Basic Private SASE-7.2.5-Deployment Guide
Basic Private SASE-7.2.5-Deployment Guide
Deployment Guide
Version 7.2.5
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTIGUARD LABS
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
Change Log 4
Deployment overview 5
Intended audience 6
Design concept and considerations 6
FortiClient EMS 6
FortiClient onboarding 6
Full tunnel VPN 6
VPN auto-connect 7
SSL deep packet inspection 7
Authentication methods 7
Posture checks using ZTNA Tags 7
Product prerequisites 8
Deployment plan 8
Deployment procedures 9
Configuring FortiClient EMS 9
FortiClient EMS system settings 9
FortiClient onboarding 11
Endpoint Profile configuration 12
Zero Trust Tags 15
On-Fabric detection rules 16
Deploying endpoint policy 17
Configuring FortiGate 19
Configuring address objects 19
Configuring authentication sources 19
Configuring user groups 20
Configuring FortiClient EMS connector 20
Configuring full tunnel VPN 21
Testing Private SASE deployment 23
Network Topology 23
Network Description 23
Viewing FortiClient user details 24
Connecting to the full tunnel VPN and accessing services 26
Running vulnerability scan 29
More information 32
Appendix A: Products used in this guide 32
Appendix B: Documentation references 32
Feature documentation 32
Deployment overview
Private SASE, short for Private Secure Access Service Edge, is a tailored method of implementing the SASE framework.
It involves customizing and fine-tuning crucial configurations by utilizing various Fortinet solutions such as FortiGate,
FortiClient EMS, FortiAuthenticator, FortiClient and more, in a coordinated manner to provide a solution akin to
FortiSASE. FortiSASE, on the other hand, is cloud based Software as a Service (SaaS) networking solution seamlessly
integrating both networking and security services within a unified platform hosted in the Fortinet Cloud.
This basic deployment guide illustrates the process of setting up a next-generation FortiGate firewall as a Point of
Presence. Remote users use agent-based FortiClient application for user onboarding. After user onboarding,
FortiClient's auto-connect feature enables them to automatically establish a full tunnel VPN (Virtual Private Network)
connection thereby securing remote user’s traffic. VPNs allows users to establish a secure and encrypted connection to
a private network or internal resources over the public Internet. A full tunnel VPN (Virtual Private Network) is a type of
VPN configuration in which all of the network traffic from a user's device is routed through the VPN connection to a
remote VPN server that in our case is FortiGate. The FortiGate then forwards the traffic to the destination on the internet
or within the private network. Subsequently, FortiGate is configured to inspect the encrypted traffic of remote users
thoroughly by using deep packet inspection. FortiClient EMS Server is used to centrally manage the FortiClient
application as an Endpoint Protection Platform (EPP) using endpoint profiles, endpoint posture assessments and access
control using ZTNA tags that are utilized by the FortiGate to allow or deny access to network resources. Below are the
typical scenarios where Private SASE finds practical application.
These basic use cases above can extend to use multiple FortiGate to act as multiple Point of Presence such that
endpoints to connect to the nearest one by using products that use DNS based load-balancing thereby reducing traffic
latency. Deployment of Multiple Point of Presence is out of scope of this deployment guide.
Intended audience
Mid-level network and security architects, engineers, and administrators in companies of all sizes and verticals looking to
understand and deploy a basic Private SASE solution using Fortinet products should find this guide helpful. A working
knowledge of Fortinet products like FortiGate, FortiClient EMS Server, FortiClient and FortiAuthenticator is helpful.
The following are some design concepts and considerations that are pre-requisites to deploy the Private SASE solution.
FortiClient EMS
The FortiClient EMS is used to ease and scale the configuring, management, and upgrading of FortiClient endpoints. In
the Private SASE deployment, the FortiClient EMS is used to configure endpoint profiles, install CA certificates for SSL
Deep inspection, configure ZTNA tagging rules, and evaluate endpoint security posture. If you choose to position the
FortiClient EMS Server behind a NAT device, it becomes imperative to ensure that the essential communication ports
are accessible to facilitate seamless interaction between FortiClient endpoints and the FortiClient EMS. See Required
services and ports for up to date information regarding opening essential ports.
FortiClient onboarding
FortiClient Onboarding involves the installation of FortiClients on remote endpoints and configuring them to establish a
connection with FortiClient EMS, to enable centralized management. Installation of FortiClient application is done by
different methods like Microsoft System Center Configuration Manager (SCCM), group policy object (GPO), Mobile
device management (MDM) or by sending FortiClient installer link to end users. Once FortiClient is installed, users that
connect to FortiClient EMS can be authenticated using local, LDAP, SAML authentication. The FortiClient onboarding on
page 11 topic discusses this in detail.
