Fortinet white logo
Fortinet white logo

Whatʼs new

Whatʼs new

The following sections describe the new features and enhancements:

Zero Trust Network Access (ZTNA)

This section includes information about the following ZTNA new features:

Connect a ZTNA access proxy to an SSL-VPN web portal

SSL-VPN web portals can be defined in ZTNA access proxy settings. The ZTNA access proxy handles the access control processes (client certificate authentication, posture check, user authentication and authorization), and establishes the HTTPS connection between the end user and the access proxy. Then, it forwards the user to the web portal where they can use predefined bookmarks to access TCP based services like HTTPS, RDP, VNC, FTP, SFTP, SSH, Telnet, and SMB. Existing SSL-VPN portal configurations can be used.

Note

The web portal service can only be configured in the CLI.

To configure the SSL-VPN web portal:
  1. Go to VPN > SSL-VPN Portals and click Create New.
  2. Enter a name, for example, test_ssl.
  3. Disable Tunnel Mode.
  4. Enable Web Mode.
  5. Create the bookmarks:
    1. Under Predefined Bookmarks, click Create New.
    2. Enter the name of the service.
    3. Select the service Type.
    4. Enter the URL to access the service.
    5. Click OK.
    6. Repeat these steps to create other bookmarks.
  6. Click OK.
To configure the ZTNA access proxy:
  1. Configure a VIP for the ZTNA access proxy. The ssl-certificate can be replaced with a server certificate:
    config firewall vip
    	edit "ztna_webportal"
    		set type access-proxy
    		set extip 172.18.62.68
    		set extintf "any"
    		set server-type https
    		set extport 4443
    		set ssl-certificate "*.test.com"
    	next
    end
  2. Configure the virtual host to be used to connect to the ZTNA access proxy. The host should resolve to the VIP’s address:
    config firewall access-proxy-virtual-host
    	edit "webportal"
    		set ssl-certificate "*.test.com"
    		set host "web.test.com"
    	next
    end
  3. Configure the ZTNA access proxy to be in web portal mode:
    config firewall access-proxy
    	edit "ztna_webportal"
    		set vip "ztna_webportal"
    		set client-cert enable
    		config api-gateway
    			edit 1
    				set url-map "/webportal"
    				set service web-portal
    				set virtual-host "webportal"
    				set ssl-vpn-web-portal "test_ssl"
    			next
    		end
    	next
    end
  4. Apply the access proxy to a proxy policy (specify the ZTNA tags as needed):
    config firewall policy
    	edit 1
    		set type access-proxy
    		set name "ztna_rule"
    		set proxy access-proxy
    		set access-proxy "ztna_webportal"
    		set srcintf "any"
    		set srcaddr "all"
    		set dstaddr "all"
    		set ztna-ems-tag "FCTEMS8821000000_High"
    		set action accept
    		set schedule "always"
    		set logtraffic all
    		set srcaddr6 "all"
    		set dstaddr6 "all"
    		set utm-status enable
    		set profile-type group
    		set profile-group "profile group1"
    		set logtraffic-start enable
    	next
    end

    The SSL VPN bookmarks are learned by the WAD daemon and are ready to use.

  5. Verify the bookmarks:
    # diagnose test app wad 351
    [bookmark: (portal/group/name=test_ssl/gui-bookmarks/2nd HTTP)]:
    	type  :1
    	url   :http://httpbin.org
    	host  :
    	folder:
    	domain:
    	port  :0
    [bookmark: (portal/group/name=test_ssl/gui-bookmarks/FTP)]:
    	type  :4
    	url   :
    	host  :
    	folder:172.16.200.215
    	domain:
    	port  :0
    [bookmark: (portal/group/name=test_ssl/gui-bookmarks/HTTPS-fortinet)]:
    	type  :1
    	url   :https://www.fortinet.com
    	host  :
    	folder:
    	domain:
    	port  :0
    [bookmark: (portal/group/name=test_ssl/gui-bookmarks/RDP)]:
    	type  :9
    	url   :
    	host  :172.18.62.213
    	folder:
    	domain:
    	port  :3389
    			…
To test the connection:
  1. From the client browser, go to https://web.test.com:4443/webportal to access the ZTNA access proxy web portal.

  2. Once the client passes the certificate check, posture check, and access is granted, the user is redirected to the web portal. The list of predefined bookmarks appears.

  3. Click a bookmark, such as HTTPS-fortinet. The website opens.

  4. From the web portal, click another bookmark, such as SSH. The page opens with the credential login screen to access the server.

UTM scanning on TCP forwarding access proxy traffic

UTM scanning and deep inspection is supported for multiple protocols in a ZTNA TCP forwarding access proxy. In addition to HTTP and HTTPS, the mail protocols (SMTP, IMAP, and POP3) and file sharing protocols (SMB and CIFS) are supported.

AV scanning for normal POP3, IMAP, and SMTP traffic

To configure AV scanning for normal POP3, IMAP, and SMTP traffic:
  1. In FortiClient, add ZTNA connection rules for the email server IP and POP3, IMAP, and SMTP ports.

