FortiSASE 24.1.37 Administration Guide
FortiSASE 24.1.37 Administration Guide
FortiSASE 24.1.37 Administration Guide
FortiSASE 24.1.37
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTIGUARD LABS
https://www.fortiguard.com
FEEDBACK
Email: techdoc@fortinet.com
Change log 7
Getting started 8
Requirements 8
Licensing 9
Initializing FortiSASE 9
Introduction 10
Endpoint mode 12
SWG mode 13
Embedded onboarding guide 13
FortiFlex licensing 16
Network restrictions removed 16
Remote VPN user identification 17
Required services and ports 17
Signing in as an IAM user 18
Supporting external IdP users 18
System status notifications 18
Dashboards 19
Adding a custom dashboard 19
Resetting all dashboards 20
Drilling down on vulnerabilities 20
FortiView monitors 21
Adding a custom monitor 22
Resetting all monitors 22
Monitoring thin-edge bandwidth usage 23
Thin-Edge 24
Edge devices 26
FortiExtender 26
Prerequisites 26
Viewing notifications for a new FortiExtender 29
Configuring FortiExtender as FortiSASE LAN Extension 29
FortiGate 37
Prerequisites 38
Viewing notifications for a new FortiGate 38
Configuring FortiGate as FortiSASE LAN Extension 39
FortiAP 41
Prerequisites 42
Viewing notifications for a new FortiAP 43
Configuring FortiAP as FortiSASE edge device 44
Network 53
Secure private access 53
Prerequisites 55
Configuring the FortiSASE security PoPs as the FortiGate hub's spokes 56
2024-03-20 Updated SWG Chrome extension and Chromebook support on page 224.
FortiSASE is a software-as-a-cloud-delivered service that allows clients to securely access the Internet with the
protection from FortiOS. With FortiSASE, you can ensure to protect remote off-net endpoints and users with the same
security policies as when they are on-net, no matter their location. The service is available through a subscription based
on the number of endpoints or users.
FortiSASE works with various FortiCloud services in the background to deliver a seamless service for securing your
Internet access.
In terms of security, FortiSASE offers the following features to protect clients:
l Antivirus
l Web Filter
l Intrusion prevention
l File filter
l Data loss prevention
l Application control
l SSL inspection
Use the following resources to get started with FortiSASE:
Learn about best practices for deploying a FortiSASE Go to Best Practices | 4-D resources. Review the
architecture document categories.
Review information about FortiSASE releases, including See FortiSASE Release Notes.
resolved and known issues
Requirements
The following items are required before you can initialize FortiSASE:
Requirement Description
FortiCloud Create a FortiCloud account if you do not have one. Launching FortiSASE requires a primary
account FortiCloud account. A primary FortiCloud account can invite other users to launch FortiSASE as
secondary users.
Internet access You must have Internet access to create a FortiSASE instance.
You can only create one FortiSASE instance per FortiCloud account.
Licensing
The FortiSASE portal enforces license requirements when you log in. FortiSASE requires the FortiSASE subscription
based on the number of remote users. Some FortiSASE features, such as assisted onboarding, require the Advanced or
Comprehensive license. See the SASE and Zero Trust Ordering Guide for licensing details.
Initializing FortiSASE
To initialize FortiSASE:
FortiSASE is a software-as-a-cloud-delivered service that allows clients to securely access the Internet with the
protection from FortiOS. With FortiSASE, you can ensure to protect remote off-net endpoints and users with the same
security policies as when they are on-net, no matter their location. The service is available through a subscription based
on the number of endpoints or users.
FortiSASE works with various FortiCloud services in the background to deliver a seamless service for securing your
Internet access.
In terms of security, FortiSASE offers the following features to protect clients:
l Antivirus
l Web Filter
l Intrusion prevention
l File filter
l Data loss prevention
l Application control
l SSL inspection
Security features are customizable and offer many familiar settings as you would see on a FortiGate.
Following are examples of common FortiSASE use cases:
Agent-based remote user Internet Secure access to the Internet using FortiClient
access agent
Agentless remote user Internet Secure access to the Internet using FortiSASE
access secure web gateway (SWG)
Secure Internet access (SIA)
Secure access to the Internet using
Site-based remote user Internet
FortiExtender device as FortiSASE LAN
access using FortiExtender
extension
Site-based remote user Internet Secure access to the Internet using FortiAP
access using FortiAP edge device that FortiSASE manages
For details on these FortiSASE use cases, see the 4-D FortiSASE Architecture Guide.
For details on the deployment process, see FortiSASE Cloud Deployment.
User provisioning is made simple, whether you are creating local users in bulk, integrating users from your Active
Directory or LDAP server, or integrating with SAML authentication. You can also easily group your users to apply similar
VPN or SWG policies.
See Service Organization Controls (SOC2) compliance standard.
Endpoint mode
In endpoint mode, endpoints connect to a FortiSASE VPN tunnel to secure their traffic. Once provisioned, clients are
connected through an always-up VPN connection to ensure FortiSASE scans traffic to the Internet.
This mode requires FortiSASE user-based licensing. See the SASE and Zero Trust Ordering Guide.
Endpoint mode also supports configuring Zero Trust Network Access (ZTNA). In this deployment configuration,
FortiSASE joins the Fortinet Security Fabric to share endpoint information with the FortiGate, allowing a corporate
FortiGate to implement ZTNA for remote users who are already registered to FortiSASE. See the FortiSASE ZTNA
Deployment Guide for details.
SWG mode
In secure web gateway (SWG) mode, users configure FortiSASE as a SWG server on their device at the OS level or in a
browser. Once configured, the SWG policies configured in FortiSASE protect sessions initiated in browsers.
This mode requires FortiSASE user-based licensing. See the FortiSASE Ordering Guide.
An embedded onboarding guide for FortiSASE displays upon first login. You can also display it later if you skip it. This
guide contains instructions and videos embedded into the FortiSASE portal that streamline initial configurations for the
secure Internet access (SIA) endpoint use case. This use case provides remote users with secure access to the Internet
using the FortiClient agent. See SIA for agent-based remote users.
Access to the embedded onboarding guide in your FortiSASE instance requires an Advanced
remote users FortiSASElicense or a Comprehensive remote users FortiSASE license. See the
FortiSASE Ordering Guide.
The information presented may not apply to instances with existing configurations.
l Video: brief video that demonstrates the steps that you must perform to complete the configuration or task.
l Verify: checklist of steps to perform to ensure that you have configured the FortiSASE settings correctly.
l To go to the corresponding FortiSASE portal page to perform the verification step, click the link provided.
l Click the checkbox input next to the verification step to mark it as completed.
l If you require technical assistance, click FortiCare Support to open the Fortinet Support site.
You can go back and forth between sections and topics by clicking the sections in the left pane or by using the Back and
Next buttons, as desired.
Typically, after the Video section, you can minimize the guide and perform the configuration settings in the FortiSASE
portal as the video demonstrates. You can resume or maximize the guide by clicking the onboarding title at the bottom of
the screen.
If you click Later or Skip onboarding to skip the onboarding for now, you can access the guide later from the Help
dropdown in the app header by clicking Onboarding.
FortiFlex licensing
FortiSASE supports applying FortiFlex entitlements generated from within the FortiFlex portal to your instances. You
must apply the appropriate FortiFlex Program and Point Pack SKUs for access to the FortiFlex portal from within your
FortiCloud account. See the FortiFlex Program Ordering Guide.
Before adding a Flex entitlement for FortiSASE from within the FortiFlex portal, ensure that
your FortiCloud account does not have any existing FortiClient EMS Cloud or FortiSASE
entitlements. Otherwise, you will not be able to add a new Flex entitlement for FortiSASE.
FortiSASE entitlements created in the FortiFlex portal must be active for at least 90 days.
For details on supported FortiFlex FortiSASE service offerings and FortiFlex deployment steps, see Service Offerings
and Deploying FortiFlex.
FortiSASE instances deployed after the 23.4.b release or with the requested network
restrictions removed cannot connect to DNS, RADIUS, or LDAP servers with internal IP
addresses. Typically, these internal servers are located behind a secure private access (SPA)
hub and you configure the SPA hub in FortiSASE. Therefore, DNS, RADIUS, or LDAP servers
must use public IP addresses or publicly accessible FQDNs and may require some
configuration or topology changes involving such servers.
FortiSASE allows administrators to identify remote VPN users uniquely in Internet and private access traffic logs.
Support for remote VPN user identification requires the following features to be enabled on your instance.
l Unique SSL VPN IP address ranges per FortiSASE security PoP within the overall 100.65.0.0/16 range. Previously,
SSL VPN IP address ranges were not unique between security PoPs.
l Removing source NAT (SNAT) for remote VPN user traffic destined for secure private access hubs. By default,
FortiSASE performs SNAT for such traffic.
To add support for both features to your instance, create a new FortiCare ticket.
The following summarizes ports that FortiSASE uses. In addition to those in the table, FortiSASE also uses ICMP.
You can log in to FortiSASE as an Identity & Access Management (IAM) user. You must first create an IAM user by
following the steps in To create an IAM user with the wizard:. When configuring the IAM user, ensure that you add
FortiSASE to the services that the user can access.
You should use IAM instead of FortiCare subaccounts in cases where multiple users access the FortiSASE customer
portal.
External identity provider (IdP) users can log into FortiSASE with their company-provided user credentials using a third-
party SAML IdP.
External IdP support is currently a limited beta feature in FortiCloud. If you require external IdP support for your
FortiSASE instance, contact FortiCare Support.
For information on managing external IdP roles and users for cloud products, see External IdP roles.
By default, the FortiSASE primary account holder is automatically subscribed to FortiSASE system status email
notifications from https://status.fortisase.com.
To manually subscribe to FortiSASE system status notifications via email and other notification types including SMS,
Slack, webhooks, Atom feeds, and RSS feeds for yourself and secondary administrators, go to
https://status.fortisase.com and click Subscribe to updates.
When subscribed to FortiSASE system status notifications, you receive email notifications whenever FortiSASE
Operations creates, updates, or resolves an incident.
FortiSASE includes dashboards so you can easily monitor device inventory, security threats, traffic, and network health.
FortiSASE includes the following dashboards:
Dashboard Description
Asset Map Displays the geographical location of assets, including servers, on a global map.
Also indicates which server has logging enabled.
FortiView Comprehensive monitoring system for your network that integrates real-time and
historical data into a single view. You can use it to log and monitor threats to
networks, filter data on multiple levels, and keep track of administrative activity.
shows a custom dashboard that differs from the default status and security dashboards:
You can reset all dashboards. This deletes all custom dashboards from FortiSASE and resets the Status and Security
dashboards to their default configurations. If you deleted a default dashboard, the reset restores it.
FortiView monitors
Dashboard Displays...
Thin-Edge Thin-Edge devices by traffic volume and drilldown by Thin Edge device.
You can create and modify a custom monitor. For example, consider that you want to create a monitor to monitor all
managed Android endpoints. You can create a custom monitor based on the Managed Endpoints monitor, and apply a
filter to display only Android endpoints. You can simply view this custom monitor whenever you want to monitor your
Android endpoints.
You can reset all monitors. This deletes all custom monitors from FortiSASE and resets the default monitors to their
default configurations. If you deleted a default monitor, the reset restores it.
1. Click the Actions icon beside the + button under Dashboards > MONITOR.
You can view FortiExtender devices' bandwidth usage from the FortiView Thin-Edge monitor.
5. Click View Sessions to view sessions associated with the selected tab.
Thin-Edge
You can view thin-edge devices through the corresponding status widget, which displays online status, security PoP
locations, and entitlements through corresponding dropdown menus.
1. Go to Dashboards > Status and in the Thin-Edge widget, click on the Entitlements dropdown menu. If this widget
does not exist, add a new Thin-Edge widget. See Adding a custom dashboard on page 19.
The Entitlements dropdown menu is only available if at least one FortiSASE ThinEdge
license has been applied to a FortiExtender device.
The FortiExtender-200F is the only supported model and Entitlements only shows
authorized status and entitlement counts for this model.
Edge devices
FortiExtender
FortiSASE supports management and integration of a FortiExtender configured as a LAN extension. A FortiExtender
with the LAN extension configuration allows a micro-branch deployment. A micro-branch deployment is a branch office
with a LAN behind a FortiExtender with secure Internet access over a backhaul connection to FortiSASE. By relying on
FortiExtender instead of FortiClient to handle secure connectivity to FortiSASE, this solution essentially extends the
single-user single-device FortiClient endpoint case to a multiuser multidevice LAN environment.
Prerequisites
For a list of model and firmware version prerequisites, see SIA for FortiExtender site-based remote users.
You must register FortiExtender devices used with the LAN extension feature to the same FortiCloud account used to
log into FortiSASE before using this feature.
To activate FortiExtender management support on FortiSASE, you must purchase and apply a FortiSASE ThinEdge
License to each FortiExtender device registered.
For details on registering products, see Registering assets.
Network topology
The following diagram depicts the network topology that the FortiExtender as a FortiSASE LAN extension configuration
uses:
By default, using DHCP, FortiSASE dynamically assigns IP addresses to devices connected to the local network of the
FortiExtender, that is, the LAN switch interface.
You should connect the FortiExtender’s discovery interface to the Internet. FortiExtender uses this interface for
communication with FortiSASE. You can configure this interface to use DHCP or static IP addressing from the GUI or
CLI.
For the FortiExtender 200F, specifically, note the following:
l Connecting the local network devices to port4 or port5 within the LAN switch interface is recommended.
l port1 or port2 are designated with the WAN role and you can use one or both ports as the discovery interface.
See the following picture for reference:
To connect to the FortiExtender 200F using a computer and log into the FortiExtender GUI:
1. Use an Ethernet cable to connect a LAN port in the back of the FortiExtender to your computer's Ethernet port.
2. Configure the computer to be on the same subnet as the FortiExtender 200F by changing its IP address to
192.168.200.100 and the netmask to 255.255.255.0.
3. In a web browser, go to the default FortiExtender 200F web GUI address: http://192.168.200.99.
4. In the username and password fields, enter admin, then press Enter.
You can configure the discovery interface's IP address via the FortiExtender GUI or CLI.
1. Log into the FortiExtender GUI as Connecting and logging into the FortiExtender 200F on page 27 describes.
2. Go to Networking > Interface.
3. Under Physical Port, select the port to configure as the discovery interface.
4. Click the pencil icon beside the desired port.
5. Under Mode, select dhcp or static. If you select static, configure the required IP address in the IP field, using IP
address/subnet format, and the desired gateway settings in the Gateway field.
6. Click Save.
Use the following CLI commands where <port> is port1 or port2 on the FortiExtender 200F and <mode> is dhcp or
static:
config system interface
edit <port>
set mode { dhcp | static }
set ip <interface IP address/subnet>
set gateway <gateway IP address for static IP address configuration>
next
end
For example, to configure the FortiExtender 200F port1 with a static IP address and subnet of 192.168.2.1/24 and
default gateway of 192.168.2.254, use the following CLI commands:
config system interface
edit port1
set mode static
set ip 192.168.2.1/24
set gateway 192.168.2.254
next
end
When a new FortiExtender powers on, the bell icon in the header displays a notification about the new device. In this
example, the 1 beside Network in the left navigation pane also indicates the new device.
Clicking View from the notifications displays a pane with the option to authorize or delete the FortiExtender.
In Edge Devices > FortiExtenders, you can authorize, deauthorize, and delete FortiExtenders:
Prior to connecting a FortiExtender to FortiSASE, you can view the instructions in the Connect FEXTs dialog in
FortiSASE.
In addition to the instructions in the Connect FEXTs dialog, you generally must perform these preliminary steps to ensure
proper connectivity:
1. Upgrade the FortiExtender to the latest firmware version known to work with FortiSASE. See SIA for site-based
remote users.
2. Factory reset the FortiExtender device to ensure no prior configuration remains on the device.
5. After selecting the OS firmware to upgrade to, click the green up arrow to start the upgrade.
6. You see a warning message that upgrading may require a factory reset. Click OK and Backup Config.
7. FortiExtender prompts you to reboot to complete the firmware upgrade. Click Restart Now to complete the upgrade.
1. Access the console from the FortiExtender GUI navigation bar or by connecting a console cable to the
FortiExtender and using terminal software.
2. Enter the following FortiExtender CLI command to factory reset the device: execute factory-reset
3. Confirm the factory reset when prompted by entering y:
FX200F # execute factory-reset
The operation will do factory reset and then reboot the system!
Do you want to continue? (y/n)y
FortiExtender serial number. Ensure that Entitlement lists FortiSASE ThinEdge License.
1. In FortiSASE, click Services. Under Cloud Services, click FortiZTP. The remaining steps are performed in FortiZTP.
2. Click the Provisioning Settings button on the right.
3. On the FortiExtender tab, ensure that FortiSASE is enabled.
4. Click UPDATE.
5. On the UNPROVISIONED tab, do the following:
a. To provision a single FortiExtender, click the Provision icon.
b. To provision multiple FortiExtenders, select the checkboxes for the desired FortiExtenders, then click the
PROVISION button.
6. Under TARGET LOCATION in the Provision devices dialog, select FortiSASE. Only options that you have
configured in Provisioning Settings appear in this dialog.
7. Do one of the following:
a. Click NEXT. You can choose to associate the FortiExtender with a profile. Select the desired profile, then click
PROVISION NOW.
b. Click PROVISION NOW.
After completing the aforementioned steps, you can proceed to authorize the FortiExtender in FortiSASE as Authorizing
a FortiExtender on page 36 describes.
You can connect a FortiExtender to FortiSASE using alternative connection methods, namely via the FortiExtender
GUI or CLI.
For ease of configuration, following the steps in Connecting FortiExtender to FortiSASE using
FortiZTP on page 29 is recommended.
As a reference, this section describes alternative connection methods other than using
FortiZTP.
Before using the FortiExtender GUI or CLI steps, you must obtain the FortiSASE domain name from FortiSASE.
5. Click OK in the dialog to have changes take effect and reboot the FortiExtender.
6. To confirm the FortiExtender's connection to FortiSASE, log in to the FortiExtender GUI and go to Dashboard.
Under Controller Information, confirm that FGT IP is non-zero, and Status is Connected.
The following commands are adapted from FortiExtender LAN extension in public cloud FGT-VM.
