| Description | This article describes the behavior where the reference count of a Zero Trust Network Access (ZTNA) server object is 0 in the FortiGate GUI and CLI when a firewall policy is used instead of a proxy policy. This is expected behavior and works as designed. |
| Scope | FortiOS v7.2.4+, v7.4.0+. |
| Solution |
Before FortiOS v7.2.4 and v7.4.0, a ZTNA configuration in the FortiOS required configuring:
In these settings, ZTNA rules were special proxy policies that controlled access to the ZTNA servers, and they could be configured from the Policy & Objects -> ZTNA -> ZTNA Rules tab.
From FortiOS v7.2.4 and v7.4.0 onwards, a configuration enhancement was introduced to provide a simplified ZTNA user experience. This enhancement allows ZTNA rules to be configured directly within firewall policies, without the requirement to use proxy-based ZTNA rules.
This new feature is introduced in below document: Introduce simplified ZTNA rules within firewall policies
An example GUI configuration is shown below:
ZTNA server 'ztna_test' is added as the destination in a firewall policy:
The corresponding CLI configuration can be found below:
Spoke2 (ztna_test) # show
It is interesting to note that the reference count of the ZTNA server object 'ztna_test' is 0, even though it appears to be in use by the firewall policy.
When checking the reference count of 'ztna_test' in the CLI using the following command, the result is empty as well:
diagnose sys cmdb refcnt show firewall.access-proxy.name ztna_test
This behavior is not observed when a proxy policy is used. For example, if the ZTNA server 'ztna_test' is referenced by the following proxy policy:
The reference can be seen in both the GUI and CLI:
Spoke2 # diagnose sys cmdb refcnt show firewall.access-proxy.name ztna_test
The reason the reference count of the ZTNA server object remains 0 when a firewall policy is used is that the firewall policy does not directly reference the object 'ztna_test' under 'config firewall access-proxy'. Instead, it references an object with the same name under 'config firewall vip'. This VIP object is created automatically when the ZTNA server object is configured in the GUI. It is not visible in the GUI and can only be seen from the CLI.
config firewall vip edit "ztna_test" end
This behavior is by design in FortiOS and will not affect the functionality of ZTNA. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.