Fortinet white logo
Fortinet white logo

Cookbook

Configuring the FortiGate to allow access to Google

Configuring the FortiGate to allow access to Google

  1. On the FortiGate, configure firewall addresses to allow users to access the Google login page.
  2. The following step can be performed in the GUI, but may take considerably longer than using the CLI. You can copy and paste the commands below.

    Open the CLI Console and enter the following, which creates the firewall addresses and adds them to a firewall address group called Google_Auth.

    config firewall address

    edit "www.googleapis.com"

    set type fqdn

    set fqdn "www.googleapis.com"

    next

    edit "accounts.google.com"

    set type fqdn

    set fqdn "accounts.google.com"

    next

    edit "ssl.gstatic.com"

    set type fqdn

    set fqdn "ssl.gstatic.com"

    next

    edit "fonts.gstatic.com"

    set type fqdn

    set fqdn "fonts.gstatic.com"

    next

    edit "www.gstatic.com"

    set type fqdn

    set fqdn "www.gstatic.com"

    next

    edit "Google_13"

    set subnet 216.58.192.0 255.255.224.0

    next

    end

    config firewall addrgrp

    edit "Google_Auth"

    set member "ssl.gstatic.com" "accounts.google.com" "www.googleapis.com" "fonts.gstatic.com" "www.gstatic.com" "Google_13"

    next

    end

  3. Go to Policy & Objects > IPv4 Policy and create a policy for Google authentication traffic.
  4. Set Incoming Interface to the WiFi SSID interface and set Source Address to all.

    Set Outgoing Interface to the Internet-facing interface and set Destination Address to Google_Auth.

    Set Service to ALL and enable NAT. Configure Security Profiles accordingly.

  5. Then open the CLI Console. Using the policy's ID, enter the following command to exempt the Google authentication traffic policy from the captive portal:
  6. config firewall policy

    edit <policy_id>

    set captive-portal-exempt enable

    next

    end

    This command allows access to the external captive portal.

Configuring the FortiGate to allow access to Google

Configuring the FortiGate to allow access to Google

  1. On the FortiGate, configure firewall addresses to allow users to access the Google login page.
  2. The following step can be performed in the GUI, but may take considerably longer than using the CLI. You can copy and paste the commands below.

    Open the CLI Console and enter the following, which creates the firewall addresses and adds them to a firewall address group called Google_Auth.

    config firewall address

    edit "www.googleapis.com"

    set type fqdn

    set fqdn "www.googleapis.com"

    next

    edit "accounts.google.com"

    set type fqdn

    set fqdn "accounts.google.com"

    next

    edit "ssl.gstatic.com"

    set type fqdn

    set fqdn "ssl.gstatic.com"

    next

    edit "fonts.gstatic.com"

    set type fqdn

    set fqdn "fonts.gstatic.com"

    next

    edit "www.gstatic.com"

    set type fqdn

    set fqdn "www.gstatic.com"

    next

    edit "Google_13"

    set subnet 216.58.192.0 255.255.224.0

    next

    end

    config firewall addrgrp

    edit "Google_Auth"

    set member "ssl.gstatic.com" "accounts.google.com" "www.googleapis.com" "fonts.gstatic.com" "www.gstatic.com" "Google_13"

    next

    end

  3. Go to Policy & Objects > IPv4 Policy and create a policy for Google authentication traffic.
  4. Set Incoming Interface to the WiFi SSID interface and set Source Address to all.

    Set Outgoing Interface to the Internet-facing interface and set Destination Address to Google_Auth.

    Set Service to ALL and enable NAT. Configure Security Profiles accordingly.

  5. Then open the CLI Console. Using the policy's ID, enter the following command to exempt the Google authentication traffic policy from the captive portal:
  6. config firewall policy

    edit <policy_id>

    set captive-portal-exempt enable

    next

    end

    This command allows access to the external captive portal.