1. Connect FortiExtender to FortiSASE:
config system management
set discovery-type fortigate
config fortigate
set ac-discovery-type static
config static-ac-addr
edit 1
set server <FortiSASE domain name here from Connect FEXTs dialog>
next
end
set discovery-intf port1
end
end
2. To confirm the FortiExtender's connection to FortiSASE, run the get extender status command in the
FortiExtender CLI. Confirm that controller-addr is non-zero and management-state is CWWS_RUN. The
following shows sample output:
FX200FXXXXXXXXXX # get extender status
Extender Status
name : FX200FXXXXXXXXXX
mode : CAPWAP
fext-addr : 172.XX.XXX.XXX
ingress-intf : port1
controller-addr : 206.XX.XXX.XXX:5246
controller-name : FGXXXXXXXXXXXXXX
uptime : 0 days, 1 hours, 18 minutes, 31 seconds
management-state : CWWS_RUN
base-mac : AA:BB:CC:11:22:33
network-mode : lan-extension
fgt-backup-mode : backup
discovery-type : static
discovery-interval : 5
echo-interval : 30
report-interval : 30
statistics-interval : 120
mdm-fw-server : fortiextender-firmware.forticloud.com
os-fw-server : fortiextender-firmware.forticloud.com
If after configuring the FortiExtender, FortiSASE does not see it, take the following troubleshooting steps.
1. Ensure that FortiExtender is updated to the latest firmware. See To upgrade the FortiExtender to the latest
firmware: on page 30.
2. After updating the FortiExtender firmware, ensure you restore the device to its factory default settings, also known
as perform a factory reset, by pressing and holding the Reset/Default button for more than five seconds.
l For details on performing a factory reset using the FortiExtender GUI, see To factory reset the FortiExtender
QuickStart Guide.
3. Ensure that the FortiExtender is registered in the same FortiCloud account as FortiSASE. See FortiCloud account
prerequisites on page 26.
4. Connect your Internet connection to port 1 and local LAN to ports 4-5. See Network topology on page 26.
After properly configuring and connecting a FortiExtender, it takes a few minutes to connect
FortiExtender to FortiSASE, after which FortiSASE takes over DHCP and serves as your
default gateway. Until then, traffic traverses your local Internet connection.
Authorizing a FortiExtender
If FortiSASE does not find a FortiSASE ThinEdge License, it disables the Authorization >
Authorize button and hovering over the Authorize button displays the No authorization
entitlements for FortiExtenders tooltip. Therefore, only licensed FortiExtenders can be
authorized.
Please ensure you apply a FortiSASE ThinEdge License to each FortiExtender to be managed
by FortiSASE.
To authorize a FortiExtender:
Deauthorizing a FortiExtender
To deauthorize a FortiExtender:
Disconnecting a FortiExtender
If a FortiExtender device has been deregistered from the FortiCloud account, then disconnecting this device will remove
the listed device from the FortiSASE Edge Devices > FortiExtenders page.
To disconnect a FortiExtender:
FortiGate
FortiGate SD-WAN as a secure edge is a controlled general availability feature that requires a
separate FortiSASE subscription license per FortiGate. All FortiGate F-series and G-series
desktop platforms running FortiOS 7.4.2 and above can support FortiSASE Secure Edge
connectivity.
Contact your Fortinet sales/partner representative to purchase a FortiSASE subscription
license for each FortiGate.
You can configure a FortiGate SD-WAN device as a FortiSASE LAN extension, also known as a FortiGate Secure Edge,
by setting up a VXLAN-over-IPsec tunnel between the FortiGate and FortiSASE. This creates a layer 2 network between
FortiSASE and the network behind the remote FortiGate. In this use case, because the FortiGate is responsible for
centralizing its remote users’ site connectivity to the FortiSASE firewall-as-a-service (FWaaS), the endpoints only need
to be configured in their IP settings to forward traffic to the FortiGate as the default gateway.
Therefore, for this use case, individual workstation or device setup is minimized because FortiClient does not need to be
installed on endpoints and web browser-based endpoint do not require explicit web proxy settings to be configured.
Prerequisites
For a list of model and firmware version prerequisites, see SIA for FortiGate site-based remote users.
You must register FortiGate devices used with the LAN extension feature to the same FortiCloud account used to log
into FortiSASE before using this feature.
To activate FortiGate management support on FortiSASE, you must purchase and apply a FortiSASE subscription
license per FortiGate device registered. See the FortiSASE Ordering Guide.
For details on registering products, see Registering assets.
Network topology
The following diagram depicts the network topology that the FortiGate as a FortiSASE LAN extension configuration
uses:
The FortiGate LAN extension feature is used in this topology where the FortiGate Connector is the on-premise FortiGate
Secure Edge device and the FortiGate Controller is FortiSASE.
A new VDOM can be created on the FortiGate Connector and its type can be set to LAN extension. This configuration
allows the VDOM to function as a FortiGate in LAN extension mode.
For details on connecting and logging into the FortiGate GUI, see Connecting using a web browser.
For details on connecting and logging into the FortiGate CLI, see Connecting to the CLI.
When a new FortiGate powers on, the bell icon in the header displays a notification about the new device. In this
example, the 1 beside Network in the left navigation pane also indicates the new device.
Clicking View from the notifications, displays the FortiGate in the Edge Devices > FortiGates page.
Alternatively, you can see the number of FortiGates waiting for authorization beside Edge Devices > FortiGates in the
navigation bar on the left.
To connect the FortiGate as FortiSASE LAN extension or FortiGate secure edge, follow this configuration workflow:
1. Obtain the FortiSASE domain name from FortiSASE.
2. Configure the FortiGate to connect to FortiSASE using the FortiSASE domain name.
For details on configuring the FortiGate secure edge to connect to FortiSASE using the GUI or CLI, see FortiGate secure
edge to FortiSASE. In these configuration steps, the FortiGate secure edge fulfills the FortiGate connector role while
FortiSASE fulfills the FortiGate controller role.
If after configuring the FortiGate, FortiSASE does not see it, take the following troubleshooting steps:
1. Ensure that the FortiGate is registered in the same FortiCloud account as FortiSASE. See FortiCloud account
prerequisites on page 38.
2. Ensure that the FortiGate is registered with a FortiSASE subscription license in the same FortiCloud account as
FortiSASE. See FortiCloud account prerequisites on page 38.
3. Verify the IPsec tunnels' phase 1 and phase 2 negotiations on the FortiGate Connector:
# diagnose vpn ike gateway list
# diagnose vpn tunnel list
Authorizing a FortiGate
If no FortiSASE subscription license is found for a FortiGate, then the Authorization >
Authorize button will be disabled and hovering over the Authorize button will display the tooltip
“No authorization entitlements for this Device”. Therefore, only licensed FortiGates can be
authorized.
Ensure you apply a FortiSASE subscription license to each FortiGate to be managed by
FortiSASE.
To authorize a FortiGate:
Deauthorizing a FortiGate
To deauthorize a FortiGate:
Disconnecting a FortiGate
If a FortiGate device has been deregistered from the FortiCloud account, then disconnecting this device will remove the
listed device from the FortiSASE Edge Devices > FortiGates page.
To disconnect a FortiGate:
FortiAP
FortiAP edge device support is a controlled General Availability feature that requires a
separate FortiSASE subscription license per FortiAP. FortiAP 231F and 431F devices running
FortiAP firmware 7.2.4 and above are supported.
Contact your Fortinet Sales/Partner representative to purchase a FortiSASE subscription
license for each FortiAP.
FortiSASE supports management and integration of a FortiAP as an edge device allowing for a micro-branch
deployment. A micro-branch deployment is a branch office with a FortiAP managed over a backhaul connection to
FortiSASE that provides secure Internet access to Wi-Fi clients. By relying on FortiAP instead of FortiClient to handle
secure connectivity to FortiSASE, this solution essentially extends the single-user single-device FortiClient endpoint
case to a multiuser multidevice Wi-Fi environment.
Prerequisites
For a list of model and firmware version prerequisites, see SIA for FortiAP site-based remote users.
You must register FortiAP devices to the same FortiCloud account used to log into FortiSASE before using this feature.
To activate FortiAP management support on FortiSASE, you must purchase and apply a FortiSASE subscription license
to each FortiAP device registered.
For details on registering products, see Registering assets.
Network topology
The following diagram depicts the network topology that the FortiAP as a FortiSASE edge device configuration uses:
You can use one of these methods for connecting and logging into the FortiAP device:
l Connect to the FortiAP using a computer with a direct wired connection to the FortiAP
l Reset the FortiAP to allow access using FortiAP Configuration mode
To connect to the FortiAP using a computer with a direct wired connection for GUI or CLI access:
1. Connect an Ethernet cable from the LAN port in the back of the FortiAP to one of the following:
a. FortiSwitch with Power-over-Ethernet (PoE) enabled on the port and then use another Ethernet cable to
connect a computer's Ethernet port to one of the free ports on the FortiSwitch.
b. PoE injector and then use another Ethernet cable to connect from the PoE injector to a computer’s Ethernet
port.
2. Configure the computer to be on the same subnet as the FortiAP by changing its IP address to 192.168.1.1 and the
netmask to 255.255.255.0.
3. Access the GUI or CLI using 192.168.1.2:
a. In a web browser, go to the default FortiAP web GUI address: https://192.168.1.2 .
b. Using SSH, go to 192.168.1.2.
4. In the Username field, enter admin and keep the password blank if this is a new setup. Otherwise, in the Password
field, enter the password associated with the admin account.
5. Create a new password that adheres to the listed password policy and then click Change Password.
To reset the FortiAP to use FortiAP Configuration mode for GUI or CLI access:
When a new FortiAP powers on, the bell icon in the header displays a notification about the new device.
In this example, the 1 beside Network in the left navigation pane also indicates the new device.
Prior to connecting a FortiAP to FortiSASE, you generally must perform these preliminary steps on the FortiAP to ensure
proper connectivity:
1. Upgrade the FortiAP to the latest firmware version known to work with FortiSASE. See SIA for FortiAP site-based
remote users.
2. Factory reset the FortiAP device to ensure no prior configuration remains on the device.
1. Download the FortiAP firmware image from the Fortinet Support Site.
2. Connect and log in to the FortiAP GUI.
3. From admin dropdown on the top-right, click Upload/Upgrade.
4. In the dropdown, select Image, click Image File, and select the desired firmware to upgrade to by browsing to the
FortiAP firmware image file location locally on your machine.
5. Click Upload to start the upgrade. You see an Uploading dialog as the file upload proceeds. FortiAP reboots
automatically to complete the firmware upgrade.
6. Reconnect and log into the FortiAP GUI and confirm the firmware version updated as desired.
1. Access the console by connecting a console cable to the FortiAP and using terminal software.
2. Enter the following FortiAP CLI command to factory reset the device: factoryreset
3. Confirm the factory reset when prompted by entering y:
FortiAP # factoryreset
This operation will reset the system to factory default!
1. In FortiSASE, click Services. Under Cloud Services, click FortiZTP. You perform the remaining steps in FortiZTP.
2. In FortiZTP, click Setting.
3. On the FortiAP tab, ensure that FortiSASE is enabled.
4. Click UPDATE.
l To provision multiple FortiAPs, select the checkboxes for the desired FortiAPs, then click PROVISION.
6. Under TARGET LOCATION in the Provision devices dialog, select FortiSASE. Only options that you have
configured in Provisioning Settings appear in this dialog.
7. Click PROVISION NOW.
8. In the prompt that mentions the provision process started for devices, click OK.
You can connect a FortiAP to FortiSASE using alternative connection methods, namely, using the FortiAP GUI or CLI.
Before using the FortiAP GUI or CLI steps, you must obtain the FortiSASE domain name from FortiSASE.
4. If you are using FortiAP Configuration mode, enter reboot to exit this mode. Configuration changes take effect
after the FortiAP reboots.
5. Connect the FortiAP port to a wired network with Internet access. The FortiAP connects to FortiSASE using the
domain name configured.
If after configuring the FortiAP, FortiSASE does not see it, take the following troubleshooting steps.
1. Ensure that the FortiAP is registered in the same FortiCloud account as FortiSASE. See FortiCloud account
prerequisites on page 42.
2. Ensure that the FortiAP is registered with a FortiSASE subscription license in the same FortiCloud account as
FortiSASE. See FortiCloud account prerequisites on page 42.
3. Ensure that after you make configure the FortiSASE domain name in the FortiAP GUI or CLI in Configuration mode,
you reboot the FortiAP.
4. Ensure that after you connect the FortiAP to a wired network that it is getting a valid IP address, can access the
Internet, and can connect to the FortiSASE wireless controller. By default, the FortiAP obtains a LAN IP using
DHCP. You can connect to the FortiAP CLI using a serial console connection and serial terminal software to
perform these steps:
a. Check the FortiAP LAN IP address and netmask, and default gateway, respectively, using these commands:
ifconfig br0
route
b. Ping the FortiSASE domain name using ping <FortiSASE domain name> and then cancel it using Ctrl+C.
c. Check the FortiAP has a valid CAPWAP connection to the wireless controller using this command:
FortiAP-431F # cw_diag -c acs
WTP Configuration
name : FortiAP-431F
loc : N/A
ap mode : thin AP
...
ACS 0 info
wcha info : mode=0 max=10 wait=10 peer_cnt=0
acPri : 1
fsm-state : RUN 768
ac-ip-addr : 154.52.4.72:5246,5247 DNS
ac-name : FGVMABCD00000EFG
...
data-chan-sec-oper : ipsec-sn
...
ACS 1 info
wcha info : mode=0 max=0 wait=0 peer_cnt=0
acPri : 2
fsm-state : START 796
ac-ip-addr : 0.0.0.0:0,0 UNKNOWN
ac-name :
...
Managing FortiAPs
You can manage a FortiAP device from Edge Devices > FortiAPs in the Managed FortiAPs tab.
l Bandwidth chart displaying inbound FortiAP edge device traffic per SSID and security PoP
From this page, you can perform these tasks:
Authorizing a FortiAP
If FortiSASE does not find a FortiSASE subscription license, it disables the Authorization >
Authorize button and hovering over the Authorize button displays the No authorization
entitlements for this Device tooltip. Therefore, you can only authorize licensed FortiAPs.
Ensure you apply a FortiSASE subscription license to each FortiAP for FortiSASE to manage.
To authorize a FortiAP:
1. Go to Edge Devices > FortiAPs click the Managed FortiAPs tab at the top.
2. Select the desired FortiAP.
3. Do one of the following:
l Under Authorization, click the Authorize button.
l Right-click the device and select Authorization > Authorize.
4. After authorization, FortiSASE displays the FortiAP status as Offline. Refresh the FortiAPs page. The FortiAP
device status changes to Online.
Deauthorizing a FortiAP
To deauthorize a FortiAP:
1. Go to Edge Devices > FortiAPs and click the Managed FortiAPs tab at the top.
2. Select the desired FortiAP.
3. Do one of the following:
l Under Authorization, click the Deauthorize button.
Disconnecting a FortiAP
If a FortiAP device has been deregistered from the FortiCloud account, then disconnecting this device will remove the
listed device from the FortiSASE Edge Devices > FortiAPs page.
To disconnect a FortiAP:
1. Go to Edge Devices > FortiAPs and click the Managed FortiAPs tab at the top..
2. Select the desired FortiAP.
3. Do one of the following:
a. Click the Disconnect button.
b. Right-click the device and select Disconnect.
Editing a FortiAP
From Edge Devices > FortiAPs under the Managed FortiAPs tab, by selecting a FortiAP device and clicking Edit, you can
edit these settings:
Field Description
Enable LEDs Select if you want LEDs on the FortiAP to be enabled (default) or disabled.
Login Password Select if you want set a new AP login password or leave the password
unchanged.
When you authorize a FortiAP unit, it is configured by default to use the default FortiAP profile (determined by model).
The FortiAP profile defines the entire configuration for the AP.
From Edge Devices > FortiAPs under the FortiAP Profiles tab, you can create a new FortiAP profile or edit an existing
default FortiAP profile.
Typically, you will edit an existing default FortiAP profile by selecting the profile and clicking Edit.
Field Description
Model Select the FortiAP model to which this profile applies. Currently 431F or 231F
Deployment Location Select where the FortiAP is being installed either indoor or outdoor. You can
override the default designation of the FortiAP to change the available channels
based on your region.
Country/Region Select the country or region to apply the Country Code for where the FortiAP will
be used.
Login Password Select if you want set a new AP login password or leave the password
unchanged.
Client load balancing Select a handoff type as needed. See Wireless client load balancing for high-
density deployments.
802.1x authentication Enable if you want to configure the FortiAP to act as a 802.1x supplicant to
authenticate against the server using EAP-FAST, EAP-TLS or EAP-PEAP (see
Configuring 802.1X supplicant on LAN).
Field Description
Band Select the wireless protocols that you want to support. The available choices
depend on the radio’s capabilities. Where multiple protocols are supported, the
letter suffixes are combined: “802.11ax/n/g” means 802.11ax and 802.11n and
802.11g.
Short Guard Interval Select to enable the short guard interval for 802.11ax or 802.11n on 5 GHz.
Channel Plan For 2.4 GHz radios, select if you want to automatically configure a Channel plan
or if want to select custom channels.
Field Description
l Three Channels: automatically selects channel 1, 6, and 11.
l Four Channels: automatically selects channels 1, 4, 8, and 11.
l Custom: select custom channels.
Channels Select the channel or channels to include. The available channels depend on
which IEEE wireless protocol you selected in Band. By default, for 5 GHz radios
all available channels are enabled.
Transmit Power Mode Select how you want to determine transmit power:
l Percent: transmit power is determined by multiplying set percentage with
l Auto: set a range of dBm values and the power is set automatically.
Transmit Power Specify either the minimum and maximum Transmit power levels in dBm or as a
percentage.
SSIDs Select SSIDs to use for this radio either All or Specify with selected SSIDs added
to a list.
You can also choose to create new FortiAP profiles by clicking Create for the purpose of overriding specific settings for
individual FortiAPs. You cannot update the name, model, and country/region of a profile once you save it.
Creating an SSID
You can configure your wireless network by defining one or more SSIDs to which your users can connect. FortiSASE
uses IP address management (IPAM) to automatically configure IP/Netmask settings for an SSID.
Field Description
Traffic Mode Tunnel — (Tunnel to Wireless Controller) Data for WLAN passes through WiFi
Controller. This is the default. Currently this is the only mode supported.
WiFi Settings
Field Description
Broadcast SSID Disable broadcast of SSID. By default, the SSID is not broadcast.[FM1]
WiFi Security
Field Description
Mode Select the security mode for the wireless interface. Wireless users must use the
same security mode to be able to connect to this wireless interface.
l WPA2 Personal: WPA2 is WiFi Protected Access version 2. Users use a pre-
Frames (PMF) mandatory. Best used for enterprise networks. Each user is
separately authenticated by user name and password.
Pre-shared Key Available only when Mode is WPA2 Personal. Preshared key must be 8 to 63
characters long.
Authentication Available only when Mode is WPA2 Enterprise or WPA3 Enterprise Only.
Select one of the following:
l RADIUS Server: select the RADIUS server that will authenticate the clients.
l User Groups: select the local user group(s) that can authenticate.
