Trying to understand all of this so I have a few questions around the setup:
Solved! Go to Solution.
I am just trying to understand which cert to use. I did see some where that the cert is whats used to encrypt the traffic between the FGT and the client. This is true for all protocols except SSH. SSH does its own encryption so the FGT lets the traffic run in clear text. Meaning the ssh encrypted traffic is not encrypted a second time.
You need to use a certificate that the client (PC) trust.
For Example:
My company is cola.com.
We have a wildcard certificate *cola.com
I imported the certificate to the firewall and called it wildcard.cola.com
also need to import the CA certificate if it is not in the firewall.
I create a DNS for the VIP used in ZTNA Servers = ztna.cola.com
I use the wildward.cola.com certificate for the ZTNA Servers.
In ZTNA destinations, the proxy gateway is = ztna.cola.com
I am doing exactly the same thing. The only change in my env is that our FortiGate is in AWS so the external IP on the FG is not what the internet sees. So I need to create my own ZTNA Destinations in EMS.
ZTNA setups can get tricky with certificates and SSO having a tool like ssstik for quick reference downloads really helps simplify testing and keeping track of configurations.
User | Count |
---|---|
2612 | |
1390 | |
804 | |
666 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.