In a full tunnel VPN, all network traffic from the user endpoint is routed through the VPN connection to the remote
network or Internet to effectively examine all traffic initiated by remote users. It is essential that this traffic traverses
through the FortiGate once it establishes a connection with the Point of Presence i.e FortiGate, for inspection. Therefore,
a full VPN tunnel is required for Private SASE deployment. Ensure you have an ample amount of bandwidth from your
FortiGate's internet service provider to accommodate the bandwidth requirements of all your remote users. There are
two types of full VPN tunnels that are widely used, namely, IPSec or SSLVPN. This deployment guide discusses full
tunnel SSL VPN in detail.
VPN auto-connect
The VPN auto-connect feature in FortiClient is designed for seamless VPN connectivity. When this feature is enabled,
FortiClient running in the background automatically initiates a VPN connection to the configured VPN server. It enables
the remote users to connect to the VPN automatically without their manual intervention thus securing their traffic as soon
as their device boots up. Once the endpoint connects to VPN, all of the user’s traffic starts to flow through the FortiGate
for inspection. For more information, see VPN autoconnect.
Once the remote endpoints connect to VPN and begin to send encrypted traffic through the VPN tunnel, it is mandatory
to decrypt the encrypted user traffic first in order to inspect the traffic for malicious content. This requires deep packet
inspection by the FortiGate where it needs to act as Man-in-the-middle to perform such inspection. Deep packet
inspection is a CPU intensive task, so ensure you choose a FortiGate model that has enough CPU cores to handle the
volume of endpoint user traffic.
Authentication methods
Different authentication methods are available during FortiClient Onboarding i.e. when it connects to the FortiClient
EMS, and when a FortiClient user initiates a connection to establish a full tunnel VPN. For authentication of FortiClient
user when it connects to FortiClient EMS, the user authentication is configured on FortiClient EMS whereas for full tunnel
VPN the user authentication is configured on FortiGate. The common authentication mechanisms used in both situations
are:
1. Different authentication methods on FortiGate to authenticate to full tunnel VPN are:
a. Local authentication
b. LDAP authentication
c. Radius authentication
d. PKI authentication
e. SAML authentication
For more information, see SSL VPN Authentication.
2. Different authentication methods on FortiClient EMS for FortiClient user verification are:
a. None
b. Local authentication
c. LDAP Authentication
d. SAML Authentication
For more information, see User Management.
Posture checks using Zero Trust Tags are used to continuously evaluate the security posture of an endpoint. You can
create Zero Trust tagging rules for endpoints based on their operating system versions, logged in domains, running
processes, and other criteria on the FortiClient EMS. ZTNA tags are shared with FortiGate continuously using FortiClient
EMS Security Fabric connector. FortiGate can then utilize these ZTNA tags for role based access control to allow or
deny access to the user traffic.
Optionally, to improve VPN security ZTNA Tags are also used to allow or deny remote users to connect to VPN tunnel
depending on the ZTNA tag the endpoints are assigned, see VPN connection based on ZTNA tag.
Product prerequisites
The Private SASE solution adopts the use of FortiGate, FortiClient EMS, FortiClient and FortiAuthenticator and other
Fortinet products to deliver a Private SASE solution. The major use case of these products to deploy Private SASE
solution are as follows:
1. FortiGate: Used as a SASE Point of Presence.
2. FortiClient EMS: Used as a central endpoint management server to deploy endpoint profiles, installing CA
certificates for SSL Deep inspection, configuring ZTNA tagging rules, evaluating endpoint security posture and
other EPP functions.
3. FortiClient: Agent-based endpoint solution to connect to geographically nearest FortiGate or Point of Presence.
4. FortiAuthenticator (Optional): Used as a central authentication server.
These products must be licensed with the respective service contracts of the features that are used in the deployment.
For more information about licensing of the above individual products, See Ordering Guides.
Deployment plan
The deployment guide assumes that FortiGate, FortiClient EMS, and FortiAuthenticator are configured with the essential
network connectivity settings so that they can be managed by an Administrator using the Graphical User Interface.
The steps below outline the general steps involved to deploy the basic Private SASE solution.
1. Configuring FortiClient EMS on page 9
a. FortiClient EMS system settings on page 9
b. FortiClient onboarding on page 11
c. Endpoint Profile configuration on page 12
d. Zero Trust Tags on page 15
e. On-Fabric detection rules on page 16
f. Deploying endpoint policy on page 17
2. Configuring FortiGate on page 19
a. Configuring address objects on page 19
b. Configuring authentication sources on page 19
c. Configuring user groups on page 20
d. Configuring FortiClient EMS connector on page 20
e. Configuring full tunnel VPN on page 21
3. Testing Private SASE deployment on page 23
a. Viewing FortiClient user details on page 24
b. Connecting to the full tunnel VPN and accessing services on page 26
c. Running vulnerability scan on page 29
Deployment procedures
The deployment process outlines every step of the deployment plan comprehensively, catering to a diverse audience
with different requirements and implementation feasibility. The guide discusses the different available configurations that
one can use to deploy the SASE framework as per their need and network design. In the Testing Private SASE
deployment on page 23 topic, practical implementation of an example is discussed.
FortiClient EMS installs with a default IP address and port. Below are the essential FortiClient EMS system settings that
are configured to manage FortiClient application on the endpoints for Private SASE deployment.
Listen on IP Displays the IP addresses for the FortiClient EMS. FortiClient connects to
FortiClient EMS on the specified IP address. You can generate a QR code for
the specified IP address. See Generating a QR code for centrally managing
FortiClient (Android) and (iOS) endpoints.
Use FQDN Specify a fully qualified domain name (FQDN) for the FortiClient EMS.
FortiClient's connection to EMS is critical to managing endpoint security.
Managing this is relatively easy for internal devices. For external devices or
devices that may leave the internal network, you must consider how to
maintain this connection. FortiClient can connect to EMS using an IP address
or FQDN. An FQDN is preferable for the following reasons:
l Easy to migrate EMS to a different IP address
The third reason is particularly valuable for environments where devices may
be internal or external from day to day. When using an FQDN, you can
configure your internal DNS servers to resolve the FQDN to the EMS internal
IP address and register your external IP address with public DNS servers. You
must then configure the device with your external IP address to forward
communication received on port 8013 to your EMS internal IP address. This
allows your external clients to leverage a virtual IP address on the FortiGate so
that they can reach EMS, while allowing internal clients to use the same FQDN
to reach EMS directly.
Alternatively, you can use a private IP address for the connection. This
configuration requires external clients to establish a VPN connection to reach
the EMS (VPN policies permitting). This configuration can be problematic if all
endpoints need an urgent update but some are disconnected from VPN at that
time.
FQDN Enter the FortiClient EMS FQDN. FortiClient can connect using the specified
IP address in the Listen on IP Addresses option or the specified FQDN.
Remote HTTPS access Specify settings for remote administration access to FortiClient EMS.
Turn remote HTTPS access to FortiClient EMS on and off. When enabled,
enter a hostname in the Custom hostname field to let administrators use a
browser and HTTPS to log into FortiClient EMS. When disabled,
administrators can only log into FortiClient EMS on the server.
HTTPS port Available when Remote HTTPS Access is enabled. Displays the predefined
HTTPS port. You cannot change the port.
Management IP and Port Available when Remote HTTPS Access is turned on. If the EMS has an IP
address that is usually not publicly reachable but the FortiGate could reach,
specify this IP address. In most cases, this is an internal IP address. The
FortiOS administrator can use this IP address to connect the FortiGate to the
EMS using a Fabric connector.
Redirect HTTP request to Available when Remote HTTPS Access is turned on. If this option is enabled, if
HTTPS you attempt to remotely access FortiClient EMS at http://<server_name>, this
automatically redirects to https://<server_name>.
Webserver certificate Displays the SSL certificate currently used for the Apache service and the
Notify (websockets) daemon. If desired, you can select another certificate from
the dropdown list. See Server Certificates.
Use Webserver certificate for Enable to use the certificate uploaded in the Webserver certificate field for
Endpoint Control endpoint control.
Endpoint Control certificate Displays the SSL certificate currently used on port 8013 for the Endpoint
Control daemon. If desired, you can select another certificate from the
dropdown list. See Server Certificates.
When this option is enabled and FortiClient tries to connect to EMS using the
endpoint control protocol, EMS sends the SSL certificate so that FortiClient
can use the certificate to verify the connection.
If the SSL certificate is from a publicly signed certificate authority, only
endpoints with the following FortiClient versions can connect to EMS:
3. Configure the following options under EMS Settings. FortiClient EMS uses these settings when managing
Windows, macOS, and Linux endpoints.
