Configuring the FortiGate to allow access to Google
- On the FortiGate, configure firewall addresses to allow users to access the Google login page.
- Go to Policy & Objects > IPv4 Policy and create a policy for Google authentication traffic.
- Then open the CLI Console. Using the policy's ID, enter the following command to exempt the Google authentication traffic policy from the captive portal:
The following step can be performed in the GUI, but may take considerably longer than using the CLI. You can copy and paste the commands below.
Open the CLI Console and enter the following, which creates the firewall addresses and adds them to a firewall address group called Google_Auth.
config firewall address
edit "www.googleapis.com"
set type fqdn
set fqdn "www.googleapis.com"
next
edit "accounts.google.com"
set type fqdn
set fqdn "accounts.google.com"
next
edit "ssl.gstatic.com"
set type fqdn
set fqdn "ssl.gstatic.com"
next
edit "fonts.gstatic.com"
set type fqdn
set fqdn "fonts.gstatic.com"
next
edit "www.gstatic.com"
set type fqdn
set fqdn "www.gstatic.com"
next
edit "Google_13"
set subnet 216.58.192.0 255.255.224.0
next
end
config firewall addrgrp
edit "Google_Auth"
set member "ssl.gstatic.com" "accounts.google.com" "www.googleapis.com" "fonts.gstatic.com" "www.gstatic.com" "Google_13"
next
end
Set Incoming Interface to the WiFi SSID interface and set Source Address to all.
Set Outgoing Interface to the Internet-facing interface and set Destination Address to Google_Auth.
Set Service to ALL and enable NAT. Configure Security Profiles accordingly.
config firewall policy
edit <policy_id>
set captive-portal-exempt enable
next
end
This command allows access to the external captive portal.