Fortinet Fortinet 1.5 Technical Note Download Page 11

Using FSAE on your network 

Configuring FSAE on Windows AD

Fortinet Server Authentication Extension Version 1.5 Technical Note
01-30005-0373-20071001

11

Configuring the Global Ignore List

The Global Ignore List excludes users such as system accounts that do not authenticate to 
any FortiGate unit. The logons of these users are not reported to FortiGate units.

To configure the Global Ignore List

1

From the Start menu select 

Programs > Fortinet > 

Fortinet Server Authentication Extension > Configure FSAE

.

2

Select Global Ignore List.

3

Expand each domain and select the users to ignore.

4

Select Save.

Configuring FortiGate group filters

FortiGate filters control the user logon information sent to each FortiGate unit. You 
need to configure the list so that each FortiGate unit receives user logon 
information for the user groups that are named in its firewall policies.

The filter list is initially empty. You need to configure filters for your FortiGate units 
using the Add function. At minimum, you can create a default filter that applies to 
all FortiGate units that do not have a specific filter defined for them.

Password

Enter the password that FortiGate units must use to 
authenticate. The maximum password length is 16 
characters. The default password is “fortinetcanada”.

Timers

Workstation verify interval

Enter the interval in minutes at which FSAE checks 
whether the user is still logged in. The default is every 
5 minutes. 
If ports 139 or 445 cannot be opened on your 
network, set the interval to 0 to disable the check. 
See 

“Configuring TCP ports” on page 13

.

Dead entry timeout interval

Enter the interval in minutes after which FSAE purges 
information for user logons that it cannot verify. The 
default is 480 minutes (8 hours). 
Dead entries usually occur because the computer is 
unreachable (in standby mode or disconnected, for 
example) but the user has not logged off.
You can also disable dead entry checking by setting 
the interval to 0. 

IP address change verify 
interval 

FSAE periodically checks the IP addresses of logged-
in users and updates the FortiGate unit when user IP 
addresses change. This does not apply to users 
authenticated through NTLM. Enter the verification 
interval in seconds. IP address verification prevents 
users from being locked out if they change IP 
addresses. You can enter 0 to disable the IP address 
check if you use static IP addresses.

Save & Close

Save the modified settings and exit. 

Apply

Apply changes now.

Default

Change all settings to the default values.

Help

View the online Help.

Note: 

To view the version and build number information for your FSAE configuration, click 

the Fortinet icon in the upper left corner of the Fortinet Collector Agent Configuration screen 
and select “About FSAE configuration”.

Summary of Contents for Fortinet 1.5

Page 1: ...www fortinet com Fortinet Server Authentication Extension Version 1 5 T E C H N I C A L N O T E...

Page 2: ...Trademarks Dynamic Threat Prevention System DTPS APSecure FortiASIC FortiBIOS FortiBridge FortiClient FortiGate FortiGate Unified Threat Management System FortiGuard FortiGuard Antispam FortiGuard Ant...

Page 3: ...Ignore List 11 Configuring FortiGate group filters 11 To view the FortiGate Filter List 12 To configure a FortiGate group filter 12 Configuring TCP ports 13 Configuring FSAE on FortiGate units 14 Spe...

Page 4: ...Fortinet Server Authentication Extension Version 1 5 Technical Note 4 01 30005 0373 20071001 Contents...

Page 5: ...the FortiGate unit so that users automatically get access to permitted resources FortiGate units control access to resources based on user groups Through FSAE the Windows Active Directory AD groups ar...

Page 6: ...t by the FSAE agent on the domain controller and if authentication is successful the information is then sent via the collector agent to the FortiGate unit Figure 2 NTLM FSAE implementation In Figure...

Page 7: ...tor privileges and a password that does not expire Installing FSAE To install FSAE you must obtain the FortiClient Setup file from the Fortinet Support web site Perform the following installation proc...

Page 8: ...e able to authenticate to FortiGate units using FSAE You can also do this later See Configuring FSAE on Windows AD on page 8 15 Select Next 16 Optionally clear the check boxes of domain controllers on...

Page 9: ...Professional Configuring Windows AD server user groups FortiGate units control access at the group level All members of a group have the same network access as defined in FortiGate firewall policies Y...

Page 10: ...st Exclude users such as system accounts that do not authenticate to any FortiGate unit See Configuring the Global Ignore List on page 11 FortiGate Group Filter Configure group filtering for each Fort...

Page 11: ...nada Timers Workstation verify interval Enter the interval in minutes at which FSAE checks whether the user is still logged in The default is every 5 minutes If ports 139 or 445 cannot be opened on yo...

Page 12: ...te If no filter is defined for a FortiGate unit and there is no default filter the collector agent sends all Windows AD group and user logon events to the FortiGate unit While this normally is not a p...

Page 13: ...rs on page 11 in the Configuring collector agent settings section Default Select to create the default filter The default filter applies to any FortiGate unit that does not have a specific filter defi...

Page 14: ...sses these servers in the order that they appear in the list If a server becomes unavailable the unit accesses the next one in the list To specify collector agents 1 Go to User Windows AD and select C...

Page 15: ...hould be belong to only one FortiGate user group If you assign it to multiple FortiGate user groups the FortiGate unit recognizes only the last user group assignment To create a user group for FSAE au...

Page 16: ...ting firewall policies Policies that require FSAE authentication are very similar to other firewall policies Currently only one single authentication firewall policy can be configured if the source in...

Page 17: ...ortiGate unit 2 Try to connect to the resource that is protected by the firewall policy requiring authentication via FSAE You should be able to connect to the resource without being asked for username...

Page 18: ...oded with the client password it may contain the challenge nonce twice using different algorithms 6 The FortiGate unit checks with the FSAE client over port 8000 to see if the authentication hash matc...

Page 19: ...www fortinet com...

Page 20: ...www fortinet com...

Reviews: