FortiGate Traffic Shaping Configuration

Traffic shaping is a method of optimizing network traffic by prioritizing different types of traffic according to their importance. FortiGate firewall offers a traffic shaping feature that can be used to prioritize traffic, limit bandwidth usage, and control network congestion. In this blog post, we’ll discuss how to configure traffic shaping on FortiGate firewall.

Fortigate Traffic Shaping

Step 1: Configure Traffic Shaping Policy

  1. Login to your FortiGate firewall and go to Policy & Objects > Policy > IPv4 Policy. Here you can create a new policy or edit an existing policy to configure traffic shaping settings.
  2. In the policy settings, go to the Traffic Shaping tab and select the Enable Traffic Shaping checkbox.
  3. Select the traffic shaping algorithm that you want to use from the Algorithm dropdown list. You can choose between fair queuing, weighted fair queuing, and priority queuing.
  4. Set the maximum bandwidth for the policy in the Maximum Bandwidth field. You can also set the minimum bandwidth and maximum burst size if needed.

Step 2: Configure Traffic Shaping Profiles

  1. In this step, you’ll create traffic shaping profiles that can be used in traffic shaping policies. Go to Policy & Objects > Traffic Shaping > Profiles and create a new profile.
  2. In the profile settings, you can configure different traffic shaping parameters such as maximum bandwidth, minimum bandwidth, and maximum burst size.
  3. You can also set traffic shaping rules for specific applications or traffic types by creating a new traffic shaping rule in the profile settings.

Step 3: Configure Traffic Shaping Classes

  1. Traffic shaping classes are used to categorize traffic and apply different traffic shaping policies to different traffic classes. Go to Policy & Objects > Traffic Shaping > Classes and create a new class.
  2. In the class settings, you can configure different traffic shaping parameters for the class such as maximum bandwidth, minimum bandwidth, and maximum burst size.
  3. You can also assign traffic shaping profiles to the class by selecting the profile from the Profile dropdown list.

Step 4: Assign Traffic Shaping Classes to Policies

  1. Once you’ve created traffic shaping policies, profiles, and classes, you need to assign the traffic shaping classes to the policies. Go to Policy & Objects > Policy > IPv4 Policy and edit the policy that you want to assign the traffic shaping class to.
  2. In the policy settings, go to the Traffic Shaping tab and select the Enable Traffic Shaping checkbox.
  3. Select the traffic shaping class that you want to assign to the policy from the Traffic Shaping Class dropdown list.

Step 5: Monitor Traffic Shaping

  1. After you’ve configured traffic shaping on your FortiGate firewall, you can monitor the traffic shaping statistics to ensure that the traffic shaping is working properly. Go to FortiView > Traffic Shaping to view the traffic shaping statistics.
  2. In the traffic shaping view, you can see the traffic shaping policies, classes, and profiles that are currently active. You can also view the bandwidth usage and packet loss statistics for each policy.

Conclusion: Traffic shaping is a powerful feature that can be used to optimize network traffic and improve network performance on FortiGate firewall. By following the above steps, you can easily configure traffic shaping on FortiGate firewall and start using it to prioritize traffic, limit bandwidth usage, and control network congestion. Make sure to monitor the traffic shaping statistics regularly to ensure that it’s working properly.

Fortigate Captive Portal Configuration

A captive portal is a web page that is presented to users when they attempt to connect to a network. Captive portals are commonly used in public Wi-Fi hotspots, hotels, and other places where the network owner wants to control the access to the network. FortiGate firewall offers a captive portal feature that can be used to authenticate users and control network access. In this blog post, we’ll discuss how to configure captive portal on FortiGate firewall.

Fortigate Captive Portal Configuration

Step 1: Configure FortiGate Firewall

  1. Login to your FortiGate firewall and go to User & Device > Authentication > Captive Portal. Here you can configure the captive portal settings such as authentication method, user groups, and web page settings.
  2. Configure User Groups: In this step, you’ll create user groups to which users will be assigned after authentication. Go to User & Device > User Groups and create the user groups that you want to use for captive portal authentication.
  3. Configure Web Page Settings: In this step, you’ll configure the web page settings for the captive portal. You can upload your own HTML file or use the default web page provided by FortiGate firewall.

Step 2: Configure Authentication Method

  1. FortiGate firewall supports various authentication methods for captive portal, including local users, RADIUS, LDAP, and TACACS+. Choose the authentication method that you want to use and configure it accordingly.
  2. If you’re using local user authentication, go to User & Device > User > User Definition and create the local users that you want to use for captive portal authentication.

Step 3: Configure Firewall Policies

  1. Once you’ve configured the captive portal settings and authentication method, you need to create firewall policies to allow traffic to and from the captive portal. Go to Policy & Objects > IPv4 Policy and create a new policy for the captive portal traffic.
  2. In the source field, select the interface where the captive portal will be presented. In the destination field, select the destination address range for the captive portal. In the service field, select the HTTP and HTTPS services.

Step 4: Test the Captive Portal

  1. Once you’ve completed the configuration, you can test the captive portal by connecting to the network and attempting to access the internet. You should be presented with the captive portal login page.
  2. Enter the username and password that you created in the authentication method configuration and click login. If the authentication is successful, you should be redirected to the internet.

Conclusion: Captive portal is a powerful feature that can be used to authenticate users and control network access on FortiGate firewall. By following the above steps, you can easily configure captive portal on FortiGate firewall and start using it to control network access. Make sure to test the captive portal after configuration to ensure that it’s working properly.