Configuring Fortigate With Forticonnect As External Captive Portal
Configuring Fortigate With Forticonnect As External Captive Portal
Captive Portal
1
FortiConnect can be configured as the external captive portal for authenticated
internet access in a FortiGate deployment. This document focuses on the
configurations required on the FortiGate controller and FortiConnect to form a
seamless conjunction.
This document describes configurations ONLY for wireless guest access. For
wired guest access, you need to create a VLAN interface on your FortiGate and
configure it to use a Captive Portal as per the procedure described in this
document and have that wired VLAN available as an untagged/access VLAN on
the guest device switch port.
2
Before You Begin
Ensure the following pre-requisites are fulfilled prior to configuring your setup.
Connect to the FortiGate and verify that the access points are discovered by
the Controller and are operational in the Online state. Navigate to WiFi &
Switch Controller > Managed FortiAPs.
The FortiAP profile is created and applied to the access point on the
FortiGate.
The FortiConnect setup is installed and complete.
Valid PKI certificates are installed to prevent certificate errors on client
devices.
Create an address object for FortiConnect.
Create an address object for your DNS server hosting the FQDN for
FortiConnect.
3
4
Configuring FortiGate
Complete these configurations on the FortiGate user interface.
5
6
Configuring the Remote Guest User Group
Create a new remote user group and assign FortiConnect as the authentication
platform.
Navigate to User & Device > User Groups; click Create New and populate the
configuration page as per your network requirements. The following
configurations are mandatory:
7
Configuring the Wireless Interface
Configure SSID and Captive Portal authentication.
Navigate to WiFi & Switch Controller > SSID; click Create New and populate
the configuration page as per your network requirements. The following
configurations are mandatory:
IP/Network Mask – Specify the IP address and netmask for the SSID.
OR
<FortiConnect_IP>/portal/<FortiGate_NAS_IP>
Example: <10.1.10.5>/portal/<10.1.10.1>
The external portal URL requires you to remove the https:// prefix.
User Groups - Select permitted user groups for captive portal
authentication; select the user group created in Configuring the Remote
Guest User Group.
Exempt Destinations/Devices – Specify FortiConnect address object and
the DNS service.
9
Configuring Outgoing Policies
Create an outbound IPV4 policy for Guest Portal access. Create another
outbound access to the internet once authenticated via the Captive Portal
Disable NAT.
10
Login into the FortiGate CLI console and run the following commands to allow
access to the external FortiConnect Captive Portal page.
Source - Select all and the user group created in Configuring the Remote
Guest User Group as the source of the initiating traffic.
11
Configuring FortiConnect
Login into the FortiConnect portal using the FortiConnect IP address or FQDN -
https://[FortiConnect FQDN]/admin OR https://[FortiConnect IP address]/admin
Secret – Specify the same shared secret configured for the RADIUS server
on FortiGate.
12
Obtaining Captive Portal Steering Path
Navigate to Guest Portals > Portals and modify the Default login portal
settings to as per your requirements.
On the Portal Policy > Redirection page, click Next to obtain the
steering/redirection URL. The redirection URL is the external address for the
captive portal and is available in the format - https://[FORTICONNECT
FQDN]/portal/login/[NAS-IP address].
Examples
https://connect.fortixpert.com/portal/login/10.1.10.1
OR
https://connect.fortixpert.com/portal/10.1.10.1
13
Configuring Authentication Server
FortiConnect can be used as a user database. Users can be provisioned through
the Sponsor Portal (https://connect.fortixpert.com/sponsor) or self-provisioned
by a guest only if the Guest Portal is configured to support this functionality.
Alternatively, a third party user database can be selected. To use a third party
user database, navigate to Network Access Policy > Authentication Policy and
click on Add Server, select an authentication server type and follow the wizard
through to completion.
14
Validating User Access
To test and validate the success of the setup connect to the guest WiFi network
from a wireless enabled device; the guest portal should load within seconds.
1. [If using guest self-sign-on] Update the Self Service section and click
Generate Account. Note down your login details.
2. [If using guest self-sign-on] Click the login button to go back to the portal
Login screen, enter your login details and you should now be on the guest
Wi-Fi network and have access to the internet.
In the FortiGate GUI, navigate to Log & Report > Monitor > Firewall User Monitor
and verify that the guest has logged in.
You can also monitor the user at Log & Report > Monitor > WiFi Client Monitor.
15