The document outlines the configuration steps for setting up an LDAP server connection, creating a user group for firewall access, and establishing a proxy with captive portal authentication. It includes detailed commands for configuring firewall profiles, user authentication schemes, and browser settings for users. Additionally, it emphasizes the importance of importing necessary certificates and configuring browser settings for seamless integration with the proxy service.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
9 views
Fortigate -Transparent proxy vpavlov
The document outlines the configuration steps for setting up an LDAP server connection, creating a user group for firewall access, and establishing a proxy with captive portal authentication. It includes detailed commands for configuring firewall profiles, user authentication schemes, and browser settings for users. Additionally, it emphasizes the importance of importing necessary certificates and configuring browser settings for seamless integration with the proxy service.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3
1.
Настроить подключение к LDAP серверу
fg60e (ldap) # show config user ldap edit "lab.test" set server "172.16.1.202" set cnid "userPrincipalName" set dn "DC=lab,DC=test" set type regular set username "CN=Fortigate read account,CN=Users,DC=lab,DC=test" set password ENC NtjDybSGMTqYS52W1riyrPfmuTpwVgSMkIXwKzbH0Olp96GUdAG97b3tH59iJS+rumLcoA4eb4G0ZjrgLwBEg5U+ dLjQqJCniaSWjvKsP8RbaMcgbY/ snGb+CIqgyYvu7sX2oiUCumsOllaq2wuOD6jAugnFDxa2jHp4Rcf7GOYCQLz27Z16usQZnQK123J62V7hOg== next end
2. Создать группу пользователей типа Firewall
fg60e (domain_users_FW_~oup) # show config user group edit "domain_users_FW_group" set member "lab.test" config match edit 1 set server-name "lab.test" set group-name "CN=Domain Users,CN=Users,DC=lab,DC=test" next end next end
3. Создать профиль config firewall profile-protocol-options для перенаправления запросов на Proxy
Применить профиль в IPv4 политике. Создать политику Transparent proxy. В обоих правилах должен быть использовать профиль SSL deep inspection. В прокси политике указать группу пользователей. 4. Включить прокси captive-portal интерфейсе, где активирован proxy (не путать с обычным captive portal: «set security-mode captive-portal») fg60e (internal7) # show config system interface edit "internal7" set explicit-web-proxy enable set proxy-captive-portal enable next end
5. Создать запись для captive-portal
fg60e (fg60e.lab.test) # show config firewall address edit "fg60e.lab.test" set type fqdn set fqdn "fg60e.lab.test" <<- Также должна быть запись в локальном DNS указывающая на IP proxy на FG (в моем случае IP на интерфейсе internal7 192.168.203.1) next end
6. Импортировать Kerberos keyrab, полученный из AD
fg60e (krb-keytab) # show config user krb-keytab edit "http_service" set principal "HTTP/FG60E.LAB.TEST@LAB.TEST" <<- Заглавные буквы. При создании SPN записи в AD так же использовать заглавные буквы. Пример: setspn -A HTTP/FG60E.LAB.TEST LAB\http-delegator set ldap-server "lab.test" set keytab "BQIAAAA3AAIACExBQi5URVNUAARIVFRQAA5GRzYwRS5MQUIuVEVTVAAAAAEAAAAAAwABAAgQSauR2Sx6Y QAAADcAAgAITEFCLlRFU1QABEhUVFAADkZHNjBFLkxBQi5URVNUAAAAAQAAAAADAAMACBBJq5HZLHphAAAA PwACAAhMQUIuVEVTVAAESFRUUAAORkc2MEUuTEFCLlRFU1QAAAABAAAAAAMAFwAQPm4SXWq2jTsCbp6M vMiX7QAAAE8AAgAITEFCLlRFU1QABEhUVFAADkZHNjBFLkxBQi5URVNUAAAAAQAAAAADABIAIBjGh7lMsS8i28 dbJmwRk0jIWR6kDTuso65UbdgiOXdGAAAAPwACAAhMQUIuVEVTVAAESFRUUAAORkc2MEUuTEFCLlRFU1QAA AABAAAAAAMAEQAQXxWl8ClJVvlcNB9lyvs7rA==" next end
7. Создать схему аутентификации
fg60e (kerb-auth) # show config authentication scheme edit "kerb-auth" set method negotiate set negotiate-ntlm disable set kerberos-keytab "http_service" next end
8. Создать правило аутентификации
fg60e (krb_auth_rule) # show config authentication rule edit "krb_auth_rule" set srcaddr "subnet_203.0" set ip-based disable set active-auth-method "kerb-auth" set web-auth-cookie enable next end
9. Указать использование captive-portal и номер порта для аутентификации
fg60e # show authentication setting config authentication setting set active-auth-scheme "kerb-auth" set captive-portal "fg60e.lab.test" set captive-portal-port 9998
10. Настроить браузер пользователя
Client browser configuration required (even for transparent web proxy) - Import FGT root CA to the web browser for SSL (downloaded from FGT SSL profile) - IE/Chrome/Edge: » Internet Options -> Security -> Local Intranet -> Advanced -> add http://fg60e.lab.test - Firefox: » about:config -> network.negotiate-auth.trusted-uris -> fg60e.lab.test (Kerberos) » about:config -> network.automatic-ntlm-auth.trusted-uris -> fg60e.lab.test (NTML)
PowerShell SysAdmin Crash Course: Unlock the Full Potential of PowerShell with Advanced Techniques, Automation, Configuration Management and Integration