FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Rajneesh
Staff
Staff
Article Id 387835
Description This article describes the HTTP/HTTPS Proxy used in the ZTNA configuration and what is the difference between them.
Scope FortiGate.
Solution

The attached image displays a simple topology, showing one remote endpoint, FortiGate and the real server or the protected server.

 

Image-1 topology.png

 

The connection between the remote endpoint and the FortiGate is in an HTTP/HTTPS proxy is always secured and a regular HTTPS connection is formed, just like when we access some websites. The Wireshark capture screenshot attached shows the connection between the IP source 10.5.210.33 and destination 10.5.146.35.

 

Tunnels.png

 

The connection between the FortiGate and the real/protected server is dependent on the type of Service selected, HTTP or HTTPS, as shown in the attached image.

 

Test.png

 

If the Service is HTTP, the <proxy connection> formed by the FortiGate with the server will be using the cleartext HTTP protocol. The Wireshark capture screenshot attached shows the connection between the IP source 172.16.1.1 and destination 172.16.1.3.

 

Image-2 http.png

 

And if the Service is HTTPS, the <proxy connection> formed by the FortiGate with the server will be using the HTTPS protocol, which relies on SSL/TLS, and the traffic will be encrypted. The Wireshark capture screenshot attached shows the connection between the IP source 172.16.1.1 and destination 172.16.1.3.

 

Image-3 https.png

 

In summary, both ZTNA HTTP and HTTPS access proxy are used to control access to web applications through a FortiGate acting as a secure gateway. The main difference is in how the traffic is handled.

  • ZTNA HTTP Proxy: Handles only unencrypted HTTP traffic. Because it's not encrypted, the proxy can inspect and control requests in detail, like reading URLs and headers directly.
  • ZTNA HTTPS Proxy: Works with encrypted HTTPS traffic. To inspect and enforce policies, it uses SSL inspection.