ZTNA For Web Applications-7.2.5-Deployment Guide
ZTNA For Web Applications-7.2.5-Deployment Guide
Deployment Guide 2
Best practices 35
Deployment Guide 3
Change Log
Date Change Description
Deployment Guide 4
INTENDED AUDIENCE
Deployment overview
This document provides a deployment example of ZTNA for Web Applications's Zero Trust Network Access (ZTNA),
covering the following solutions:
l ZTNA application gateway:
l Fabric connection to FortiClient EMS
l HTTPS access proxy for web applications
l ZTNA IP/MAC based access control for local users accessing the web applications
l No persistent connection, such as VPN, is necessary
Using a similar scenario and topology example from the ZTNA Architecture Guide, we will walk through deploying the core
components necessary to complete the requirements above. The goal is to reduce the reliance on dial-up VPN by using
ZTNA to unify remote access and local access to web applications using role-based access control concepts.
Intended audience
Mid-level network and security architects in companies of all sizes and verticals should find this guide helpful. A working
knowledge of FortiOS, FortiClient, FortiClient EMS, and the ZTNA for Web Applications Security Fabric is helpful.
This deployment guide describes the steps involved in deploying a specific architecture. Readers should first evaluate
their environment to determine whether the architecture outlined in this guide suits them. It is advisable to review the
reference architecture guides, such as the ZTNA Architecture Guide, if readers are still in the process of selecting the right
architecture. See also the ZTNA Concept Guide.
Deployment Guide 5
DESIGN CONSIDERATIONS
This deployment guide presents one of possibly many ways to deploy the solution. It may also omit specific steps where
readers must make design decisions to further configure their devices. It is recommended that readers also review
supplementary material found in product administration guides, example guides, cookbooks, release notes, and other
documents where appropriate on the Fortinet Document Library.
For comments and feedback, please visit Basic ZTNA Deployment on community.fortinet.com.
Design considerations
Traditionally, VPN is used to secure data flowing in an otherwise insecure connection. However, the method of access
over VPN often doesn't account for the risk of infected or non-compliant endpoints infecting network devices. Also,
endpoints must have a persistent tunnel in order to connect to the protected resources.
Migrating to Zero Trust Network Access allows administrators to control many of these factors by means of requiring client
certificates and user authentication to authorize the access. Furthermore, security posture checks ensure that endpoint
device health is monitored in real time while users are accessing resources.
When designing your Zero Trust Access solution, and in this case, ZTNA access to internal web applications, several
things will need to be considered:
l What are the web applications that you want to allow for our users?
l How will users resolve the address to these web applications?
l What are the user groups that are allowed access to the web applications?
l Who will authenticate the users? Where does the authentication server reside?
l Where will users be accessing the web applications from?
l What are the required security postures for an endpoint to access the resources?
l Where is the optimal location for the EMS server?
l How do you provision and onboard FortiClient endpoints?
Answering these questions will help you make the design choices necessary to configure your ZTNA solution. Using the
following simple topology, we will run through the design decisions that administrators will typically encounter.
Deployment Guide 6
DESIGN CONSIDERATIONS
Relevant questions:
l What are the web applications that you want to allow for our users?
l How will users resolve the address to these web applications?
Consider the web applications that you will be exposing for your users. Which resources are your users allowed to connect
to? Which ones will need to be protected?
In the example topology, the web applications that need to be accessed can be broken down into:
Mail server No, all users are allowed to access web mail from anywhere
The protected web servers and applications will become the ZTNA server mapping used in your ZTNA configurations.
Next, consider how users currently resolve the FQDN addresses of the web applications. When accessing the applications
internally or through VPN, users can resolve the addresses using an internal DNS server. Essentially, the same FQDN
resolves to the same private IP address internally or remotely.
When using ZTNA, a remote user accessing a protected web application must resolve the FQDN address of the resource
to the HTTP access proxy address on the FortiGate. Therefore, a public DNS record must be configured. Meanwhile, when
Deployment Guide 7
DESIGN CONSIDERATIONS
resolving the FQDN address internally, clients can continue to use an internal DNS server to resolve the address to the
server’s private IP address.
