12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

User<br />

User groups<br />

User group types<br />

You can configure user groups to provide authenticated access to:<br />

• Firewall policies that require authentication<br />

See “Adding authentication to firewall policies” on page 276.<br />

• SSL VPNs on the <strong>FortiGate</strong> unit<br />

See “SSL-VPN firewall policy options” on page 281.<br />

• IPSec VPN Phase 1 configurations for dialup users<br />

See “Creating a new phase 1 configuration” on page 345.<br />

• XAuth for IPSec VPN Phase 1 configurations<br />

See XAUTH in “Defining phase 1 advanced settings” on page 348.<br />

• <strong>FortiGate</strong> PPTP configuration<br />

See “PPTP Range” on page 361.<br />

• <strong>FortiGate</strong> L2TP configuration<br />

This is configurable only using the config vpn l2tp CLI <strong>com</strong>mand. See<br />

the <strong>FortiGate</strong> CLI Reference.<br />

• Administrator login with RADIUS authentication<br />

See “Configuring RADIUS authentication for administrators” on page 163.<br />

• FortiGuard Web Filtering override groups<br />

See “FortiGuard - Web Filter” on page 435.<br />

For each resource that requires authentication, you specify which user groups are<br />

permitted access. You need to determine the number and membership of user<br />

groups appropriate to your authentication needs.<br />

There are three types of user group:<br />

• Firewall<br />

• Active Directory<br />

• SSL VPN<br />

Firewall<br />

A firewall user group provides access to a firewall policy that requires firewall type<br />

authentication and lists the user group as one of the allowed groups. The<br />

<strong>FortiGate</strong> unit requests the group member’s user name and password when the<br />

user attempts to access the resource that the policy protects. A user may also be<br />

authenticated by certificate if this method is selected in the firewall policy. For<br />

more information, see “Adding authentication to firewall policies” on page 276.<br />

A firewall user group can also provide access to an IPSec VPN for dialup users. In<br />

this case, the IPSec VPN phase 1 configuration uses the Accept peer ID in dialup<br />

group peer option. The user’s VPN client is configured with the user name as peer<br />

ID and the password as pre-shared key. The user can connect successfully to the<br />

IPSec VPN only if the user name is a member of the allowed user group and the<br />

password matches the one stored on the <strong>FortiGate</strong> unit. A user group cannot be a<br />

dialup group if any member is authenticated using a RADIUS or LDAP server. For<br />

more information, see “Creating a new phase 1 configuration” on page 345.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

01-30005-0203-20070830 387

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!