FortiSASE includes the following so that you can easily monitor your network:
Dashboard Description
Asset Map Displays on a global map the geographical location of assets, including security
PoPs, private access hubs, edge devices (FortiAP, FortiExtender, FortiGate), and
endpoints (hidden by default). For a security PoP, indicates status, number of
connected units, and logging support (if enabled). For larger topologies, groups
multiple asset types and single asset types for global, regional, and local views
using number bubbles.
Secure Private Access Add, delete, and update common secure private access (SPA) network
configuration and add, delete, update, and monitor SPA service connections to
FortiGate SPA hub.
Connected Users View and deauthenticate users that are connected to FortiSASE.
Digital Experience Monitoring View health check metrics for digital experience monitoring (DEM) of first-mile
connectivity between SaaS applications and each of the geographical points of
presence (PoPs) provisioned for your FortiSASE instance.
For securing FortiSASE remote user access to private TCP-based and UDP-based applications, FortiSASE supports
secure private access (SPA) using SD-WAN or SPA using a next generation firewall converted to a standalone
FortiSASE SPA hub. FortiSASE private access supports up to four FortiGate hubs.
For SPA use cases, the security points of presence (PoPs) act as spokes to the FortiGate hub (FortiGate SD-WAN hub
or FortiSASE SPA hub), relying on IPsec VPN overlays and BGP to secure and route traffic between PoPs and the
networks behind the organization's FortiGate hub.
FortiSASE security points of presence and the organization’s FortiGate hubs form a traditional hub-and-spoke topology
that supports the Fortinet autodiscovery VPN (ADVPN) configuration. ADVPN is an IPsec technology that allows a
traditional hub-and-spoke VPN’s spokes to establish dynamic, on-demand, direct tunnels, known as shortcut tunnels,
between each other to avoid routing through the topology's hub device.
FortiSASE remote users may access private resources behind FortiGate hub(s) directly through FortiSASE to hub(s)
IPsec tunnels. If a private resource is behind an organization’s spoke device, they may connect directly to that resource
through an on-demand, direct, and dynamic ADVPN tunnel. Therefore, the SPA use cases with FortiGate hubs only
allow traffic to be initiated from FortiSASE spokes to FortiGate spokes.
FortiSASE supports these main routing design methods:
l BGP per overlay (default)
l BGP on loopback
Prerequisites
For the FortiGate SD-WAN secure private access (SPA) use case, SD-WAN network deployments are expected to
conform to Fortinet’s best practices for SD-WAN architecture and deployment for the following topologies:
l SD-WAN with a single datacenter/hub
l SD-WAN with dual datacenters/hubs
l SD-WAN with up to four datacenters/hubs
For deployment details, see the 4-D FortiSASE SPA with a FortiGate SD-WAN Deployment Guide.
For the FortiGate next generation firewall (NGFW) SPA use case, you must first convert the NGFW to a standalone
IPsec VPN hub. For deployment details, see the 4-D FortiGate NGFW to FortiSASE SPA Hub Conversion Deployment
Guide (FortiOS 7.0.7+).
For the FortiGate NGFW SPA use case running FortiOS 7.2.4 and above, you can use the Fabric Overlay Orchestrator
feature to convert the NGFW to a standalone IPsec VPN hub. For deployment details, see the 4-D FortiGate NGFW to
FortiSASE SPA Hub Conversion using Fabric Overlay Orchestrator Deployment Guide (FortiOS 7.2.4+, 7.4.0+).
Secure private access (SPA) Service Connection license enforcement takes effect with the
FortiSASE 23.3 release in Q3 2023. Customers who have not already enabled SPA at that
time are required to purchase a license. See the FAQ in the FortiSASE Ordering Guide.
A single SPA Service Connection license is required per FortiGate and allows inbound connectivity to the licensed
device from all remote user and branch locations.
l FortiGate desktop platforms are recommended as a single next generation firewall location only.
l FortiGate 100F series and above recommended for an SD-WAN hub.
See the FortiSASE Ordering Guide.
Network restrictions
Because the following IP addresses ranges are reserved for FortiSASE internal usage, note the following network
restrictions, and ensure your network configuration does not overlap with them:
l 10.252.0.0/16
l 10.253.0.0/16
l 100.65.0.0/16
Before configuring the Secure Private Access settings in the FortiSASE portal, to ensure
proper secure private access (SPA) functionality, you must ensure that the FortiGate hub
conforms to the deployment details (topologies, configuration settings) covered in the specific
4-D FortiSASE SPA deployment guide corresponding to your SPA use case as Prerequisites
on page 55 mentions.
To allow FortiSASE remote users with SPA to resources behind your FortiGate hub (FortiSASE SPA hub/FortiGate SD-
WAN hub) network, you can configure FortiSASE security points of presence (PoP) as spokes in your hub-and-spoke
network in Network > Secure Private Access.
Configuration workflow
To configure SPA service connections (hubs), you must follow this configuration workflow in Network > Secure Private
Access:
1. Click the Network Configuration tab at the top of the page and configure the common network configuration settings.
See Configuring network configuration on page 57.
2. Click the Service Connections tab at the top of the page, click Create, and configure a new service connection
(hub). See Configuring a new service connection on page 59.
You cannot configure a service connection or hub without first configuring Network
Configuration settings.
Before proceeding with configuring hubs or service connections, you must configure common SPA network
configuration used by all service connections.
Only a single BGP routing design method can be used for all hubs and spokes. They cannot
be mixed.
Also, the BGP routing design method cannot be changed once saved. You must delete the
service connection(s) and network configuration and reconfigure with a different BGP routing
design method.
1. Go to Network > Secure Private Access and click the Network Configuration tab.
2. For the Secure Private Access Network Configuration page, for BGP Routing Design, select one of the following:
l BGP per overlay (default selection)
l BGP on loopback. FortiSASE automatically selects and grays out BGP Recursive Routing after you selecting
this option.
3. Fill in the rest of the fields with values of the attributes of the FortiGate hub network connection. FortiSASE validates
the input and notifies you of any invalid values. See the following table:
BGP Routing Design FortiSASE supports these main routing design BGP per overlay
methods:
l BGP per overlay (default)
l BGP on loopback
You can use only a single BGP routing design
method for all hubs and spokes. You cannot mix
them.
Autonomous system number BGP autonomous system (AS) number of your 65400
(ASN) hubs. Typically, this should be the same on both
hubs.
BGP recursive routing Enabling the BGP recursive routing setting Enabled
allows for interhub connectivity and redundancy
to networks behind the active hub if each hub
has a physical connection to the others for cases
when connectivity between a FortiSASE security
PoP and the active hub fails.
For example, consider that this BGP
configuration setting enabled and a FortiSASE
security PoP’s connectivity with hub 1 goes
down. To ensure the security PoP can reach a
network behind hub 1, it would route traffic to hub
2 first, then route it to hub 1 via its interhub
connection, followed by routing the traffic to the
desired destination network behind hub 1.
Hub selection method Method by which FortiSASE selects hub. By Hub health and priority
default, FortiSASE uses hub health and priority:
l Hub health and priority: periodically
Health check IP address IP address of a server behind the hub that should 10.30.100.1
be used to set up the SD-WAN performance SLA
rule.
Because the following IP addresses ranges are reserved for FortiSASE internal usage,
note the following network restrictions, and ensure your network configuration does not
overlap with them:
l 10.252.0.0/16
l 10.253.0.0/16
l 100.65.0.0/16
For BGP per overlay, the BGP router ID subnet should not overlap with the subnet used for
the BGP peer IP address. These settings should be unique values as the example values
demonstrate.
For BGP on loopback, the BGP router ID subnet should match the BGP peer IP address
range defined on the hub.
When using the BGP MED option, user-defined hub priorities are not used because the
SD-WAN SLA rule is disabled in this case.
4. Click Save.
You can create a new service connection (hub) using one of the following BGP routing design methods:
You configured the corresponding BGP routing design method in the Network Configuration
tab.
After you create a service connection, you can update its authentication method using Update Authentication Method,
namely, to switch from using a preshared key (PSK) to a certificate or vice-versa. You can also use this option to update
the existing authentication method's settings, such as updating the PSK or updating the PKI user or certificate.
Authentication method Method used to authenticate with the FortiGate Pre-shared key
hub. Supports Pre-shared key (default) and
Certificate.
BGP peer IP address On the hub, the IP address used as the BGP 10.10.10.253
peer ID
Because the following IP addresses ranges are reserved for FortiSASE internal usage,
note the following network restrictions, and ensure your network configuration does not
overlap with them:
l 10.252.0.0/16
l 10.253.0.0/16
l 100.65.0.0/16
For BGP per overlay, the BGP router ID subnet should not overlap with the subnet used for
the BGP peer IP address. These settings should be unique values as the example values
demonstrate.
For BGP on loopback, the BGP router ID subnet should match the BGP peer IP address
range defined on the hub.
4. Click Save.
5. Once FortiSASE successfully configures the service connection, it notifies you. The value in the Configuration State
column changes from Creating to Success.
6. (Optional) Repeat the steps to configure up to a total of four service connections as necessary to support your
secure private access service connection network topology. The following shows the GUI after configuring two
service connections:
For FortiSASE security points of presence (PoP), the SD-WAN performance SLA (health
check) setting has the following parameters:
l Latency threshold: 120 ms
l Jitter threshold: 55 ms
Also, for FortiSASE security PoPs, the SD-WAN rule is configured with the lowest cost (SLA)
mode, where the security PoPs choose the lowest cost link (highest priority hub) that satisfies
the SLA to forward traffic.
In the SD-WAN rule used by each FortiSASE security PoP, the interface preference order
matters when selecting links of equal cost (equal priority hubs). Therefore, to define interface
preference order, you must configure service connections in FortiSASE in the desired order of
preference from the most preferred hub to the least preferred hub.
Authentication method Method used to authenticate with the FortiGate Pre-shared key
hub. Supports Pre-shared key (default) and
Certificate.
ADVPN Route Tag For BGP on loopback only, ADVPN route tag 1
number for spoke to tag incoming routes
advertised from a hub.
See Enhanced BGP next hop updates and
ADVPN shortcut override.
BGP peer IP address On the hub, the IP address used as the BGP 10.10.10.253
peer ID
Because the following IP addresses ranges are reserved for FortiSASE internal usage,
note the following network restrictions, and ensure your network configuration does not
overlap with them:
l 10.252.0.0/16
l 10.253.0.0/16
l 100.65.0.0/16
For BGP per overlay, the BGP router ID subnet should not overlap with the subnet used for
the BGP peer IP address. These settings should be unique values as the example values
demonstrate.
For BGP on loopback, the BGP router ID subnet should match the BGP peer IP address
range defined on the hub.
4. Click Save.
5. Once FortiSASE successfully configures the service connection, it notifies you. The value in the Configuration State
column changes from Creating to Success.
6. (Optional) Repeat the steps to configure up to a total of four service connections as necessary to support your
secure private access service connection network topology.
Click the Health button at the top of the page to view the Health and VPN Tunnel Status page, which shows all
configured hubs' health and VPN tunnel status. This page provides advanced monitoring of the IPsec VPN tunnel, BGP
peering state, and health check IP status that you can use for troubleshooting advanced scenarios with configured hubs.
For example, you can view two hubs' health and VPN tunnel status from this page:
For any hub, selecting a point of presence and clicking View Learned BGP Routes displays the learned BGP routes for
that hub. For example, the learned BGP routes for the example DC1 are as follows:
When you configure the hub selection method as hub health and priority within each point of presence (PoP), FortiSASE
selects the highest priority hub that meets minimum SLA requirements. You can assign a hub a different priority level in
different PoPs using the Update Service Connection Priorities page. A lower numerical cost value indicates a higher
priority for a hub and vice-versa.
1. Go to Network > Secure Private Access. On the Service Connections tab, click Update Service Connection
Priorities.
2. From the Security PoP dropdown list, select the desired PoP hub. The example selects the San Jose – California –
USA security PoP.
3. Select the desired hub and do one of the following to set the priority:
a. From the Set Priority dropdown list, select the desired priority. P1 is the highest priority, and P2 is the lowest
priority.
b. Right-click the hub, select Set Priority, and select the desired priority. P1 is the highest priority, and P2 is the
lowest priority.
4. Set the priority for each hub that will influence hub selection. The example modifies hub priorities so that DC1 has a
priority of P2 and DC2 has a priority of P1:
5. Click Apply to save the updated priority values. The page sorts the hubs from highest to lowest priority:
6. (Optional) Repeat the steps to update hub priorities for other security PoPs.
You cannot directly update hub configuration. You must delete any current configuration and
reconfigure using new settings to update it.
To monitor private access hubs when you have configured them, view the following widgets in the Dashboards > Private
Access page:
l Private Access Health and VPN Tunnel Status
l Private Access Hub Priorities
l Top Ten Private Access Users
The following provides private access widgets with data for two private access hubs:
The security settings for Internet and private access are identical. For details on configuring security settings, see
Security on page 106.
By default, for the secure private access (SPA) use cases using a FortiGate hub configured through the Secure Private
Access page, all FortiSASE agent-based remote users have unrestricted access to private applications behind the hub
network through an Allow-All Private Traffic private access policy.
To restrict SPA to private applications of any protocol (TCP, UDP, ICMP, and so on) behind a FortiGate hub, in the
FortiSASE portal you can configure zero trust network access (ZTNA) tagging rules that apply ZTNA tags to remote
users based on specified endpoint posture checks. You can then specify these tags as the source in a dynamic private
access policy to deny or allow access as desired.
You can use tags to build dynamic policies that you do not need to manually reconfigure whenever an endpoint’s status
changes. For example, consider that you want to deny Windows endpoints without antivirus (AV) installed and running
as detected by FortiClient from accessing private applications behind the FortiGate hub. You would configure the
following:
l Rule that applies a SASE-Compliant tag to Windows endpoints that FortiClient detects as having AV software
installed and running
l Rule that applies a SASE-Non-Compliant tag to Windows endpoints that FortiClient detects as not having AV
software installed
l Private access policy that allows Windows endpoints with the SASE-Compliant tag to access a specific server
behind the FortiGate hub
l Private access policy that denies Windows endpoints with the SASE-Non-Compliant tag from accessing a specific
server behind the FortiGate hub
As FortiSASE receives information from endpoints, it dynamically removes and applies the SASE-Non-Compliant tag to
endpoints. For example, if an endpoint that previously had the SASE-Non-Compliant tag applied has its AV software
installed or enabled as detected by FortiClient, then FortiSASE automatically removes the SASE-Non-Compliant tag
from the endpoint and applies the SASE-Compliant tag instead. Consequently, the endpoint would then be able to
access private applications behind the FortiGate hub.
Therefore, a dynamic policy is a policy that has one or more zero trust network access tags specified as its source.
For details on configuring dynamic tags and policies, see Tagging on page 192.
Configuration workflow
You can follow this configuration workflow, which the document describes in detail using the example configuration of a
dynamic private access policy that allows access to private applications, which in this example is a private server behind
the FortiGate hub:
1. Configure a zero trust network access (ZTNA) tagging rule set for compliant endpoints.
2. Configure a ZTNA tagging rule set for non-compliant endpoints.
3. Configure a dynamic private access policy to allow access to a specific private server from compliant endpoints.
4. Configure a dynamic private access policy to deny access to a specific private server from non-compliant endpoints.
5. Test the dynamic private access policies using ICMP ping to the specific private server from a compliant endpoint
and from a non-compliant endpoint, respectively.
A similar workflow applies to a private access policy that allows or denies access to
applications of any other protocols besides ICMP, such as TCP or UDP applications.
This example demonstrates how to configure zero trust network access (ZTNA) tag names and ZTNA tagging rule sets
with the following posture checks:
l Endpoint is running Windows and has antivirus (AV) software installed and running
l Endpoint is running Windows and does not have AV software installed or running
This example demonstrates how to configure dynamic private access policies using the zero trust network access tags
that you created in Configuring ZTNA rule sets to dynamically tag agent-based remote users on page 69 to allow
endpoints tagged as SASE-Compliant with access to selected private resources and to deny access to selected private
resources for endpoints tagged as SASE-Non-Compliant.
5. Click OK.
6. In Configuration > Policies with Secure Private Access selected, ensure that you order the policies so that the Allow-
SASE-Compliant policy is before the Allow-All Private Traffic policy. With this ordering of policies, FortiSASE allows
endpoints that match the dynamic policy access to the specific private server.
To test that FortiSASE allows a FortiClient endpoint tagged as SASE-Compliant access to a private
server:
8. In FortiSASE, in Configuration > Policies, observe that the Allow-SASE-Compliant dynamic private access policy hit
count increased and that the Deny-SASE-Non-Compliant dynamic private access policy hit count has not changed.
To test that FortiSASE denies a FortiClient endpoint tagged as SASE-Non-Compliant access to a private
server:
7. Observe the following output indicating the ICMP ping has timed out since access to the specific server is denied:
C:\> ping 10.100.99.101
8. In FortiSASE, in Configuration > Policies, observe that the Allow-SASE-Compliant dynamic private access policy hit
count has not changed and that the Deny-SASE-Non-Compliant dynamic private access policy hit count increased.
Verify that the IPsec VPN tunnels immediately appear on the FortiGate hub from all configured FortiSASE security points
of presence(PoP).
On the FortiGate hub, verify that the IPsec VPN tunnels from the FortiSASE PoPs acting as spokes by going to
Dashboard > Network and clicking the IPsec widget to expand it.