User authentication
Relevant questions:
l What are the user groups that are allowed access to the web applications?
l Who will authenticate the users? Where does the authentication server reside?
Consider the user groups that are allowed to access each web application. Are the user groups clearly defined? Are the
same user groups configured on your authentication server? To use the same user groups to control access, the FortiGate
needs to be able to connect to the authentication server and synchronize the groups locally.
Method Description
If your applications do not need to be segmented by user groups, you can consider
not applying any authentication. However, all users will have access to your
No Authentication
protected resources and logs will not be able to indicate the user who accessed the
resources.
Use local authentication only if you do not have any central authentication solution
Local
and you only have few users to authenticate on a single FortiGate.
Use remote authentication when you have a central authentication solution such as
a Windows AD and one or more FortiGates need to connect to the authentication
Remote
server. The connections are most commonly made through LDAPS and RADIUS
locally to the authentication server.
Use SAML authentication when your Identity Provider (IdP) is remote or in the Cloud
SAML (such as Azure AD) or you rely on an IdP proxy to connect the FortiGate to the remote
Identity Provider.
In the example topology, the Windows AD handles authentication for the entire FortiAD.Info domain. Using LDAPS, the
FortiGate can connect directly to the Active Directory and synchronize the user groups.
In cases where the authentication server is not local to the FortiGate, the FortiGate can act as a Service Provider (SP) and
redirect authentication to an IdP or an IdP proxy such as FortiTrust-ID.
ZTNA policies
Relevant questions:
l Where will users be accessing the web applications from?
It is assumed that users will be accessing the web applications remotely and from within the local network.
For remote users, access will be granted using simple or full ZTNA policies. These policies define the granular source and
destination pairs that are allowed to connect. The ZTNA servers will be used in the ZTNA policies to map to web
applications that are exposed to the end users. Client certificates will be checked to verify the endpoint devices, and
security posture check can be performed using ZTNA tags. Finally, user authentication can be applied to control the user
groups that have access to the ZTNA servers.
Deployment Guide 8
SUCCESS CRITERIA
For local users, their optimal path will be to access the internal web applications directly instead of accessing them
through the ZTNA application gateway. These policies can use ZTNA tags to perform security posture checks and user
groups to granularly control the users who have access.
Relevant questions:
l What are the required security postures for an endpoint to access the resources?
l Where is the optimal location for the EMS server?
l How do you provision and onboard FortiClient endpoints?
Security posture defines the rules and logic that determine whether an endpoint meets the device security requirements
to access internal resources. This can be criteria related to the vulnerability status of the endpoint, the applications
installed on it, the domain and user group it is joined to or many other factors. These rules are configured on the EMS
server as ZTNA tagging rules and pushed to the managed endpoints where they are evaluated. ZTNA tags identify the
result of processing the ZTNA rules on the endpoints. They are used by the FortiGate in ZTNA policies for access control.
FortiClient EMS is used to manage and push configurations, ZTNA tagging rules and client certificates to the endpoints. It
also has a persistent connection to the FortiGate to communicate information about the endpoints to the FortiGate.
Therefore, consider the endpoints that will connect to your FortiClient EMS as well as FortiGates that will connect.
Different locations you can consider include deploying the EMS server on-premise behind the FortiGate, deploying in the
public Cloud or using FortiClient Cloud.
Deploying on-premise may be ideal when you have the resources necessary to manage the server internally. However,
you will need to define firewall policies to allow proper access to EMS internally and remotely. Whereas FortiClient Cloud
offers EMS as a service that can be accessed from anywhere.
Finally, consider how FortiClients will be provisioned, and how users can be securely onboarded to EMS. For smaller
deployments, administrators can send invitations with FortiClient installers for users to download and install manually. For
larger deployments, it may be more feasible to use a MDM solution to provision FortiClient instead.
Success criteria
In the ZTNA design, the goal is to enhance security by improving identity and posture checking of devices connecting to
the internal network, and by reducing the attack surface of traditional dial-up VPN. In our use case, the following success
criteria is detailed:
l Block unmanaged devices.
l Limit remote access to the internal network for web applications only.
l Allow only identified user groups access to only the specific applications that they need.
l Dynamically deny access to devices with critical vulnerabilities both on the internal network and remote locations.
l Dynamically allow access once the vulnerabilities are remediated.
l Reduce the reliance on dial-up VPN.
