Ana içeriğe atla

Fortinet Authentication options

Fortinet has multiple authentication solutions in their Fortigate and FortiAuthenticator products, but deciding which solution is best for each environment can be difficult. We'll go over the different options in this post.

Authentication methods
FG with Captive Portal
This is open authentication (not Transparent), but no infrastructure is required and can even work without LDAP or RADIUS. Recommended for guest networks or low infrastructure environments.

FG con LDAP Polling
It is the most basic solution of SSO, only the firewall asks LDAP to check the users name. It has the advantage of not needing to deploy agents, the disadvantage is limited to very large or complex environments, so it is often used in small spaces.

FG with DC-Agent (TS-Agent and other agents)
In this deployment, specific Agents are activated in Domain Controllers and Terminal Server to control users' mobility. The Collector (distributed on a server or Windows PC) is responsible for collecting all users' information and submitting it to Fortigate. With this solution, we can handle 80% or more roaming requirements of normal projects that are not overly complex (one or two domains).

FAC as a Collector
Adding FortiAuthenticator will allow us to give more details on the management of Domains, Multiple Fortigate Clusters and will confuse these users with other resources such as LDAP, RADIUS or another application that manages their authentication. It will also allow guests to add tools that will facilitate the management of 2FA-tokens.
We can cover any authentication method with these 4 solutions, but we still need to deal with the roaming issue. In some networks, computers authenticate in one environment (for example, LAN) and then perform another authentication in another environment (for example, WiFi).

Maintaining consistency between both authentications can be complex on some networks, so Fortinet has the following tools depending on scenarios.



In any case, keep in mind that FortiAuthenticatior will facilitate deployment in environments with the following conditions.
  • 2FA in general.
  • Complex multi-domain environments.
  • Environments with several auth sources (For example AD + OpenLDAP + RADIUS/802.1X)
  • Environments with a non-standard authentication (for example, a non-LDAP/RADIUS source such as SAML, Citrix, Google, O365 vb.)
  • Environments with mobility in which an immediate roaming between two authentications is needed.

Yorumlar

Bu blogdaki popüler yayınlar

Troubleshoot Fortigate SSL VPN

You can use the diagnose commands below to identify SSL VPN problems. diagnose debug application sslvpn -1 This command will enable the debug level of SSL VPN with debug level -1. Debug level -1 gives detailed results. Verify the debug configuration diagnose debug info debug output: disable console timestamp: disable console no user log message: disable sslvpn debug level: -1 (0xffffffff) CLI debug level: 3 This output verifies that SSL VPN debugging is enabled at debug level -1 and shows which filters are in place. The above output shows that debug output is disabled, so debug messages are not displayed. The output also indicates that debugging is not enabled for any software system. Use the following command to enable the display of Debug Messages. diagnose debug enable To view the debug messages, login to the SSL VPN portal and the CLI displays debug output similar to the one below. FGT90E3G10002814 # [282:root]SSL state:before/accept initialization (172.20.130.12) [282:root]SSL sta...

Fortigate Route ve Spoofing–Reverse path check

The AntiSpoofing mechanism (reverse path check or reverse path forward) in Fortigate allows you to check that the properties of a packet in other paths are received at one level in the correct interface. It includes mechanisms to prevent IP Spoofing attacks that involve changing the source IP address of a packet that the Fortigate firewall receives from one of the interfaces that the source IP address would not expect. reverse path forward <span style="text-decoration: underline;">Interfaces :</span>   LAN : 192.168.1.254/24 DMZ : 192.168.2.254/24   <span style="text-decoration: underline;">Routage statique en place :</span>   Route : 192.168.100.0/24 gw 192.168.1.254 Route : 0.0.0.0 gw defaut wan gateway This protection mechanism ensures that a packet with the source 192.168.100.0/24 cannot be reached by the LAN interface. The only interface authorized to receive the Flows of this network is the DMZ (see the routing). If a pac...

Forcepoint NGFW Mobile VPN Yapılandırma

Bu bölümde NGFW özelliklerinde VPN ayarlarını tanımlayacağız (Endpoints, Sites ve VPN Clients) ENDPOINTS VPN  Endpoints , Kullanıcıların VPN tüneli kurmak istediklerinde bağlanacakları IP adresini tanımlar. 1. Firewalls>Edit>VPN> Endpoints  sekmesini açıyoruz. 2. Bu kurulumda yalnızca bir harici  Endpoints  var, bunu etkinleştiririz. 3.  Resimde ki örnek yapılandırmada, tüm VPN türleri, kullanıcıların (IPsec,SSL VPN tunnelling veya User browser (SSL VPN Portalı)) kullanarak Forcepoint VPN istemcisiyle bağlantı kurmasına olanak sağlamak için etkinleştirilmiştir. VPN SITES VPN site öğeleri, trafik selectors, yani VPN istemcisi ile NGFW motoru arasındaki tünel açıldığında ve çalışır durumda olduğunda VPN üzerinden ulaşılabilecek IP adresleridir. 1.  Firewalls>Edit>VPN>Sites sekmesini açıyoruz. 2. VPN site yapılandırmasında 'Add and update IP addresses based on routing option' seçildiğinde, Routing yapılandırmasına bağlı olarak otomati...