Listen on port Displays default port of FortiClient EMS. You can change the port by typing a
new port number. FortiClient connects using the specified port number.
Enforce User Verification Enforce user verification for endpoints. Users must log in to verified user
accounts to register to EMS. See Invitations.
4. For more granular options for your deployment, See Configuring EMS settings.
FortiClient onboarding
FortiClient Onboarding is a process of installing FortiClient application on the endpoints and configuring different
authentication mechanism for connecting FortiClient endpoint to connect to FortiClient EMS. Following is an overview of
different ways to initially install FortiClient application to endpoints and then configure authentication of FortiClient
application to connect to FortiClient EMS.
You can use one of the following methods for installing FortiClient application:
Microsoft System Center 1. Create a custom deployment package (MSI file) on EMS. See Adding a
Configuration Manager (SCCM) FortiClient deployment package.
or group policy object (GPO) 2. Deploy the FortiClient deployment package to desired endpoints using one of
the following:
l SCCM: Deploy applications with Configuration Manager.
l GPO: Use Group Policy to remotely install software.
Mobile device management Use an MDM application to initially deploy FortiClient to the desired endpoints.
(MDM) FortiClient supports the following MDM applications. See the guide for each MDM
application:
l Intune
Sending installer link to end Create a custom deployment package on EMS. See Adding a FortiClient
users deployment package.
Create an invitation on EMS, configuring the invitation to be sent to all desired end
users. See Invitations.
The end user receives an email or SMS notification that includes the configured
invitation code and installer. They install FortiClient on their devices using the
included installer and enter the invitation code to connect their FortiClient to EMS.
You can use one of the following authentication methods for authenticating the FortiClient endpoints to connect to the
FortiClient EMS:
None End user does not need to provide any credentials to connect to EMS.
Local End user must provide credentials that match a local user configured in User
Management > Local Users to connect to EMS.
You must create a local user to configure this option. See Local users.
LDAP End user must provide their domain credentials to connect to EMS.
You must configure an LDAP domain to configure this option. See Adding
endpoints using an AD domain server.
SAML End user must provide their credentials for an SAML identity provider, such as
Azure Active Directory (AD), to connect to EMS.
You must configure SAML settings to configure this option. See SAML
Configuration.
For more information regarding different authentication mechanism, see User Management.
After FortiClient application installation completes on an endpoint, you can connect FortiClient to FortiClient EMS
automatically or manually depending on the type of the installation methods used. See Connecting FortiClient Telemetry
after installation to connect FortiClient to FortiClient EMS.
Once the FortiClient endpoints are onboarded, meaning that FortiClient application is installed and is connected to EMS
Server, FortiClient EMS can now be used to manage these FortiClient endpoints by pushing configurations necessary
for Private SASE deployment.
FortiClient EMS can push endpoint configurations to FortiClient by configuring an endpoint profile and it in an endpoint
policy.
1. First, we can either edit an existing endpoint profile or create a new endpoint profile. See Creating a new profile.
2. Edit an existing endpoint policy or create a new endpoint policy that is configured with the desired profile. Configure
the endpoint policy to apply to the desired domains and work groups. See Adding an endpoint policy.
3. After you apply the endpoint policy to endpoint groups, EMS pushes profile changes to endpoints with the next
Telemetry communication.
4. Monitor the update using the Endpoints pane. See Viewing the Endpoints pane.
For the Private SASE deployment, we will be configuring Remote Access and System Settings Endpoint profiles as
these profiles enable us to achieve the design goals of Private SASE. For this deployment, we assume these two profiles
are not yet configured in your environment. If they are already configured, please make the following additional required
changes.
1. On the FortiClient EMS go to Endpoint Profiles > Remote Access > Add.
2. Enter the desired Name for this profile.
3. Click on the Advanced tab to see more granular configuration.
4. In the Remote Access Profile tab, enable the eye icon to show this feature from the end user in FortiClient. This
setting is enabled by default.
5. Scroll down to the VPN Tunnels section at the bottom, click on Add Tunnel.
6. Create an SSL VPN tunnel using manual configuration or XML. For details on configuring a VPN tunnel using XML,
see VPN. The following are the important options that needs to be configured for this VPN tunnel:
Configuration Description
Basic Settings
Name Enter a VPN name. Use only standard alphanumeric characters. Do not use
symbols or accented characters.