  2. In the FortiProxy unit, configure the ZTNA TCP forwarding server to add the email server address and enable AV profile scanning in the ZTNA rules.
  3. On the client PC, open Outlook app and send emails with attachments containing virus affected files.
  4. The ZTNA rule on the FortiProxy unit blocks the email send/receive traffic and generates AV logs.

AV deep scanning for SSL encrypted POP3S, IMAPS, and SMTPS traffic

To configure AV deep scanning for SSL encrypted POP3S, IMAPS, and SMTPS traffic:
  1. In FortiClient, add ZTNA connection rules for the email server IP and POP3S, IMAPS, and SMTPS ports.

  2. In the FortiProxy unit, configure the ZTNA TCP forwarding server to add the email server address and enable AV profile scanning in the ZTNA rules.
  3. On the client PC, open Outlook app and send emails with attachments containing virus affected files.
  4. The ZTNA rule on the FortiProxy unit blocks the email send/receive traffic and generates AV logs.

AV scanning for SMB service traffic

To configure AV scanning for SMB service traffic:
  1. In FortiClient, add ZTNA connection rules for the SMB file sharing server IP and ports.

  2. In the FortiProxy unit, configure the ZTNA TCP forwarding server to add the SMB server address and enable AV profile scanning in the ZTNA rules.
  3. On the client PC, upload and download virus affected files to and from the SMB server.
  4. The ZTNA rule on the FortiProxy unit blocks the email send/receive traffic and generates AV logs.

File filter scanning for CIFS service traffic

To configure file filter scanning for CIFS service traffic:
  1. In FortiClient, add ZTNA connection rules for the CIFS server IP and port.
  2. In the FortiProxy unit, configure the ZTNA TCP forwarding server to add the CIFA server address and enable file filter profile scanning in the ZTNA rules.
  3. On the client PC, upload and download predefined file types (such as .EXE) to and from the CIFS server.
  4. The ZTNA rule on the FortiProxy unit blocks the email send/receive traffic and generates AV logs.

Increase ZTNA and EMS tag limits

The following limits have increased for EMS server, IP addresses, and MAC addresses in EMS and ZTNA tags:

  • The maximum number of EMS servers a FortiProxy unit can connect to increased from three to five.
  • The maximum number of IP address an EMS tag can resolve increased from 1000 to over 100,000.
  • The maximum number of MAC address an EMS tag can resolve increased from 1000 to 3000.

Use the following diagnose commands to verify address information:

# diagnose firewall fqdn <option>

Option

Description

list-ip

List IP FQDN information.

list-mac

List MAC FQDN information.

list-all

List FQDN information.

getinfo-ip

Get information of IP FQDN address.

getinfo-mac

Get information of MAC FQDN address.

get-ip

Get and display one IP FQDN address.

get-mac

Get and display one MAC FQDN address.

Use FQDN with ZTNA TCP forwarding access proxy

When defining ZTNA connection rules on FortiClient for TCP forwarding, it is sometimes desirable to configure the destination host address as an FQDN address instead of an IP address. Because the real servers are often servers in the corporate network, this layer of obfuscation prevents internal IP addresses from easily leaking to the public, and also makes the destination more easily recognizable by the end users.

One obstacle to overcome is getting remote hosts to resolve an internal FQDN that is typically only resolvable by an internal DNS in the corporate network. This can be solved with the following:

  1. When an FQDN address is added as a destination host in a ZTNA connection rule, FortiClient creates a virtual IP address for this FQDN address and adds this to the computer’s host file (Windows). The same is true when a ZTNA connection rule entry is pushed from EMS.

  2. The virtual IP address mapped to the FQDN address is not the real address of the server. It allows applications to resolve the FQDN address to this virtual IP address. FortiClient listens to any traffic destined for it and forwards the traffic using the TCP forwarding URL with FQDN to the ZTNA access proxy.

  3. The FortiProxy access proxy will resolve the FQDN using the internal DNS on the corporate network, matching the traffic to the ZTNA real server configuration with the same domain and address.

  4. If a valid ZTNA real server entry is found, traffic is forwarded to the real server.

This features requires a minimum FortiClient and FortiClient EMS version of 7.0.3.

To configure the TCP forwarding access proxy:
  1. Go to Policy & Objects > ZTNA and select the ZTNA Servers tab.

  2. Click Create New.

  3. Enter a Name, such as ZTNA_S1.

  4. Configure the network settings:

    1. Set External interface to any.

    2. Set External IP to 172.18.62.32.

    3. Set External port to 443.

  5. Select the Default certificate. Clients will be presented with this certificate when they connect to the access proxy VIP.

  6. Add server mapping:

    1. In the Service/server mapping table, click Create New.

    2. For Service, select TCP Forwarding.

    3. Add a server:

      1. In the Servers table, click Create New.

      2. Create a new FQDN address for the HTTPS server at s27.qa.fortinet.com and then click OK.

      3. Apply the new address object as the address for the new server.

      4. Click OK.

    4. Add another server using the same steps for s29.qa.fortinet.com.

  7. Click OK. Now that the ZTNA server is complete, the domain settings must be configured in the CLI to map domains to the real servers.