Fortigate SSL mirroring explicit proxy/SSL inspected traffic

SSL inspection on Fortigate is a mechanism that can be used to protect and inspect the content of encrypted sessions, find and block threats. SSL inspection not only protects against attacks using HTTPS, but also against other commonly used encrypted protocols such as SMTPS, POP3S, IMAPS, and FTPS. A full SSL inspection (Deep Inspection) should be used to ensure that all encrypted content is inspected. When SSL inspection is used, Fortigate acts as the receiver of the source SSL session and decrypts and inspects its content, Then the content is encrypted again, a new SSL session is established between Fortigate and the receiver by impersonating the sender, and the content is freed from threats. It is possible to "Mirror" or send a copy of the traffic Decrypted by SSL inspection to one or more Fortigate interfaces so that the traffic can be collected by the Raw Packet Capture tool for archiving or analysis. Mirroring occurs after it is processed by the SSL Decoder and at the s...

Modify FortiGate HA Link-Failed-Signal and MAC address tables

The "Link-Fail-Signal" command allows us to force switches next to the Cluster Fortigate unit to refresh their MAC tables, which will be useful if the Switches do not refresh their MAC tables correctly. Normally, after Link Failover, the new Primary sends Gratuitous ARP (GARP) packets to refresh the MAC forwarding tables of the switches connected to the Cluster. In some cases, Switches ignore GARP packets and continue to reference the MAC address of the port. So the transaction fails on the Fortigate side and continues to send packets. You can use the following command to prevent a Cluster unit with Monitored Interface connection from turning off all interfaces (except Heartbeat Interfaces and HA Mgmt Interfaces) after Link Failure occurs. config system ha set link-failed-signal enable end If cluster computers are managed with a Mgmt interface, it must be specified, otherwise the port on which it is managed is Down. config system ha set link-failed-signal enable en...

Forcepoint console logging etkinleştirme

NGFW Console Logging etkinleştirme işlemi aşağıda belirtilen adımlar ile sağlanılabilir. 1. Engine üzerinde bir Command Line Session açın. 2. Console Logging önceden etkinleştirilip etkinleştirilmediğini kontrol edin. Belirtilen komutu yazın ve ENTER tuşuna basın: cat /proc/cmdline Çıktıda line console = ttyS <PORT> görürseniz, Serial Console Logging zaten etkin demektir. 3. Serial Console Logging etkin değilse, Belirtilen komutu yazın ve ENTER tuşuna basın: sg-bootconfig –help Secondary Console seçeneklerinin nasıl ayarlanacağına ilişkin talimatlar 4. Console için parametreleri tanımlayın. sg-bootconfig --secondary-console=[<CONS>] where <CONS> := tty0|ttyS<PORT>,<SPEED> <PORT> := 0|1|2|3|4|5|6|7 <SPEED> := 9600|19200|38 400|57600|115200 Örneğin: sg-bootconfig --secondary-console=ttyS0,115200 apply ve ENTER tuşuna basın. Not: Speed settings, serial kablonun diğer ucundaki host üzerinde yapılandırılan ayar ile eşleş...

Fortigate RPF kontrolünü devre dışı bırakma

RPF (Reverse Path Forwarding) IP Spoofing saldırılarına karşı korur ve  Input Interface  üzerinden Source IP'ye geri dönen aktif bir Route olup olmadığını kontrol eder. RPF, aşağıdaki şekillerde yapılması mümkün olmasına rağmen , devre dışı bırakılması önerilmeyen bir güvenlik mekanizmasıdır  Asymmetric Routing'e  izin verdiğimizde, bu sistemde RPF'nin doğrulanmasını engeller ve Fortigate Statefull yerine Stateless Firewall'a dönüştürür. asymmetric routing  izin verme komutu aşağıdaki gibidir. config system setting set asymroute enable end Firmware 5.6 sürümünden itibaren, aşağıdaki komutlarla arayüz seviyesinde RPF kontrolünü devre dışı bırakabiliriz. config system interface edit <interface> set src-check disable end

Forcepoint OSPF Area IP adresi Tanımı

Version: 6.5, 6.4, 6.3, 6.2, 5.10 SORUN OSPF Dynamic Routing kullanıldığında, aynı OSPF alanındaki Router’lar arasında OSPF neighborhood oluşturulur.   Area 0 "backbone" ve normalde diğer alanlar ondalık sayı kullanır. Ancak Quagga OSPF yapılandırma alanında, IP adresinin Area numarası olarak tanımlanmasını sağlayan noktalı ondalık biçim kullanılarak sunulur. OSPF'yi vtysh kullanarak komut satırından yapılandırırken, "area a.b.c.d" sözdizimi kullanılır ( https://www.nongnu.org/quagga/docs/quagga.html#OSPF-area ) ancak Management Client OSPF Area öğesi özelliklerinde noktalı ondalık syntax kabul edilmez. ÇÖZÜM Area numarasını IP adresi olarak tanımlarken, IP adresini ondalık sayıya dönüştürmeniz gerekir. Örnek olarak 192.168.1.0 alanını kullanmak istiyorsanız, bu IP adresini ondalık sayıya dönüştürmeniz gerekir. Bu Manuel olarak, önce IP adresini ikili değere dönüştürerek yapılabilir Ardından, ondalık değere ayarlanmış her biti dönüştürün ve bunları ek...

The Data's in: Prisma Access Crushes Zscaler + Cisco

The Data's in: Prisma Access Crushes Zscaler + Cisco   New AV-Comparatives report for SASE solutions The new AV-Comparatives report for SASE solutions put Zscaler Internet Access and Palo Alto Networks Prisma Access to the test. Download the full report to see how Prisma Access achieved the best scores overall for security efficacy.