Fortinet black logo

Administration Guide

ZTNA tag control example

ZTNA tag control example

To add a ZTNA tag control:
  1. Go to System > ZTNA and select the ZTNA Servers tab.
  2. Select the default fortipam_access_proxy server and click Edit.
  3. In Client Certificate, select Enable.
  4. Click OK.

    After enabling Client Certificate, you are required to log in again.

  5. In the certificate check pop-up that appears, click OK.
  6. Log in to FortiPAM.
  7. Go to System > ZTNA and select the ZTNA Rules tab.
  8. Select the default FortiPAM_Default rule and click Edit.
  9. In ZTNA Tag, add the ZTNA tags or tag groups that are allowed access.

    You can choose whether to match all the tags or any by selecting All or Any for Match ZTNA tags.

    Only endpoints with the added tags can access FortiPAM.

  10. Click OK.

    On the ZTNA Tags tab, you can find all the ZTNA tags from EMS server and create ZTNA tag group.

    See Creating a ZTNA tag group.

To add ZTNA tag control using the CLI:

In the access proxy, client-cert must be enabled. You can use ztna-ems-tag to give FortiPAM access to endpoints with this tag.

  1. In the CLI console enter the following commands:

    config firewall access-proxy

    edit "fortipam_access_proxy"

    set vip "fortipam_vip"

    set client-cert enable <---

    config api-gateway

    edit 1

    set url-map "/pam"

    set service pam-service

    next

    edit 2

    set url-map "/tcp"

    set service tcp-forwarding

    config realservers

    edit 1

    set address "all"

    next

    end

    next

    edit 3

    set service gui

    config realservers

    edit 1

    set ip 127.0.0.1

    set port 80

    next

    end

    next

    end

    next

    end

    config firewall policy

    edit 1

    set type access-proxy

    set name "FortiPAM_Default"

    set srcintf "any"

    set srcaddr "all"

    set dstaddr "all"

    set action accept

    set schedule "always"

    set access-proxy "fortipam_access_proxy"

    set ztna-ems-tag "FCTEMS8822002925_pam-ems-tag-office" <---

    set utm-status enable

    set groups "SSO_Guest_Users"

    set ssl-ssh-profile "deep-inspection"

    next

    end

ZTNA tag control example

To add a ZTNA tag control:
  1. Go to System > ZTNA and select the ZTNA Servers tab.
  2. Select the default fortipam_access_proxy server and click Edit.
  3. In Client Certificate, select Enable.
  4. Click OK.

    After enabling Client Certificate, you are required to log in again.

  5. In the certificate check pop-up that appears, click OK.
  6. Log in to FortiPAM.
  7. Go to System > ZTNA and select the ZTNA Rules tab.
  8. Select the default FortiPAM_Default rule and click Edit.
  9. In ZTNA Tag, add the ZTNA tags or tag groups that are allowed access.

    You can choose whether to match all the tags or any by selecting All or Any for Match ZTNA tags.

    Only endpoints with the added tags can access FortiPAM.

  10. Click OK.

    On the ZTNA Tags tab, you can find all the ZTNA tags from EMS server and create ZTNA tag group.

    See Creating a ZTNA tag group.

To add ZTNA tag control using the CLI:

In the access proxy, client-cert must be enabled. You can use ztna-ems-tag to give FortiPAM access to endpoints with this tag.

  1. In the CLI console enter the following commands:

    config firewall access-proxy

    edit "fortipam_access_proxy"

    set vip "fortipam_vip"

    set client-cert enable <---

    config api-gateway

    edit 1

    set url-map "/pam"

    set service pam-service

    next

    edit 2

    set url-map "/tcp"

    set service tcp-forwarding

    config realservers

    edit 1

    set address "all"

    next

    end

    next

    edit 3

    set service gui

    config realservers

    edit 1

    set ip 127.0.0.1

    set port 80

    next

    end

    next

    end

    next

    end

    config firewall policy

    edit 1

    set type access-proxy

    set name "FortiPAM_Default"

    set srcintf "any"

    set srcaddr "all"

    set dstaddr "all"

    set action accept

    set schedule "always"

    set access-proxy "fortipam_access_proxy"

    set ztna-ems-tag "FCTEMS8822002925_pam-ems-tag-office" <---

    set utm-status enable

    set groups "SSO_Guest_Users"

    set ssl-ssh-profile "deep-inspection"

    next

    end