To map domains to the real servers:
config firewall access-proxy
	edit "ZTNA_S1"
		set vip "ZTNA_S1"
		set client-cert enable
		config api-gateway
			edit 2
				set url-map "/tcp"
				set service tcp-forwarding
				config realservers  
					edit 4
						set address "s27.qa.fortinet.com"
						set domain "qa.fortinet.com"
					next
					edit 5
						set address "s29.qa.fortinet.com"
						set domain "qa.fortinet.com"
					next
				end
			next
		end
	next
end
To configure the ZTNA rule:
  1. Go to Policy & Objects > ZTNA and select the ZTNA Rules tab.

  2. Click Create New.

  3. Set Name to ZTNA_TCP.

  4. Set Incoming Interface to port2.

  5. Set Source to all.

  6. Select the ZTNA server ZTNA_S1.

  7. Configure the remaining options as needed.

  8. Click OK.

To configure the DNS entries for each server:
  1. Enable the DNS database visibility:

    1. Go to System > Feature Visibility.

    2. Enable DNS Database.

    3. Click Apply.

  2. Go to Network > DNS Service. Under DNS Database, click Create New.

  3. Set DNS Zone to ZTNA.

  4. Set Domain Name to qa.fortinet.com.

  5. Add the DNS entries:

    1. Under DNS Entries, click Create New.

    2. Set Hostname to s27.

    3. Set IP Address to the HTTPS server address.

    4. Click OK.

    5. Add another DNS entry using the same steps for the s29.qa.fortinet.com HTTP server.

  6. Click OK.

Testing the connection to the access proxy

Before connecting, users must have a ZTNA connection rule in FortiClient.

Note

ZTNA TCP forwarding rules can be provisioned from the EMS server. See Provisioning ZTNA TCP forwarding rules via EMS for more details.

To create the ZTNA rules in FortiClient and connect:
  1. From the ZTNA Connection Rules tab, click Add Rule.

  2. Create a rule for the HTTPS server:

    1. Set Rule Name to server27.

    2. Set Destination Host to s27.qa.fortinet.com:443.

    3. Set Proxy Gateway to 172.18.62.32:443.

    4. Disable Encryption.

    5. Click Create.

  3. Create a rule for the HTTP server:

    1. Set Rule Name to server29.

    2. Set Destination Host to s29.qa.fortinet.com:80.

    3. Set Proxy Gateway to 172.18.62.32:443.

    4. Disable Encryption.

    5. Click Create.

  4. Upon creating the ZTNA rules, two new entries are added to the Windows PC’s host file in folder C:\Windows\System32\drivers\etc. View the file, and observe the new entries for the virtual IP and FQDN pairing for each ZTNA connection rule.

    # ----- FORTICLIENT ZTNA VIP START -----
    10.235.0.1 s27.qa.fortinet.com
    10.235.0.2 s29.qa.fortinet.com
    # ----- FORTICLIENT ZTNA VIP END -----
  5. The Windows PC now resolves the FQDNs to the virtual IPs, and FortiClient will listen to the traffic to these IPs and forward them to the TCP access proxy.

  6. Have the remote user connect to the HTTPS and HTTP servers on a browser. After device verification, the user is able to successfully connect to the remote servers.

Display EMS ZTNA and endpoint tags in user widgets and Asset Identity Center

EMS ZTNA and endpoint tags are displayed in the Device Inventory widget, FortiClient widget, and the Asset Identity Center page. In the backend, EMS ZTNA tags, endpoint tags, and EMS serial numbers have been added to the user device query API and response.

Tooltip

The ZTNA tag name can be used as a search criterion in the Asset view of the Asset Identity Center page.

FQDNs supported for ZTNA TCP forwarding

Fully qualified domain names (FQDNs) can now be used for ZTNA TCP forwarding.

SSL VPN

This section includes information about the following SSL-VPN new features:

WebSocket SSL-VPN tunnel support

The WebSocket SSL-VPN tunnel is now supported for the Chromebook plugin. Only version 13 of the SEC WebSocket protocol is supported.

Azure Active Directory supported for the LDAP authentication source

You can now authenticate user credentials on the FortiProxy unit with Azure Active Directory (AD) services.

REST API

This section includes information about the following REST API new features:

Log REST API events

The REST API events log subtype logs POST, PUT, DELETE, and GET REST API requests. Logs can be viewed under Log & Report > Events > REST API Events after REST API events logging has been enabled in the CLI.

To enable REST API events logging in the CLI:
config log setting
	set rest-api-set {enable | disable}
	set rest-api-get {enable | disable}
end

rest-api-set {enable | disable}

Enable/disable logging of POST, PUT, and DELETE REST API requests.

rest-api-get {enable | disable}

Enable/disable logging of GET REST API requests.

Replace FSSO-based FortiNAC tag connector with REST API

A new REST API endpoint in both FortiNAC and FortiProxy is used by FortiNAC to send user logon and logoff information to the FortiProxy unit. The new FortiNAC tag dynamic firewall address type is used to store the device IP, FortiNAC firewall tags, and FortiNAC group information sent from FortiNAC by the REST API when user logon and logoff events are registered.

