Yuri Slobodyanyuk Blog on Information Security 2024年09月12日
Fortigate guest user accounts - create, edit, delete and deploy
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

本文档详细介绍了在 Fortigate 防火墙中配置 Guest 用户帐户的步骤。它涵盖了从创建用户组到使用这些组在安全规则或 Wi-Fi SSID 中进行身份验证的整个流程,并提供了完整的 CLI 配置示例,帮助用户快速上手。

🎯 **创建用户组**: 首先,您需要创建用户组,这些组充当模板,定义 Guest 用户可以或必须拥有的参数。在“用户和设备”>“用户组”>“新建”中,选择“类型:Guest”。如果启用“批量 Guest 帐户创建”,则所有配置将变为灰色,并且所有要创建的用户详细信息将自动随机生成。 可选地,您可以创建一个 Guest 用户管理员来管理 Guest 用户并分配相关组。该管理员只能看到管理这些 Guest 用户的页面。在“系统”>“管理员”>“新建”中,选择“类型:仅限于 Guest 帐户配置的限制管理员”。 该管理员必须像普通管理员一样访问管理 IP。

🚀 **创建 Guest 用户**: 在“用户和设备”>“Guest 管理”>“新建”中创建 Guest 用户。请注意右上角,选择要为新创建用户选择的正确组。

🛡️ **使用创建的组**: 最后,您可以在安全规则或 Wi-Fi SSID 中使用 Guest 组进行身份验证,例如在 Captive Portal 中。在安全规则中,用户必须先浏览某个地方才能获得登录页面。

💻 **完整 CLI 配置示例**: 本文档提供了详细的 CLI 配置示例,包括创建用户组、Guest 用户和管理员,以及配置安全规则以使用 Guest 组进行身份验证。

🌐 **附加资源**: 本文档的作者还推荐了其他资源,例如 LinkedIn 和 Github,以获取更多关于 Fortigate 和网络安全的信息。

The guest user accounts are special in Fortigate and unlike regular local Firewall user accounts. The flow of creating them is:

Let's configure it.

First, you create Groups, which serve, in this case, as a template for various parameters users can/must have later:

User & Device -> User Groups -> New .. -> Type: Guest

If you enable "Batch Guest Account Creation" then all the configs become grayed out and all the details of the to-be created users will auto-randomly generated.

(Optional) Create Guest users admin to manage them and assign relevant Groups

Such admin can only see the page of managing these Guest users and that is it.

System -> Administrators -> New .. -> Type: Restrict admin to guest account provisioning only:

This admin has to have access to the Management IP as a usual admin:

Create Guest users

User & Device -> Guest Management -> New ..

Pay attention to the right upper corner to pick the correct group for the new to-be created user.

Use the created Groups

Finally, we can use the Guest groups in Security rules or WiFi SSID for the Captive Portal for authenticaton.

Here is the example of Security rule. A user will have to first browse somewhere to get the login page.

Full CLI configuration:

config user group    edit "SSO_Guest_Users"    next    edit "Guest-group"        set group-type guest        set user-name enable        set sponsor mandatory        set expire-type first-successful-login        set expire 446400        config guest            edit "joan@nasa.gov"                set name "guest1"                set password ENC y3UDU+HYxl2n7KBFwPXNkd1BD2XmoAKyga50LtyL+qk+GLcwPDGHyw8hzkY9Wl0Q7wYYm4dOWuqMoDAzvQ1MsxyoxJsLag+esNBC4nGONVC+tRqyWSjA+8xvyiZykgwB3Urj0ylv6vd99mVk0XiwHtd2S/GLB7/1DsfQtinp6NwH4FF3g+3YPni7fThHwWQjnMfH3w==                set sponsor "NASA"                set company "NASA"                set email "joan@nasa.gov"                set expiration 2020-08-03 05:13:27            next        end    next    edit "Guest-group2"        set group-type guest        set user-name enable        set expire-type first-successful-login        set expire 878400        config guest            edit "johnny@nsa.gov"                set name "guest2"                set password ENC 41+u3YABUwTLctu56UTIni2P7rRnr3edfCKOfH/RJatGi7znh8kpcxc03vJTciH4J7/CDmBVESD4foPi5hMV+u9DQLzQ2AN2sxKMcB+9fJ/O2RhlVRoBwR7SN/is2G2Tra3pMA1lkWzJhMAcXfQnB55YcYq5UnXqGYDNhNt+I8+1CDyowlxIxWpS5grwPIYJEiWQCQ==                set sponsor "NSA"                set company "NSA"                set email "johnny@nsa.gov"                set expiration 878400            next        end    nextend

Optional guest users admin:

config system admin    edit "guest-admin"        set vdom "root"        set guest-auth enable        set guest-usergroups "Guest-group" "Guest-group2"        set password ENC SH2SUStSlY72bDN/7nYPYJGaKNHPdtjsd4BLiYwKzXu+N/B19BHiX899iakQ6k=    nextend

LAN to Internet wired networks rule:

edit 3        set name "LAN-10.17-to-Internet"        set uuid cdfe8fee-ca85-51ea-5c07-b2311d5406cd        set srcintf "port3"        set dstintf "port1"        set srcaddr "LAN_10.10.17"        set dstaddr "all"        set action accept        set schedule "always"        set service "ALL"        set utm-status enable        set fsso disable        set groups "Guest-group" "Guest-group2"  <-- Guest user groups        set webfilter-profile "custom1"        set dnsfilter-profile "custom-dns-filter1"        set application-list "Custom-app-control"        set ssl-ssh-profile "deep-inspection"        set nat enable    next

Follow me on https://www.linkedin.com/in/yurislobodyanyuk/ not to miss what I publish on Linkedin, Github, blog, and more.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Fortigate Guest 用户 安全规则 身份验证 CLI 配置
相关文章