Remote Gateway Enter the remote gateway IP address/hostname of the FortiGate or Point of
Presence to which FortiClient endpoint will connect. You can configure
multiple remote gateways by clicking the + button. If one gateway is not
available, the tunnel connects to the next configured gateway.
Advanced Settings
Enable SAML Login Enable this setting to enable SAML SSO login for this VPN tunnel. See SAML
SSO.
Use External Browser as Use if you wish to display the SAML authentication prompt in an external
User-agent for SAML Login browser instead of in the FortiClient GUI. See Using a browser as an external
(Optional) user-agent for SAML authentication in an SSL VPN connection.
Show "Reminder Password" Enable this option to have the VPN tunnel remember the password. You will
Option also need to enable this option on FortiGate discussed later.
Show "Always Up" Option Enable this option to have the VPN tunnel always up. You will also need to
enable this option on FortiGate discussed later.
Show "Auto Connect" Option Enable this option to automatically connect to the VPN tunnel. You will also
need to enable this option on FortiGate discussed later.
7. Click on Save.
8. Scroll up to the General settings, enable the following important settings:
Configuration Description
General
Current Connection Select the current VPN tunnel created in the previous step.
Auto Connect Select a VPN tunnel for endpoints to automatically connect to when the end
user logs into the endpoint. The end user must have established VPN
connection manually at least once from FortiClient GUI.
Disable Connect/Disconnect Disable the Connect/Disconnect button when using Auto Connect with VPN.
By default, this setting is set to Disabled.
1. On the FortiClient EMS go to Endpoint Profiles > System Settings > Add.
2. Enter the desired Name for this profile.
3. Click on the Advanced tab to see more granular settings for configuration.
4. Enable the following settings:
Configuration Description
Show Host Tag on FortiClient Enable this to see the applied host tags on the FortiClient endpoint’s GUI. See
GUI Zero Trust Tags.
Endpoint Control
Disable Disconnect Enable this setting to forbid users from disconnecting FortiClient from
FortiClient EMS.
Other
Install CA Certificate on Turn on to select and install a CA certificate on the FortiClient endpoint. The
Client default root CA certificates from your FortiGate will show up automatically
once the FortiGate is authorized on the EMS. To connect the FortiGate to the
EMS, see Configuring FortiClient EMS connector on page 20.
You can also add custom root CA certificates by going to Endpoint Policy &
Components > CA Certificates.
For more optional configuration parameters, see System Settings. To install a custom CA certificate used for deep
inspection on the endpoints, see CA Certificates.
For configuring other optional endpoint profiles as per your security requirements, see Endpoint Profiles. Once the
endpoint profiles are configured they can be used in endpoint policy to be deployed on the endpoints.
Zero trust network access (ZTNA) is an access control method that uses client device identification, authentication, and
Zero Trust tags to provide role-based network access. It gives administrators the flexibility to manage network access for
On-net users and Off-net users. However, for the Private SASE deployment, we use context based posture checks using
Zero Trust Tags.
You can create Zero Trust tagging rules for endpoints based on their operating system versions, logged in domains,
running processes, and other criteria. EMS uses the rules to dynamically group endpoints. FortiOS can use the dynamic
endpoint groups to build dynamic policy rules.
only the Windows 10 rule (rule 2) satisfy the rule set. To restore the default logic, you can click Default Logic.
For more information on editing, deleting a tag, and so on, see Zero Trust Tags.
You can configure on-fabric detection rules for endpoints. EMS uses the On-Fabric detection rules to determine if the
endpoint is On-fabric or Off-fabric. Depending on the endpoint's on-fabric status, EMS may apply a different profile to the
endpoint, as configured in the endpoint policy.
For Private SASE deployment, the endpoints that connect to full tunnel VPN must be categorized as On-fabric and other
devices that are not connected to full tunnel VPN must be categorized as Off-fabric. To determine the On-fabric nature of
the device, we can use one or multiple specific rules given below:
DNS Server Configure at least one IP address for the desired DNS server. EMS considers
Local IP/Subnet In the IP Range field, enter a range of IP addresses. In the Default Gateway
MAC Address field, optionally enter the default gateway MAC address. EMS
considers the endpoint as satisfying the rule if its Ethernet or wireless IP
address is within the range specified and if its default gateway MAC address
matches the one specified, if it is configured. Configuring the MAC address is
optional. You can configure multiple addresses using the + button.
This is the only detection type that applies to endpoints running FortiClient
6.4.0 and earlier versions. Other detection types do not apply to these
endpoints.
For Private SASE use case, you can configure the local IP address/subnet to
be the SASE subnet reserved to be assigned to the endpoints connecting to
full tunnel VPN.