Product requirements
Deployment Guide 9
PRODUCT REQUIREMENTS
Deployment Guide
PRODUCT REQUIREMENTS
Deployment procedures
In this deployment example, we will demonstrate remote and local access to protected web applications as indicated by
the traffic arrows above. In this case, FortiGate has the necessary LDAP configurations to connect to the local Active
Directory server for user authentication. Firewall policies are assumed to be configured on the FortiGate for accessing the
FortiClient EMS from local and remote locations.
We will create two ZTNA servers for our ZTNA application gateway. One ZTNA server allows access to the Web servers for
users that are part of the Remote-Allowed user group. Another ZTNA server allows access to the Finance server for the
Finance group only.
Local access will use ZTNA IP/MAC based access control to apply ZTNA tags for security posture check. It will also restrict
access to the user groups above.
Deployment Guide
EMS SERVER CONFIGURATIONS
By default, FortiClient EMS uses the certificate issued by FortiCare to each licensed EMS server for securing web server
access and endpoint control. However, the certificate is not issued by a public CA and may not be natively trusted by
connecting endpoints or the FortiGate.
For information about different kinds of EMS server certificates, see Server Certificates.
For more information about uploading a certificate, see Adding an SSL certificate to FortiClient EMS.
Deployment Guide
EMS SERVER CONFIGURATIONS
1. Go the System Settings > EMS Settings page to apply the newly uploaded certificate as the Webserver certificate
and the Endpoint Control certificate.
The Webserver certificate is used for secure access to the web interface of EMS. This can
be for administrative web access through the browser or connecting to the EMS API with
the FortiGate EMS Fabric Connector. The Endpoint Control certificate secures the
communication between EMS and FortiClient.
a. Click the drop-down arrow next to Webserver certificate then select an uploaded certificate from the menu.
b. Enable the option Use Webserver certificate for Endpoint Control.
c. Click Save to save the changes.
A warning appears to indicate the server must be restarted.
d. Click Yes to continue.
2. After a few minutes, refresh the browser and return to the System Settings > EMS Settings page. The new certificate
should now be applied.
With user-based licensing, a user can register up to three endpoint devices under one user
license.
None End user does not need to provide any credentials to connect to EMS.
End user must provide credentials that match a local user configured in User
Local
Management > Local Users to connect to EMS.
End user must provide their domain credentials to connect to EMS. You must
LDAP (Active Directory Domain)
configure an Active Directory domain through LDAPS to configure this option.
End user must provide their credentials for an SAML identity provider, such as
SAML
Azure Active Directory (AD), to connect to EMS.
No verification
This option is not recommended in production, because it allows any endpoint devices to register to EMS, potentially even
malicious ones. Unknown devices that register to EMS take up unnecessary licenses, and synchronizes settings such as
VPN tunnel configurations and ZTNA destinations that should not be exposed outside the organization.
Deployment Guide
EMS SERVER CONFIGURATIONS
Local verification
This option is useful when the number of managed users is small or when no remote identity provider is available.
These are the most desirable options as they allow users to be synchronized from remote, or redirect the authentication to
the SAML IdP in the case of SAML. Users credentials are not stored locally and end users do not need to remember
another user credential and password. This is a very scalable solution for user onboarding.
For information on how to configure verification for user onboarding, see the User Management chapter in the EMS
Administration Guide.
In EMS 7.2.0 and above, adding an Active Directory Domain has been enhanced to ease the importing of specific OUs &
User Groups using a “tree style” for selection. This can be used with User Onboarding to choose which groups should be
allowed to onboard their FortiClient endpoints. Importing the OUs and User Groups also allows you to configure Zero Trust
Tagging Rules that verify a User in an AD Group.
Field Value
Password Password
EMS must verify the chain of trust for the server certificate issued for the
Certificate AD server. Import the necessary CA certificate if the AD server certificate
was signed by a private CA.
