Configuring a private access policy for server-to-client traffic
Secure private access (SPA) server-to-client communication allows traffic initiated from SPA hubs (or local networks behind SPA hubs) to remote users (currently VPN users only). This communication requires the Remote VPN and edge device user identification feature and additional configuration steps on the FortiGate SPA hub itself. See Prerequisites and considerations.
For details on SPA client-to-server communication, see Configuring a private access policy for client-to-server traffic.
To configure a private access policy to remote users from SPA hubs:
- Go to Configuration > Policies.
- Click the Private Access tab and then click the From hubs subtab.
- Click +Create to create a new policy.
- Configure these fields:
Field
Value
Name Enter a unique private access policy name. Source Scope - Private Access Traffic: all private access traffic
- Specify: specify selected private access hosts or host groups.
Destination - All: all FortiSASE users/devices
- VPN Users: remote endpoint users
Service Click + and select services or service groups. Action Accept or Deny Profile Group Default or Specify and select a profile group. Force Certificate Inspection Enabled or disabled.
When enabled, this policy ignores the SSL inspection mode defined in the selected profile group and instead uses certificate inspection.
Schedule
Select always or another recurring schedule.
Status Enable or disable. Log Allowed Traffic Enable or disable.
- Security Events: log traffic that has a security profile applied to it.
- All Sessions: log all sessions that this policy accepts or denies.
Comments
Enter comments up to the listed maximum number of characters.
- Click OK.
To configure a FortiGate SPA hub firewall policy required for traffic from SPA hubs:
On the FortiGate SPA hub, you must configure a firewall policy allowing traffic from the desired local interface(s) or spokes behind the hub to the remote VPN and edge device users via the SPA overlay. This policy ensures that traffic from networks connected to the FortiGate SPA hub are allowed to FortiSASE remote VPN and edge device users.
In this example, for the FortiGate SPA hub, the SPA overlay (IPsec VPN tunnel) is defined as fgt_hub1 and the local connected networks DMZ_HQ and LAN_HQ are on port2 and port4, respectively. Therefore, we create a policy that allows traffic from the local connected networks on the hub to the FortiSASE remote VPN users.
- On the FortiGate SPA hub, go to Policy & Objects > Firewall Policy.
- Click +Create New to create a new policy.
- Configure these fields:
Field
Value
Name Enter a unique private access policy name. Incoming Interface
DMZ_HQ (port2)
LAN_HQ (port4)
Outgoing Interface
fgt_hub1
Source
all
Destination
All
Schedule
always
Service
ALL
Action
ACCEPT
NAT
You can enable or disable NAT depending on the IP configuration of the organization’s FortiGate SPA hub.
IP Pool Configuration
Use Outgoing Interface Address
- Click OK.
Prerequisites and considerations
Prerequisites
- The display of the From hubs subtab and resulting functionality requires a FortiSASE instance with the remote VPN user identification feature, which is included with new instances created after the FortiSASE 24.3.b release and may need to be added on instances created before that release. See Remote VPN and edge device user identification. Otherwise, the From hubs subtab does not display.
- Currently, FortiSASE supports traffic from SPA hubs to remote VPN users only.
- On the FortiGate SPA hub, you must configure a firewall policy allowing traffic from the desired local interface(s) or spokes behind the hub to the remote VPN users via the SPA overlay. This policy ensures that traffic from networks connected to the FortiGate SPA hub are allowed to FortiSASE remote VPN users.
Considerations
-
For SSL VPN remote users, whenever changes are made to an existing Internet Access or Private Access policy, they take effect only after SSL VPN users reconnect to FortiSASE.
-
With the addition of support for identity-based policies for edge devices in FortiSASE 24.3.a, the behaviour of edge device traffic based on policies has changed in existing FortiSASE instances:
- Any policies you created before FortiSASE 24.3.a, specifically for edge devices, namely, policies with Source Scope set to Edge Devices will have User set to Captive Portal Exempt.
- Any policies you created before FortiSASE 24.3.a with Source Scope set to All will not be modified. Therefore, any edge devices whose traffic matched an All allow policy before will now have authentication enforced using the captive portal. You must explicitly create a new exemption policy and place it above any All allow policies to avoid captive portal authentication for any impacted edge devices. See Configuring an exemption policy for an edge device.
-
When SSO authentication is used with the captive portal for edge devices, you must add an exemption policy for the SAML IdP URLs specified using hosts or infrastructure selections for the Destination field to allow SSO authentication traffic destined for the IdP to bypass the captive portal. See Configuring an exemption policy for SSO authentication for Entra ID.