1. Run at least one of the following commands. For a VDOM-enabled hub FortiGate, enter the proper VDOM before
running the command(s):
diagnose vpn ike gateway list
diagnose vpn tunnel list
get vpn ipsec tunnel summary
a. For diagnose vpn ike gateway list, confirm that the phase 1 IKE security associations (SA) for the
FortiSASE security PoPs with corresponding peer IDs are established. Confirm that the IKE SA and IPsec VPN
SA show created and established as 1/1. The following shows sample output for this command:
vd: root/0
name: ToSpokes_1
version: 2
…
created: 923s ago
peer-id: region8-fos001-tiui7pzu-1
…
IKE SA: created 1/1 established 1/1 time 10/10/10 ms
IPsec SA: created 1/1 established 1/1 time 0/0/0 ms
…
direction: responder
status: established 923-923s ago = 10ms
proposal: aes128-sha256
child: no
…
PPK: no
2. For diagnose vpn tunnel list, confirm that the phase 2 IPsec VPN SAs for the FortiSASE security PoPs are
established. Confirm that the SA field exist and are populated. The following shows sample output for this
command:
name=ToSpokes_1 ver=2 serial=3ba 208.85.68.228:4500->154.52.6.89:52270 tun_
id=10.150.160.2 tun_id6=::10.0.3.147 dst_mtu=1500 dpd-link=on
weight=1
bound_if=25 lgwy=static/1 tun=intf/2 mode=dial_inst/3 encap=none/9096 options
[2388]=npu rgwy-chg rport-chg frag-rfc run_state=0 accept_
traffic=1 overlay_id=0
parent=ToSpokes index=1
proxyid_num=1 child_num=0 refcnt=6 ilast=0 olast=0 ad=s/1
stat: rxp=2689 txp=1042 rxb=16418 txb=18338
dpd: mode=on-idle on=1 idle=20000ms retry=3 count=0 seqno=1
natt: mode=silent draft=0 interval=10 remote_port=52270
proxyid=ToSpokes proto=0 sa=1 ref=4 serial=1 ads
src: 0:0.0.0.0-255.255.255.255:0
dst: 0:0.0.0.0-255.255.255.255:0
SA: ref=6 options=a26 type=00 soft=0 mtu=1422 expire=42258/0B replaywin=2048
seqno=411 esn=0 replaywin_lastseq=00000a80 itn=0 qat=0 hash_search_len=1
life: type=01 bytes=0/0 timeout=43187/43200
dec: spi=fd64b472 esp=aes key=16 0ab999cd40bc420cc78556f84b37747f
ah=sha1 key=20 2e9f19e91d696d530adefb3d219ad1c74d08dcd8
enc: spi=14c9a05c esp=aes key=16 5446e233d666319b8f88fd1768f774b0
ah=sha1 key=20 15989dc3ef5fd1d0b385df93241e0d6a0b373826
dec:pkts/bytes=2689/16346, enc:pkts/bytes=1042/21844
npu_flag=03 npu_rgwy=154.52.6.89 npu_lgwy=208.85.68.228 npu_selid=33d dec_npuid=1
enc_npuid=1
3. For get vpn ipsec tunnel summary, confirm that the phase 2 IPsec VPN selectors for the FortiSASE security
PoPs are sending and receiving traffic. Confirm that selectors(total,up): 1/1, rx(pkt,err), and tx
(pkt,err) are non-zero. The following shows sample output for this command:
'ToSpokes_0' 154.52.29.50:64916 selectors(total,up): 1/1 rx(pkt,err): 2689/0 tx
(pkt,err): 1043/0
'ToSpokes_1' 154.52.6.89:52270 selectors(total,up): 1/1 rx(pkt,err): 2689/0 tx
(pkt,err): 1042/0
'ToSpokes_2' 50.208.126.11:0 selectors(total,up): 1/1 rx(pkt,err): 22149/0 tx
(pkt,err): 55050/37
…
'ToSpokes_4' 206.47.184.245:64916 selectors(total,up): 1/1 rx(pkt,err): 2689/0
tx(pkt,err): 1043/0
…
Testing private access connectivity to FortiGate hub network from remote users
You can verify access to the FortiGate hub network from FortiSASE users, namely FortiClient users connected to
FortiSASE in endpoint mode using ping.
From a FortiClient user connected to FortiSASE, use ping within a Windows Command Prompt to verify access to a host
behind the FortiGate hub internal network. The example pings 10.50.101.50, which is on an internal network. The
following shows sample output:
C:\>ping 10.50.101.50
Pinging 10.50.101.50 with 32 bytes of data:
Reply from 10.50.101.50: bytes=32 time=80ms TTL=62
Reply from 10.50.101.50: bytes=32 time=80ms TTL=62
Reply from 10.50.101.50: bytes=32 time=80ms TTL=62
Reply from 10.50.101.50: bytes=32 time=84ms TTL=62
1. Check the BGP peering status and the advertised routes using the following CLI commands. Replace x.x.x.x with
the BGP neighbor IP address:
get router info bgp summary
get router info bgp neighbors x.x.x.x advertised-routes
2. On the GUI, verify routing by going to Dashboard > Networks. Click the Static & Dynamic Routing widget to expand
it, then select BGP Neighbors from the dropdown list in the top right corner.
In the FortiSASE portal, you can verify traffic from FortiSASE remote users has reached private access destinations
through these methods:
l From Analytics > Logs > Traffic by viewing either the All Internet and Private Access Traffic page or the Private
Access Traffic page
l From Dashboard > FortiView > Sources, Dashboard > FortiView > Destinations, or Dashboard > FortiView >
Policies and filtering on the private access destination IP address
Following is an example of the Analytics > Logs > Traffic > All Internet and Private Access Traffic page, filtered for the
private access destination IP address 10.50.101.50.
Following is an example of the Analytics > Logs > Traffic > Private Access Traffic page.
Following are examples of the Dashboard > FortiView > Sources, Dashboard > FortiView > Destinations, or Dashboard
> FortiView > Policies pages, filtered on the private access destination IP address 10.50.101.50.
Verifying private access hub status and location using the asset map
The Network > Asset Map page in the FortiSASE portal supports filtering on Private Access Hub assets to display their
status and geographical location.
Following is an example of the asset map filtered on Private Access Hub assets.
Managed Endpoints
You can view managed endpoints via the Network > Managed Endpoints page.
Alternatively, you can display the Managed Endpoints status widget or status monitor under Dashboards as follows:
l Go to Dashboards > Status and under the Managed Endpoints widget, click Click to Expand. If this widget does not
exist, add a new Managed Endpoints widget as Adding a custom dashboard on page 19 describes.
l Go to an existing Managed Endpoints monitor. If this monitor does not exist, add a new Managed Endpoints monitor
as Adding a custom monitor on page 22 describes.
The page, status widget, and status monitor all display a list of endpoints that show endpoint information, including but
not limited to the following:
l Device username
l VPN username
l Management connection status
l Security point of presence
l Public IP address
l VPN status
l Platform
l Vulnerabilities detected
l FortiClient version and ID
l Zero trust network access tags
The Managed Endpoints view contains the following buttons at the top of the page:
l When an endpoint is selected, you can use the View Endpoint Details button to display detailed endpoint
information that FortiClient gathers on the endpoint device.
l The Management Connection button allows enabling/disabling the management connection for endpoints.
l When the endpoint has a Connected VPN status, you can click More Options to access the following actions:
l View VPN Session
l Show in FortiView
l Show Matching Traffic Logs
l The Export All button exports the list of endpoints in a CSV file format that includes endpoint details such as device
username name, IP and MAC addresses, FortiClient version, and so on.
You can toggle between Managed Endpoints and Unmanaged Endpoints views.
By default, the management connection for all endpoints is enabled. Therefore, you do not need to enable the
management connection for an endpoint when you have not yet disabled it.
You can remove an endpoint from management by disabling its management connection with the following results:
l The endpoint is permanently excluded from management and cannot register with FortiSASE using an invitation
code unless its management connection is reenabled.
l FortiSASE removes the endpoint profile and zero trust network access (ZTNA) tagging settings from the selected
endpoint.
l A license seat is freed up for use by other endpoints.
After an endpoint has previously been removed from management, you can add it to management by enabling its
management connection with the following results:
l FortiSASE is now managing the endpoint and the endpoint is allowed to register with FortiSASE using an invitation
code.
l FortiSASE applies the endpoint profile and ZTNA tagging settings configured in Configuration > Profiles and
Configuration > ZTNA Tagging respectively to the selected endpoint.
l The endpoint uses up a license seat.
When you remove an endpoint from management by disabling its management connection, in
FortiClient the endpoint’s zero trust telemetry connection and Remote Access FortiSASE VPN
connection will both be disconnected.
The Disable option within Management Connection is not equivalent to the Deregister button
in previous FortiSASE versions.
In previous versions, Deregister just disconnected the endpoint from FortiSASE and allowed
the possibility for the endpoint to remain managed and reregister with FortiSASE.
Currently, once you configure Management Connection > Disable for an endpoint, it is
permanently excluded from management. Namely, it is considered an unmanaged endpoint,
and cannot register with FortiSASE.
To allow an unmanaged endpoint to be managed by and register with FortiSASE, you must
select the endpoint and configure Management Connection > Enable.
To add an endpoint to management when it has been previously removed from management:
Digital Experience
Digital experience monitoring (DEM) serves as a valuable tool for network administrators in diagnosing connectivity and
network issues for remote users along with monitoring their real-time network bandwidth, CPU, memory, and hard disk
usage. It also enables tracing end-to-end network performance, from an endpoint to a FortiSASE PoP and to a SaaS
application using a DEM agent installed on the endpoint. DEM provides insights into potential network issues between a
FortiClient endpoint, FortiSASE PoP, SaaS applications, and the Internet service providers (ISP) connecting them.
l On Windows, use the installer package to uninstall FortiClient and the DEM agent
together. You cannot uninstall DEM agent using Add or Remove Program in Control
Panel.
To navigate DEM:
1. Go to Network > Managed endpoints to see the list of managed and unmanaged endpoints.
2. Select an endpoint and click View Endpoint Details. A new slide in appears and the following endpoint details are
visible:
Hardware Shows information regarding endpoint hardware such as vendor, model, and
CPU. It displays a real-time graph that shows total hard disk, CPU, and
memory usage on the endpoint.
Digital Experience 1. Shows DEM agent status: offline, online, or agent is not installed. To get end-
to-end network performance visibility from the endpoint to a particular SaaS
application, run a trace job for the selected endpoint. SeeRunning a trace job
on an endpoint on page 83.
DEM displays a list of SaaS applications and health check metrics for first-mile connectivity between the
geographical PoPs provisioned for your FortiSASE instance and SaaS applications, as the following diagram
FortiSASE can run a trace job on the endpoint using DEM agent. This assists in troubleshooting various performance
bottlenecks in the network by providing link metrics such as average RTT and packet loss on various hops of the
network.
If you interrupt the current running job by clicking Stop, FortiSASE deletes the historical
traceroute data collected so far and you must restart the job.
The first trace job output displays within five minutes after clicking Start, after which FortiSASE presents output
every three minutes until the selected Monitor for duration expires. FortiSASE stores the results displayed for three
days only for the latest trace job. To analyze the trace job, see Analyzing trace job result on page 83.
l DEM agent status must be Online under Digital Experience tab under Network >
or ICMP traffic.
The trace job output gives information on average RTT (ms) and packet loss (%) on various hops of the network. To
identify the hop accurately, understanding whether the selected endpoint is connected to the FortiSASE VPN tunnel for
secure Internet access (SIA) or not is important.
When an endpoint is connected to the FortiSASE VPN tunnel, it accesses SaaS applications using SIA. Thus, the first
and second hops of the trace are the entry and exit interface IP address of the FortiSASE PoP that the endpoint is
connected to. The remaining hops are the ISPs in between until the last hop, which is the selected SaaS application.
When an endpoint is not connected to the FortiSASE tunnel, it accesses SaaS applications directly using its local
Internet breakout bypassing the FortiSASE PoP. Thus, the performance metrics (average RTT and packet loss)
displayed do not include the FortiSASE PoP.
Some ISPs do not respond to the trace packets that the DEM agent sends and requests time
out. For such hops, their entry is marked as *** in the trace result output.
Each FortiSASE administrator can only run one trace job on unique endpoints simultaneously.
1. Initially, the desired endpoint has not yet attempted to connect to FortiSASE. Go to Network > Managed Endpoints,
click the Unmanaged Endpoints view and confirm the endpoint is not yet visible there.
2. Go to Configuration > Users and click Onboard Users.
3. Set FortiClient Installer to Download.
4. Under Manual Installer to the right of the Invitation Code field, click the copy icon to copy the invitation code.
5. On the endpoint, open FortiClient. On the Zero Trust Telemetry tab, paste the copied FortiSASE invitation code and
click Connect. The endpoint successfully establishes a zero trust telemetry connection with FortiSASE. Upon
connection, FortiClient receives an endpoint policy from FortiSASE. A system tray bubble message displays once
the download completes.
6. Go to Network > Managed Endpoints and click Managed Endpoints. Confirm the endpoint is visible in that view and
that the Management Connection is Online. If the endpoint reboots, it continues to establish its zero trust telemetry
connection with FortiSASE and receives an endpoint policy each time.
The Disable option within Management Connection is not equivalent to the Deregister button
in previous FortiSASE versions.
In previous versions, Deregister just disconnected the endpoint from FortiSASE and allowed
the possibility for the endpoint to remain managed and reregister with FortiSASE.
Currently, once you configure Management Connection > Disable for an endpoint, it is
permanently excluded from management. Namely, it is considered an unmanaged endpoint,
and cannot register with FortiSASE.
To allow an unmanaged endpoint to be managed by and register with FortiSASE, you must
select the endpoint and configure Management Connection > Enable.
1. Consider that the device has been managed and is registered to and connected to FortiSASE. Go to Network >
Managed Endpoints, click the Managed Endpoints view, and confirm the endpoint is visible there.
2. Select the endpoint, select Management Connection > Disable, and click OK to confirm. In FortiClient after the
telemetry sync timer elapses, the endpoint’s zero trust telemetry connection and the FortiSASE VPN connection
both disconnect after previously having been connected.
3. Confirm that the endpoint has disappeared from the Managed Endpoints view.
4. Go to Network > Managed Endpoints and click Unmanaged Endpoints. Confirm the endpoint is visible in that view.
5. Go to Configuration > Users and click Onboard Users.
6. Set FortiClient Installer to Download.
7. Under Manual Installer to the right of the Invitation Code field, click the copy icon to copy the invitation code.
8. On the endpoint, open FortiClient. On the Zero Trust Telemetry tab, paste the copied FortiSASE invitation code and
click Connect. The endpoint no longer successfully establishes its zero trust telemetry connection with FortiSASE
since you have excluded it from management.
9. If the endpoint reboots, repeat step 8. FortiClient attempts to connect to FortiSASE and never succeeds with
registering and receiving an endpoint policy each time. This confirms that the unmanaged endpoint has been
excluded from management as desired.
1. Consider that the device has been unmanaged and previously removed from management. Go to Network >
Managed Endpoints, click the Unmanaged Endpoints view and confirm the endpoint is visible there.
2. Select the endpoint, select Management Connection > Enable, and click OK to confirm.
You may want to view which applications have been installed on FortiSASE managed endpoints.
For managed endpoints, FortiClient sends the software inventory information to FortiSASE when it first registers to
FortiSASE. If software changes occur on the endpoint, such as installing new software, updating existing software, or
removing existing software, FortiClient sends an updated inventory to FortiSASE.
Based on this information sent by FortiClient, you can view the application inventory for FortiSASE managed endpoints
as follows:
l Go to Network > Managed Endpoints and select the Software Installations tab to view a global list of applications
installed on all endpoints.
l The Endpoint Count field displays the number of endpoints with the specific application installed.
l You can select an application and either click View Endpoints or right-click and select View Endpoints to view
which endpoints have the application installed.
l Go to Network > Managed Endpoints, select the Endpoints tab, select an endpoint, and either click View Endpoints
Details or right-click and select View Endpoint Details. From the Endpoint Details pane, click Installed Applications
to view a list of installed applications for the selected endpoint.
Each list includes details for each application such as vendor and version information.
The FortiGuard Endpoint Forensics Analysis service provides remote endpoint analysis to help you respond to and
recover from cyber incidents. You can request detailed analysis of the endpoint from the Forensics team if you observe
high-risk applications or traffic, malware, intrusion attempts, malicious emails, lateral movement, and so on, on that
endpoint. For each engagement, forensics analysts from Fortinet’s FortiGuard Labs remotely assist in collecting,
examining, and presenting digital evidence, including a final detailed report. See the FortiClient Forensic Service
datasheet.
FortiSASE supports requesting a new FortiGuard Forensics Analysis for a suspicious endpoint and viewing a summary
of analysis requests from Network > Managed Endpoints. You must complete a request form, download the Forensics
Analysis agent onto the endpoint, and run the agent.
The verdict along with a downloadable report are updated in FortiSASE within five business days. You can have a
maximum of five forensic analysis requests in progress at a given time.
Currently, the FortiGuard Forensics Analysis feature only supports Windows endpoints.
The endpoint must be connected to FortiSASE Endpoint Management Service and must be
online at the time that you submit a forensics analysis request.
Download Forensics Agent if you have not downloaded and installed it already along with the instructions for
installing the agent as step 7 describes. In the app header, you see a FortiGuard Forensic Analysis notification
indicating a service request has been initiated for the endpoint. Click View to open the Forensic Service portal,
which allows further communication between the administrator and the Forensics team.
9. Once the Forensics team completes the analysis, in the app header, you see a FortiGuard Forensic Analysis
notification indicating that the report is ready. Click Download to download the report.
To assist network administrators with troubleshooting remote user connectivity issues to common SaaS applications,
FortiSASE includes a digital experience monitoring (DEM) page accessible from Network > Digital Experience
Monitoring.
You can also add a Digital Experience Monitoring widget to Dashboards > Status.
To monitor end-to-end network performance from an endpoint to a FortiSASE PoP and to a SaaS application, see Digital
Experience on page 82.
To be configurable, the DEM feature requires either an Advanced remote users FortiSASE
license or a Comprehensive remote users FortiSASE license. See the FortiSASE Ordering
Guide.
Network > Digital Experience Monitoring displays a list of SaaS applications and health check metrics for first-mile
connectivity between the geographical points of presence (PoPs) provisioned for your FortiSASE instance and these
SaaS applications. An administrator can use this information to determine if remote user traffic is passing through a PoP
with ideal connectivity or with some ongoing connectivity issues.
Digital Experience Monitoring displays historic data that you can filter by the following durations:
l One hour (default)
l One day
l One week
l One month
l One year
You can also refresh data for the selected time duration.
You can view more details for each metric by hovering the mouse over a metric to display tooltips.
You can view more details for a specific SaaS application using one of these methods:
l Selecting an application and clicking Drill down
l Double-clicking an entry
l Right-clicking while an application is selected and selecting the drilldown option
The drilldown page provides more detail for the time duration selected in the form of charts and tables.
From the main or the drilldown page, you can perform the following operations:
l Best Fit Columns
l Reset Table
l Export displayed data to a file in CSV or JSON format
l Select Columns
DNS Settings
Remote users use the DNS Server setting in FortiSASE under Configuration > DNS to resolve hostnames for internal
and external domains.
l Implicit DNS rules have been predefined for VPN users and for secure web gateway and Thin-Edge users. These
users use these rules for resolving hostnames for external domains.
l You can create split DNS rules by clicking Create. These are used for resolving hostnames for internal domains.
See Split DNS Rules on page 96.
DNS, LDAP, and RADIUS servers must use public IP addresses or publicly accessible FQDNs
and may require some configuration or topology changes. See Network restrictions removed
on page 16.
By default, FortiSASE deployments use FortiGuard DNS as the default DNS server for implicit DNS rules. You can select
any implicit DNS rule and click Edit to change the default DNS server.
FortiGuard DNS servers do not support DNS over TCP. If you require DNS over TCP, edit
implicit DNS rules from the default FortiGuard DNS server to other DNS servers that support
DNS over TCP.
You can configure Default DNS Server with one of the following options, then click OK to save the change:
Use endpoints' system DNS Use the system DNS setting already IP addresses specific to
configured on the agent-based endpoints endpoints
Other DNS Use a public DNS server other than IP addresses specific to public
FortiGuard DNS DNS server
Custom Enable to specify your own custom primary Specify IP address of primary
and secondary DNS servers. and secondary DNS.
