Retail environment guest access
Businesses such as coffee shops provide free Internet access for customers. In this scenario, you do not need to configure guest management, as customers can access the WiFi access point without logon credentials.
However, consider that the business wants to contact customers with promotional offers to encourage future patronage. You can configure an email collection portal to collect customer email addresses for this purpose. You can configure a firewall policy to grant network access only to users who provide a valid email address. The first time a customer’s device attempts WiFi connection, FortiOS requests an email address, which it validates. The customers' subsequent connections go directly to the Internet without interruption.
This configuration consists of the following steps:
Creating an email collection portal
The customer’s first contact with your network is a captive portal that presents a webpage requesting an email address. When FortiOS has validated the email address, the customer’s device MAC address is added to the collected emails device group.
This example modifies the freewifi WiFi interface to present an email collection captive portal.
To configure the freewifi SSID to use an email collection portal in the GUI:
-
Enable email collection:
-
Go to System > Feature Visibility.
-
In the Additional Features section, enable Email Collection.
-
Click Apply.
-
-
Edit the freewifi SSID:
-
Go to WiFi & Switch Controller > SSIDs and edit the freewifi SSID.
-
In the Security Mode Settings section, set the Security mode to Captive Portal.
-
Set the Portal type to Email Collection.
-
Click OK.
-
To configure the freewifi SSID to use an email collection portal in the CLI:
config wireless-controller vap edit freewifi set security captive-portal set portal-type email-collect next end
Creating a firewall policy
You must configure a firewall policy that allows traffic to flow from the WiFi SSID to the internet interface only for members of the collected emails device group. This policy must be listed first. Unknown devices are not members of the collected emails device group, so they do not match the policy.
To create a firewall policy:
config firewall policy edit 3 set srcintf "freewifi" set dstintf "wan1" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ALL" set nat enable set email-collect enable next end
Checking for collected emails
When a WiFi user connects to the freewifi SSID, they are presented with a captive portal to enter their email address.
Once the user enters their email and clicks Continue, they will have access to the Internet. The collected emails can be verified in FortiOS.
To check for collected emails in the GUI:
-
Go to Dashboard > Users & Devices and click Add Widget.
-
In the User & Authentication section, select Collected Email and click Add Widget.
-
Click Close.
-
Click the Collected Email to expand to full view. The list of emails is displayed.
-
Optionally, click Export to export the data as a CSV or JSON file.
To check for collected emails in the CLI:
# diagnose firewall auth mac list 72:4d:e1:**:**:**, admin@fortinet.com type: email, id: 0, duration: 937, idled: 19 expire: 863980, allow-idle: 864000 flag(1000): src_idle packets: in 4753 out 4592, bytes: in 2662403 out 2458644 ----- 1 listed, 0 filtered ------