Description | This article describes and clarifies the behavior of the logical and operator when combining ZTNA Security Tags with Security Tag Groups. |
Scope | ZTNA, Explicit-Proxy, proxy-policy. |
Solution |
FortiOS introduces a logical 'and' operator for Security Tags for full proxy policies.
When configuring a proxy policy on FortiGate, it is possible to combine Security Tags with Security Tag groups.
config firewall address edit "EMS_A" set type dynamic next edit "EMS_B" set type dynamic next edit "EMS_C" set type dynamic next edit "EMS_D" set type dynamic next edit "TAG_group" set category ztna-ems-tag next end config firewall proxy-policy edit 1 set proxy access-proxy next end
In this case, 'EMS_A', 'EMS_B', and 'TAG_group' will be logically connected with a logical 'and' operator, but the members ('EMS_C' and 'EMS_D') of the Security Tag Group will not: they will be connected with a logical 'or'.
This means that if only one or more members match in this Security Tag group, the logical state of TAG_group would be true, and FortiGate would allow access even if only one member matches (for example: EMS_C is applied to the client, but EMS_D is not).
diagnose test application fcnacd 7
If Security Tags must have been applied to the client requesting access to the proxy (for example EMS_A, EMS_B, EMS_C, and EMS_D)...
diagnose test application fcnacd 7
It would then be, necessary to use them directly in the proxy_policy:
config firewall proxy-policy edit 1 set proxy access-proxy next end
Related articles: ZTNA HTTPS access proxy example - FortiGate administration guide Full versus simple ZTNA policies - FortiGate administration guide |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.