Description | This article describes and clarifies the behavior of the logical and operator when combining ZTNA Security Tags with Security Tag Groups. |
Scope | ZTNA, Explicit-Proxy, proxy-policy. |
Solution |
FortiOS introduces a logical 'and' operator for Security Tags for full proxy policies.
When configuring a proxy policy on FortiGate, it is possible to combine Security Tags with Security Tag groups.
config firewall address edit "EMS_A" set type dynamic next edit "EMS_B" set type dynamic next edit "EMS_C" set type dynamic next edit "EMS_D" set type dynamic next edit "TAG_group" set category ztna-ems-tag next end config firewall proxy-policy edit 1 set proxy access-proxy next end
In this case, 'EMS_A', 'EMS_B', and 'TAG_group' will be logically connected with a logical 'and' operator, but the members ('EMS_C' and 'EMS_D') of the Security Tag Group will not: they will be connected with a logical 'or'.
This means that if only one or more members match in this Security Tag group, the logical state of TAG_group would be true, and FortiGate would allow access even if only one member matches (for example: EMS_C is applied to the client, but EMS_D is not).
diagnose test application fcnacd 7
If Security Tags must have been applied to the client requesting access to the proxy (for example EMS_A, EMS_B, EMS_C, and EMS_D)...
diagnose test application fcnacd 7
It would then be, necessary to use them directly in the proxy_policy:
config firewall proxy-policy edit 1 set proxy access-proxy next end
Related articles: ZTNA HTTPS access proxy example - FortiGate administration guide Full versus simple ZTNA policies - FortiGate administration guide |