On Fortigate we can use LDAP Server for user authentication. What I miss here is the 2 important things what Cisco calls AAA
-Authentication
-Authorization –> missing
-Accounting –> missing
– Fortigate Supports LDAP, RADIUS, TACACS, with LDAP it can only authenticate users, authorization is only possible with TACACS.
– With Fortigate we cannot define where it should look for the user regarding the base DN. one level or more level beneath the base DN is not possible. What it does in the background, is not clear for me.
– It is possible to look for group membership. See the link:
http://docs.fortinet.com/fgt/handbook/40mr3/fortigate-authentication-40-mr3.pdf
Used Version: v4.0,build0521,120313 (MR3 Patch 6)
1. LDAP Server configuration.
config user ldap
edit "WindowsLDAP"
set server "10.0.1.10"
set cnid "cn"
set dn "CN=Users,DC=mycompanyAD,DC=mycompany,DC=sec"
set type regular
set username "cn=administrator,cn=users,dc=mycompanyad,dc=mycompany,dc=sec"
set password ENC AwAAAMhVMCPmG0A0z4lq2AY7VbExK8/4PQBdOIpMGzActfHzgRdKP/3ogrnXe4k277GUqHAccpTkysswKekSwLjQvBvHt3qS1YEQyvu+E+qdfrnd
next
end
|
2. User-group configuration.
config user group
edit "FSSO_Guest_Users"
set group-type fsso-service
next
edit "Guest-group"
set member "guest"
next
edit "LDAP_Users"
set member "WindowsLDAP"
next
end
|
3. Firewall Policy configuration.
config firewall policy edit 1 set srcintf "port3" set dstintf "External" set srcaddr "all" set dstaddr "all" set action accept set utm-status enable set identity-based enable set nat enable config identity-based-policy edit 1 set schedule "always" set logtraffic enable set groups "LDAP_Users" set service "ANY" next end next end |
4. Testing Ldap authentication.
firewall (root) # diag test authserver ldap WindowsLDAP firewall mypassword authenticate 'firewall' against 'WindowsLDAP' succeeded! Group membership(s) - CN=Remote Desktop Users,CN=Builtin,DC=mycompanyAD,DC=mycompany,DC=sec CN=Administrators,CN=Builtin,DC=mycompanyAD,DC=mycompany,DC=sec |
Posted on June 19, 2012
0