REST API filter standardization

The following API endpoints now use the same filtering as the /api/v2/cmdb/ endpoints:

  • /api/v2/monitor/fortiview/statistics

  • /api/v2/monitor/user/device/query

Other new features and enhancements

This section includes information about the following new features and enhancements:

Implicit enforcement of deep inspection for user friendly policy matching

When the HTTP CONNECT request or the Transport Layer Security (TLS) server name indication (SNI) partially matches a policy with deep inspection is enabled, deep inspection of the policy is enforced with the HTTPS traffic.

Monitoring the status of the PSUs

A log message is generated if a FortiProxy power supply unit (PSU) loses or regains power.

NOTE: This feature is available only for the FortiProxy 2000E and 4000E models.

Limiting the access of nondomain users

  • You can now limit the access of nondomain users while using proxy authentication. To do so:

    • Use the negotiate authentication scheme.
    • Disable NTLM negotiation.

    For example:

    config authentication scheme

    edit "negotiateonly"

    set method negotiate

    set negotiate-ntlm disable

    set kerberos-keytab "fpx45.dev.fgt.com"

    next

    end

    config authentication rule

    edit "negotiaterule"

    set srcaddr "all"

    set dstaddr "all"

    set srcaddr6 "all"

    set active-auth-method "negotiateonly"

    next

    end

Migrating FortiToken Mobile users from the FortiProxy unit to FortiToken Cloud

The execute fortitoken-cloud migrate-ftm <license> <vdom> command allows the migration of FortiToken Mobile users from the FortiProxy unit to FortiToken Cloud. The FortiToken Cloud account must be using a time-based subscription license. A request must be made to Fortinet Customer Service to initiate and pre-authorize the transfer. All current active FortiToken Mobile users will be migrated to the FortiToken Cloud license with no changes to the FortiToken Mobile serial number. The FortiProxy user or administrator's two-factor setting is automatically converted from fortitoken to fortitoken-cloud. After migration, end users will be able to authenticate as before without any changes to their FortiToken mobile app.

Use DNS over TLS for default FortiGuard DNS servers

When using FortiGuard servers for DNS, the FortiProxy unit defaults to using DNS over TLS (DoT) to secure the DNS traffic. New FortiGuard DNS servers are added as primary and secondary servers.

Note

Because DNS servers probably do not support low encryption DES, low encryption devices do not have the option to select DoT or DoH. The devices default to cleartext (UDP/53) instead.

The FortiGuard DNS server certificates are signed with the globalsdns.fortinet.net hostname by a public CA. The FortiProxy unit verifies the server hostname using the server-hostname setting.

Note

When upgrading to 7.0.2, the FortiGuard servers are updated to the new defaults.

To view the FortiGuard server DNS settings in the GUI:
  1. Go to Network > DNS Settings.
  2. For DNS servers, select Use FortiGuard Servers. The Primary DNS server is 96.45.45.45, and the Secondary DNS server is 96.45.46.46. DNS Protocols is set to TLS and cannot be modified.
To view the FortiGuard server DNS settings in the CLI:
# show system dns
config system dns
	set primary 96.45.45.45
	set secondary 96.45.46.46
	set protocol dot
	set server-hostname "globalsdns.fortinet.net"
end
Note

The protocol and server-hostname settings should not be modified when using the default FortiGuard servers.

Add real-time FortiView monitors for proxy traffic

The following real-time FortiView monitors have been added for proxy traffic: FortiView Proxy Destinations, FortiView Proxy Sessions, and FortiView Proxy Sources. Proxy policy sessions are no longer shown in the FortiView Policies and FortiView Applications monitors.

Prerequisites:
  1. Configure an explicit proxy and proxy policy.
  2. Change the network settings on the client PC to use the FortiProxy unit as the proxy.
  3. Generate web traffic on the client PC.
To add the proxy traffic related widgets:
  1. Go to Dashboard > Status and click Add Widget.
  2. In the FortiView section, click the + beside one or all of the following:
    1. FortiView Proxy Destinations
    2. FortiView Proxy Sessions
    3. FortiView Proxy Sources
  3. Click Add Widget. The widgets are added to the dashboard.
  4. Double-click or right-click an entry in a monitor and select Drill Down to Details to view additional information about the selected traffic activity.

Process monitor

The Process Monitor displays running processes with their CPU and memory usage levels. Administrators can sort, filter, and terminate processes within the Process Monitor pane.

To access the process monitor:
  1. Go to Dashboard > Status:
    • Left-click in the CPU or Memory widget and select Process Monitor.
    • Click the user name in the upper right-hand corner of the screen, then go to System > Process Monitor.

    The Process Monitor appears, which includes a line graph, donut chart, and process list.

  2. Click the + beside the search bar to view which columns can be filtered.
To kill a process within the process monitor:
  1. Select a process.
  2. Click the Kill Process dropdown.
  3. Select one of the following options:
    • Kill: the standard kill option that produces one line in the crash log (diagnose debug crashlog read).
    • Force Kill: the equivalent to diagnose sys kill 9 <pid>. This can be viewed in the crash log.
    • Kill & Trace: the equivalent to diagnose sys kill 11 <pid>. This generates a longer crash log and backtrace. A crash log is displayed afterward.

Add WebSocket for Security Fabric events

With the WebSocket for Security Fabric events, subscribers to the WebSocket (such as the Fabric Management page) are updated upon new Fabric events and alert users to reload the page.