For example, you can edit the VPN implicit DNS rule to use a custom DNS server as follows:
1. Go to Configuration > DNS, select VPN Implicit DNS Rule, and click Edit.
2. In the Edit Implicit DNS Rule page, for Default DNS Server, select Other DNS.
3. From the DNS Server dropdown, select Custom.
4. In the Primary DNS Server and Secondary DNS Server fields, enter the respective IP addresses for the servers of
your choice.
5. Click OK.
Using FortiGuard DNS or another public DNS service is sufficient for most Secure Internet Access (SIA) use cases that
simply require remote users to resolve hostnames for external domains.
FortiSASE users often must resolve internal hostnames that public DNS servers cannot resolve in scenarios including
but not limited to:
l When agent-based users are located within the organization’s local network, also known as being on-net, and users
must use an internal DNS server instead of a public DNS server.
l When agent-based, agentless, or site-based FortiExtender users are located remotely, FortiSASE private access
has been configured with secure private access (SPA) hubs, and users must use an internal DNS server behind the
SPA hub.
To support these scenarios, you can configure FortiSASE DNS settings for split DNS using Split DNS Rules.
Split DNS works as follows:
l Selectively use an internal DNS server only when it is necessary to resolve hostnames for the specified internal
domain(s).
l Resolve all other hostnames for external domains using the implicit DNS rule.
Split DNS is more efficient than sending all DNS requests to internal DNS servers because it reduces any potential
latency and downtime with using internal DNS servers for resolving public hostnames if any issues arise with these
limited availability and limited resource internal DNS server deployments. For resolving hostnames for external domains,
split DNS leverages the redundancy, extensive resources, and geographical coverage of public DNS servers with
anycast capabilities.
For the scenario with on-net users who must use an internal DNS server to resolve hostnames
for the internal domain, configuring split DNS using an internal DNS server with a private IP
address and without an SPA hub configured in FortiSASE will yield inconsistent results. When
an SPA hub is not configured in FortiSASE, ensure that split DNS is configured using an
internal DNS server with a public IP address.
Split DNS supports using an internal DNS server with a private IP address only when an SPA
hub is configured in FortiSASE.
DNS, LDAP, and RADIUS servers must use public IP addresses or publicly accessible FQDNs
and may require some configuration or topology changes. See Network restrictions removed
on page 16.
To secure DNS requests, the DNS-over-HTTPS (DoH) protocol secures DNS requests and replies sent and received
over HTTPS and works with public DNS servers that support this protocol. DoH is enabled by default on modern web
browsers including Chrome, Edge, and Firefox and is supported by Google’s public DNS servers, which is the default for
upgraded FortiSASE deployments. Therefore, for split DNS rules to work with DNS servers that support DoH, SSL deep
inspection must be enabled for agent-based remote users on FortiSASE.
Prerequisites
Split DNS requires SSL deep inspection to be enabled on FortiSASE so that FortiSASE can intercept the DNS traffic.
l To confirm SSL deep inspection is enabled, go to Configuration > Security and under the SSL Inspection widget
ensure Deep Inspection is displayed.
l To enable SSL deep inspection, go to Configuration > Security and in the SSL Inspection widget click on Customize.
In the SSL Inspection pane, select Deep Inspection and click OK.
See Certificate and deep inspection modes on page 143 for further details on deep inspection.
With deep inspection enabled, FortiSASE proxies traffic from the client. While being proxied, connections using secure
protocols like HTTPS have their certificates replaced and signed by FortiSASE. To avoid seeing warnings and errors, the
client must trust the signing Certificate Authority (CA) and have a valid certificate chain back to the root CA. Therefore,
installing FortiSASE’s CA certificate on the client’s trusted certificate store is important.
FortiSASE supports automatically installing the FortiSASE CA certificate for agent-based users with FortiClient installed
on their endpoints.
The FortiSASE CA certificate must be manually installed on endpoints for agentless SWG users and site-based
FortiExtender users.
l For agentless SWG users, installing this CA certificate is already part of the SWG onboarding process.
l For endpoints using a site-based FortiExtender, installing this CA certificate is an additional step that must be
performed.
See Certificate installation on page 217 for installing the FortiSASE CA certificate. Although these steps are geared
toward onboarding SWG users, they also apply for site-based FortiExtender users.
Ensure that your FortiSASE remote users have access to the internal DNS server.
For the scenario with on-net users who must use an internal DNS server to resolve hostnames
for the internal domain, configuring split DNS using an internal DNS server with a private IP
address and without an SPA hub configured in FortiSASE will yield inconsistent results. When
an SPA hub is not configured in FortiSASE, ensure that split DNS is configured using an
internal DNS server with a public IP address.
Split DNS supports using an internal DNS server with a private IP address only when an SPA
hub is configured in FortiSASE.
DNS, LDAP, and RADIUS servers must use public IP addresses or publicly accessible FQDNs
and may require some configuration or topology changes. See Network restrictions removed
on page 16.
3. In the Create DNS Rule pane, enter the Primary DNS Server, (optional) Secondary DNS Server, and one or more
Domains. Click + to add more fields to enter in additional domains. Click OK.
4. Observe that the split DNS rule has been created and is displayed in the table.
If you are using split DNS to resolve local domains using an internal DNS server with an SPA
hub configured, then the Web Filter or DNS Filter blocks access to these local domains from
FortiClient remote users if the Newly Observed Domain category is set to Block in the
respective security component. In this case, you must create URL Filter entries for the Web
Filter or Domain Filter entries for the DNS Filter to allow access to these local domains.
If you are using split DNS to resolve local domains using an internal DNS server with an SPA
hub configured, to ensure access to the internal DNS server from FortiClient remote users you
must have a Private Access policy configured that allows DNS requests to that specific server.
Policies
You must associate any traffic going through FortiSASE with a policy. Policies control where the traffic goes, how
FortiSASE processes it, and whether or not FortiSASE allows it to pass through.
When a session is initiated through the VPN tunnel, FortiSASE analyzes the connection and performs a VPN policy
match. FortiSASE performs the match from top down and compares the session with the configured VPN policy
parameters. When there is a match and the action is Accept, FortiSASE applies the enabled security components to the
traffic. If the action is Deny, FortiSASE blocks the traffic from proceeding.
Allow-All Allows traffic for all services for all VPN users. You can edit and delete this VPN
policy.
Implicit Deny Denies access to traffic that does not match another configured VPN policy. You
cannot edit or delete this VPN policy.
With only these default VPN policies and no custom configurations, FortiSASE allows traffic to pass through the Allow-All
VPN policy, and applies the enabled security components for scanning and processing.
You can add multiple policies to perform granular firewall actions and inspection. This example configures a policy to
allow a set of remote users to access *.fortinet.com and blocks the same remote users from accessing all traffic to
*.netflix.com.
The following provides instructions for configuring the described policies. You may want to configure similar policies,
modifying settings based on your environment.
Configuring a policy to allow traffic from the thin-edge LAN to FortiSASE for SIA
To configure a policy to allow traffic from the thin-edge LAN to FortiSASE for SIA:
SWG Policies
You must associate any traffic going through FortiSASE with a policy. Secure web gateway (SWG) policies control
where the traffic goes, how FortiSASE processes it, and whether or not FortiSASE allows it to pass through.
When a user's client software, such as a web browser, proxies traffic through FortiSASE, FortiSASE analyzes the
connection and performs a SWG policy match. FortiSASE performs the match from top down and compares the session
with the configured policy parameters. When there is a match and the action is Accept, FortiSASE applies the enabled
security components to the traffic. If the action is Deny, FortiSASE blocks the traffic from proceeding.
You must first enable SWG configuration for the feature to be available in the GUI. See SWG Configuration on page 199.
DENY_BOTNET Denies traffic to known botnet C&C servers for all SWG users. You cannot edit or
delete this SWG policy.
Allow-All Allows traffic for all services for all SWG users. You can edit and delete this SWG
policy.
Implicit Deny Denies access to traffic that does not match another configured SWG policy. You
cannot edit or delete this SWG policy.
With only these default SWG policies and no custom configurations, FortiSASE blocks all traffic to known botnet
C&C servers, allows all other traffic to pass through the Allow-All SWG policy, and applies the enabled security
components for scanning and processing.
This example configures a secure web gateway (SWG) policy to block all SWG users from accessing all traffic to
*.netflix.com.
c. On the right pane, click Download SWG Certificates. You must distribute this certificate to end users to install
on their endpoints to avoid untrusted certificate errors.
2. Create the SWG-DenyNetflix SWG policy:
a. Go to Configuration > SWG Policies.
b. Click Create.
c. Configure the SWG-DenyNetflix SWG policy:
i. For User, select All SWG Users.
ii. In the Destination field, click Specify.
iii. On the Host tab, click Create.
iv. Select IPv4 Host. Configure the fields as follows:
Field Value
Field Value
v. Click OK.
vi. Select the newly created Netflix host.
vii. In the Service field, click +. On the Select Entries pane, select webSWG.
viii. Leave all other fields at their default values.
ix. Click OK.
3. In Configuration > SWG Policies, ensure that you order the policies so that the SWG-DenyNetflix policy is before the
Allow-All policy.
4. Distribute the URL in the System > SWG Configuration > Hosted PAC File field and the certificate downloaded from
Download SWG Certificates to end users.
5. The end user installs the certificate on their device.
6. The end user can configure SWG settings at the OS level or in a browser. Configuring SWG settings at the OS level
applies them to all installed browsers. The following gives instructions for configuring SWG settings at the OS level
on a Windows 10 device:
a. In Windows, go to Windows Settings > System > SWG Settings.
b. Enable Use setup script.
c. In the Script address field, enter the Hosted PAC File URL.
d. The next time the user starts a browser session, the browser displays an authentication prompt. The end user
enters their FortiSASE user credentials in the prompt. After ten minutes of inactivity, the browser reprompts for
authentication credentials.
When a session is initiated through the client browser, FortiSASE analyzes the connection and performs an SWG policy
match. FortiSASE performs the match from top down and compares the session with the configured SWG policy
parameters. For example, consider that an SWG user attempts to access www.netflix.com. FortiSASE attempts to
match the SWG-DenyNetflix policy, which matches. FortiSASE denies the user access to www.netflix.com.
Security
You can configure FortiSASE security components settings and view logs for each component in Security. FortiSASE
applies enabled security components to each Allow policy in Policies. You can configure some exemptions and
overrides for some security components.
Decrypting and inspecting content in encrypted traffic for these FortiSASE security features
requires deep inspection:
l Antivirus
l File Filter
Without deep inspection configured on FortiSASE and the corresponding certificate authority
(CA) certificate automatically installed on the endpoint with FortiClient, the aforementioned
features do not work as desired with encrypted traffic.
See Certificate and deep inspection modes on page 143.
You can create security profile groups, which allow you to group different security profile settings together. You can then
configure the profile group as part of a policy.
For example, consider the RemoteHomeOffice-AllowFortinet example policy from Adding policies to perform granular
firewall actions and inspection on page 100, which allows remote employees (members of the Remote-Home-Office
VPN user group) to access *.fortinet.com. Consider that you also want to monitor these employees' access to Cloud/IT
applications using Application Control With Inline-CASB, while disabling Application Control With Inline-CASB for all
other employees. You can achieve this by creating a new security profile group with the desired Application Control With
Inline-CASB settings, and configuring this profile group as part of the RemoteHomeOffice-AllowFortinet policy.
Application Control With Inline-CASB remains disabled for policies that have another security profile group applied.
The following provides for configuring the described scenario.
AntiVirus
An AntiVirus (AV) profile allows you to configure FortiSASE to apply AV protection to traffic matching the following
protocols:
l HTTP
l SMTP
l POP3
l IMAP
l FTP
l CIFS
AV inspection prevents potentially unwanted and malicious files from entering the network.
AV requires deep inspection to decrypt and inspect content in encrypted traffic. See Certificate
and deep inspection modes on page 143.
Intrusion prevention
Intrusion Prevention System (IPS) technology protects your network from cybercriminal attacks by actively seeking and
blocking external threats before they can reach potentially vulnerable network devices.
FortiSASE uses signature-based defense against known attacks or vulnerability exploits. These often involve an
attacker attempting to gain access to your network. The attacker must communicate with the host in an attempt to gain
access, and this communication includes commands or sequences of commands and variables. The IPS signatures
include these command sequences, allowing FortiSASE to detect and stop the attack.
The following table describes the IPS profiles that you can select in FortiSASE:
Protect client or server All (client and server) All (client and server) All (client and server)
traffic
Severity of the signatures All severity levels: l Low All severity levels:
l Info l Medium l Info
l High l High
l Critical l Critical
Action taken with traffic in Pass or drop matching l For signatures with Monitor, namely, pass or
which signatures are traffic, depending on the medium, high, and allow matching traffic while
detected signature default action, critical severity: block logging (monitoring) it.
which FortiGuard IPS or drop matching
determines traffic.
l For signatures with
low severity: pass or
drop matching traffic,
depending on the
signature default
action, which
FortiGuard IPS
determines
Profile Description
Recommended (default) Scans traffic for all known threats and applies the recommended action.
Monitor Scans traffic for threats but does not apply any action. Primarily used for
logging.
4. Click OK.
File Filter
File Filter allows you to block or monitor specific file types. Inspection is based on file type only, not on file content.
Deep inspection is required for File Filter to decrypt and inspect content in encrypted traffic.
See Certificate and deep inspection modes on page 143.
DLP
FortiSASE data loss prevention (DLP) prevents sensitive data from leaving or entering your network by defining various
sensitive data patterns, scanning for the patterns while inspecting traffic, and allowing, blocking, or logging only when
traffic matches the patterns.
DLP rules specify how to handle traffic when a sensor or a file type is triggered. Sensors detect specific content types
defined in dictionaries.
DLP is configured based on the following components:
Component Description
Data type Define the type of pattern within data or content that DLP tries to match. Currently, DLP supports
predefined types such as keyword, regular expressions, hex, credit card, and US social security
number.
Dictionary Data type entry collections. When selecting a data type such as keyword, regular expressions, or
hex, define the pattern that you are looking for.
Component Description
Sensor Define which dictionaries to check. You can match any dictionary or all dictionaries., or a special
logical combination of the dictionaries. It can also count the number of dictionary matches to trigger
the sensor.
File pattern Define file pattern groups based on predefined file types or define your own pattern to match the file
name.
Rule Define rules for matching a sensor based on a file type or a message, and the protocol type being
used. It also allows you to choose the action to allow, block, or log only.
DLP requires deep inspection to decrypt and inspect content in encrypted traffic. See
Certificate and deep inspection modes on page 143.
Field Description
Sensors Select DLP sensors. You must create a new DLP sensor and then select it.
Severity Select the severity or threat level that matches this filter.
Action Action to take with content that this DLP profile matches.
Type Select whether to check the content of messages (an email message) or
files (downloaded files or email attachments).
Field Description
File type Select the number of a DLP file pattern table to match. You can either
select a predefined file pattern table or create a new one by clicking + in the
dropdown list.
Field Description
Entry matches needed to Logic used to apply to sensor entry matches to trigger sensor:
trigger sensor l All: logical AND condition on matching entries
Field Description
Dictionary Select the dictionary for this sensor entry. You must create a new
dictionary and then select it.
f. Create a dictionary:
i. Click the Dictionary field and click +Create to create a new DLP dictionary.
ii. In the New DLP Dictionary slide-in, configure these settings:
Field Description
Entry matches needed to Logic used to apply to dictionary entry matches to trigger sensor:
trigger sensor l All: logical AND condition on matching entries
Field Description
Type Select a predefined DLP Data Type from the dropdown list.
Repeat Enable or disable repeat matching of the selected DLP Data Type.
Repeat any aforementioned step to create multiple entries for these settings:
l Dictionary entries
l DLP dictionaries
l Sensor entries
l Sensors
l DLP rules
This configuration will block HTTPS upload traffic that includes credit card information. The pre-defined data type for
credit card is used in the dictionary.
To configure blocking HTTPS upload traffic that includes credit card information:
3. Disable all enabled security features (AntiVirus, Web Filter with Inline-CASB, Intrusion Prevention, DNS Filter,
Application Control With Inline-CASB) using these steps for each security feature:
a. Click the toggle button next to the security feature widget to disable the feature.
b. Click OK to confirm disabling the security feature.
4. In the SSL Inspection widget ensure deep inspection is enabled:
a. For SSL inspection, click Customize:
b. Select Deep Inspection.
c. Click OK.
5. Enable Data Loss Prevention (DLP).
6. Create a DLP rule:
a. In the Data Loss Prevention (DLP) widget, click Customize.
b. In the DLP slide-in, click Create to create a new DLP rule.
c. In the New Rule slide-in, configure these settings:
Field Value
Name dlp-case-1
Sensors Select DLP sensors. You must create a new DLP sensor and then select it.
Severity Medium
Action Block
Type File
Field Value
Name sensor-case-1
Field Value
ID 1
Field Value
Dictionary Select the dictionary for this sensor entry. You must create a new
dictionary and then select it.
Status Enabled
f. Create a dictionary:
i. Click the Dictionary field and click +Create to create a new DLP dictionary.
ii. In the New DLP Dictionary slide-in, configure these settings:
Field Value
Name dl-case-1
Field Value
Type credit-card
Repeat Disable
Status Enabled
Field Value
Name Test-DLP-1
Field Value
Service ALL
Action Accept
Status Enable
c. Click OK.
8. Drag the Test-DLP-1 to the top of the policy list. Ensure it is placed above Allow-All.
To verify blocking HTTPS upload traffic that includes credit card information is working:
1. Ensure that your endpoint with FortiClient installed is registered with FortiSASE Endpoint Management Service and
that you have established a secure connection to FortiSASE.
2. On the connected endpoint, open the Chrome web browser in incognito mode.
3. In the web browser, go to https://dlptest.com/sample-data/. Copy one of the credit card numbers from the page and
paste it into a Word document. Save the document in .DOC format to your endpoint local drive as cc-test.doc.
4. Go to https://dlptest.com/https-post/. Under File Upload, select the .DOC file created and click Submit. Since HTTP
POST traffic for the PDF file upload includes a credit card number, FortiSASE blocks the file and generates a DLP
log.
5. In FortiSASE, go to Analytics > Security > Data Loss Prevention (DLP) and confirm that FortiSASE generated a
DLP block log entry that corresponds to your VPN user and cc-test.doc filename.
This configuration blocks HTTPS upload traffic to the OpenAI ChatGPT application that includes a sensitive keyword.
The predefined data type, keyword, is used in the DLP dictionary.
This example enables Application Control With Inline-CASB and configures it to block QUIC
so that the OpenAI server uses TLS 1.3 instead of QUIC. FortiSASE can inspect TLS 1.3
traffic using SSL deep inspection.
