Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

EMS Administration Guide

Configuring FortiOS 6.2 dynamic policies using EMS dynamic endpoint groups

FortiOS 6.2 uses the FSSO protocol to retrieve dynamic endpoint groups from EMS. The following instructions only apply when using FortiOS 6.2.

The following configuration is necessary for this feature:

  1. In FortiClient EMS, create Zero Trust tagging rules. See Adding a Zero Trust tagging rule set.
  2. After Telemetry communication has occurred between EMS and FortiClient, ensure that EMS has dynamically grouped endpoints based on the Zero Trust tagging rules. See Zero Trust Tag Monitor.
  3. In FortiOS, create the EMS Fabric connector.
  4. Configure FSSO settings.
  5. In FortiOS, create a user group based on EMS dynamic endpoint groups.
  6. In FortiOS, create a dynamic firewall policy for the user group.

EMS can be connected to a maximum of three FortiGates at a time via the FSSO protocol.

To create the EMS Fabric connector in FortiOS:

You can create the EMS Fabric connector in the FortiOS GUI or CLI. If desired, you can optionally configure the Fabric connector with an SSL certificate and a password for FSSO. If configured, you must configure the same certificate and password in EMS to ensure a successful connection.

  1. Go to Security Fabric > Fabric Connectors.
  2. Click Create New, then select FortiClient EMS.
  3. In the Name field, enter the desired name.
  4. For Type, select FortiClient EMS.
  5. In the Primary Server IP field, enter the EMS IP address. If EMS multitenancy is enabled, you must enter the FQDN instead of the IP address. You must enter the FQDN in the format side.fqdn to integrate the FortiGate to the a specific EMS multitenancy site. For example, if the site name is site A, enter sitea.ems.example.com. See Multitenancy.
  6. (Optional) From the Trusted SSL certificate dropdown list, select the certificate.
  7. (Optional) In the Password field, enter the desired password.
  8. Click Apply & Refresh.
To configure EMS FSSO Settings:

If you configured a certificate and/or password in To create the EMS Fabric connector in FortiOS:, you must configure the same certificate and password in EMS.

  1. If you configured a certificate for the EMS Fabric connector in FortiOS, do the following:
    1. In FortiOS, go to System > Certificates.
    2. Right-click the configured certificate, then select Download.
  2. In EMS, go to System Settings > EMS Settings.
  3. For SSL certificate, browse to and upload the certificate downloaded in step 1.
  4. In the Configure FSSO Password field, enter the password.
  5. Click Save.
To create a user group based on EMS dynamic groups:
  1. In FortiOS, go to User & Device > User Groups. Click Create New.
  2. In the Name field, enter the desired name.
  3. For Type, select Fortinet Single Sign-On (FSSO).
  4. In the Members field, click +. The Select Entries pane appears. Select the dynamic endpoint groups pulled from EMS.

  5. Select the desired dynamic endpoint groups. Endpoints that currently belong to this EMS dynamic endpoint group will be members of this FortiOS user group.
  6. Click OK.
To create a dynamic firewall policy for the user group:

You can now create a dynamic firewall policy for the user group. In this example, an IPv4 policy is created for the user group.

  1. In FortiOS, go to Policy & Objects > IPv4 Policy. Click Create New.
  2. In the Source field, click +. The Select Entries pane appears. On the User tab, select the user group configured above.
  3. Configure other options as desired. Click OK.
  4. Go to Policy & Objects > IPv4 Policy to ensure the policy was created and applied to the desired user group. FortiOS will update this policy when it receives updates from EMS.

Configuring FortiOS 6.2 dynamic policies using EMS dynamic endpoint groups

FortiOS 6.2 uses the FSSO protocol to retrieve dynamic endpoint groups from EMS. The following instructions only apply when using FortiOS 6.2.

The following configuration is necessary for this feature:

  1. In FortiClient EMS, create Zero Trust tagging rules. See Adding a Zero Trust tagging rule set.
  2. After Telemetry communication has occurred between EMS and FortiClient, ensure that EMS has dynamically grouped endpoints based on the Zero Trust tagging rules. See Zero Trust Tag Monitor.
  3. In FortiOS, create the EMS Fabric connector.
  4. Configure FSSO settings.
  5. In FortiOS, create a user group based on EMS dynamic endpoint groups.
  6. In FortiOS, create a dynamic firewall policy for the user group.

EMS can be connected to a maximum of three FortiGates at a time via the FSSO protocol.

To create the EMS Fabric connector in FortiOS:

You can create the EMS Fabric connector in the FortiOS GUI or CLI. If desired, you can optionally configure the Fabric connector with an SSL certificate and a password for FSSO. If configured, you must configure the same certificate and password in EMS to ensure a successful connection.

  1. Go to Security Fabric > Fabric Connectors.
  2. Click Create New, then select FortiClient EMS.
  3. In the Name field, enter the desired name.
  4. For Type, select FortiClient EMS.
  5. In the Primary Server IP field, enter the EMS IP address. If EMS multitenancy is enabled, you must enter the FQDN instead of the IP address. You must enter the FQDN in the format side.fqdn to integrate the FortiGate to the a specific EMS multitenancy site. For example, if the site name is site A, enter sitea.ems.example.com. See Multitenancy.
  6. (Optional) From the Trusted SSL certificate dropdown list, select the certificate.
  7. (Optional) In the Password field, enter the desired password.
  8. Click Apply & Refresh.
To configure EMS FSSO Settings:

If you configured a certificate and/or password in To create the EMS Fabric connector in FortiOS:, you must configure the same certificate and password in EMS.

  1. If you configured a certificate for the EMS Fabric connector in FortiOS, do the following:
    1. In FortiOS, go to System > Certificates.
    2. Right-click the configured certificate, then select Download.
  2. In EMS, go to System Settings > EMS Settings.
  3. For SSL certificate, browse to and upload the certificate downloaded in step 1.
  4. In the Configure FSSO Password field, enter the password.
  5. Click Save.
To create a user group based on EMS dynamic groups:
  1. In FortiOS, go to User & Device > User Groups. Click Create New.
  2. In the Name field, enter the desired name.
  3. For Type, select Fortinet Single Sign-On (FSSO).
  4. In the Members field, click +. The Select Entries pane appears. Select the dynamic endpoint groups pulled from EMS.

  5. Select the desired dynamic endpoint groups. Endpoints that currently belong to this EMS dynamic endpoint group will be members of this FortiOS user group.
  6. Click OK.
To create a dynamic firewall policy for the user group:

You can now create a dynamic firewall policy for the user group. In this example, an IPv4 policy is created for the user group.

  1. In FortiOS, go to Policy & Objects > IPv4 Policy. Click Create New.
  2. In the Source field, click +. The Select Entries pane appears. On the User tab, select the user group configured above.
  3. Configure other options as desired. Click OK.
  4. Go to Policy & Objects > IPv4 Policy to ensure the policy was created and applied to the desired user group. FortiOS will update this policy when it receives updates from EMS.