Whatʼs new

Whatʼs new

The following sections describe the new features and enhancements:

Zero Trust Network Access (ZTNA)

This section includes information about the following ZTNA new features:

Connect a ZTNA access proxy to an SSL-VPN web portal

SSL-VPN web portals can be defined in ZTNA access proxy settings. The ZTNA access proxy handles the access control processes (client certificate authentication, posture check, user authentication and authorization), and establishes the HTTPS connection between the end user and the access proxy. Then, it forwards the user to the web portal where they can use predefined bookmarks to access TCP based services like HTTPS, RDP, VNC, FTP, SFTP, SSH, Telnet, and SMB. Existing SSL-VPN portal configurations can be used.

Note

The web portal service can only be configured in the CLI.

To configure the SSL-VPN web portal:
  1. Go to VPN > SSL-VPN Portals and click Create New.
  2. Enter a name, for example, test_ssl.
  3. Disable Tunnel Mode.
  4. Enable Web Mode.
  5. Create the bookmarks:
    1. Under Predefined Bookmarks, click Create New.
    2. Enter the name of the service.
    3. Select the service Type.
    4. Enter the URL to access the service.
    5. Click OK.
    6. Repeat these steps to create other bookmarks.
  6. Click OK.
To configure the ZTNA access proxy:
  1. Configure a VIP for the ZTNA access proxy. The ssl-certificate can be replaced with a server certificate:
    config firewall vip
    	edit "ztna_webportal"
    		set type access-proxy
    		set extip 172.18.62.68
    		set extintf "any"
    		set server-type https
    		set extport 4443
    		set ssl-certificate "*.test.com"
    	next
    end
  2. Configure the virtual host to be used to connect to the ZTNA access proxy. The host should resolve to the VIP’s address:
    config firewall access-proxy-virtual-host
    	edit "webportal"
    		set ssl-certificate "*.test.com"
    		set host "web.test.com"
    	next
    end
  3. Configure the ZTNA access proxy to be in web portal mode:
    config firewall access-proxy
    	edit "ztna_webportal"
    		set vip "ztna_webportal"
    		set client-cert enable
    		config api-gateway
    			edit 1
    				set url-map "/webportal"
    				set service web-portal
    				set virtual-host "webportal"
    				set ssl-vpn-web-portal "test_ssl"
    			next
    		end
    	next
    end
  4. Apply the access proxy to a proxy policy (specify the ZTNA tags as needed):
    config firewall policy
    	edit 1
    		set type access-proxy
    		set name "ztna_rule"
    		set proxy access-proxy
    		set access-proxy "ztna_webportal"
    		set srcintf "any"
    		set srcaddr "all"
    		set dstaddr "all"
    		set ztna-ems-tag "FCTEMS8821000000_High"
    		set action accept
    		set schedule "always"
    		set logtraffic all
    		set srcaddr6 "all"
    		set dstaddr6 "all"
    		set utm-status enable
    		set profile-type group
    		set profile-group "profile group1"
    		set logtraffic-start enable
    	next
    end

    The SSL VPN bookmarks are learned by the WAD daemon and are ready to use.

  5. Verify the bookmarks:
    # diagnose test app wad 351
    [bookmark: (portal/group/name=test_ssl/gui-bookmarks/2nd HTTP)]:
    	type  :1
    	url   :http://httpbin.org
    	host  :
    	folder:
    	domain:
    	port  :0
    [bookmark: (portal/group/name=test_ssl/gui-bookmarks/FTP)]:
    	type  :4
    	url   :
    	host  :
    	folder:172.16.200.215
    	domain:
    	port  :0
    [bookmark: (portal/group/name=test_ssl/gui-bookmarks/HTTPS-fortinet)]:
    	type  :1
    	url   :https://www.fortinet.com
    	host  :
    	folder:
    	domain:
    	port  :0
    [bookmark: (portal/group/name=test_ssl/gui-bookmarks/RDP)]:
    	type  :9
    	url   :
    	host  :172.18.62.213
    	folder:
    	domain:
    	port  :3389
    			…
To test the connection:
  1. From the client browser, go to https://web.test.com:4443/webportal to access the ZTNA access proxy web portal.

  2. Once the client passes the certificate check, posture check, and access is granted, the user is redirected to the web portal. The list of predefined bookmarks appears.

  3. Click a bookmark, such as HTTPS-fortinet. The website opens.

  4. From the web portal, click another bookmark, such as SSH. The page opens with the credential login screen to access the server.

UTM scanning on TCP forwarding access proxy traffic

UTM scanning and deep inspection is supported for multiple protocols in a ZTNA TCP forwarding access proxy. In addition to HTTP and HTTPS, the mail protocols (SMTP, IMAP, and POP3) and file sharing protocols (SMB and CIFS) are supported.

AV scanning for normal POP3, IMAP, and SMTP traffic

To configure AV scanning for normal POP3, IMAP, and SMTP traffic:
  1. In FortiClient, add ZTNA connection rules for the email server IP and POP3, IMAP, and SMTP ports.

  2. In the FortiProxy unit, configure the ZTNA TCP forwarding server to add the email server address and enable AV profile scanning in the ZTNA rules.
  3. On the client PC, open Outlook app and send emails with attachments containing virus affected files.
  4. The ZTNA rule on the FortiProxy unit blocks the email send/receive traffic and generates AV logs.

AV deep scanning for SSL encrypted POP3S, IMAPS, and SMTPS traffic

To configure AV deep scanning for SSL encrypted POP3S, IMAPS, and SMTPS traffic:
  1. In FortiClient, add ZTNA connection rules for the email server IP and POP3S, IMAPS, and SMTPS ports.

  2. In the FortiProxy unit, configure the ZTNA TCP forwarding server to add the email server address and enable AV profile scanning in the ZTNA rules.
  3. On the client PC, open Outlook app and send emails with attachments containing virus affected files.
  4. The ZTNA rule on the FortiProxy unit blocks the email send/receive traffic and generates AV logs.

AV scanning for SMB service traffic

To configure AV scanning for SMB service traffic:
  1. In FortiClient, add ZTNA connection rules for the SMB file sharing server IP and ports.

  2. In the FortiProxy unit, configure the ZTNA TCP forwarding server to add the SMB server address and enable AV profile scanning in the ZTNA rules.
  3. On the client PC, upload and download virus affected files to and from the SMB server.
  4. The ZTNA rule on the FortiProxy unit blocks the email send/receive traffic and generates AV logs.

File filter scanning for CIFS service traffic

To configure file filter scanning for CIFS service traffic:
  1. In FortiClient, add ZTNA connection rules for the CIFS server IP and port.
  2. In the FortiProxy unit, configure the ZTNA TCP forwarding server to add the CIFA server address and enable file filter profile scanning in the ZTNA rules.
  3. On the client PC, upload and download predefined file types (such as .EXE) to and from the CIFS server.
  4. The ZTNA rule on the FortiProxy unit blocks the email send/receive traffic and generates AV logs.

Increase ZTNA and EMS tag limits

The following limits have increased for EMS server, IP addresses, and MAC addresses in EMS and ZTNA tags:

  • The maximum number of EMS servers a FortiProxy unit can connect to increased from three to five.
  • The maximum number of IP address an EMS tag can resolve increased from 1000 to over 100,000.
  • The maximum number of MAC address an EMS tag can resolve increased from 1000 to 3000.

Use the following diagnose commands to verify address information:

# diagnose firewall fqdn <option>

Option

Description

list-ip

List IP FQDN information.

list-mac

List MAC FQDN information.

list-all

List FQDN information.

getinfo-ip

Get information of IP FQDN address.

getinfo-mac

Get information of MAC FQDN address.

get-ip

Get and display one IP FQDN address.

get-mac

Get and display one MAC FQDN address.

Use FQDN with ZTNA TCP forwarding access proxy

When defining ZTNA connection rules on FortiClient for TCP forwarding, it is sometimes desirable to configure the destination host address as an FQDN address instead of an IP address. Because the real servers are often servers in the corporate network, this layer of obfuscation prevents internal IP addresses from easily leaking to the public, and also makes the destination more easily recognizable by the end users.

One obstacle to overcome is getting remote hosts to resolve an internal FQDN that is typically only resolvable by an internal DNS in the corporate network. This can be solved with the following:

  1. When an FQDN address is added as a destination host in a ZTNA connection rule, FortiClient creates a virtual IP address for this FQDN address and adds this to the computer’s host file (Windows). The same is true when a ZTNA connection rule entry is pushed from EMS.

  2. The virtual IP address mapped to the FQDN address is not the real address of the server. It allows applications to resolve the FQDN address to this virtual IP address. FortiClient listens to any traffic destined for it and forwards the traffic using the TCP forwarding URL with FQDN to the ZTNA access proxy.

  3. The FortiProxy access proxy will resolve the FQDN using the internal DNS on the corporate network, matching the traffic to the ZTNA real server configuration with the same domain and address.

  4. If a valid ZTNA real server entry is found, traffic is forwarded to the real server.

This features requires a minimum FortiClient and FortiClient EMS version of 7.0.3.

To configure the TCP forwarding access proxy:
  1. Go to Policy & Objects > ZTNA and select the ZTNA Servers tab.

  2. Click Create New.

  3. Enter a Name, such as ZTNA_S1.

  4. Configure the network settings:

    1. Set External interface to any.

    2. Set External IP to 172.18.62.32.

    3. Set External port to 443.

  5. Select the Default certificate. Clients will be presented with this certificate when they connect to the access proxy VIP.

  6. Add server mapping:

    1. In the Service/server mapping table, click Create New.

    2. For Service, select TCP Forwarding.

    3. Add a server:

      1. In the Servers table, click Create New.

      2. Create a new FQDN address for the HTTPS server at s27.qa.fortinet.com and then click OK.

      3. Apply the new address object as the address for the new server.

      4. Click OK.

    4. Add another server using the same steps for s29.qa.fortinet.com.

  7. Click OK. Now that the ZTNA server is complete, the domain settings must be configured in the CLI to map domains to the real servers.

