Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

Administration Guide

ZTNA Connection Rules

You can use FortiClient to create a secure encrypted connection to protected applications without using VPN. Acting as a local proxy gateway, FortiClient works with the FortiGate application proxy feature to create a secure connection via HTTPS using a certificate received from EMS that includes the FortiClient UID. The FortiGate retrieves the UID to identify the device and check other endpoint information that EMS provides to the FortiGate, which can include other identity and posture information. The FortiGate allows or denies the access as applicable. See the FortiOS Administration Guide for FortiOS configuration requirements. For TCP forwarding to non-web-based applications, you must define ZTNA connection rules in FortiClient as follows.

To add a ZTNA connection rule:
  1. On the ZTNA Connection Rules tab, click Add Rule.
  2. In the Rule Name field, enter the desired name.
  3. In the Destination Host field, enter the IP address/FQDN and port of the destination host in the format <IP address or FQDN>:<port>. This example enters demo.fortinet.com:22 as the destination host value.
  4. In the Proxy Gateway field, enter the FortiGate access IP address and port in the same format. This example enters 21.14.22.11:80 as the proxy gateway value.
  5. From the Mode dropdown list, select Transparent.
  6. Click Create.

ZTNA Connection Rules

You can use FortiClient to create a secure encrypted connection to protected applications without using VPN. Acting as a local proxy gateway, FortiClient works with the FortiGate application proxy feature to create a secure connection via HTTPS using a certificate received from EMS that includes the FortiClient UID. The FortiGate retrieves the UID to identify the device and check other endpoint information that EMS provides to the FortiGate, which can include other identity and posture information. The FortiGate allows or denies the access as applicable. See the FortiOS Administration Guide for FortiOS configuration requirements. For TCP forwarding to non-web-based applications, you must define ZTNA connection rules in FortiClient as follows.

To add a ZTNA connection rule:
  1. On the ZTNA Connection Rules tab, click Add Rule.
  2. In the Rule Name field, enter the desired name.
  3. In the Destination Host field, enter the IP address/FQDN and port of the destination host in the format <IP address or FQDN>:<port>. This example enters demo.fortinet.com:22 as the destination host value.
  4. In the Proxy Gateway field, enter the FortiGate access IP address and port in the same format. This example enters 21.14.22.11:80 as the proxy gateway value.
  5. From the Mode dropdown list, select Transparent.
  6. Click Create.