{"id":60316,"date":"2022-03-30T11:00:00","date_gmt":"2022-03-30T15:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=60316"},"modified":"2024-02-08T11:07:37","modified_gmt":"2024-02-08T16:07:37","slug":"manage-and-secure-remote-access-to-fortinet-network-appliances","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/manage-and-secure-remote-access-to-fortinet-network-appliances","title":{"rendered":"Manage and Secure Remote Access to Fortinet Network Appliances"},"content":{"rendered":"\n
Work from anywhere isn\u2019t restricted to employees at small to medium-sized enterprises (SMEs). Many IT teams and managed service providers (MSPs) work in distributed teams, which necessitates securing access to network infrastructure and timely user lifecycle management. However, these foundational security controls are too often disregarded when internal budgets, or asking a client to spend more for remote access, fail to address the potential security risks.<\/p>\n\n\n\n
This article is the first in a series of how-tos that demonstrate how to use JumpCloud\u2019s capabilities to achieve better security with minimal costs using a centralized platform that includes everything required to secure access to your appliance. It has the added bonus of providing single sign-on (SSO) beyond this scenario, delivering identity and access management (IAM) for every service your organization may use, and eliminating managing passwords everywhere<\/em>.<\/p>\n\n\n\n Fortinet is the maker of some of the most popular next-generation firewalls (NGFW), and its devices have interfaces to either use its security products or to configure external providers. The prerequisites to secure Fortinet NGFW access with JumpCloud\u2019s services are:<\/p>\n\n\n\n JumpCloud makes it possible for a RADIUS challenge to incorporate TOTP tokens from JumpCloud Protect<\/a>\u2122 multi-factor authentication (MFA). User passwords are amended to include a token every time a user logs into the appliance. Users are managed from within JumpCloud\u2019s directory groups, which are bound with a RADIUS configuration that\u2019s specific to your NGFW. The directory determines that every group within that group must be enrolled with MFA services to log into any service that JumpCloud connects them to, including your firewall appliance. A service account on the Fortinet device determines what level of admin rights are assigned.<\/p>\n\n\n\n Every JumpCloud account includes RADIUS services, which are configured<\/a> using the following steps.<\/p>\n\n\n\n To configure RADIUS MFA for a new server:<\/p>\n\n\n\n Note that we recommend using EAP-TTLS\/PAP, but Fortinet doesn\u2019t support it<\/a> at this time.<\/p>\n\n\n\n\n
\n
Three Pillars for Better Access Control<\/h2>\n\n\n\n
Setting Up JumpCloud RADIUS, MFA<\/h3>\n\n\n\n
\n
\n
\n
\n
\n
\n