, In a captive portal setup through an interface, is it
possible to have the disclaimer page show up after the user has finished
authenticating? We are opting to use the disclaimer page as a way to
notify certain users (billing concerns, ann...
Greetings! Good day to everyone! Our school is currently setting up a
topology similar to Ken Felix's article on this link -
http://socpuppet.blogspot...arent-using-inter.html > Awesome article by
the way :) We were able to make the said topology fro...
Greetings to ALL! We setup a Fortigate 300C with User Identity Policy so
that users will have to login first thru a LOGIN PAGE before being able
to connect to the internet. We encountered a problem when some of our '
VIP users' bought new laptops wit...
Hi! Good day to all! Is there another way to restore the Replacement
Messages on our Fortigate 300C to default? For some reason even if I
click on Restore Default button then save, it still reverts back to the
one that I made. Thanks in advance! Bles...
Fishbone, thank you for your response! Got a hint on the solution from
it - 'share the same IP'. Our DHCP lease time is way shorter that the
idle time out for the captive portal to deauthenticate the users.
You can also enable the Fortinet Bar under Proxy Options then Web
Options. A bar will show on the top portion of the webpage which shows
the user who is currently logged in. To logout, simply click on the
username and a sign out option will show. The...
Thank you for the suggestion! I will surely give that one a go. And
update this thread after. But first i have to find out to what ' site /
link / ip' Microsoft use for the account login. Anybody who has an idea
what that might be? Thanks in advance!...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.