Description This article describes an issue where a FortiSASE user is
unable to match the correct user group due to a mismatch between the
user group configuration in Azure and FortiGate Scope FortiSASE Solution
Let's say user's internet access was n...
Description This article describes how to secure FortiSASE with
SAML-based SSL VPN, using Azure Active Directory as the Identity
Provider. It covers the step-by-step process of integrating Azure AD
with FortiSASE, ensuring secure remote access throug...
Description This article describes how to fix the 'Entry Not Found'
error when selecting a 2FA authentication scheme in FortiGate's ZTNA
SaaS-based access proxy configuration Scope FortiGate. Solution The
requirement is to set up 2FA when accessing Z...
Description This article details the implementation of Zero Trust
Network Access (ZTNA) for SaaS applications using RADIUS authentication
Scope FortiGate. Solution Once the ZTNA access proxy configuration for
SaaS access is complete, the next step is...
Description This article describes a behavior where only the Webex SaaS
application was intended to route through a ZTNA proxy configured on a
FortiGate and Forticlient EMS, but traffic from www.google.com, was also
being redirected. Scope FortiGate,...
Dear onebox-tech, To configure AWS Direct Connect on a FortiGate 90G,
create a VLAN interface on the FortiGate corresponding to the VLAN ID
provided by AWS, configure BGP with AWS's ASN (7224) and your IP
prefixes, set up static routes to direct traf...
Hi farcas, Currently in FortiSase traffic is only one way. Client
connected to fortisase via vpn towards internet >> SIA Client connected
to fortisase via vpn towards private NW behind hub FGT >> SPA Also the
concept is same even in agentless mode.
Hi ibnet, You can also have a look in below article along with
preserve-session-route enable settings
https://community.fortinet.com/t5/FortiGate/Technical-Tip-Using-SNAT-route-change-to-update-existing-NAT/ta-p/198439
Dear nethan, You can take a pcap on the FGT and verify it on wireshark.
Also verify is the ssl deep inspection cert is install on the user PC.
https://community.fortinet.com/t5/FortiGate/Technical-Tip-Extended-logging-for-SSL-traffic/ta-p/202112
Dear Umesh, You can follow the below article where it has mentioned
about each feature of fortigate
https://docs.fortinet.com/document/fortigate/7.4.1/administration-guide/954635/getting-started