VPN Tunnel In the Name field, enter an SSL or IPsec VPN tunnel name. EMS considers the
endpoint as satisfying the rule if it is connected to a VPN tunnel with a
matching name. You can configure tunnels using the + button.
For more information on On-Fabric detection rule set options, see On-Fabric Detection Rules.
Ideally, the Off-net devices, meaning devices not connected to the full tunnel VPN, should be granted limited access to
the Internet so that the remote users are bound to connect to the full tunnel VPN to get full access to Internet services.
This can be achieved with FortiClient EPP by creating a more restrictive Web Filter endpoint profile and then applying it
to the endpoint policy. Once the endpoint connects to the full tunnel VPN and is categorized as On-net, then a user’s
traffic can be inspected and subjected to various security policies and posture checks on the FortiGate ensuring
complete security.
To deploy the endpoint profiles on the managed FortiClient endpoints and to apply the On-fabric detection rules created
earlier we need to configure endpoint policy.
Endpoint Policy Name Enter the desired name for the endpoint policy.
Profile (Off-Fabric) Configure the desired endpoint profiles to apply to the endpoint when it is off-
fabric according to the on-fabric detection rules configured in this policy. For
example, you may want to apply more restrictive profiles to the endpoint when
it is determined to be off-fabric. From the dropdown list, select the desired
endpoint profiles.
If including an off-fabric profile in a policy, also including on-fabric detection
rules in the policy is recommended. Otherwise, EMS may not apply on-fabric
and off-fabric profiles as desired.
When you enable this toggle, the Profile field displays two sets of endpoint
profile dropdown lists. You can configure the desired endpoint profiles for an
off-fabric endpoint using the dropdown lists on the right.
Profile From the dropdown lists, configure the desired endpoint profiles to apply to
endpoints that EMS has applied the policy to. FortiClient EMS displays
enabled endpoint profiles with a green circle and disabled endpoint profiles
with a gray circle.
On-Fabric Detection Rules Select the on-fabric detection rules to include in the policy. You can select
multiple rules. You must have already created on-fabric detection rules to
include them in an endpoint policy. See On-fabric Detection Rules.
Enable the Policy Toggle to enable or disable the endpoint policy. You can enable or disable the
policy at a later time from Endpoint Policy & Components > Manage Policies.
4. Click Save. You can view the newly created policy in Endpoint Policy & Components > Manage Policies.
FortiClient EMS pushes these settings to the FortiClient endpoint with the next Telemetry communication.
Configuring FortiGate
The address objects define sources and destinations of network traffic and can be used to control access such as in the
firewall policies, SSL VPN configuration, and so on.
1. On the FortiGate, go to Policy & Objects > Addresses > Create New > Address.
2. Enter the Name.
3. Enter the Type as Subnet and specify the IP/Netmask.
4. Click OK.
Repeat the same steps as above to configure multiple address for your LAN, full tunnel SSL VPN subnet (SASE
Subnet), DMZ, and so on as per your network and requirement. SASE Subnet is the IP address range dedicated to
FortiClient users when they connect to full tunnel VPN.
Different authentication methods are available to authenticate the FortiClient endpoint users when they initiate a
connection to full tunnel VPN. The Private SASE’s full tunnel VPN terminates on the FortiGate, thus authentication
sources need to be defined on the FortiGate. FortiGate can be configured with the following authentication sources:
LDAP Authentication The authentication is performed using the LDAP Server. See LDAP servers to
connect FortiGate to LDAP server.
Radius Authentication The authentication is performed using the Radius Server. See Radius servers to
connect FortiGate to Radius server.
PKI Authentication is performed using PKI i.e. user certificates. See PKI for more
information.
SAML Authentication Authentication is performed using SAML. See SAML for more information.
FortiGate also supports two-factor authentication methods along with the primary authentication methods discussed
above. With two-factor authentication enabled, users must provide an additional authentication code or token along with
their username and password for added security. To set up two factor authentication, see Applying multi-factor
authentication.
In the implementation of the example discussed under Testing Private SASE deployment on page 23, SAML
authentication is used where FortiGate is the Service Provider (SP) and FortiAuthenticator is the Identity Provider (IdP).
See FortiGate SSL VPN with FortiAuthenticator as SAML IdP.
Once authentication method is selected and configured, we can create user groups that reference the authentication
methods thereby using authentication sources like LDAP, Radius, SAML. See User groups to configure user groups.