Certificate hostname check Verify the server hostname against the server certificate.
Optional field to name this server entry. If blank, then the name of the
Alias
domain is the name for this server.
Deployment Guide
EMS SERVER CONFIGURATIONS
c. Click Test.
d. Click Save.
Once connected, the card for the domain appears. For example, a card for the domain fortiad.info:
While the Authentication Server entry defines the connection to the AD server, you will also need to specify what you want
to import from the server. With the new tree style view in EMS 7.2.0 and above, this can be as easy as selecting the
Domian, OU, or Group directly for import.
Deployment Guide
EMS SERVER CONFIGURATIONS
7. Click Save.
8. Review the imported domain. The number of devices and users imported are displayed. Click once on your domain to
display options such as Edit, Delete, and (Manual) Sync.
9. Under Endpoints > Domains, view the imported Domain, OUs, or Groups. Select an OU or Group to further view the
endpoints. The endpoints can now be managed by the Group.
There are many tagging rules to choose from and this will be very customized for each organization. For general steps on
how to define tagging rules, see Zero Trust Tagging Rules.
The following example demonstrates how to configure a rule for detecting the presence of a Critical vulnerability on an
endpoint.
Deployment Guide
EMS SERVER CONFIGURATIONS
Deployment Guide
EMS SERVER CONFIGURATIONS
This step can be used to verify that users can successfully connect to EMS. Depending on whether user verification is
needed and the need to send out an invitation link, users will use different codes to register on their FortiClient endpoint.
The following example demonstrates a basic endpoint registration to the ems.ztnademo.com server without any user
authentication.
To register endpoints:
1. In the Zero Trust Telemetry page, enter the server address ems.ztnademo.com.
2. Click Connect.
Deployment Guide
EMS SERVER CONFIGURATIONS
Once connected, a notification appears indicating settings have been pushed from EMS.
3. Shortly after, click on the avatar to view information about the device. Note that Zero Trust Tag Domain-Users is
added.
Deployment Guide
CONNECT THE FORTIGATE TO EMS
FortiGate must securely connect to FortiClient EMS in order to protect the synchronization of endpoint and ZTNA tag
information. As such, the FortiGate must have a trusted certificate chain for the EMS server certificate. The first step
before connecting to EMS is to upload the CA certificate, if the EMS server certificate is not signed by a public CA.
3. (Optional) The certificate can be renamed in the CLI using the following command:
Next, using the Fabric Connector GUI on the FortiGate, configure the EMS fabric connector to connect to FortiClient EMS.
As part of the connection process, the certificate chain to the EMS server certificate will be verified. Administrators must
also examine the server certificate for authenticity and accept the certificate.
Name Name
EMS threat feed Enable to receive malware hashes from EMS for use in the
Deployment Guide
APPLYING USER AUTHENTICATION
FortiGate AV
Synchronize firewall addresses Must be enabled to pull ZTNA tags from EMS
7. Clicking on Authorize will open a window to launch the FortiClient EMS login page. You can authorize the FortiGate
from there.
8. Alternatively, log in to EMS on another browser window to authorize.
9. Once logged in, a dialog is displayed requesting to authorize the FortiGate. Select Authorize.
10. Alternatively, navigate to Administration > Fabric Devices to authorize the FortiGate.
1. Go to Policy & Objects > ZTNA and then navigate to the ZTNA Tags tab.
ZTNA tags that were created in EMS are displayed on the page.
The ZTNA tags do not have any matched endpoints yet. Once ZTNA policies are set up and a connection is made, the
endpoints will be populated on their associated tags.
For more information about connecting the FortiGate to EMS, see Configuring FortiClient EMS.
The following deployment example uses an authentication scheme that utilizes the Basic method to authenticate the end
users. It also assumes the use of a pre-defined LDAP server (LDAP-fortiad) for remote authentication as well as pre-
configured LDAP user groups (LDAP-Remote-Allowed-Group and LDAP-Finance).
There are a variety of different supported methods of authentication by ZTNA such as SAML authentication or form
authentication. They produce slightly different user experiences for the end-users. Furthermore, you can also choose to
use different types of remote servers other than LDAP.
Deployment Guide
CONFIGURE ZTNA APPLICATION GATEWAY ON THE FORTIGATE
1. Go to Policy & Objects > Authentication Rules and select Authentication Schemes from the top right.
2. Click Create New > Authentication Scheme.
a. Configure the following:
Name ZTNA-Auth-scheme
Method Basic
b. Click OK.
3. Click Create New > Authentication Rules.
a. Configure the following:
Name ZTNA-Auth-Rule
Protocol HTTP
b. Click OK.
We will create two ZTNA server objects to allow access to the Web Servers and the Finance Server. This is a design
decision based on the following logic.
When each set of servers are accessible by a different set of users, we must create two sets of simple ZTNA policies to
allow the proper user groups access to the server. Since simple ZTNA policies do not allow configuration of specific
destinations, we must configure two ZTNA server objects to use in the two sets of ZTNA policies.
On the other hand, if you decide to create full ZTNA policies which allow you to specify a destination, you can create one
ZTNA server object to map to the Web Servers and Finance Server. This method reduces the number of external ZTNA
application gateway addresses you need.
To configure the HTTP access proxy server mapping for the Web servers in load-balancing mode:
Field Value
Name ZTNA-webserver
Network
Deployment Guide
CONFIGURE ZTNA APPLICATION GATEWAY ON THE FORTIGATE
Field Value
External IP 10.0.3.10
Field Value
Type IPv4
Service HTTPS
Path /
Servers
Field Value
Type IP
IP 10.88.0.3
Port 9043
Status Active
Field Value
Type IP
IP 10.88.0.4
Port 9043
Status Active
Deployment Guide
CONFIGURE ZTNA APPLICATION GATEWAY ON THE FORTIGATE
To configure the HTTP access proxy server mapping for the Finance server:
Field Value
Name ZTNA-financeserver
Network
External IP 10.0.3.11
Field Value
Type IPv4
Service HTTPS
Path /
Servers
Deployment Guide
CONFIGURE ZTNA POLICIES TO CONTROL REMOTE ACCESS
Field Value
Type IP
IP 10.88.0.5
Port 9043
Status Active
i. Click OK.
c. Click OK to finish service/server mapping.
5. Click OK to finish the ZTNA server setup.
We will create one simple ZTNA policy to block access for devices with the Critical-Vulnerability tag, and two ZTNA
policies to allow access for the respective user groups. The Domain-Users tag will be used in the allow policies to ensure
connecting users are part of the domain.
Field Value
Name ZTNA-vulnerable-deny
Type ZTNA
Address – all
Source
User – LDAP-Remote-Allowed-Group, LDAP-Finance
ZTNA-webserver
Destination
ZTNA-financeserver
Schedule always
Action Deny
Logging Options
Workflow Management
4. Click OK to save.
Deployment Guide
CONFIGURE ZTNA POLICIES TO CONTROL REMOTE ACCESS
Field Value
Name ZTNA-webserver-allow
Type ZTNA
Address – all
Source
User – LDAP-Remote-Allowed-Group
Destination ZTNA-webserver
Schedule always
Action Accept
Logging Options
Workflow Management
4. Click OK to save.
Deployment Guide
VERIFY ZTNA ACCESS TO THE WEB APPLICATIONS
3. Create a policy to allow access to the ZTNA-financeserver for users with the Domain-Users ZTNA tag:
Field Value
Name ZTNA-finance-allow
Type ZTNA
Address – all
Source
User – LDAP-Finance
Destination ZTNA-financeserver
Schedule always
Action Accept
Logging Options
Workflow Management
4. Click OK to save.
Now that the ZTNA server objects and policies are configured, it is time to access the web applications. Remember to
update external DNS servers to map the FQDN of the web applications to the ZTNA application gateway addresses.
In a real network, the ZTNA application gateway addresses should be public IP addresses.
In this scenario, we will demonstrate accessing the web applications using a user that belongs
to the Remote-Allowed group only. Access to the Web server will be allowed, and access to the
Finance server will be denied.
