Configuring FSSO with Novell networks

Configuring FSSO with Novell networks You need to configure the eDirectory agent for it to communicate with eDirectory servers. You may have provided some of this information during installation. This section includes: Configuring the eDirectory agent Adding an eDirectory server Configuring a group filter   Configuring the eDirectory agent You need to configure the eDirectory […]

Configuring the FSSO TS agent for Citrix

Configuring the FSSO TS agent for Citrix   The FSSO TS agent works with the same FSSO Collector agent that is used for integration with Windows Active Directory. Install the Collector agent first. Follow the Collector agent installation procedure in Collector agent installation on page 562.   Configuration steps include: Install the Fortinet Citrix FSSO […]

Chapter 5 – Best Practices

Chapter 5 – Best Practices Overview This FortiGate Best Practices document is a collection of guidelines to ensure the most secure and reliable operation of FortiGate units in a customer environment. It is updated periodically as new issues are identified.   General Considerations 1. For security purposes, NAT mode is preferred because all of the […]

RADIUS SSO example

RADIUS SSO example A common RADIUS SSO topology involves a medium sized company network of users connecting to the Internet through the FortiGate unit, and authenticating with a RADIUS server. RADIUS SSO authentication was selected because it is fast and relatively easy to configure. This section includes: Assumptions Topology Configuring RADIUS Configuring FortiGate regular and […]

Examples and Troubleshooting Authentication

Examples and Troubleshooting This chapter provides an example of a FortiGate unit providing authenticated access to the Internet for both Windows network users and local users. The following topics are included in this section: Firewall authentication example LDAP Dial-in using member-attribute example RADIUS SSO example Troubleshooting Firewall authentication example Example configuration Overview In this example, there […]