Fortinet 100A Router User Manual


 
FortiGate-100A Administration Guide Version 2.80 MR7
FortiGate-100A Administration Guide 01-28007-0068-20041203 233
Users and authentication
You can control access to network resources by defining lists of authorized users,
called user groups. To use a particular resource, such as a network or a VPN tunnel,
the user must belong to one of the user groups that is allowed access. The user then
must correctly enter a user name and password to prove his or her identity. This is
called authentication.
You can configure authentication in:
any firewall policy with Action set to ACCEPT
IPSec, PPTP and L2TP VPN configurations
When the user attempts to access the resource, the FortiGate unit requests a user
name and password. The FortiGate unit can verify the user’s credentials locally or
using an external LDAP or RADIUS server.
Authentication expires if the user leaves the connection idle for longer than the
authentication timeout period.
You need to determine the number and membership of your user groups appropriate
to your authentication needs.
To set up user groups
1 If external authentication is needed, configure RADIUS or LDAP servers. See
“RADIUS” on page 235 and “LDAP” on page 236.
2 Configure local user identities in User > Local. For each user, you can choose
whether the password is verified by the FortiGate unit, by a RADIUS server or by an
LDAP server. See “Local” on page 234.
3 Create user groups in User > User Group. Add local users as appropriate. See “User
group” on page 239.
You can also add a RADIUS or LDAP server to a user group. In this case, all users in
the external server’s database can authenticate.
This chapter describes:
Setting authentication timeout
Local
RADIUS
LDAP
User group