What's new
The following sections describe new features, enhancements, and changes in FortiProxy 7.6.6:
LLM security gateway as HTTP proxy
FortiProxy 7.6.6 supports LLM security gateway as HTTP proxy with the following features:
-
Seamless user access via PAC file or explicit proxy settings—Users can configure their browsers or devices with a PAC file (or manual proxy setting) to direct traffic for known LLM endpoints (for example,
api.openai.com,claude.ai,gemini.google.com) through FortiProxy, removing the need for a dedicated access portal. -
Automatic LLM traffic detection and classification—FortiProxy inspects outbound HTTPS traffic and automatically classifies LLM API requests based on domain, URL patterns, and TLS fingerprinting, enabling vendor and model awareness without user intervention.
-
Inline policy enforcement on prompts & responses—Requests and responses are scanned inline, allowing FortiProxy to apply DLP, keyword-based allow/deny lists, language filters, and rate limiting transparently during real-time usage.
-
Per-user attribution and API key control—FortiProxy maps each request to a user identity (via FSSO or other authentication methods) and enforces API key usage policies (e.g., inject shared key, block if no key, per-user quota), maintaining traceability even without a web portal.
-
Real-time logging & analytics—All interactions are logged with full context (user, time, model, prompt, response), feeding into FortiAnalyzer, FortiSIEM, or other logging systems for auditing, AI usage metrics, and compliance.
-
Optional redirect to policy page on first use or violation—On first LLM use or policy violation, FortiProxy can redirect the user to a policy awareness page or disclaimer, replicating the portal’s policy visibility while keeping access frictionless.
Configuration example
edit "ztna_portal_fqdn"
set vip "ztna_portal_fqdn"
set host "10.20.20.220.xx.xx"
set auth-rule "ztna"
set cookie-age 50
set llm-proxy enable
set llm-profile "llm-profile-2"
set ak-manager enable
next
end
edit "src-adv"
set type src-advanced
set host "all"
config header-group
edit 1
set header-name "Authorization"
set header ".*"
next
end
next
end
edit "bearer-scheme"
set method bearer
set user-database "ldap"
set bearer-type access-token
next
edit "fac_ldap_scheme"
set method basic
set user-database "ldap"
next
end
edit "bearer-session"
set srcaddr "src-adv"
set ip-based disable
set active-auth-method "bearer-scheme" <--- new option
next
edit "ztna"
set protocol ztna-portal
set ip-based disable
set active-auth-method "fac_ldap_scheme"
set web-auth-cookie enable
next
end
edit "ldap"
set server "10.120.1.120"
set cnid "cn"
set dn "dc=qa,dc=domaintest,dc=com"
set type regular
set username "qa\\administrator"
set password ENC a2luZ8wb8C2sNYzMPmlPpntA2h3vFgz/F092WGNpwaoB7esnzD8G/Whg/Ph/VswTZ3OvFRWyNysni6sOp4kcWPTwQo6k6iNzQFOEMAROqeV4+lFJ4JzYR1VQ8P6EC7kqJ2B3cZYmvU0o1DBr843pLe9+k4miy4pPHmg2qvPqmSThqF9dLjYa33JTrgHHsygbGkACcVlmMjY3dkVA
next
end
edit 13
set type ztna-proxy
set ztna-proxy "ztna_portal_fqdn"
next
edit 16
set name "test"
set llm-profile "llm-profile-2"
next
end
edit "llm-profile-2"
config chat
set system-prompt-mode append
set system-prompt "using emoji"
end
config response
end
next
end
Replacing iptables and ipset with netlink
FortiProxy 7.6.6 replace iptables and ipset with netlink to reduce dependency on third-party programs. As a result, the old diagnose iptables commands are replaced with the new diagnose nft commands with improved performance and scalability. See CLI changes for more details.
Logging for license sharing events
FortiProxy7.6.6 adds logging for the following license sharing events:
-
When a member becomes stale and recovers from stale status, the event is recorded on the root node.
-
When a member node is promoted as root or reverts back as a member, the event is recorded on the member node.
-
When the effective root node changes, the event is recorded on each member node.
See the License Sharing Deployment Guide for more details.
HTTP QUERY method support
FortiProxy 7.6.6 adds support for the HTTP QUERY method. You can now redirect to captive portal for QUERY, similar to a POST request. You can also use the new QUERY method in config firewall proxy-address, config waf profile, and config icap profile.
CLI changes
FortiProxy 7.6.6 includes the following CLI changes:
-
diag sys saml metadata—Use this new command to test SAML metadata. -
diagnose sys disk—Use this new command to enable and view SMART support information for FPX-2000G/4000G/400G. -
config firewall proxy-address—Theset methodsubcommand includes the newqueryoption. config waf profile—Theconfig method > default-allowed-methodsandconfig method-policy > allowed-methodssubcommands includes the newqueryoption.config icap profile—Theset methodssubcommand includes the newqueryoption.-
The old
diagnose iptablescommands are replaced with the newdiagnose nftcommands with improved performance and scalability:Old New iptables listnft show
iptables list6ipset listiptables refreshnft update
iptables dry-runnft set log-show-ruledump enable', then 'update'
iptables shaperfirewall shaper reapply
iptables shaper-statsfirewall shaper
debug app iptablesnft log