The user groups can then be used in the VPN configuration and firewall policies to authenticate the FortiClient endpoint
when remote users initiates a full tunnel VPN connection to the FortiGate.
The FortiGate can connect to the FortiClient EMS using Security Fabric connector. Up to seven EMS servers can be
added to the Security Fabric, including a FortiClient EMS Cloud server. Once the FortiGate is authorized and connected
to the FortiClient EMS, ZTNA Tags configured on the EMS Server are shared with FortiGate. The FortiGate also shares
its CA certificates used for SSL Deep inspection with the EMS server.
3. Go to Security Fabric > Fabric Connectors and double-click the FortiClient EMS card.
4. Enable an EMS, and set Type to FortiClient EMS.
5. Enter a name and IP address or FQDN.
When connecting to a multitenancy-enabled EMS, Fabric connectors must use an FQDN to connect to EMS, where
the FQDN hostname matches a site name in EMS (including "Default"). The following are examples of FQDNs to
provide when configuring the connector to connect to the default site and to a site named SiteA, respectively:
default.ems.yourcompany.com, sitea.ems.yourcompany.com. See Multitenancy.
6. Optionally, enable EMS threat feed. See Malware threat feed from EMS for more information about using this
setting in an AV profile.
7. Click OK. A window appears to verify the EMS server certificate:
8. Click Accept.
9. Click Accept. The Connection status is now Connected.
10. If the device is not authorized, log in to the FortiClient EMS to authorize the FortiGate under Administration > Fabric
Devices.
For more information on EMS Fabric connector, see Configuring FortiClient EMS.
The full tunnel VPN can be an IPsec tunnel or an SSL VPN tunnel. For this deployment, we assume the basic networking
i.e. IP addressing, routing of the FortiGate is already configured, and will create a full tunnel VPN using SSL.
r. Click OK.
s. Similarly create a new policy for the SASE Secure SaaS Application use case.
These firewall policies ensures that only authenticated FortiClient endpoints with the specified ZTNA tag are allowed
access to the network resources, thus allowing for role based network access control for SIA, SPA and SSA. The user
traffic is also undergoing Deep Packet Inspection and scanning using configured security profiles.
Additionally, see the SSL VPN Best Practices to enhance SSL VPN security.
The Private SASE deployment is tested by employing a sample scenario based on the following network topology and
description below.
Network Topology
Network Description
In the example, Enterprise Core is the FortiGate firewall acting as the Point of Presence. FortiAuthenticator (FAC) is
acting as centralized authentication server. FortiClient EMS is the FortiClient endpoint management server. Both FAC
and FortiClient EMS connect to the FortiGate’s ISFW interface. Critical Assets is a web server connected to DMZ
interface. The Off-net Client is a domain-joined endpoint on the Internet with FortiClient onboarded, meaning that it is
installed and connected to FortiClient EMS through FortiGate using a virtual IP (port forward).
Remote user authentication is performed on the FortiGate using SAML with FAC as IdP. The FortiClient application on
the endpoint is configured with a restrictive Web Filter Endpoint Profile when its Off-Fabric, meaning it is not connected
to the full tunnel VPN and the Auto-connect VPN feature is enabled in the Remote Access Endpoint Profile. The endpoint
user’s traffic will undergo deep packet inspection on the FortiGate after it connects to the full tunnel SSL VPN. The
endpoint is installed with the required CA certificate used for Deep packet inspection using the System Setting Endpoint
profile.
Two ZTNA tagging rule configured on FortiClient EMS to tag the endpoint with tags listed below:
The endpoint will be granted complete network access if it is tagged with IT tag, and it will be denied access to resources
if it is tagged with Critical-Vulnerability tag.
After the FortiClient onboarding is completed (FortiClient is installed and connected to the FortiClient EMS), to verify the
user details click the user avatar in the upper left corner of FortiClient to view the following information:
Full name Displays the endpoint user's name if added by the endpoint user.
Phone Displays the endpoint user's phone number if added by the endpoint user. See
Retrieving user details from cloud applications and Adding your phone number
and email address manually.
Email Displays the endpoint user's email address if added by the endpoint user. See
Retrieving user details from cloud applications and Adding your phone number
and email address manually.
Get personal info from Displays the source of the endpoint user's personal information and the last time
the information was updated. The options are user-specified, from the OS, and
from cloud applications: LinkedIn, Google, and Salesforce. Depending on the
EMS configuration, not all options may be available.
You can click User Input to select an image or take a webcam photo to use as the
user avatar.
