01-01-2022 07:41 AM
Hi,
I have a scenario where multiple offices (different customers) are connecting with same data center via FortiGate firewall IPsec tunnel and SSL users (Forti client). We wanted to manually allow each Laptop/ Mobile device (non domain) connecting with us. All device uses LDAP credentials to login SSL as well as to access network resources.
If we deploy Cisco ISE in our network, can we control all remote devices (laptops and mobiles) who get authentication from LDAP to connect with our resources? We want to ensure each employee login only from allowed device even they have credentials to connect but without our permission they shouldn't get connected.
Thanks.
Solved! Go to Solution.
01-06-2022 01:46 PM
Hello @Rizwan Haider
If your question relates to the Fortigate VPN authentication with ISE, then yes that is doable.
The Fortigate VPN would need to send RADIUS requests to ISE to request Authentication/Authorization. I haven't done this myself, and I am not sure what version of Fortigate you're using, but perhaps you can follow the hints in this Cookbook to setup how to talk to ISE? If the Fortigate device requires custom RADIUS attribute responses from ISE, then you can check out this link that discusses how to do that in ISE.
01-06-2022 01:46 PM
Hello @Rizwan Haider
If your question relates to the Fortigate VPN authentication with ISE, then yes that is doable.
The Fortigate VPN would need to send RADIUS requests to ISE to request Authentication/Authorization. I haven't done this myself, and I am not sure what version of Fortigate you're using, but perhaps you can follow the hints in this Cookbook to setup how to talk to ISE? If the Fortigate device requires custom RADIUS attribute responses from ISE, then you can check out this link that discusses how to do that in ISE.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide