The following snippet summarizes the Basic ZTNA deployment for protecting web application access using HTTPS access proxy for remote access, and IP/MAC based access control for local access. To view the complete guide, go to ZTNA Deployment Guide.
When designing your Zero Trust Access solution, and in this case, ZTNA access to internal web applications, several things will need to be considered:
In this deployment example, we will demonstrate remote and local access to protected web applications as indicated by the traffic arrows above.
The following is an overview of the procedure:
For more information, go to ZTNA Deployment Guide.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.