By Manny Fernandez

June 26, 2020

Dynamic VLANs with Single SSID using FortiAP and FortiAuthenticator

First and foremost, a special shout out to a friend that helped with this config.  Juan Perez, thank you brother.

Use Case: Customer wants a single SSID in his environment. He wants Teachers on a VLAN once they connect on a managed workstation (AD Member), Students on a different VLAN when THEY connect on managed workstation, Computers to authenticate and kept in a Computer VLAN until the user logs in, and a BYOD VLAN for the users connecting with personal devices. These use cases can be delivered via an 802.1x PEAP configuration on FortiAuthenticator

Setting up AD Groups

First lets create two groups and two test users.

Screen Shot 2020-06-03 at 8.39.41 PM

Here we create two AD groups; Teacher and Student

Screen Shot 2020-06-03 at 8.41.53 PM

I then created a user and added him to the Student group.

Screen Shot 2020-06-03 at 8.42.31 PM

Likewise, I created a user and added HIM to the Teacher group.

 

FortiGate Configuration

Now we are going to configure the pieces we are going to need

Creating the VLAN Interface

2020-06-03_21-45-50

Here we have the SSID at the top where all devices will connect to.  We are create VLAN below this SSID interface.  Each VLAN corresponds to the different types of connection we want to handle.

2020-06-03_19-28-42

Here is an example of what an interface looks like.  We can see it is a VLAN and it is attached to the ISOLATED interface.  Assign an IP address and mask, enabled DHCP and save.  Repeat for the other interfaces.

Creating RADIUS Server

2020-06-03_22-03-50

Go to User & Device (6.2.2 and below) RADIUS Server, then Create New.  Enter the IP address of the FAC server and the Secret key.

SSID Configuration

On the SSID configured on the Fortigate, you will need to modify the config

2020-06-03_21-05-14

Here we can see that we are choosing  WPA2 Enterprise as the Security Mode, Choose the RADIUS Server as the Authentication and from the drop-down, choose your RADIUS server you recently set up.  You also want to enable the Dynamic VLAN assignment.

Policies

We are going to need policies for these devices to browse the Internet and specifically for the Computer , Teacher and Student networks, you will need to define access to the internal resources as needed.

2020-06-03_21-01-10

In this example, I have only created the Outbound policies to permit Internet. But more will be needed.

Also remember to add either a Central NAT policy or configure the Policy NAT inside each policy.

FortiAuthenticator (FAC) Configuration

Now we will configure the FAC.

Creating FAC Groups

2020-06-03_22-19-42

We need to create 4 groups representing the 4 types of users (Teachers, Students, Computers and BYOD). As you can see, these groups are either Local or Remote LDAP.

Each group is going to require some modifications

2020-06-03_20-21-06

2020-06-03_20-18-24

We are going to choose Default under the Vendor section.  Then choose Tunnel-Private-Group-ID, then under the Value section you will need to enter the VLAN ID for this group.

2020-06-03_20-20-04

Next, you need to add Tunnel-Type and choose VLAN from the drop down list.

2020-06-03_20-20-46

Next we are going to configure Tunnel-Medium-Type and choose IEEE-802 from the drop down.

You will need to do the same to each group.  Make sure you change the VLAN ID for each group.

For the Student and Teacher AD Group, you will need to create a filter so that it pulls the users from the respective AD groups.

2020-06-03_20-47-15

Here is the filter for the Student AD group.  The filter is as follows:

(&(objectCategory=user)(memberOf=CN=Student,OU=Lab-Groups,DC=myinfoseclab,DC=local))

2020-06-03_20-48-50

Here is the filter for the Teacher group.

(&(objectCategory=user)(memberOf=CN=Teacher,OU=Lab-Groups,DC=myinfoseclab,DC=local))

Creating RADIUS Client

Now we are going to configure the RADIUS Client

I want to make a point here.  I have configured a RADIUS client previously for VPNs in a previous post.  Within the same RADIUS client configuration, you can create multiple profiles that represent different options.  So the same RADIUS client configuration will handle the remote access VPN as well as the WiFi configuration we are doing here.

2020-06-04_21-10-41

You can see the Profiles in the screenshot above.

Let’s get started with the profile configuration

2020-06-04_23-56-50

We will need to enable Apply this profile based on RADIUS attributes. Here we are defining the SSID name being sent to the RADIUS server.  The Vendor is Default and the Attribute ID is available from the drop down and is Called-Station-id and the Value is the SSID exactly as it is configured on the FortiGate.

2020-06-05_00-06-53

Now we need to configure the Device Authentication portion.  We are going to configure the Only machine-authentication to the group we created earlier named Computer.  Then configure Only user-authenticated  to BYOD which we created earlier.

2020-06-05_00-20-30

Now we see the final section of the RADIUS client configuration; User Authentication.  Choose the Realm and enable the User Windows AD Domain authentication and save.

Setting up the WiFi GPO

Here is the configuration

Screen Shot 2020-06-19 at 12.41.33 PM

Screen Shot 2020-06-19 at 12.44.06 PM

 

Screen Shot 2020-06-19 at 12.44.24 PM

Screen Shot 2020-06-19 at 12.44.57 PM

Screen Shot 2020-06-19 at 12.46.23 PM

 

 

Recent posts

  • There are many options when troubleshooting in FortiGate firewalls. ... Full Story

  • Have you ever had an IPS signature that continues... Full Story

  • Use case:  Customer has a Split Tunnel Enabled but... Full Story