Deployment Guide
VERIFY ZTNA ACCESS TO THE WEB APPLICATIONS
5. Open a browser.
6. Go to https://webserver.ztnademo.com:9043 to test access to Web server.
7. When prompted, select the client certificate issued by EMS and then click OK.
8. Next, you will be prompted for a username and password. Enter the credentials for the user.
The webpage will load.
11. After the session is closed, go to the FortiGate and open Log & Report > ZTNA Traffic. Verify that a log was recorded
for the allowed traffic and the denied traffic. The username tsmith is logged for both allowed and denied traffic.
12. Alternatively, use the CLI to display the ZTNA logs:
Deployment Guide
VERIFY ZTNA ACCESS TO THE WEB APPLICATIONS
When accessing a protected web server, traffic will be blocked due to security posture check.
From the ZTNA traffic logs, we can see the denied traffic hitting the ZTNA-vulnerable-deny policy, and the user who tried
to access it.
# execute log filter category 0
# execute log filter field subtype ztna
# execute log display
Deployment Guide
CONFIGURE FIREWALL POLICIES WITH IP/MAC BASED ACCESS CONTROL FOR INTERNET ACCESS
srcuuid="b458a65a-f759-51ea-d7df-ef2e750026d1" dstuuid="62a8fb8a-5e52-51ee-2e82-
07f37c248ba1" service="tcp/9043" proxyapptype="http" proto=6 action="deny" policyid=17
policytype="proxy-policy" poluuid="a21b3020-5e53-51ee-c587-b7d8384ed100" policyname="ZTNA-
vulnerable-deny" duration=6 user="tsmith" group="LDAP-Remote-Allowed-Group"
authserver="LDAP-fortiad" vip="ZTNA-webserver" accessproxy="ZTNA-webserver"
clientdeviceid="9A016B5A6E914B42AD4168C066EB04CA" clientdevicemanageable="manageable"
clientdevicetags="MAC_EMS1_ZTNA_all_registered_clients/EMS1_ZTNA_all_registered_
clients/MAC_EMS1_ZTNA_Critical-Vulnerability" emsconnection="online" msg="Denied: proxy-
policy action is deny. Matched tag: EMS1_ZTNA_Critical-Vulnerability" wanin=0 rcvdbyte=0
wanout=0 lanin=2680 sentbyte=2680 lanout=62887 fctuid="9A016B5A6E914B42AD4168C066EB04CA"
appcat="unscanned" crscore=30 craction=131072 crlevel="high"
The user permissions to access internal resources from remote and from within the corporate network should remain the
same. However, the path in which the traffic takes will be different.
When we examine our topology, remote endpoints access the web application through a ZTNA application gateway on
port3. However, for local endpoints, accessing the ZTNA application from port1 to port3, and then accessing the web
application through port2 is inefficient and unnecessary.
Therefore, in this section we will demonstrate configuring IP/MAC based access control to provide the same user
permissions for local endpoints accessing web applications directly from port1 to port2.
Deployment Guide
CONFIGURE FIREWALL POLICIES WITH IP/MAC BASED ACCESS CONTROL FOR INTERNET ACCESS
a. Create a policy to deny access to the web servers if the endpoint has Critical-Vulnerabilites:
Field Value
Name Local-Deny-Access-Critical-Vuln
Type Standard
Address – all
Source
User – LDAP-Remote-Allowed-Group, LDAP-Finance
Schedule always
Service ALL
Action Deny
NAT Disable
Logging Options
Workflow Management
b. Click OK to save.
To configure firewall policies to allow access for devices that pass ZTNA security posture check:
Field Value
Name Local-Allowed-Webservers
Type Standard
Address – all
Source
User – LDAP-Remote-Allowed-Group
Deployment Guide
CONFIGURE FIREWALL POLICIES WITH IP/MAC BASED ACCESS CONTROL FOR INTERNET ACCESS
Field Value
Webserver1
Destination
Webserver2
Schedule always
Service ALL
Action Accept
NAT Disable
Logging Options
Workflow Management
b. Click OK to save.
c. Create a policy to allow access to the Finance servers for users belonging to the LDAP-Finance group and has
the Domain-Users ZTNA Tag:
Field Value
Name Local-Allowed-Finance
Type Standard
Address – all
Source
User – LDAP-Finance
Destination Finance
Schedule always
Service ALL
Action Accept
NAT Disable
Logging Options
Workflow Management
d. Click OK to save.