You must enable Intrusion Prevention for Internet access traffic because Application Control
With Inline-CASB features require it to be enabled.
Field Value
Name chatgpt
Sensors Select DLP sensors. You must create a new DLP sensor and then select it.
Field Value
Severity Critical
Action Block
Type Message
Protocol HTTP-POST
Field Value
Name chatgpt
Field Value
ID 1
Dictionary Select the dictionary for this sensor entry. You must create a new
dictionary and then select it.
Status Enabled
f. Create a dictionary:
i. Click the Dictionary field and click +Create to create a new DLP dictionary.
ii. In the New DLP Dictionary slide-in, configure these settings:
Field Value
Name chatgpt
g. Create a dictionary entry with the fortinet keyword by doing the following:
i. Create a new dictionary entry by clicking +Create.
ii. In the New Entry slide-in, configure these settings:
Field Value
Type keyword
Pattern fortinet
Repeat Disable
Status Enabled
The configuration enables Case sensitive to enable ignoring letter case when pattern matching.
h. Create a dictionary entry with the source code keyword by doing the following:
i. Create a new dictionary entry by clicking +Create.
ii. In the New Entry slide-in, configure these settings:
Field Value
Type keyword
Repeat Disable
Status Enabled
The configuration enables Case sensitive to enable ignoring letter case when pattern matching.
i. Click OK several times to complete the customization:
i. Click OK to create the new dictionary entry.
ii. Click OK to create the DLP dictionary. Click OK when prompted to select the newly created dictionary.
iii. Click OK to create the new sensor entry.
iv. Click OK to create the new sensor. Click OK when prompted to select the newly created sensor. Click
Close.
v. Click OK to create the new DLP rule.
vi. Click OK to complete DLP configuration customization.
9. Configure the updated profile group in a policy:
a. Go to Configuration > Policies.
b. Configure a new policy with these settings:
Field Value
Name ChatGPT
Destination Specify:
1. Click +.
Field Value
2. In the Select Entries slide-in, click + and create new + IPv4 Host.
3. In the New Host slide-in, configure these settings:
a. Location: Unspecified
b. Name: OpenAI
c. Type: FQDN
d. FQDN: chat.openai.com
4. Click OK to create the new host.
5. Click OK when prompted to select the newly created host.
6. Click Close.
Service ALL
Action Accept
Status Enable
c. Click OK.
10. Drag the ChatGPT policy to the top of the policy list. Ensure it is placed above Allow-All.
To verify blocking HTTPS upload traffic that includes sensitive keywords is working:
1. Ensure that your endpoint with FortiClient installed is registered with FortiSASE Endpoint Management Service and
that you have established a secure connection to FortiSASE.
2. On the connected endpoint, open the Chrome web browser in incognito mode.
3. In the web browser, go to https://chat.openai.com.
4. Search for any phrase that includes the keywords set up in the DLP dictionary. Since the phrase in HTTP POST
traffic includes both sensitive keywords, FortiSASE blocks this traffic to OpenAI and generates a DLP log. Verify the
request fails in ChatGPT and an error is generated.
5. In FortiSASE, go to Analytics > Security > Data Loss Prevention (DLP) and confirm that FortiSASE generated a
DLP block log entry that corresponds to your VPN user and visiting https://chat.openai.com.
6. Go to Analytics > Security > Traffic > Internet Access Traffic and confirm that FortiSASE generated a DLP block log
entry that corresponds to your VPN user and visiting https://chat.openai.com.
Web Filter
Web filter restricts or controls user access to web resources. In FortiSASE, there are three main components of Web
Filter:
Component Description
URL Category Provides categories from the FortiGuard Web Filter service that you can use to
filter web traffic.
URL Filter Uses specific URLs with patterns containing text and regular expressions so
FortiSASE can process the traffic based on the filter action (exempt, block, allow,
monitor) and webpages that match the criteria.
Content Filter Blocks or exempts webpages containing words or patterns that you specify.
Additionally, in HTTPS connections, since the HTTP payload is encrypted, the
default certificate inspection cannot inspect the traffic. To apply content filter on
HTTPS traffic, you must use SSL deep inspection. See Certificate and deep
inspection modes on page 143.
These components interact with each other to provide maximum control over what users on your network can view and
protect your network from many Internet content threats.
FortiSASE applies web filters in the following order:
1. URL Filter
2. URL Category
3. Content Filter
In FortiSASE, there is one global Web Filter configuration that applies to all users.
FortiSASE supports these Web Filter options:
Option Description
Block Invalid URLs Block websites when their SSL certificate CN field does not contain a valid
domain name.
This option also blocks URLs that contains spaces. If there is a space in the URL,
it must be written as %20 in the URL path.
Allow websites when a rating Allow access to websites that return a rating error from the FortiGuard Web Filter
error occurs service.
Enforce 'Safe Search' on Google, This setting applies to popular search sites and prevents explicit websites and
Yahoo!, Bing, Yandex images from appearing in search results.
The supported search sites are Google, Yahoo, Bing, and Yandex.
To enforce safe search, you must use SSL deep inspection. See Certificate and
deep inspection modes on page 143.
Restricting web usage using FortiGuard URL categories and URL filter
To restrict web usage using FortiGuard URL categories and URL filter:
Type Description
Allow Passes the traffic to the remaining web filters, antivirus inspection engine, and
DLP inspection engine. If the URL does not appear in the URL list, FortiSASE
allows the traffic.
Monitor Processes the traffic the same way as the Allow action. For the Monitor action,
FortiSASE generates a log message each time it establishes a matching traffic
pattern.
Block Denies or blocks attempts to access any URL that belongs to the category. A
replacement message displays.
Type Description
Simple Tries to strictly match the full context. For example, if you enter
www.facebook.com in the URL field, it only matches traffic with
www.facebook.com. It does not match facebook.com or
message.facebook.com. When FortiSASE finds a match, it performs the
selected URL action.
Wildcard Tries to match the pattern based on the rules of wildcards. For example, if
you enter *fa* in the URL field, it matches all the content that has fa such as
www.facebook.com, message.facebook.com, fast.com, and so on. When
FortiSASE finds a match, it performs the selected URL action.
RegExp Tries to match the pattern based on the rules of regular expressions. When
FortiSASE finds a match, it performs the selected URL action.
Type Description
Allow Passes the traffic to the remaining web filters, antivirus inspection engine,
and DLP inspection engine. If the URL does not appear in the URL list,
FortiSASE allows the traffic.
Block Denies or blocks attempts to access any URL that matches the URL
pattern. A replacement message displays.
Exempt Allows the traffic to pass through, bypassing other web filters, antivirus
inspection engine, and DLP inspection engine.
Monitor Processes the traffic the same way as the Allow action. For the Monitor
action, FortiSASE generates a log message each time it establishes a
matching traffic pattern.
Restricting web usage using content filter for HTTPS pages requires enabling SSL deep inspection. See Certificate and
deep inspection modes on page 143.
Type Description
Wildcard Blocks or exempts one word or text strings of up to 80 characters. You can
also use wildcard symbols such as ? or * to represent one or more characters.
For example, a wildcard expression forti*.com matches fortinet.com and
fortiguard.com. The * represents any character appearing any number of
times.
RegExp Blocks or exempts patterns of regular expressions that use some of the same
symbols as wildcard expressions, but for different purposes. In regular
expressions, * represents the character before the symbol. For example,
forti*.com matches fortiii.com but not fortinet.com or fortiice.com. In this case,
the symbol * represents i appearing any number of times.
Type Description
Exempt Allows the traffic to pass through, bypassing other content filters, antivirus
inspection engine, and DLP inspection engine.
Block Denies or blocks attempts to access any URL that matches the URL pattern. A
replacement message displays.
Web rating overrides allow you to add specific URLs to custom web ratings categories.
In a web filter profile, you can configure the action for each category. See Restricting web usage using FortiGuard URL
categories and URL filter on page 121 for details. If a URL is in multiple categories, custom categories take precedence
over FortiGuard categories.
For example, consider that you add www.gambling.com is added to a custom category and set the custom category
action to Block. The default action for the FortiGuard Gambling category is Monitor. When a user browses to
www.gambling.com, the custom category action takes precedence over the FortiGuard category, so access to
www.gambling.com is blocked.
To enforce safe search, you must use SSL deep inspection. See Certificate and deep
inspection modes on page 143.
For individual search engine safe search specifications, refer to the documentation for Google,
Yahoo, Bing, and Yandex.
Safe search is still enforced from FortiSASE even if the individual search engine allows you to
disable safe search from their search engine interface.
In the examples below, safe search was disabled for each of the individual search engines
(except for Google which does not allow any modification).
b. If you click on SafeSearch, then you will see the following message:
2. Go to a web browser, browse to Yahoo, perform a search, and observe that search results matching safe search
criteria are blocked:
3. Go to a web browser, browse to Bing, perform a search, and observe that search results matching safe search
criteria are blocked:
4. Go to a web browser, browse to Yandex, perform a search, and observe that search results matching safe search
criteria are blocked:
The FortiSASE Web Filter with Inline-CASB security component can be used to customize headers when agentless
(SWG) or agent-based (FortiClient) remote users are accessing SaaS applications. When configured, FortiSASE
intercepts HTTP headers and can modify them for outgoing traffic as follows:
l Add to request
l Add to response
l Remove from request
l Remove from response
The process of intercepting and customizing HTTP headers is also commonly known as HTTP header insertion.
By customizing HTTP headers for FortiSASE outgoing traffic destined for SaaS applications, the Web Filter with Inline-
CASB can control SaaS application behaviour. Typically, customizing headers, namely, adding to request headers for
access requests to SaaS applications is used to implement restricting tenants’ access.
Prerequisites
Customizing HTTP headers using the Web Filter with Inline-CASB requires SSL deep inspection to be enabled on
FortiSASE so that FortiSASE can intercept HTTP headers and add/remove to header requests/responses, as required
by the SaaS application.
l To confirm SSL deep inspection is enabled, go to Configuration > Security and under the SSL Inspection widget,
ensure that Deep Inspection displays.
l To enable SSL deep inspection, go to Configuration > Security and in the SSL Inspection widget, click Customize,
and in the SSL Inspection slide-in, select Deep Inspection and click OK.
If you do not enable deep inspection, you see the following warnings:
l Under Configuration > Security in the Web Filter With Inline-CASB widget, you see a caution icon and when
hovering over the tooltip, you see a warning message with a link to the Deep Inspection page.
l When clicking on Customize in the Web Filter With Inline-CASB widget and selecting the Inline-CASB Headers tab,
you see a warning message with a link to the Deep Inspection page.
See Certificate and deep inspection modes on page 143.
You must know the format and content of vendor-specific headers supported by a SaaS application to use with the Web
Filter with Inline-CASB.
For more information on the specific headers used for restricted SaaS access, see SaaS vendor-specific documentation:
Currently, all configured headers are added to outgoing FortiSASE traffic for agentless (SWG)
remote users. Therefore, for this scenario, ensure you configure headers carefully considering
their global scope to ensure they do not overlap or result in duplicate behaviour.
Large organizations may want to restrict SaaS access to resources like Microsoft Office 365, Google Workspace, and
Slack by tenant to block non-company login attempts and secure the users from accessing non-approved cloud
resources. Many cloud vendors enable this by applying tenant restrictions for access control. For example, users
accessing Microsoft 365 applications with tenant restrictions through the corporate proxy will only be allowed to log in as
the company’s tenant and access the organization’s applications.
Typically, access requests from clients pass through a security device or service, in this case FortiSASE, which inserts
headers to notify the SaaS service to apply tenant restrictions with the permitted tenant list. Users are redirected the
SaaS service login page and are only allowed to log in if they belong to the permitted tenant list.
To customize headers for Office 365 tenant restriction, Google Workspace account access control, and
Slack-approved workspaces for current network:
Ensure that you have reviewed Prerequisites on page 127 and have them in place before
proceeding to customize headers to ensure proper functionality.
d. Set the Destination. This is an address object or address group containing domains that the service provider
specifies.
l For SWG agentless remote users, go to Configuration > SWG Policies and do one of the following:
l Create a new SWG policy and select the security profile group.
l Edit an existing SWG policy and select the security profile group.
For details on security profile groups and configuring them in policies, see Security profile groups on page 106.
The following tables list the vendor-specific headers that you must configure in the inline-CASB headers page:
For proper functioning of Microsoft Office 365 tenant restrictions, you must include the tenant
ID in addition to the domains in a comma-separated list configured for Restrict-Access-
To-Tenants.
Google Workspace
Slack
Example header
Header name Header content Action Destination
content
Example header
Header name Header content Action Destination
content
Enterprise Grid
account
of *.slack.com
X-Slack-Allowed- Organization IDs or
yyyyyy
Workspaces workspace ID
You must manually create a new address object called wildcard.slack.com containing the FQDN of *.slack.com via the
Create button when in the Select Entries slide-in resulting from clicking the Destination in the Inline-CASB Header slide-
in.
Due to vendors' changing requirements, these settings may no longer comply with the vendors' official guidelines. See
the vendor documentation in SaaS vendor-specific headers on page 127.
This example creates inline-CASB headers in FortiSASE to control permissions for Microsoft Office 365 to allow
corporate domains and deny personal accounts, such as Hotmail and Outlook, that a user accesses through
login.live.com.
l For a SWG agentless remote user, the traffic will match a SWG policy.
If this is the first time the user has attempted to access the Internet, then the user must enter valid credentials
for the SSO authentication prompt.
l The Web Filter with Inline-CASB adds new headers to the customer tenant, indicating the allowed domain and
restricted access for personal accounts. Next, FortiSASE starts a new connection with the Microsoft Office 365
domain controller including the new headers.
l The Microsoft Office 365 domain controller assesses this data and will allow or deny this access, then sends a reply
to FortiSASE.
l FortiSASE sends a reply to the client.
FortiSASE Web Filter with Inline-CASB will only indicate the correct domains to be allowed or denied through the
headers to Microsoft. The custom sign-in portal in the browser is generated by Microsoft.
The Restrict-Access-To-Tenants and Restrict-Access-Context headers are inserted for incoming requests
to: login.microsoftonline.com, login.microsoft.com, and login.windows.net, which are part of the Microsoft Office 365
address group.
To restrict access to personal accounts using the login.live.com domain, the sec-Restrict-Tenant-Access-
Policy header is inserted and uses restrict-msa as the header content.
Before configuring FortiSASE, collect the information related to the company domain in the Office 365 contract:
For proper functioning of Microsoft Office 365 tenant restrictions, you must include the tenant
ID in addition to the domains in a comma-separated list configured for Restrict-Access-
To-Tenants.
Following is an example of completed configuration in the Inline-CASB Headers tab within the Web Filter with Inline-
CASB slide-in:
This section outlines the steps for testing the access with a client using a SWG agentless remote user. The steps are
similar with a client using a FortiClient agent-based remote user.
1. Get a client to log in with their corporate email using the login.microsoftonline.com domain.
4. After the client enters their credentials, a message appears that they cannot access this resource because by the
cross-tenant access policy restricts it.
5. Try to log in using another corporate email with Microsoft 365 access that is from a domain not allowed on this
tenant and observe the message about external access being blocked by policy.
1. In FortiSASE, go to Analytics > Security > Web Filter With Inline-CASB to view the corresponding logs.
2. Right-click a table heading and add Change Headers to make HTTP headers visible.
3. Drag and drop the Change Headers heading to the left to make it easy to see without scrolling.
4. Click a log entry of interest and click Details to drill down to see details.
DNS Filter
You can apply DNS category filtering to control user access to web resources. DNS filtering has the following features:
Feature Description
Feature Description
Botnet C&C domain blocking Blocks the DNS request for the known
botnet C&C domains. FortiGuard
continually updates the botnet C&C domain
list. The botnet C&C domain blocking
feature can block the botnet website access
at the DNS name resolving stage. This
provides additional protection for your
network.
Feature Description
Options Redirect botnet C&C requests to FortiGuard Service continually updates the
Block Portal botnet C&C domain list. The botnet C&C
domain blocking feature can block the
botnet website access at the DNS name
resolving stage.
Log all DNS queries and Enable to log all domains visited (detailed
responses DNS logging).
Allow DNS requests when a rating Enable to allow all domains when
error occurs FortiGuard DNS servers fail, or they are
unreachable from FortiSASE. When this
happens, a log message is recorded in the
DNS logs by default.
For individual search engine safe search specifications, refer to the documentation for Google,
Bing, and YouTube.
c. If desired, click Manage Categories. Select the desired category, then click Edit. You can enable and configure
the Threat Level for the category. You must configure a threat level for this category to appear in FortiView
Threats after the DNS filter blocks it.
5. To configure domain filter, do the following:
a. Click Create under Domain Filter.
b. Enter a domain, and select a Type and Action.
c. Click OK. The example has configured three domain filters:
8. Click OK.
To enforce safe search, you must use SSL deep inspection. See Certificate and deep
inspection modes on page 143.
For individual search engine safe search specifications, refer to the documentation for Google,
Bing, and YouTube.
You can use a tool such as dig or nslookup to demonstrate that the domain lookup for a search site has been replaced by
its safe search equivalent site.
1. On a Windows endpoint in the Windows Command Prompt, run nslookup for Google and observe the following
output:
nslookup google.com
...
Non-authoritative answer:
Name: forcesafesearch.google.com
Addresses: 2001:4860:4802:32::78
216.239.38.120
Aliases: google.com
2. On a Windows endpoint in the Windows Command Prompt, run nslookup for Bing and observe the following output:
nslookup bing.ca
...
Non-authoritative answer:
Name: strict.bing.com
Address: 204.79.197.220
Aliases: bing.ca
3. On a Windows endpoint in the Windows Command Prompt, run nslookup for YouTube and observe the following
output:
nslookup youtube.com
...
Non-authoritative answer:
Name: restrict.youtube.com
Addresses: 2001:4860:4802:32::78
216.239.38.120
Aliases: youtube.com
FortiSASE can recognize network traffic that a large number of applications generate. Application Control With Inline-
cloud access security broker (Inline-CASB) uses Intrusion Prevention System (IPS) protocol decoders that can analyze
network traffic to detect application traffic, even if the traffic uses non-standard ports or protocols. Application Control
With Inline-CASB supports traffic detection using the HTTP protocol (versions 1.0, 1.1, and 2.0).
FortiSASE uses Application Control, IPS, and SSL deep inspection to act as an Inline-CASB by providing access control
to software-as-a-service (SaaS) cloud application traffic. A CASB sits between users and their cloud service to enforce
security policies as they access cloud-based resources.
You must enable Intrusion Prevention for Internet access traffic because Application Control
With Inline-CASB features require it to be enabled.
Type Description
Allow Passes the traffic to the web filters, antivirus inspection engine, and DLP
inspection engine.
Monitor Processes the traffic the same way as the Allow action. For the Monitor action,
FortiSASE generates a log message each time it establishes a matching traffic
pattern.
