Fortinet black logo

Administration Guide

Zero Trust Network Access (ZTNA) rules

Zero Trust Network Access (ZTNA) rules

A ZTNA rule is a proxy policy used to enforce access control. ZTNA tags or tag groups can be defined to enforce zero trust role based access. Security profiles can be configured to protect this traffic.

Note

Before you can create ZTNA rules, ZTNA Rules must be enabled in the Display Options.

To configure a ZTNA rule:
  1. Ensure that you are in the correct ADOM.
  2. Go to Policy & Objects > Policy Packages.
  3. In the tree menu for the policy package in which you will be creating the new policy, select ZTNA Rule.
  4. Click Create New, or, from the Create New menu, select Insert Above or Insert Below. By default, policies will be added to the bottom of the list.
    The Create New ZTNA Rules pane opens.
  5. Enter a name for the rule.
  6. Add the ZTNA tags or tag groups that are allowed access.
  7. Select the ZTNA server.
  8. Configure the remaining options as needed.
  9. Click OK.

Zero Trust Network Access (ZTNA) rules

A ZTNA rule is a proxy policy used to enforce access control. ZTNA tags or tag groups can be defined to enforce zero trust role based access. Security profiles can be configured to protect this traffic.

Note

Before you can create ZTNA rules, ZTNA Rules must be enabled in the Display Options.

To configure a ZTNA rule:
  1. Ensure that you are in the correct ADOM.
  2. Go to Policy & Objects > Policy Packages.
  3. In the tree menu for the policy package in which you will be creating the new policy, select ZTNA Rule.
  4. Click Create New, or, from the Create New menu, select Insert Above or Insert Below. By default, policies will be added to the bottom of the list.
    The Create New ZTNA Rules pane opens.
  5. Enter a name for the rule.
  6. Add the ZTNA tags or tag groups that are allowed access.
  7. Select the ZTNA server.
  8. Configure the remaining options as needed.
  9. Click OK.