You can provide information to FortiClient from an account for a cloud application,
such as a LinkedIn, Google, or Salesforce account. After the endpoint user logs
into the account, FortiClient attempts to retrieve the following information when
available: name, avatar, phone number, and email address. See Retrieving user
details from cloud applications.
By default, FortiClient displays user details from the endpoint OS and sends this
information to EMS. If you provide details using one of the methods above,
FortiClient displays those details and sends that information to EMS instead.
Status Displays whether the endpoint is online or offline, on- or off-fabric. See On-/off-
fabric status with EMS.
Domain Displays the name of the domain to which the endpoint is connected, if applicable.
Zero Trust Tags Displays the tags that have been applied to the endpoint depending on the Zero
Trust tagging rules configured in EMS.
In the User avatar screenshot, notice the Status section of the user information that displays that the user is Off-fabric.
This is because as per the On-Fabric Detection rules in the example, if the FortiClient endpoint is not connected to the
full tunnel VPN its status is set as Off-fabric.
The FortiClient endpoint’s status can also be confirmed from the FortiClient EMS by viewing the Endpoints pane. See
Viewing the Endpoints pane.
Ideally, a more restrictive endpoint profile must be configured if the user is Off-Fabric (not connected to the full tunnel
VPN). This will force the remote users to connect to the full tunnel VPN to be categorized as On-Fabric by the On-Fabric
Detection rules.
In our example, if the user is Off-fabric all Internet access to HTTP/HTTPS websites are blocked by Off-fabric Web Filter
Endpoint profile if the endpoint user tries to access the Internet as shown below.
1. As the Internet access is restricted by the endpoint profile because the user is Off-fabric, the remote user now
connects to the full tunnel VPN, so that they can start accessing network services.
2. As auto-connect VPN feature is enabled, FortiClient tries to connect to the VPN server prompting for username and
password. Manually open the FortiClient application, and on the Remote Access tab, select the VPN connection
from the dropdown list. Optionally, you can right-click the FortiTray icon in the system tray and select a VPN
configuration to connect.
3. Enter your username and password. Click the Connect button. If SAML SSO for authentication is configured click on
SAML Login and enter the username and password. When connected, FortiClient displays the connection status,
duration, and other relevant information, as shown below. You can also verify the same on FortiGate by using the
SSL VPN monitor Dashboard, see SSL-VPN monitor.
4. Verify the user information once the user is connected to the full tunnel SSL VPN. It should change the status to be
On-Fabric as per the On-Fabric Detection rules and should be tagged with the Zero Trust tags as per the Zero Trust
Tagging Rules created.
In the given example, it should be tagged with a tag of IT as the user Mark Gilbert is part of IT AD group.
5. You can browse to your corporate LAN, DMZ and access the Internet depending on the FortiGate firewall policies
configured. The endpoint users are granted access to the resources based on the ZTNA tags that are associated to
the individual endpoints.
In our example, after the endpoint connects to the full tunnel VPN and gets the ZTNA Tag of IT, it is allowed to
access critical Asset HTTP webserver hosted on http://10.100.77.200 connected behind the DMZ interface of the
FortiGate.
6. Because of a full tunnel VPN user’s traffic to Internet flows through the FortiGate, where the FortiGate performing
deep packet inspection. This can be confirmed by checking the Issuer of the server certificate of the website that the
user connects to, which indicates FortiGate acts as a Certificate Authority and signed the Certificate on the fly. See
Deep inspection.
Once the vulnerability scan is finished, FortiClient endpoint will show the detected vulnerabilities.
3. After the endpoint has detected the vulnerability, click on the User Avatar to see if it’s tagged with the Critical-
Vulnerability Tag as per the ZTNA Tagging Rules.
4. After being tagged with Critical-Vulnerability, the endpoint will now not be able to access any resources because the
firewall policies are configured to explicitly deny any traffic coming from an endpoint with a Critical-Vulnerability
ZTNA tag as seen from FortiGate’s Forward Traffic logs under Log and Report.
More information
The following product models and firmware were used in this guide.
FortiClient v7.2.0
FortiOS v7.2.5
FortiAuthenticator v6.4.6
Feature documentation
FortiClient EMS Admin Guide l System Settings > Configuring EMS settings
l User Management
l Endpoint Policy & Components > Manage Policies > Adding an endpoint
Policy
FortiClient Admin Guide l Zero Trust Telemetry > FortiClient Telemetry > Connecting FortiClient
Telemetry after installation
Copyright© 2023 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.