Hello All,
Iam trying to understand how fortigate explicit proxy works and how is the traffic flow with explicit proxy and proxy policies.
How do a traffic flow ( Client to Fortigate firewall as a proxy -> Proxy Policy -> normal policies -> ) , or is they any other way this works.
Do we need normal policies for explicit proxy or we don't required.
Any documents or related content i helpful
Hi Network_Learners,
Was this intentionally posted in FortiCare Service Development? You are more likely to get an answer in the Support Forum - I can move it there if you would like.
Welcome to your new Fortinet Community!
You'll find your previous forum posts under "Forums"
| User | Count |
|---|---|
| 8 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.