Type Description
Block Denies or blocks attempts to access any application that belongs to the
category. A replacement message displays.
8. In Application Overrides, you can configure actions for individual applications, overriding the action configured for
their category. Click Create. Select the desired action from the dropdown list in the upper left corner, select the
desired applications, then click OK. You can search for the desired applications, and filter the list to show only cloud
applications. The Application Overrides pane denotes cloud applications with a cloud icon, such as for the
YouTube_Category.Control application in the following screenshot. The following example allows the Video/Audio
category, and blocks YouTube.
9. Click OK.
When the user attempts to access YouTube under these settings, they see the following message in their browser.
You can view data for cloud application access attempts in Dashboards > FortiView Cloud Applications.
SSL Inspection
Secure sockets layer (SSL) inspection allows FortiSASE to inspect the SSL/TLS layer during certificate inspection and
upper layers during deep inspection. This enables FortiSASE to filter and protect secured traffic that the various security
profiles have processed. SSL inspection not only protects traffic over HTTPS, but also from other commonly used
encrypted protocols such as SMTPS, POP3S, IMAPS, and FTPS. FortiSASE supports two types of SSL inspection.
These FortiSASE features require deep inspection to decrypt and inspect content in encrypted
traffic:
l Split DNS
l Antivirus
l File Filter
Without deep inspection configured on FortiSASE and the corresponding certificate authority
(CA) certificate automatically installed on the endpoint with FortiClient, the aforementioned
features do not work as desired with encrypted traffic.
You can configure FortiSASE SSL inspection to use certificate or deep inspection.
Mode Description
Certificate inspection FortiSASE inspects only the header information up to the SSL/TLS layer.
Certificate inspection verifies the web server identities by analyzing the SSL/TLS
negotiations by looking at the server certificate and TLS connection parameters.
Therefore web filter can perform FortiGuard category web filtering, URL filtering,
and other filtering that does not require looking at the payload when you enable
certificate inspection.
Deep inspection FortiSASE decrypts and inspects the content to find and block threats. It then
reencrypts the content and sends it to the real recipient. You can configure
exemptions for deep inspection.
While HTTPS offers protection on the Internet by applying SSL encryption to web
traffic, malicious traffic can also use SSL encryption to get around your network's
normal defenses.
For example, you may download a file containing a virus during an e-commerce
session or receive a phishing email containing a seemingly harmless download
that, when launched, creates an encrypted session to a command and control
(C&C) server and downloads malware onto your computer. You can use SSL
inspection to protect the infiltration by scanning for malicious content in your
HTTPS web traffic or identifying phishing content in encrypted mail exchanges.
SSL inspection can also defend against the exfiltration process while an infected
host calls home to a C&C server or leaks company secrets over encrypted
sessions.
When you use deep inspection, FortiSASE serves as the intermediary to connect
to the SSL server. It decrypts and inspect the content to find threats and block
them. The recipient is presented with the FortiSASE certificate or a custom
certificate instead of the real server certificate. FortiClient receives the certificate
automatically and endpoint users do not see any certificate browser warnings.
In some scenarios, you may not want to perform SSL deep inspection and simply choose to trust the connections or the
user initiating the connections. For example, for banking-related traffic, most end users do not want deep inspection
applied out of privacy reasons. Similarly, traffic related to personal health and wellness may contain personal information
that is too sensitive to scan. As such, when defining deep inspection, FortiSASE exempts the Finance and Banking and
Health and Wellness categories by default.
In other cases, a user or user group may need to access websites without deep inspection. Exempting the user prevents
their connections from SSL deep inspection scanning altogether.
By default, you can download the certificate authority (CA) certificate of the FortiSASE CA, Fortinet_CA_SSL, who signs
the certificate used in encrypting SSL connections when performing deep inspection. If desired, you can upload a
custom CA certificate and key to perform deep inspection.
Blocking QUIC
To ensure security features requiring SSL deep inspection work with HTTP3 traffic, you can manually block QUIC (UDP
443) traffic to ensure fallback from QUIC to TLS 1.3 occurs.
In FortiSASE, for VPN remote users, you can block QUIC traffic by creating a new service and creating a new policy that
blocks this service.
For SWG users, on the endpoint, you can block QUIC traffic by disabling the corresponding web browser setting.
To block QUIC for VPN remote users using a service and policy:
Field Value
Name QUIC
4. Click OK.
5. Create a policy using the QUIC service by going to Configuration > Policies:
a. Click +Create.
b. In the New Policy page, configure these settings:
Field Value
Service Click +
Select QUIC under Web Access.
Click Close.
Action Deny
Status Enable
c. Click OK.
6. Drag the newly created policy to the top of the policy list.
On the endpoint machine, go to the web browser settings and disable QUIC as follows:
Browser Action
Google Chrome In the address bar, enter chrome://flags#enable-quic, and set experimental QUIC
protocol to Disabled.
Mozilla Firefox In the address bar, enter about:config, search for network.http.http3.enabled and
set it to false.
Microsoft Edge In the address bar, enter edge://flags/#enable-quic, and set experimental QUIC
protocol to Disabled.
After you have implemented one of the aforementioned approaches to block QUIC traffic, confirm it works as follows:
1. On an endpoint machine, open a web browser. For this example, Google Chrome is used.
2. Go to https://quic.nginx.org/. If QUIC traffic is blocked, you should see the following web site result:
Feeds
You can configure feeds, also known as threat feeds, on FortiSASE to dynamically import an external list from an
HTTP/HTTPS server hosted in the form of a plain text file. The imported list is then available as a threat feed and you can
use it to enforce special security requirements, such as long-term policies to always allow or block access to certain
websites or short-term requirements to block access to known compromised locations. The threat feeds are dynamically
synchronized and updated periodically at the configured refresh rate so that any changes in entries of external list are
immediately imported to FortiSASE.
FortiSASE supports the following threat feed types:
Consider the following file format requirements for an external resources files:
l In plain text format with each URL list, IP address, and domain name occupying one line.
l Limited to 10 MB or 128 × 1024 (131072) entries, whichever limit is hit first.
l There is no duplicated entry validation for the external resources file (entry inside each file or inside different files).
l If the number of entries exceeds the limit, FortiSASE does not load additional entries beyond the threshold.
You can set the external resources update period by configuring Refresh rate.
FortiClient blocks IPv6 traffic and it does not traverse through the FortiSASE tunnel. Threat
feeds only support listing IPv6 addresses for threat feed interoperability with different devices,
but FortiSASE does not support IPv6 traffic traversal.
You can configure a maximum of 20 threat feeds of the same or different types. Depending on their type, you can use
threat feeds to configure traffic or secure web gateway policies, DNS filter, or Web Filter to allow or deny access to
network resources that the information retrieved from the feed specifies.
To configure a feed:
Field Value
Refresh rate Enter a value from 1 to 43200 in minutes as per your requirement.
URI Select a protocol for FortiSASE to use to access the threat feed:
l http://
l https://
HTTP basic authentication (Optional) Enable or disable basic HTTP authentication. When enabled, enter
the username and password in the requisite fields.
Block in Threat Feed Deny Available for threat hosts feed. When you enable this option, FortiSASE
policy automatically adds this feed in the Destination field for the default Threat Feed
Deny policy blocking access for secure Internet access traffic.
Field Value
Block in default internet access Available for DNS filter domains and Web filter FQDNs feed. When you enable
profile group this option, FortiSASE automatically adds this feed with an Action of Block in
the default Internet access profile group.
You can use a threat host feed as the source or destination for a traffic or secure web gateway policy for secure Internet
access (SIA) and secure private access traffic (SPA).
1. Do one of the following:
l Go to Configuration > Policies.
You can use a DNS filter domain feed as a domain feed category in DNS Filter.
1. Go to Configuration > Security. Select the appropriate Profile Group from the dropdown in the top right corner.
2. Go to DNS Filter and click Customize.
3. In the slide in, a Domain feeds category appears under FortiGuard Category Based Filter, which shows all the
configured DNS filter domain feeds. Click the required DNS filter domain feed and select the appropriate action:
4. Click OK.
5. Do one of the following under Internet Access (SIA) or Private Access (SPA):
l For agent-based users, go to Configuration > Policies.
You can use a web filter FQDN feed as a web filter FQDN feed category.
1. Go to Configuration > Security. Select the appropriate Profile Group from the dropdown in the top right corner.
2. Go to Web Filter With Inline-CASB and click Customize.
3. In the slide in, a FQDN feeds category appears under FortiGuard Category Based Filter, which shows all the
configured Web filter FQDN feeds. Click the required FQDN feed and select the appropriate action:
Action Description
Warning Display a message to the user allowing them to continue if they choose.
Disable Remove the category from the from the web filter profile.
This option is only available for local or remote categories from the right-
click menu.
4. Click OK.
5. Do one of the following under Internet Access (SIA) or Private Access (SPA):
l For agent-based users, go to Configuration > Policies.
In Authentication Sources and Access, you can control network access for different users and devices in your network.
FortiSASE authentication controls system access by user group. By assigning individual users to the appropriate user
groups, you can control each user’s access to network resources. You can define local and remote users in FortiSASE.
You can also integrate user accounts on remote authentication servers and connect them to FortiSASE.
The following summarizes the provisioning process for different user types on FortiSASE:
LDAP Configure remote users over LDAP to easily integrate FortiSASE with a Windows
Active Directory (AD) server or another LDAP server. You can invite users in one
of the following ways:
l Define an individual user and send the invitation to them directly
l Create a user group and send the invitation using the Onboard Users button
See Configuring FortiSASE with an LDAP server for remote user authentication in
endpoint mode on page 151.
See Configuring FortiSASE with an LDAP server for remote user authentication in
SWG mode on page 154.
RADIUS Configure remote authentication with a RADIUS server. You can allow all users
from the IdP or define a group in Configuration > Users. Send the invitation code
to users using the Onboard Users button. See Configuring FortiSASE with
a RADIUS server for remote user authentication on page 158.
Single sign on (SSO) Configure an SSO connection with an authentication server such as Entra ID or
Okta, where Entra ID or Okta is the identity provider (IdP) and FortiSASE is the
service provider (SP). You can allow all users from the IdP or define a group in
Configuration > Users. Send the invitation code to users using the Onboard Users
button. See:
l Configuring FortiSASE with Entra ID SSO in endpoint mode on page 160
on page 164
l Configuring FortiSASE with Okta SSO on page 165.
Local Define user in Configuration > Users and send invitation to them directly. See
Users on page 180.
DNS, LDAP, and RADIUS servers must use public IP addresses or publicly accessible FQDNs
and may require some configuration or topology changes. See Network restrictions removed
on page 16.
The FortiSASE Endpoint Management Service does not support importing LDAP subdomains
if you have already imported the LDAP parent domain previously into it.
The Onboard Users button, which is available from the Remote User Management widget on the Status dashboard,
allows you to send an email to users to invite them to FortiSASE. They can register their FortiClient to FortiClient Cloud
by using the instructions in the invitation email. You must still provision users via one of the aforementioned methods to
give them access to VPN and other FortiSASE resources.
Configuring remote users over LDAP allows FortiSASE to easily integrate with a Windows Active Directory (AD) server
or another LDAP server. This example has a Windows domain controller that has users defined in its AD. You want to
allow certain users VPN access over FortiSASE. These users connect using their Windows domain credentials.
A FortiGate that uses a virtual IP address (VIP) to port forward port 10636 to the Windows server protects the Windows
server. Communication over this VIP is allowed only for the FortiSASE IP address. The example domain is
KLHOME.local.
DNS, LDAP, and RADIUS servers must use public IP addresses or publicly accessible FQDNs
and may require some configuration or topology changes. See Network restrictions removed
on page 16.
Field Description
Server Port By default, LDAP uses port 636 and a secure connection. If you are using a
custom port, define it here. In this example, it is 10636.
Common Name Identifier This is the attribute in which your LDAP server identifies the username.
l In an AD, this is commonly the common name attribute, which is denoted
cn.
l Alternatively, you can use sAMAccountName. This is case-sensitive.
l In other LDAP servers, it may be the user ID, which is denoted uid.
Field Description
l In an AD, for usernames in the username@domain format, use the user
principal name (UPN) attribute, which is denoted userPrincipalName.
Distinguished Name Used to look up user account entries on the LDAP server. It reflects the
hierarchy of LDAP database object classes above the CN identifier in which
you are doing the lookup.
If you want to recursively look up all objects under the root domain in the
example AD, specify dc=KLHOME,dc=local. If you want to look up users
under a specific organization unit, specify ou=VPN-
Users,dc=KLHOME,dc=local.
Password Renewal Enable remote password renewal. When the LDAP user's password expires,
the user can renew their password when authenticating with FortiSASE. This
option is only available if using LDAPS.
Certificate Select the CA certificate for your LDAPS connection. If this certificate is not
signed by a known CA, you must export the certificate from your server and
install this on FortiSASE. To import the certificate, do the following:
1. Click Certificate, then Create.
2. If you have the certificate file, select File.
3. Click Upload. This creates a new remote CA certificate in the FortiSASE
certificate store.
You can also import and view the certificate in System > Certificates.
Server Identity Check If enabled, the server certificate must include the server IP address/name
defined in the Server IP/Name field.
Advanced Group Matching Enable advanced group matching. Based on your LDAP server, you may need
to configure additional properties to ensure that FortiSASE correctly matches
LDAP groups.
Group Member Check Determines which attributes FortiSASE uses for group matching:
l Group object
l User attribute
Group Filter Enter the filter to use for group matching. Required when Group Member
Check is set to User attribute.
Group Search Base Enter the search base to use for group searching. Required when Group
Member Check is set to User attribute.
Member Attribute Enter the name of the attribute from which FortiSASE retrieves the group
membership information.
The FortiSASE Endpoint Management Service does not support importing LDAP
subdomains if you have already imported the LDAP parent domain previously into it.
Field Description
The LDAP server only looks up against the distinguished name (DN), but
does not search on the subtree.
l Anonymous: bind using anonymous user and search starting from the
DN and recurse over the subtrees. Many LDAP servers do not allow this.
l Regular: bind using username/password provided and search starting
Username If using regular bind, enter the username. In the example AD, this may be
KLHOME\administrator or administrator@KLHOME.
Client Certificate Enable client certificate for authentication with LDAPS server. Select the client
certificate that you previously uploaded to FortiSASE.
5. Click Test connection. If the connection fails, return to the previous steps to reconfigure the LDAP server, or skip the
test. If the connection succeeds, click Next.
6. Review the configuration, then click Submit.
ix. Under Invite Users, enter the email addresses of the users that you want to add to FortiSASE. Click Send.
FortiSASE sends invitation emails to these users so that they can download FortiClient and connect to
FortiSASE.
The end user follows these instructions to connect to the FortiSASE VPN tunnel.
1. Follow the instructions from the received email to install the compatible FortiClient version on to your device.
2. Once installed, open FortiClient.
3. On the ZERO TRUST TELEMETRY tab, in the Join FortiClient Cloud field, enter the invitation code from the
received email.
4. FortiClient connects to and becomes provisioned by FortiClient Cloud. On the REMOTE ACCESS tab, connect to
the preconfigured VPN tunnel using your Windows username and password. If the administrator configured the CN
identifier as cn, the username is likely the user's full name. Once connected, the REMOTE ACCESS tab displays
the active VPN connection and additional information.
Configuring FortiSASE with an LDAP server for remote user authentication in SWG
mode
Configuring remote users over LDAP allows FortiSASE to easily integrate with a Windows Active Directory (AD) server
or another LDAP server. This example has a Windows domain controller that has users defined in its AD. You want to
allow certain users to configure FortiSASE as their secure web gateway (SWG) server. These users authenticate using
their Windows domain credentials.
The Windows server is protected by a FortiGate that uses a virtual IP address (VIP) to port forward port 10636 to the
Windows server. Communication over this VIP is allowed only for the FortiSASE IP address. The example domain is
KLHOME.local.
DNS, LDAP, and RADIUS servers must use public IP addresses or publicly accessible FQDNs
and may require some configuration or topology changes. See Network restrictions removed
on page 16.
Field Description
Server Port By default, LDAP uses port 636 and a secure connection. If you are using a
custom port, define it here. In this example, it is 10636.
Common Name Identifier This is the attribute in which your LDAP server identifies the username.
l In an AD, this is commonly the common name attribute, which is denoted
cn.
l Alternatively, you can use sAMAccountName. This is case-sensitive.
l In other LDAP servers, it may be the user ID, which is denoted uid.
Distinguished Name Used to look up user account entries on the LDAP server. It reflects the
hierarchy of LDAP database object classes above the CN identifier in which
you are doing the lookup.
Field Description
If you want to recursively look up all objects under the root domain in the
example AD, specify dc=KLHOME,dc=local. If you want to look up users
under a specific organization unit, specify ou=VPN-
Users,dc=KLHOME,dc=local.
Password Renewal Enable remote password renewal. When the LDAP user's password expires,
the user can renew their password when authenticating with FortiSASE. This
option is only available if using LDAPS.
Certificate Select the CA certificate for your LDAPS connection. If this certificate is not
signed by a known CA, you must export the certificate from your server and
install this on FortiSASE. To import the certificate, do the following:
1. Click Certificate, then Create.
2. If you have the certificate file, select File.
3. Click Upload. This creates a new remote CA certificate in the FortiSASE
certificate store.
You can also import and view the certificate in System > Certificates.
Server Identity Check If enabled, the server certificate must include the server IP address/name
defined in the Server IP/Name field.
Advanced Group Matching Enable advanced group matching. Based on your LDAP server, you may need
to configure additional properties to ensure that FortiSASE correctly matches
LDAP groups.
Group Member Check Determines which attributes FortiSASE uses for group matching:
l Group object
l User attribute
Group Filter Enter the filter to use for group matching. Required when Group Member
Check is set to User attribute.
Group Search Base Enter the search base to use for group searching. Required when Group
Member Check is set to User attribute.
Member Attribute Enter the name of the attribute from which FortiSASE retrieves the group
membership information.
The FortiSASE Endpoint Management Service does not support importing LDAP
subdomains if you have already imported the LDAP parent domain previously into it.
Field Description
The LDAP server only looks up against the distinguished name (DN), but
does not search on the subtree.
l Anonymous: bind using anonymous user and search starting from the
DN and recurse over the subtrees. Many LDAP servers do not allow this.
l Regular: bind using username/password provided and search starting
Username If using regular bind, enter the username. In the example AD, this may be
KLHOME\administrator or administrator@KLHOME.
Client Certificate Enable client certificate for authentication with LDAPS server. Select the client
certificate that you previously uploaded to FortiSASE.
5. Click Test connection. If the connection fails, return to the previous steps to reconfigure the LDAP server, or skip the
test. If the connection succeeds, click Next.
