FortiClient
FortiClient proactively defends against advanced attacks. Its tight integration with the Security Fabric enables policy-based automation to contain threats and control outbreaks. FortiClient is compatible with Fabric-Ready partners to further strengthen enterprises’ security posture.
agomes
Staff
Staff
Article Id 386997
Description This article shows how to move an application from a VPN IPsec client-to-site to ZTNA.
Scope FortiGate, FortiClient EMS, and FortiClient.
Solution

Follow these to move the application from VPN IPsec client-to-site to ZTNA Application with FortiClient EMS.

 

This procedure needs a fabric configuration between FortiGate and FortiClient EMS.

 

If a FortiManager application is accessible through a VPN IPsec client-to-site, the following configuration will involve a VPN and a policy allowing the respective traffic.

 

The topology below illustrates the VPN IPsec client-to-site traffic flow.

 

2025-04-09 10_00_31-Excalidraw and 10 more pages - Personal - Microsoft​ Edge.png

 

Follow the ZTNA traffic flow:

 

2025-04-09 10_10_04-Excalidraw and 10 more pages - Personal - Microsoft​ Edge.png

 

To move this configuration to ZTNA, follow these steps:

 

  1. Create a ZTNA Server on the FortiGate.

 

2025-04-09 10_09_00-FortiGate - POD1-FGT01 and 10 more pages - Personal - Microsoft​ Edge.png

 

  1. Use the FortiGate interface address that the client will connect to access the application (proxy address).
  2. Try to use a different port from the management port.
  3. Map the application using TCP Forwarding and insert the port that the application will be accessible on.
  1. Go to the FortiClient EMS server and check if the application was synced with the fabric on Fabric Connectors -> ZTNA Application Catalog. See the screenshot below.

 

2025-04-09 10_17_09-FortiClient Endpoint Management Server and 10 more pages - Personal - Microsoft​.png

 

  1. Go to the ZTNA Destination profile, select the add button in the Rules Grouped by ZTNA Applications tab, choose the application, and select the Finish button to sync this application with the FortiClient.

 

2025-04-09 10_19_35-FortiClient Endpoint Management Server and 10 more pages - Personal - Microsoft​.png

 

  1. Select the Save button to save the profile and sync this application with the FortiClient.

  2. Check on the FortiClient if the application was synced.

 

2025-04-09 10_24_35-Terminal and 10 more pages - Personal - Microsoft​ Edge.png

 

  1. Go to the FortiGate and create a ZTNA policy to allow this traffic.

 

2025-04-09 10_31_25-FortiGate - POD1-FGT01 and 10 more pages - Personal - Microsoft​ Edge.png

 

  1. The use of security posture tags can be used if necessary to restrict access as well, but this article does not cover security posture tags.
  2. After this, try to access the application through its original IP address https://172.16.1.100.
  3. FortiClient will use the FortiGate (192.168.50.1:4443) as a proxy and access the Application.
Contributors