Description | This article describes how to perform the initial setup of a transparent proxy with an SD-WAN. |
Scope | Any supported versions of FortiGate and FortiOS. |
Solution |
First, configure the SD-WAN. See the documentation for more information.
In this example, port1 and port2 are members of the SD-WAN:
set status enable # config zone edit "virtual-wan-link" next end config members edit 1 set interface "port1" set gateway x.x.x.x next edit 2 set interface "port2" set gateway y.y.y.y next end end
Additionally, establish a static route for the SD-WAN interface's internet connectivity.
# config router static edit 1 set distance 1 set sdwan-zone "virtual-wan-link" next end
Performance SLAs and and SD-WAN rules can also be added to the configuration as required.
Next, to enable the proxy features on the FortiGate that are usually hidden, go to System->Feature Visibility->Enable Explicit Proxy.
After, create two policies: - One normal firewall policy in proxy mode. - Another proxy policy in transparent mode.
In a transparent proxy deployment, the user's client software (such as a browse) is unaware that it is communicating with a proxy. Users request Internet content as usual, without any special client configuration, and the proxy serves their requests.
To configure the firewall policy in proxy mode through the CLI, see the following example:
# config firewall policy edit 1 set name "fwproxypolicy" set uuid 5f591e2a-ca63-51ed-6468-5c7f24abb156 set srcintf "port3" set dstintf "virtual-wan-link" set action accept set srcaddr "all" set dstaddr "all" set schedule "always" set service "ALL" set inspection-mode proxy set http-policy-redirect enable set nat enable next end
The 'set http-policy-redirect enable' section is essential to ensure traffic is redirected to the transparent proxy policy.
To configure the transparent proxy policy in the CLI:
# config firewall proxy-policy edit 1 set uuid 71c4fec6-ca63-51ed-ff18-c62fb581e3fe set name "transparentProxy" set proxy transparent-web set srcintf "port3" set dstintf "virtual-wan-link" set srcaddr "all" set dstaddr "all" set service "webproxy" set action accept set schedule "always" set ssl-ssh-profile "deep-inspection" next end
No special client configuration is necessary to use a FortiGate transparent proxy. Because the client is using the FortiGate as its default gateway, requests will pass through the regular firewall policy first and then be redirected to the transparent proxy policy.
See the following article for more information about the differences between explicit proxies and transparent proxies: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2023 Fortinet, Inc. All Rights Reserved.