Deployment Guide
CONFIGURE FIREWALL POLICIES WITH IP/MAC BASED ACCESS CONTROL FOR INTERNET ACCESS
In our example, the following DNS mappings are assumed to be created in an internal DNS server:
l webserver.ztnademo.com > 10.88.0.3
l finance.ztnademo.com > 10.88.0.5
In this scenario, we will demonstrate accessing the web applications using a user that belongs
to both the Remote-Allowed group and the Finance group. Access to the Web server and
access to the Finance server will be allowed.
5. Open a browser.
6. Go to https://webserver.ztnademo.com:9043 to test access to Web server.
In this example, the port used is 9043 so users must take an extra step to trigger
authentication over port 443 first.
7. Next, you will be prompted for a username and password. Enter the credentials for the user.
Deployment Guide
CONFIGURE FIREWALL POLICIES WITH IP/MAC BASED ACCESS CONTROL FOR INTERNET ACCESS
…
2: date=2023-10-03 time=15:49:30 eventtime=1696373370478461357 tz="-0700"
logid="0000000013" type="traffic" subtype="forward" level="notice" vd="root"
srcip=10.0.1.2 srcport=28145 srcintf="port1" srcintfrole="undefined" dstip=10.88.0.5
dstport=9043 dstintf="port2" dstintfrole="dmz" srcuuid="b458a65a-f759-51ea-d7df-
ef2e750026d1" dstuuid="6b38e638-0775-51ec-1333-bc27ff2d5b8d" srccountry="Reserved"
dstcountry="Reserved" sessionid=98046 proto=6 action="close" policyid=22
policytype="policy" poluuid="7693847e-623c-51ee-2021-a105aa9c6c1a" policyname="Local-
Allowed-Finance" user="dparker" group="LDAP-Finance" authserver="LDAP-fortiad"
service="tcp/9043" trandisp="noop" duration=113 sentbyte=3535 rcvdbyte=33360 sentpkt=32
rcvdpkt=43 appcat="unscanned"
…
4: date=2023-10-03 time=15:49:12 eventtime=1696373352638475272 tz="-0700"
logid="0000000013" type="traffic" subtype="forward" level="notice" vd="root"
srcip=10.0.1.2 srcport=28117 srcintf="port1" srcintfrole="undefined" dstip=10.88.0.3
dstport=9043 dstintf="port2" dstintfrole="dmz" srcuuid="b458a65a-f759-51ea-d7df-
ef2e750026d1" dstuuid="3a951b32-0775-51ec-59c8-7a5207859839" srccountry="Reserved"
dstcountry="Reserved" sessionid=98033 proto=6 action="server-rst" policyid=21
policytype="policy" poluuid="11e5fd9a-623c-51ee-a638-b8d26f632985" policyname="Local-
Allowed-Webservers" user="dparker" group="LDAP-Remote-Allowed-Group" authserver="LDAP-
fortiad" service="tcp/9043" trandisp="noop" duration=150 sentbyte=2802 rcvdbyte=312041
sentpkt=29 rcvdpkt=226 appcat="unscanned" sentdelta=0 rcvddelta=40
Deployment Guide
APPENDIX A: PRODUCTS USED IN THIS GUIDE
More information
This section includes:
l Appendix A: Products used in this guide on page 35
l Appendix B: Documentation references on page 35
The following product models and firmware were used in this guide:
FortiClient v7.2.1
FortiOS v7.2.5
Feature documentation
l FortiOS Admin Guide > ZTNA chapter
l ZTNA Reference Guide > Endpoint Posture Check
l FortiClient Admin Guide > Zero Trust Tags
Best practices
l Zero Trust Network Access solution hub
l Zero Trust Network Access 4-D resources
l ZTNA Concept Guide
l ZTNA Architecture Guide
Deployment Guide
www.fortinet.com
Copyright© 2024 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All
other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different
network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s Chief Legal Officer, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such
binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto,
whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.
01-725-944554-20231130