To map domains to the real servers:
config firewall access-proxy
	edit "ZTNA_S1"
		set vip "ZTNA_S1"
		set client-cert enable
		config api-gateway
			edit 2
				set url-map "/tcp"
				set service tcp-forwarding
				config realservers  
					edit 4
						set address "s27.qa.fortinet.com"
						set domain "qa.fortinet.com"
					next
					edit 5
						set address "s29.qa.fortinet.com"
						set domain "qa.fortinet.com"
					next
				end
			next
		end
	next
end
To configure the ZTNA rule:
  1. Go to Policy & Objects > ZTNA and select the ZTNA Rules tab.

  2. Click Create New.

  3. Set Name to ZTNA_TCP.

  4. Set Incoming Interface to port2.

  5. Set Source to all.

  6. Select the ZTNA server ZTNA_S1.

  7. Configure the remaining options as needed.

  8. Click OK.

To configure the DNS entries for each server:
  1. Enable the DNS database visibility:

    1. Go to System > Feature Visibility.

    2. Enable DNS Database.

    3. Click Apply.

  2. Go to Network > DNS Service. Under DNS Database, click Create New.

  3. Set DNS Zone to ZTNA.

  4. Set Domain Name to qa.fortinet.com.

  5. Add the DNS entries:

    1. Under DNS Entries, click Create New.

    2. Set Hostname to s27.

    3. Set IP Address to the HTTPS server address.

    4. Click OK.

    5. Add another DNS entry using the same steps for the s29.qa.fortinet.com HTTP server.

  6. Click OK.

Testing the connection to the access proxy

Before connecting, users must have a ZTNA connection rule in FortiClient.

Note

ZTNA TCP forwarding rules can be provisioned from the EMS server. See Provisioning ZTNA TCP forwarding rules via EMS for more details.

To create the ZTNA rules in FortiClient and connect:
  1. From the ZTNA Connection Rules tab, click Add Rule.

  2. Create a rule for the HTTPS server:

    1. Set Rule Name to server27.

    2. Set Destination Host to s27.qa.fortinet.com:443.

    3. Set Proxy Gateway to 172.18.62.32:443.

    4. Disable Encryption.

    5. Click Create.

  3. Create a rule for the HTTP server:

    1. Set Rule Name to server29.

    2. Set Destination Host to s29.qa.fortinet.com:80.

    3. Set Proxy Gateway to 172.18.62.32:443.

    4. Disable Encryption.

    5. Click Create.

  4. Upon creating the ZTNA rules, two new entries are added to the Windows PC’s host file in folder C:\Windows\System32\drivers\etc. View the file, and observe the new entries for the virtual IP and FQDN pairing for each ZTNA connection rule.

    # ----- FORTICLIENT ZTNA VIP START -----
    10.235.0.1 s27.qa.fortinet.com
    10.235.0.2 s29.qa.fortinet.com
    # ----- FORTICLIENT ZTNA VIP END -----
  5. The Windows PC now resolves the FQDNs to the virtual IPs, and FortiClient will listen to the traffic to these IPs and forward them to the TCP access proxy.

  6. Have the remote user connect to the HTTPS and HTTP servers on a browser. After device verification, the user is able to successfully connect to the remote servers.

Display EMS ZTNA and endpoint tags in user widgets and Asset Identity Center

EMS ZTNA and endpoint tags are displayed in the Device Inventory widget, FortiClient widget, and the Asset Identity Center page. In the backend, EMS ZTNA tags, endpoint tags, and EMS serial numbers have been added to the user device query API and response.

Tooltip

The ZTNA tag name can be used as a search criterion in the Asset view of the Asset Identity Center page.

FQDNs supported for ZTNA TCP forwarding

Fully qualified domain names (FQDNs) can now be used for ZTNA TCP forwarding.

SSL VPN

This section includes information about the following SSL-VPN new features:

WebSocket SSL-VPN tunnel support

The WebSocket SSL-VPN tunnel is now supported for the Chromebook plugin. Only version 13 of the SEC WebSocket protocol is supported.

Azure Active Directory supported for the LDAP authentication source

You can now authenticate user credentials on the FortiProxy unit with Azure Active Directory (AD) services.

REST API

This section includes information about the following REST API new features:

Log REST API events

The REST API events log subtype logs POST, PUT, DELETE, and GET REST API requests. Logs can be viewed under Log & Report > Events > REST API Events after REST API events logging has been enabled in the CLI.

To enable REST API events logging in the CLI:
config log setting
	set rest-api-set {enable | disable}
	set rest-api-get {enable | disable}
end

rest-api-set {enable | disable}

Enable/disable logging of POST, PUT, and DELETE REST API requests.

rest-api-get {enable | disable}

Enable/disable logging of GET REST API requests.

Replace FSSO-based FortiNAC tag connector with REST API

A new REST API endpoint in both FortiNAC and FortiProxy is used by FortiNAC to send user logon and logoff information to the FortiProxy unit. The new FortiNAC tag dynamic firewall address type is used to store the device IP, FortiNAC firewall tags, and FortiNAC group information sent from FortiNAC by the REST API when user logon and logoff events are registered.

