Description
This article describes how most web pages are dynamic. For example, javascript is used to construct dynamic URL links.
This makes it much more difficult to locate the URL in the returned page from HTTP(s) servers (sometimes it is simply impossible to do it properly).
The complexity of such URL rewrite is getting worse and it is becoming a recommendation to use alternatives as presented in this article.
All the alternatives presented in this article support Antivirus/Web Filter/DLP/IPS features, different from the SSL VPN web mode which has very limited support for those features.
Recommendation reminder: VPN or not it is always a good practice long passwords together with 2FA/MFA.
Scope
FortiGate v7.0, v7.2, v7.4. v7.6.
Solution
- Non-VPN remote access (ZTNA access proxy feature) or (FortiSASE).
ZTNA: Zero Trust Network Access
FortiGate: ZTNA configuration examples
Best Practices | 4-D Resources
- Use IPsec remote access.
- ZTNA agentless web-based application access.
ZTNA web portal does not need any client-side install and will not execute client checks.
Related documents for this alternative:
FortiGate/FortiOS New Features - ZTNA agentless web-based application access
- Use SSL-VPN Tunnel mode.
- It is flexible and easy to configure.
- Additional features compared with alternatives.
- It is not NPU offloaded.
- Less performance overall compared with all alternatives mentioned in this article.
- Might not be available on Low-end models.
Technical Tip: SSL VPN support on FortiGate desktop
Technical Tip: How to configure SSL-VPN split tunnel mode
Technical Tip: Split DNS support for SSL VPN
Technical Tip: How to disable SSL-VPN Web Mode or Tunnel Mode in SSL-VPN portal
- A VIP, PAT, or 'Virtual Server' together with 'firewall policy authentication'.
Firewall Auth: FortiGate administration guide
Technical Tip: How to configure SAML authentication for firewall policy with Virtual IP (VIP)
'Virtual Server' + authentication | Recommend using HTTPS instead of HTTP: Technical Tip: Web Server authentication from external network on VIP policy