12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Firewall Policy<br />

Configuring firewall policies<br />

Note: When you use certificate authentication, if you do not specify any certificate when<br />

you create a policy, the global settings will be used. If you specify a certificate, the perpolicy<br />

setting will overwrite the global setting. For information about user authentication<br />

global settings, see “Authentication settings” on page 394.<br />

User authentication supports the following protocols:<br />

• HTTP<br />

• HTTPS<br />

• Telnet<br />

• FTP<br />

For information about configuring authentication protocols and other<br />

authentication settings, see “Authentication settings” on page 394.<br />

You can specify which protocol will be used to issue the authentication challenge.<br />

The firewall policy must also include the authentication protocol for the end users<br />

to be able to get authenticated. For example, if you are creating a POP3 policy,<br />

and you have specified that HTTP protocol will be used for authentication, the<br />

firewall policy services must include at least HTTP and POP3.<br />

Figure 168:Selecting user groups for authentication<br />

Select Authentication and select one or more user groups to require users to enter<br />

a user name and password, or use certificates to authenticate, before the firewall<br />

accepts the connection.<br />

• The Firewall authentication method includes locally defined user groups, as<br />

well as LDAP, and RADIUS users.<br />

• Select Active Directory from the drop-down list to choose Active Directory<br />

groups defined in User > User Group. Authentication with Active Directory<br />

groups and other groups cannot be <strong>com</strong>bined in the same policy.<br />

• To use NTLM authentication, select NTLM from the drop-down list and choose<br />

Active Directory groups defined in User > User Group. You use AD groups as<br />

the members of the authentication group for NTLM.<br />

Note: To allow the <strong>FortiGate</strong> unit to authenticate with an Active Directory server, the<br />

Fortinet Server Authentication Extensions (FSAE) must be installed on the Active Directory<br />

Domain Controller. FSAE is available from Fortinet Technical Support.<br />

In most cases, ensure users can use DNS through the firewall without<br />

authentication. If DNS is not available, users cannot connect to a web, FTP, or<br />

Telnet server using a domain name.<br />

Note: Policies that require authentication must be added to the policy list above matching<br />

policies that do not; otherwise, the policy that does not require authentication is selected<br />

first.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

01-30005-0203-20070830 277

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!