FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
ddeguzman
Staff
Staff
Article Id 297903
Description

This article describes the behavior of why SSL VPN users match the incorrect portal/authentication rule.

 

In this example, 2 local users (denice and rejean) are members of the 'SSLVPNGROUP' local user group, but there is additional access provided to the user 'denice'. The behavior is user 'denice' matches the web-access portal, but user 'rejean' matches the expected portal 'full-access' despite being a member of the same group.

 

Under the SSL VPN setting, the 'full-access' portal is mapped to this group. While the default (All Other Users/Groups) is mapped to 'web-access'. 


Usergroup.JPG

 

Authentication-ruleAuthentication-rule

 

By default, the 'All Other Users/Group' is authentication rule # 0, while the SSLVPNGROUP is authentication rule # 1. This can be confirmed via CLI also.

 

Viva-kvm41 # show vpn ssl settings
config vpn ssl settings
    set banned-cipher SHA1 SHA256 SHA384
    set servercert "Fortinet_Factory"
    set tunnel-ip-pools "SSLVPN_TUNNEL_ADDR1"
    set tunnel-ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1"
    set source-interface "port5"
    set source-address "all"
    set source-address6 "all"
    set default-portal "web-access"  <--
        config authentication-rule
            edit 1
                set groups "SSLVPNGROUP"
                set portal "full-access"
            next
        end
end

 

As shown below, user 'denice' is added directly to policy #4 since additional access was allocated, while the user group 'SSLVPNGROUP' is added to policy #3.

 

Policy.JPG

 

User 'rejean' tries to authenticate, it matches the 'authentication-rule' # 1 as expected because she is a member of the SSL VPN group.


rejean_authenticationrejean_authentication

 

But when user 'denice' tries to authenticate and connect via SSL VPN, it matches the authentication-rule #0 and gets mapped to the 'web-mode' portal even if being a member of 'SSLVPNGROUP'.

 

denice_authenticationdenice_authentication

Scope FortiGate.
Solution

To override this behavior, it is recommended to have matching 'users/group' on both 'firewall policies' and 'authentication-rule'.

 

In this case, it is either possible to create a new authentication-rule for user 'denice' specifically, or create a separate user group for the user and specify it on the new authentication rule.

 

denice_new-rule.JPG

 

Viva-kvm41 # show vpn ssl settings
config vpn ssl setting

    set banned-cipher SHA1 SHA256 SHA384
    set servercert "Fortinet_Factory"
    set tunnel-ip-pools "SSLVPN_TUNNEL_ADDR1"
    set tunnel-ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1"
    set source-interface "port5"
    set source-address "all"
    set source-address6 "all"
    set default-portal "no-access"
        config authentication-rule

edit 1

set groups "SSLVPNGROUP"
set portal "full-access"

next

edit 2 <-----

set users "denice"

set portal "full-access"

next

end

end

 

denice-auth-workingdenice-auth-working