What's new
The following sections describe new features, enhancements, and changes in FortiProxy 7.6.1:
ZTNA support for UDP traffic
ZTNA now supports UDP traffic from FortiClient 7.4.1 and later endpoints. When UDP traffic to a destination is detected, FortiClient forms a UDP connection over QUIC to the FortiProxy ZTNA gateway. After authentication, security posture check, and authorization, FortiProxy forms a connection with the destination and the end-to-end UDP traffic passes through. See ZTNA for UDP traffic in the Administration Guide for an example.
Enhancements to the policy list
FortiProxy 7.6.1 includes the following enhancements to the policy list under Policy and Objects > Policies:
-
Improved performance and reduced time in loading a large number of policies. This is achieved by only loading the necessary data when needed, rather than loading all the data at once.
-
A new layout has been introduced for the policy list which includes several features to enhance user experience. You can choose between the new layout and the old layout. To switch between the classic and new policy list layout, select the style from the dropdown menu. See New layout for policies in the Administration Guide for more details.
-
The Interface Pair View is now available when a policy is configured with multiple interfaces. Previously the Interface Pair View was grayed out when multiple interfaces were set for a policy, and the By Sequence view was displayed. See Policy views in the Administration Guide for more details.
New log fields for long-live sessions
Logging of long-live session statistics can be enabled or disabled in traffic logs.
config log setting set long-live-session-stat {enable | disable} end
When enabled, traffic logs include the following fields of statistics for long-live sessions:
Duration delta ( |
Displays the time in seconds between the last session log and the current session log. |
Sent packet delta ( |
Displays the number of sent packets. When the number of packets reported in the |
Received packet delta ( |
Displays the number of received packets. When the number of packets reported in the |
The long-live session fields enhance the granularity and accuracy of traffic longs to aid troubleshooting and analysis. See Log fields for long-lived sessions in the Administration Guide for an example.
Multiple explicit proxies in a policy
You can now select multiple explicit proxies in a policy:
In the CLI, the explicit-web-proxy
option of the config firewall policy
command also adds support for multiple explicit web proxies:
config firewall policy edit 2 set type explicit-web set uuid c48e0f02-0857-51ef-cfc7-b9e1b79313c3 set dstintf "port3" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "webproxy" set explicit-web-proxy "web-proxy-8800" "web-proxy-8801" set utm-status enable set logtraffic all set log-http-transaction enable set extended-log enable set ssl-ssh-profile "custom-deep-inspection" set webfilter-profile "my-web-filter" next end
IP based user authentication through portal authentication without HTTP redirection
For IP-based authentication, if negotiate is enabled in its active scheme, the form-auth-fallback
command is available. When enabled, if an exception occurs while processing the ticket, the user will be prompted to enter user name and password. Captive portal must be enabled.
By default, form-auth-fallback
is disabled.
config authentication rule edit "krb-rules" set srcintf "any" set srcaddr "all" set dstaddr "all" set active-auth-method "krb-scheme" set form-auth-fallback enable next end
Customizable syslog format option
To better support 3rd party integrations, syslog format options can be customized.
config log syslogd setting set format custom config log-templates edit 1 set category traffic set template "$(date) $(time) $(logid)" next next end
category <category> |
The log category. |
template <string> |
The log template string. |
Use a static client certificate for SSL/SSH inspection
When configuring an SSL/SSH inspection profile, you can now configure FortiProxy to use a static client certificate for mTLS authentication on behalf of all authenticated users using the new Static option of SSL Client Certificate. You can then select the client certificate to use. The default is Fortinet_CA_SSL.
Alternatively use the new static
status option of the config ssl-client-certificate
subcommand under config firewall ssl-ssh-profile
. You can then configure the client certificate using the new set cert
subcommand.
Header replacement in web-proxy profile
In web-proxy profiles, the header can be replaced.
config web-proxy profile edit my_profile config headers edit 1 set name "server" set action add-to-response set add-option {replace | replace-when-match} set content "content_changed" next end next end
replace |
Replace content to existing HTTP header or create new header if HTTP header is not found. |
replace-when-match |
Replace content to existing HTTP header. |
Add license information in SNMP
FortiProxy 7.6.1 adds license information to SNMP with the following OIDs:
-
FortiProxy license related: 3.6.1.4.1.12356.101.10.117.*
-
SWG Bundle (FURL): 3.6.1.4.1.12356.101.10.117.1.*
-
Licensed sessions: 3.6.1.4.1.12356.101.10.117.1.1
-
Active sessions (licensing limit): 3.6.1.4.1.12356.101.10.117.1.2
-
Purchased seats: 3.6.1.4.1.12356.101.10.117.1.3
-
-
Browser Isolation (FNBI): 3.6.1.4.1.12356.101.10.117.2.*
-
Content Analysis (FCAS): 3.6.1.4.1.12356.101.10.117.3.*
Support for Google Cloud HSM
FortiProxy 7.6.1 adds support for Google Cloud HSM which allows FortiSASE HSM integration.
Improved certificate management in cloud infrastructure
FortiProxy 7.6.1 introduces the following certificate management improvements in cloud infrastructure to optimize performance:
-
Certificate signing has been changed from synchronous to asynchronous.
-
Certificate caching mechanism has been improved so that local certificate cache is maintained by individual WAD workers while centralized certificate cache is managed by the certificate manager.
SR-IOV support on Hyper-V
FortiProxy 7.6.1 adds support for SR-IOV on Hyper-V to optimize FortiProxy-VM performance.
CLI changes
FortiProxy 7.6.1 includes the following CLI changes:
-
—Use the newconfig user radius
set require-message-authenticator
option to configure whether to require message-authenticator checking.enable
Validation of message authenticator is mandatory in authentication responses.
disable
Validation of message authenticator is optional in authentication responses.
-
diagnose debug kernel log
—Use this new command to show or clear kernel log.show
Dump the kernel log.
clear
Clear the kernel log.