Hi,
after playing around with ZTNA, some things are not clear to me and maybe, someone has the same struggles and / or "caps" in the head.
a) To reach out a certificate based authentication and to remove the VPN gateway, you have to work with full ZTNA servers which than, the Fortigate acts like a proxy for. What I am missing; you can do a kind of load balancing with the real servers behind a HTTPS ZTNA server, but there is no option to do a health check like you could do on a "normal" virtual server. Also, it would be interestesting, if real SSL offloading works and deep inspection is done in a correct manner, so IDP/IDS and all traffic is inspected well and no signifcant security risk will raise here. Same with encrypted traffic, like SSH over a TCP tunnel.
b) The most - maybe stupid - issue I ran with the following issue:
- Let´s imagine you have a service like a git repository server on your site, behind a Fortigate. You can protect it using ZTNA, but you also may need access through the API and have to limit access not only by ZTNA tags, but also with the help of normal, oldschool, firewall policies, which limits access by ip addresses for example.
Maybe, you could now install the Forticlient on this server, which wants to access this service. But is not the way I prefer. So, I want to mix both, ZTNA policies, and normal firewall policies.
- Assume, you have www.example.com routed to IP 1.2.3.4 and Port 443. So you can only define this host and port combination once, as a Zerotrust Server, OR as a virtual server.
Does anyone has an brilliant idea, how to keep host *and* port, and mix up both, means, filter access by ZTNA, *AND* by the normal policies (means, filter by IP networks for example)?
Any ideas and help would be charming
Thanks
Ronny
I think I am little bit more further and I checked this page:
However, to achieve access for registered and authenticated users *AND* those "unknown devices", you would need to have *two* rules in the policy,
one rule for the ZTNA tagged users,
one rule for the ZTNA unknown users, limited by the source IP
Problem is, you could not combine both in ONE rule, for tagged users you need the source IP set to all, and for "unknown devices", restricted by the origin of the ip-network, you have to set the source address.
Problem, with FortiOS 7.2, I am not able to create more than one rule with the same ZTNA server destination.
Any ideas?
User | Count |
---|---|
2570 | |
1362 | |
796 | |
651 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.