Configuring traffic proxy on the gateway for forwarding secret launch (traffic plane)
We configure the traffic proxy on the gateway for forwarding secret launch.
|
|
Traffic proxy can only be configured via the CLI console. |
To configure traffic proxy on the FortiPAM gateway:
Starting 1.5.0, the default vip/access-proxy/policy is used for traffic proxy for reverse/service mode. There is no need to manually create traffic proxy in the gateway.
There is always a default firewall address and policy for the reverse mode.
config firewall address edit"fortipam_vip_gwy_addr" set uuid 71be08b0-9635-51ef-15dd-cc38fbd02e05 set subnet 172.17.219.98 255.255.255.255 next end
The IP address in the default firewall.address is the same as the default VIP.
config firewall policy edit 2001 set type access-proxy set name"fortipam_vip_gwy_pol" set uuid 71be3eca-9635-51ef-ee0f-1fd59c381492 set srcintf "any" set srcaddr set dstaddr "all" set action accept set schedule "always" set access-proxy"fortipam_access_proxy" set ssl-ssh-profile "deep-inspection" next end
Both the reverse and the service mode work on the default fortipam_vipsecret.gateway entry on the FortiPAM device.
If the gateway device is required to function as both the forward and the reverse gateway, you must add a new firewall.address representing the source device IP address and add that address next to fortipam_vip_gwy_addr in the policy.
Notes:
-
If the secret server and the gateway are different products, i.e., one is FortiPAM and the other is FortiSRA, the gateway always works on the reverse mode.
- In the CLI console, enter the following commands:
config firewall vip edit "fortipam_vip_gw" set uuid d39c1138-032a-51ef-8508-24d8bb973e7a set type access-proxy set extip 10.59.112.97 set extintf "port1" set server-type https set extport 7443 set ssl-certificate "Fortinet_SSL" next end config firewall access-proxy edit "gw_access_proxy" set vip "fortipam_vip_gw" config api-gateway edit 2 set url-map "/tcp" set service tcp-forwarding config realservers edit 1 set address "all" next end next end next end config firewall policy edit 2 set type access-proxy set uuid 380dc436-032b-51ef-0ef6-a260ec98f34b set srcintf "any" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set access-proxy "gw_access_proxy" set ssl-ssh-profile "deep-inspection" next end
If you require a customized VIP for traffic forwarding, follow the below configuration:
|
|
|
To configure traffic proxy on the FortiGate gateway:
- In the CLI console, enter the following commands:
config firewall vip edit "rvs_gw_vip" set uuid 070aabf8-1c88-51ef-7522-ee10d057882a set type access-proxy set server-type https set extip 10.59.112.131 set extintf "port1" set client-cert disable set extport 9443 set ssl-certificate "fortipam_gw5" next end config ztna traffic-forward-proxy edit "ztfp_fpam" set vip "rvs_gw_vip" next end config firewall proxy-policy edit 3 set uud 4d3ad48c-1d45-51ef-24ad-e8ec50ae317d set proxy ztna-proxy set ztna-proxy "ztfp_fpam" set srcintf "any" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set logtraffic all set utm-status enable set ssl-ssh-profile "deep-inspection" next end
|
|
The By default, the config authentication setting set user-cert-ca "CA_Cert_1" end |