Per-policy disclaimer messages
FortiOS supports a customizable captive portal to direct users to install or enable required software.
Per-policy custom disclaimers in each VDOM are supported. For example, you may want to configure three firewall policies, each of which matches traffic from endpoints with different FortiClient statuses:
|
Endpoint status |
FortiOS behavior |
|---|---|
|
Endpoint does not have FortiClient installed. |
Traffic matches a firewall policy that displays an in-browser warning to install FortiClient from the provided link. |
|
Endpoint has FortiClient installed, registered to EMS, and connected to the FortiGate. |
Traffic matches a dynamic firewall policy which allows the endpoint to reach its destination via this policy. |
|
Endpoint is deregistered from EMS and disconnected from the FortiGate. |
Traffic matches another dynamic firewall policy that displays warning to register FortiClient to EMS. |
The replacement message groups and policy disclaimer settings must be enabled.
To enable per-policy disclaimer messages in the GUI:
-
Go to System > Feature Visibility.
-
Enable Replacement Message Groups and Policy Disclaimer.
-
Click Apply.
To enable per-policy disclaimer messages in the CLI:
config system global
set gui-replacement-message-groups enable
endconfig system settings
set gui-policy-disclaimer enable
end
To configure per-policy disclaimers in the GUI:
-
Ensure the per-policy disclaimer messages option is enabled.
-
Go to Policy & Objects > Firewall Policy.
-
Edit the policy that applies when an endpoint does not have FortiClient installed.
-
Under Disclaimer Options, enable Display Disclaimer and Customize Messages.
-
Add a replacement message group:
-
Select an existing replacement message group from the dropdown and click Edit Disclaimer Message.
-
Click Create, enter a name, and click OK. Select the replacement message group and click Edit Disclaimer Message.
-
-
Edit the message to warn users to install FortiClient, and provide the FortiClient download link.
-
Click Save.
-
Repeat the above steps for each policy that requires a custom disclaimer message.
To configure per-policy disclaimers in the CLI:
config firewall policy
edit 1
set name "111"
set srcintf "port12"
set dstintf "port11"
set srcaddr "all"
set dstaddr "pc155_address"
set action accept
set schedule "always"
set service "ALL"
set wsso disable
set groups "ems_03_group"
set disclaimer enable
set replacemsg-override-group "test"
set nat enable
next
edit 4
set name "44"
set srcintf "port12"
set dstintf "port11"
set srcaddr "all"
set dstaddr "pc5-address"
set action accept
set schedule "always"
set service "ALL"
set wsso disable
set groups "ems_03_group"
set disclaimer enable
set replacemsg-override-group "test2"
set nat enable
next
edit 6
set name "66"
set srcintf "port12"
set dstintf "port11"
set srcaddr "all"
set dstaddr "all"
set status disable
set schedule "always"
set service "ALL"
set logtraffic all
set fsso disable
set block-notification enable
set replacemsg-override-group "endpoint-override"
next
end