Fortinet Document Library

Version:


Table of Contents

Cookbook

6.2.0
Download PDF
Copy Link

Per-policy disclaimer messages

FortiOS supports a customizable captive portal to direct users to install or enable required software.

Per-policy custom disclaimers in each VDOM are supported. For example, you may want to configure three firewall policies, each of which matches traffic from endpoints with different FortiClient statuses:

Endpoint status

FortiOS behavior

Endpoint does not have FortiClient installed.

Traffic matches a firewall policy that displays an in-browser warning to install FortiClient from the provided link.

Endpoint has FortiClient installed, registered to EMS, and connected to the FortiGate.

Traffic matches a dynamic firewall policy which allows the endpoint to reach its destination via this policy.

Endpoint is deregistered from EMS and disconnected from the FortiGate.

Traffic matches another dynamic firewall policy that displays warning to register FortiClient to EMS.

To enable per-policy disclaimer messages:
config user setting
    set auth-cert "Fortinet_Factory"
    set per-policy-disclaimer enable
end
To configure per-policy disclaimers in the GUI:
  1. Ensure the per-policy disclaimer messages option is enabled.
  2. Go to Policy & Objects > IPv4 Policy.
  3. Edit the policy that applies when an endpoint does not have FortiClient installed.
  4. Under Disclaimer Options, enable Display Disclaimer.
  5. Enable Customize Messages then click Edit Disclaimer Message. The default disclaimer message is shown.
  6. Edit the message to warn users to install FortiClient, and provide the FortiClient download link.

  7. Click Save.
  8. Repeat the above steps for each policy that requires a custom disclaimer message.
To configure per-policy disclaimers in the CLI:
config firewall policy
    edit 1
        set name "111"
        set uuid c3ad8da0-bd7c-51e8-c0da-fe9053bf35ae
        set srcintf "port12"
        set dstintf "port11"
        set srcaddr "all"
        set dstaddr "pc155_address"
        set action accept
        set schedule "always"
        set service "ALL"
        set wsso disable
        set groups "ems_03_group"
        set disclaimer enable
        set replacemsg-override-group "test"
        set nat enable
    next
    edit 4
        set name "44"
        set uuid 686ea2ca-348d-51e9-9dca-b2b4b4aabbe2
        set srcintf "port12"
        set dstintf "port11"
        set srcaddr "all"
        set dstaddr "pc5-address"
        set action accept
        set schedule "always"
        set service "ALL"
        set wsso disable
        set groups "ems_03_group"
        set disclaimer enable
        set replacemsg-override-group "test2"
        set nat enable
    next
    edit 6
        set name "66"
        set uuid f1034e52-36d5-51e9-fbae-da21922ccd10
        set srcintf "port12"
        set dstintf "port11"
        set srcaddr "all"
        set dstaddr "all"
        set status disable
        set schedule "always"
        set service "ALL"
        set logtraffic all
        set fsso disable
        set block-notification enable
        set replacemsg-override-group "endpoint-override"
    next
end

Per-policy disclaimer messages

FortiOS supports a customizable captive portal to direct users to install or enable required software.

Per-policy custom disclaimers in each VDOM are supported. For example, you may want to configure three firewall policies, each of which matches traffic from endpoints with different FortiClient statuses:

Endpoint status

FortiOS behavior

Endpoint does not have FortiClient installed.

Traffic matches a firewall policy that displays an in-browser warning to install FortiClient from the provided link.

Endpoint has FortiClient installed, registered to EMS, and connected to the FortiGate.

Traffic matches a dynamic firewall policy which allows the endpoint to reach its destination via this policy.

Endpoint is deregistered from EMS and disconnected from the FortiGate.

Traffic matches another dynamic firewall policy that displays warning to register FortiClient to EMS.

To enable per-policy disclaimer messages:
config user setting
    set auth-cert "Fortinet_Factory"
    set per-policy-disclaimer enable
end
To configure per-policy disclaimers in the GUI:
  1. Ensure the per-policy disclaimer messages option is enabled.
  2. Go to Policy & Objects > IPv4 Policy.
  3. Edit the policy that applies when an endpoint does not have FortiClient installed.
  4. Under Disclaimer Options, enable Display Disclaimer.
  5. Enable Customize Messages then click Edit Disclaimer Message. The default disclaimer message is shown.
  6. Edit the message to warn users to install FortiClient, and provide the FortiClient download link.

  7. Click Save.
  8. Repeat the above steps for each policy that requires a custom disclaimer message.
To configure per-policy disclaimers in the CLI:
config firewall policy
    edit 1
        set name "111"
        set uuid c3ad8da0-bd7c-51e8-c0da-fe9053bf35ae
        set srcintf "port12"
        set dstintf "port11"
        set srcaddr "all"
        set dstaddr "pc155_address"
        set action accept
        set schedule "always"
        set service "ALL"
        set wsso disable
        set groups "ems_03_group"
        set disclaimer enable
        set replacemsg-override-group "test"
        set nat enable
    next
    edit 4
        set name "44"
        set uuid 686ea2ca-348d-51e9-9dca-b2b4b4aabbe2
        set srcintf "port12"
        set dstintf "port11"
        set srcaddr "all"
        set dstaddr "pc5-address"
        set action accept
        set schedule "always"
        set service "ALL"
        set wsso disable
        set groups "ems_03_group"
        set disclaimer enable
        set replacemsg-override-group "test2"
        set nat enable
    next
    edit 6
        set name "66"
        set uuid f1034e52-36d5-51e9-fbae-da21922ccd10
        set srcintf "port12"
        set dstintf "port11"
        set srcaddr "all"
        set dstaddr "all"
        set status disable
        set schedule "always"
        set service "ALL"
        set logtraffic all
        set fsso disable
        set block-notification enable
        set replacemsg-override-group "endpoint-override"
    next
end