REST API filter standardization

The following API endpoints now use the same filtering as the /api/v2/cmdb/ endpoints:

  • /api/v2/monitor/fortiview/statistics

  • /api/v2/monitor/user/device/query

Other new features and enhancements

This section includes information about the following new features and enhancements:

Implicit enforcement of deep inspection for user friendly policy matching

When the HTTP CONNECT request or the Transport Layer Security (TLS) server name indication (SNI) partially matches a policy with deep inspection is enabled, deep inspection of the policy is enforced with the HTTPS traffic.

Monitoring the status of the PSUs

A log message is generated if a FortiProxy power supply unit (PSU) loses or regains power.

NOTE: This feature is available only for the FortiProxy 2000E and 4000E models.

Limiting the access of nondomain users

  • You can now limit the access of nondomain users while using proxy authentication. To do so:

    • Use the negotiate authentication scheme.
    • Disable NTLM negotiation.

    For example:

    config authentication scheme

    edit "negotiateonly"

    set method negotiate

    set negotiate-ntlm disable

    set kerberos-keytab "fpx45.dev.fgt.com"

    next

    end

    config authentication rule

    edit "negotiaterule"

    set srcaddr "all"

    set dstaddr "all"

    set srcaddr6 "all"

    set active-auth-method "negotiateonly"

    next

    end

Migrating FortiToken Mobile users from the FortiProxy unit to FortiToken Cloud

The execute fortitoken-cloud migrate-ftm <license> <vdom> command allows the migration of FortiToken Mobile users from the FortiProxy unit to FortiToken Cloud. The FortiToken Cloud account must be using a time-based subscription license. A request must be made to Fortinet Customer Service to initiate and pre-authorize the transfer. All current active FortiToken Mobile users will be migrated to the FortiToken Cloud license with no changes to the FortiToken Mobile serial number. The FortiProxy user or administrator's two-factor setting is automatically converted from fortitoken to fortitoken-cloud. After migration, end users will be able to authenticate as before without any changes to their FortiToken mobile app.

Use DNS over TLS for default FortiGuard DNS servers

When using FortiGuard servers for DNS, the FortiProxy unit defaults to using DNS over TLS (DoT) to secure the DNS traffic. New FortiGuard DNS servers are added as primary and secondary servers.

Note

Because DNS servers probably do not support low encryption DES, low encryption devices do not have the option to select DoT or DoH. The devices default to cleartext (UDP/53) instead.

The FortiGuard DNS server certificates are signed with the globalsdns.fortinet.net hostname by a public CA. The FortiProxy unit verifies the server hostname using the server-hostname setting.

Note

When upgrading to 7.0.2, the FortiGuard servers are updated to the new defaults.

To view the FortiGuard server DNS settings in the GUI:
  1. Go to Network > DNS Settings.
  2. For DNS servers, select Use FortiGuard Servers. The Primary DNS server is 96.45.45.45, and the Secondary DNS server is 96.45.46.46. DNS Protocols is set to TLS and cannot be modified.
To view the FortiGuard server DNS settings in the CLI:
# show system dns
config system dns
	set primary 96.45.45.45
	set secondary 96.45.46.46
	set protocol dot
	set server-hostname "globalsdns.fortinet.net"
end
Note

The protocol and server-hostname settings should not be modified when using the default FortiGuard servers.

Add real-time FortiView monitors for proxy traffic

The following real-time FortiView monitors have been added for proxy traffic: FortiView Proxy Destinations, FortiView Proxy Sessions, and FortiView Proxy Sources. Proxy policy sessions are no longer shown in the FortiView Policies and FortiView Applications monitors.

Prerequisites:
  1. Configure an explicit proxy and proxy policy.
  2. Change the network settings on the client PC to use the FortiProxy unit as the proxy.
  3. Generate web traffic on the client PC.
To add the proxy traffic related widgets:
  1. Go to Dashboard > Status and click Add Widget.
  2. In the FortiView section, click the + beside one or all of the following:
    1. FortiView Proxy Destinations
    2. FortiView Proxy Sessions
    3. FortiView Proxy Sources
  3. Click Add Widget. The widgets are added to the dashboard.
  4. Double-click or right-click an entry in a monitor and select Drill Down to Details to view additional information about the selected traffic activity.

Process monitor

The Process Monitor displays running processes with their CPU and memory usage levels. Administrators can sort, filter, and terminate processes within the Process Monitor pane.

To access the process monitor:
  1. Go to Dashboard > Status:
    • Left-click in the CPU or Memory widget and select Process Monitor.
    • Click the user name in the upper right-hand corner of the screen, then go to System > Process Monitor.

    The Process Monitor appears, which includes a line graph, donut chart, and process list.

  2. Click the + beside the search bar to view which columns can be filtered.
To kill a process within the process monitor:
  1. Select a process.
  2. Click the Kill Process dropdown.
  3. Select one of the following options:
    • Kill: the standard kill option that produces one line in the crash log (diagnose debug crashlog read).
    • Force Kill: the equivalent to diagnose sys kill 9 <pid>. This can be viewed in the crash log.
    • Kill & Trace: the equivalent to diagnose sys kill 11 <pid>. This generates a longer crash log and backtrace. A crash log is displayed afterward.

Add WebSocket for Security Fabric events

With the WebSocket for Security Fabric events, subscribers to the WebSocket (such as the Fabric Management page) are updated upon new Fabric events and alert users to reload the page.