6. Review the configuration, then click Submit.
The end user follows these instructions to configure SWG mode on their machine. The end user can configure SWG
settings at the OS level or in a browser. When SWG settings are configured at the OS level, they are applied to all
installed browsers. The following gives instructions for configuring SWG settings at the OS level on a Windows 10
device.
4. The next time the user starts a browser session, the browser displays an authentication prompt. The end user
enters their Windows domain credentials in the prompt. After ten minutes of inactivity, the browser reprompts for
authentication credentials.
DNS, LDAP, and RADIUS servers must use public IP addresses or publicly accessible FQDNs
and may require some configuration or topology changes. See Network restrictions removed
on page 16.
Field Description
Authentication Type If you know the RADIUS server uses a specific authentication protocol, select
Specify and select the desired protocol from the list. Otherwise, select Default.
Include All Users Allow all users on the RADIUS server to authenticate with FortiSASE.
4. Configure the following Configure Servers settings. If the primary server does not respond, FortiSASE sends the
access request to the secondary server if configured:
Field Description
Primary Server
Secret Enter the server secret key. This value must match the secret on the RADIUS
primary server.
Secondary Server
IP/Name (Optional) Enter the domain name or IP address of the secondary RADIUS
server.
Field Description
Secret (Optional) Enter the secondary server secret key. This value must match the
secret on the RADIUS secondary server.
5. Click Test connection. If the connection fails, return to the previous steps to reconfigure the RADIUS server(s), or
skip the test. If the connection succeeds, click Next.
6. Review the configuration, then click Submit.
The following procedure is not applicable for SWG mode users. See SWG mode on page 13.
Before you configure FortiSASE with Microsoft Entra ID single sign on (SSO) for endpoint mode (VPN user SSO) or
secure web gateway (SWG) mode (SWG user SSO), review the following tables to understand which Entra ID basic
SAML configuration fields correspond to FortiSASE SAML fields.
For the Configure Identity Provider step, this table maps the FortiSASE SAML fields that you must copy from FortiSASE
and configure in Entra ID:
For the Configure Service Provider step, this table maps the Entra ID SAML fields that you must copy from FortiSASE
and configure in FortiSASE:
SAML Group Object Id (See following steps for identifying this field from a newly created group in Entra ID.)
Matching > Group
ID
IdP Certificate Base64 SAML certificate name (See following steps for downloading this certificate from Entra
ID.) The certificate name must be alpanumeric and less than 30 characters.
Enable and configure SAML group matching if you only want to allow Entra ID users of a certain group to authenticate.
Otherwise, leave this setting disabled. You can define more granular groups when configuring user group settings.
1. In the left pane of the Azure portal (three horizontal lines), go to Microsoft Entra ID > Manage > Groups.
2. The default view shows all groups. Find the desired group and note the Object Id.
For details on creating a new security group, see Tutorial: Entra ID SSO Integration with FortiGate SSL VPN.
You can find the full group claims list in Configure group claims for applications by using Microsoft Entra ID.
1. In Entra ID, go to your Entra ID enterprise application, go to Single sign-on > SAML Signing Certificate.
2. For Certificate (Base64), click Download to download the identity provider certificate to your computer.
You can configure a single sign on (SSO) connection with Microsoft Entra ID (formerly known as Azure Active Directory
or Azure AD) via SAML, where Entra ID is the identity provider (IdP) and FortiSASE is the service provider (SP). This
feature allows end users to connect to VPN by logging in with their Entra ID credentials.
Before completing the following steps, see Configuring FortiSASE with Entra ID SSO: SAML configuration fields on page
159 for details on how Entra ID SAML fields map to FortiSASE SAML fields.
1. In FortiSASE, go to Configuration > VPN User SSO. The first step of the SSO configuration wizard displays the
entity ID, SSO URL, and single logout URL. You use these values to configure FortiSASE as an SP in Azure. Copy
these values.
2. Create and configure your FortiSASE environment in Azure:
a. In the Azure portal, go to Microsoft Entra ID > Enterprise applications > New application.
b. Search for and select FortiSASE.
c. Click Create.
d. Assign Entra ID users and groups to FortiSASE.
e. Go to Set up single sign on.
f. For the SSO method, select SAML.
g. In Basic Configuration, enter the values that you copied in step 1 in the Identifier (Entity ID), Reply URL, Sign
on URL, and Logout URL fields. Click Save.
3. Obtain the IdP information from Azure:
a. The SAML Signing Certificate box contains links to download the SAML certificate. Download the certificate.
b. The Set up <FortiSASE instance name> box lists the IdP information that you must provide to FortiSASE. Copy
the values in the Login URL, Entra ID Identifier, and Logout URL fields.
4. Configure the IdP information in FortiSASE:
a. In FortiSASE, click Next in the SSO wizard. In the IdP Entity ID, IdP Single Sign-On URL, IdP Single Log-Out
URL fields, paste the values that you copied from the Entra ID Identifier, Login URL, and Logout URL fields,
respectively.
b. From the IdP Certificate dropdown list, select Create, then upload the certificate that you downloaded. Click
Next.
5. Review the SAML configuration, then click Submit.
6. Invite Entra ID users to FortiSASE:
a. (Optional) If you want to define a group of users, create a user group:
i. Go to Configuration > Users.
ii. Click Create > User Group.
iii. In the Members field, click +.
iv. In the Select Entries pane, select the desired users to add to this user group.
v. In the Remote Groups field, select Create.
vi. From the Remote Server dropdown list, select the desired server.
vii. In the Groups field, add the desired groups from the selected server to this user group. Click OK.
viii. Click OK.
b. In Configuration > Single Sign On (SSO), click Onboard Users.
c. Under Invite Users, enter the email addresses of the users that you want to add to FortiSASE.
d. Click Send. FortiSASE sends invitation emails to these users so that they can download FortiClient and
connect to FortiSASE.
1. In FortiClient on an endpoint, go to the REMOTE ACCESS tab. The tab should display a SAML Login button.
2. Click the SAML Login button.
3. In the dialog, sign in with your Entra ID credentials to connect to VPN.
VPN autoconnect is a feature that only the FortiClient agent for Windows supports. Therefore,
the Microsoft Entra ID Options configuration settings and the FortiSASE agent-based VPN
autoconnect using Microsoft Entra ID (formerly known as Azure Active Directory or Azure AD)
use case apply to Windows endpoints only.
You must configure FortiSASE with Entra ID options, namely the domain name and application ID, to automatically
connect to FortiSASE SSL VPN using Entra ID credentials. The FortiSASE Endpoint Management Service uses this
information to configure the remote access profile on the FortiClient agent installed on a Windows endpoint. The
FortiClient agent for Windows also uses this information to automatically establish an SSL VPN connection immediately
after FortiClient is installed, and every time a user logs into Windows.
1. In Configuration > VPN User SSO, ensure that Service Provider Configuration and Identity Provider Configuration
are already configured as Configuring FortiSASE with Entra ID SSO in endpoint mode on page 160 describes.
3. In the Microsoft Entra ID Options slide-in, select Allow Automatic Sign-on and enter the domain name and
application ID.
For instructions for locating the domain name and application ID on the Azure portal and deployment details for
configuring remote Windows endpoints with the FortiClient agent for Windows to automatically connect to FortiSASE
SSL VPN using Entra ID credentials, see the FortiSASE Agent-based VPN Auto-Connect using Entra ID SSO
Deployment Guide.
You can configure a single sign on (SSO) connection with Microsoft Entra ID (formerly known as Azure Active Directory
or Azure AD) via SAML, where Entra ID is the identity provider (IdP) and FortiSASE is the service provider (SP). This
feature allows end users to configure FortiSASE as their secure web gateway (SWG) server and authenticate using their
Entra ID credentials.
Before completing the following steps, see Configuring FortiSASE with Entra ID SSO: SAML configuration fields on page
159 for details on how Entra ID SAML fields map to FortiSASE SAML fields.
1. In FortiSASE, go to Configuration > SWG User SSO. The first step of the SSO configuration wizard displays the
entity ID, SSO URL, and single logout URL. You use these values to configure FortiSASE as an SP in Azure. Copy
these values.
2. Create and configure your FortiSASE environment in Azure:
a. In the Azure portal, go to Microsoft Entra ID > Enterprise applications > New application.
b. Search for and select FortiSASE.
c. Click Create.
d. Assign Entra ID users and groups to FortiSASE.
e. Go to Set up single sign on.
f. For the SSO method, select SAML.
g. In Basic Configuration, enter the values that you copied in step 1 in the Identifier (Entity ID), Reply URL, Sign
on URL, and Logout URL fields. Click Save.
3. Obtain the IdP information from Azure:
a. The SAML Signing Certificate box contains links to download the SAML certificate. Download the certificate.
b. The Set up <FortiSASE instance name> box lists the IdP information that you must provide to FortiSASE. Copy
the values in the Login URL, Entra ID Identifier, and Logout URL fields.
4. Configure the IdP information in FortiSASE:
a. In FortiSASE, click Next in the SSO wizard. In the IdP Entity ID, IdP Single Sign-On URL, IdP Single Log-Out
URL fields, paste the values that you copied from the Entra ID Identifier, Login URL, and Logout URL fields,
respectively.
b. From the IdP Certificate dropdown list, select Create, then upload the certificate that you downloaded. Click
Next.
5. Review the SAML configuration, then click Submit.
The end user follows these instructions to configure SWG mode on their machine. The end user can configure SWG
settings at the OS level or in a browser. When the user configures SWG settings at the OS level, they are applied to all
installed browsers. The following gives instructions for configuring SWG settings at the OS level on a Windows 10
device.
4. The next time the user starts a browser session, the browser displays an authentication prompt. The end user
enters their Entra ID credentials in the prompt. After ten minutes of inactivity, the browser reprompts for
authentication credentials.
You can configure a single sign on (SSO) connection with Okta via SAML, where Okta is the identity provider (IdP) and
FortiSASE is the service provider (SP). This feature allows end users to connect to VPN by logging in with their
Okta credentials.
1. In FortiSASE, go to Configuration > VPN User SSO. The first step of the SSO configuration wizard displays the
entity ID, SSO URL, and single logout URL. You use these values to configure FortiSASE as an SP in Okta. Copy
these values.
2. Create and configure your FortiSASE environment in Okta:
a. Add the FortiSASE application to Okta:
i. On the Okta administration page, go to Applications.
ii. Click Add Application.
iii. In the searchbox, search for and select FortiSASE.
iv. Click Add.
v. Under General Settings, click Done.
b. On the Assignment tab, from the Assign dropdown list, select Assign to People.
c. In the dialog, assign the desired users to the FortiSASE Okta application.
d. On the Sign On tab, click Edit.
e. Paste the entity ID value from FortiSASE in the Base URL field in Okta. After pasting, edit this value to remove
everything after the URL,"fortisase.com".
f. Click Save.
Configuring FortiSASE with FortiAuthenticator Cloud as SAML IdP proxy for Entra
ID SSO
FortiTrust Identity (FortiTrustID) performs the function of a SAML identity provider (IdP) as well as an IdP proxy and
enforces multifactor authentication (MFA). FortiTrustID is composed of FortiAuthenticator Cloud for IdP and IdP proxy
functionality and FortiToken Cloud for MFA including adaptive authentication.
A use case for IdP proxy is when using multiple IdPs to authenticate different user types. For example, you may
authenticate employees using Microsoft Entra ID while contractors use Google Workspace or Okta.
You can configure a single sign on (SSO) connection with FortiAuthenticator Cloud via SAML, where FortiAuthenticator
Cloud is the IdP, namely, an IdP proxy, and FortiSASE is the service provider (SP). This feature allows end users to
connect to VPN by logging in with their corresponding IdP credentials.
This example describes how to set up FortiAuthenticator Cloud as a SAML IdP proxy for Entra ID.
These steps require FortiTrustID to be running FortiAuthenticator Cloud 6.5.0 and above to
support the following features to help with compatibility with third-party IdPs:
l Sends username in this parameter: specify the parameter name in which the remote
To upgrade to FortiAuthenticator Cloud 6.5.0 and above, which supports the above features,
you will need to send a request to fortitrustid-support@fortinet.com. See the FortiTrustID
Release Notes corresponding to your version, specifically, the Upgrade Information section.
Configuring Entra ID
Create a new Entra enterprise application using the FortiSASE application as a template from the Entra app gallery,
configure your Microsoft Entra ID (formerly known as Azure Active Directory or Azure AD) environment with users and
groups and configure the enterprise application for SAML single sign-on (SSO) for the agent-based or endpoint mode
deployment.
To create an enterprise application using FortiSASE as a template from the gallery and find the
application ID of the FortiSASE enterprise application:
1. Go to the Microsoft Entra ID directory home, and select Roles and administrators.
2. From the Administrative roles list, select Directory readers.
3. Select the ellipsis for Directory readers, then select Description.
4. Go to Assignments and select Add assignment.
5. In the Add assignments window, search your application by name, and select Add.
1. In FortiAuthenticator Cloud, Go to Authentication > Remote Auth. Servers > OAUTH and select Create New.
2. Enter a name for the remote OAuth server.
3. In the OAuth source dropdown list, select Azure Directory.
4. In the Client ID field, enter the Entra enterprise application ID that you saved previously.
5. In the Client Key field, enter the Client secrets Value created previously.
6. Select OK to add the remote OAuth server.
1. In FortiAuthenticator Cloud, go to Authentication > Remote Auth. Servers > SAML, and click Create New. In the
Create New Remote SAML Server page, configure the following:
a. Select Proxy as the Type.
b. For the Entity ID, click the dropdown menu and select the Azure identity provider (IdP) option.
c. Under Single Logout, ensure Enable SAML single logout is checked.
d. Copy these SAML fields:
l Portal URL
l Entity ID
l ACS (login) URL
l SLS (logout) URL
2. Keep this page open in your web browser since you will continue configuring it after configuring Entra ID.
Microsoft Entra ID > Basic SAML Configuration FortiAuthenticator Cloud > Edit Remote SAML
Server
While still in the SAML-based Sign-on page for the enterprise application you created, in the SAML certificates box, do
the following:
1. Download the Certificate (Base64) by clicking Download and selecting a file location for downloading the certificate
file.
2. Download the Federation Metadata XML by clicking Download and selecting a file location for downloading the XML
file.
1. Go to the open web browser and continue configuring Create New Remote SAML Server in FortiAuthenticator
Cloud.
2. Confirm Type is still set to Proxy.
3. For the Entity ID, ensure the Azure identity provider (IdP) option is still selected.
4. Since by this point you have already completed the Entra ID SAML configuration and obtained the IdP metadata file,
under IdP Metadata, click Import IdP metadata, select the Federation Metadata XML file saved previously, and click
OK to import the file. After importing the XML file, observe that the IdP entity ID and IdP single sign-on URL fields
have been populated accordingly.
5. For Send username in this parameter, enter login_hint.
6. Ensure Strip realm from username before sending is unchecked.
7. In Single logout, confirm Enable SAML single logout is still checked.
8. In Group Membership, select Cloud and choose the previously created Azure OAuth server. Update the Groups
field to match what is configured on the Azure side.
9. Click OK to save changes.
1. In FortiAuthenticator Cloud, go to Certificate Management > End Entities > Local Services.
2. Click Export Certificate to export the certificate being used as the Default IdP certificate.
3. In the file browser, choose where to save the file and click Save.
1. In FortiAuthenticator Cloud, go to Authentication > SAML IdP > Service Providers and create a new reference for
the service provider that you will be using as your SAML client.
4. Click Save.
5. Keep this page open in your web browser since you will continue configuring it after configuring FortiSASE.
l ACS URL
l SLS URL
1. Go to the open web browser and continue configuring Edit SAML Service Provider in FortiAuthenticator Cloud.
2. In the SP Metadata pane, enter the SP information from FortiSASE, which you will use as the SAML SP:
FortiSASE > Configuration > VPN User SSO FortiAuthenticator Cloud > Edit SAML Service
Provider
Entity ID SP entity ID
From FortiSASE, it is possible to search the user groups on the remote SAML provider configured for VPN and secure
web gateway (SWG) SSO by configuring SAML provider credentials in the Search User Groups from SAML Provider
slide-in window. You can then configure the user groups for SAML group matching. Dynamically discovering a user
group from the SAML identity provider (IdP) is more convenient than manually finding a user group’s identifier (ID) from
the remote SAML provider’s portal and configuring it for SAML group matching.
Before you can configure the SAML provider credentials, you must perform some setup and obtain these credentials
from the SAML IdP.
Currently, searching user groups from a SAML provider from FortiSASE is supported with
Entra ID SSO in endpoint mode via Configuration > VPN User SSO, or in SWG mode via
Configuration > SWG User SSO.
Before you can search user groups from Microsoft Entra ID (formerly known as Azure Active Directory or Azure AD)
single sign on (SSO), you must perform some preliminary steps and then determine the SAML provider credentials from
the Entra ID portal.
1. Log into the Azure portal. You should already have an enterprise application created in Entra ID. If this has not been
created, see Creating an enterprise application using FortiSASE as a template from the gallery and collecting SAML
IdP URL information.
2. On the homepage, do one of the following:
l Under Azure Services, click Microsoft Entra ID.
l Click the navigation menu and under All Services, click Microsoft Entra ID.
To add Microsoft Graph API application permissions required for searching user groups:
1. In the left menu, click App registrations, then click the All applications tab.
2. Look for the name of your FortiSASE SSL VPN enterprise application and click the hyperlinked name.
3. In the left menu, click API permissions, and click Add a permission.
6. In the Select permissions section, search for, and select the following permissions by clicking the checkboxes next
to these permissions:
l Group.Read.All – Read all groups
8. In the API permissions page, click Grant admin consent for Default Directory. If this option is grayed out, you must
log into an Entra ID admin account to perform this step.
To add a client secret string and determine the value of the client secret string:
1. In the left menu, click App registrations, then click the All applications tab.
2. Look for the name of your FortiSASE SSL VPN enterprise application and click the hyperlinked name.
3. In the left menu, click Certificates & secrets, and click New client secret.
4. In the Add a Client Secret slide-in window, add a Description and select the Expires option of your choice. Click Add.
5. Observe that a new client secret has been created. Immediately after creation, ensure you copy the Value of the
client secret string, which FortiSASE uses as the Client Secret. This value is not visible after this initial creation step
and moving to another page.
1. In the left menu, click App registrations, then click the All applications tab.
2. Look for the name of your FortiSASE SSL VPN enterprise application and click the hyperlinked name.
3. In the left menu, click Overview and note the following values:
l Application (client) ID, which FortiSASE uses as the Client ID
After performing preliminary steps and determining the Microsoft Entra ID (formerly known as Azure Active Directory or
Azure AD) single sign on (SSO) credentials, you can proceed to configure them in FortiSASE to allow dynamic group
discovery from Entra ID SSO and select a group for SAML group matching.
The following example is for searching user groups from Entra ID SSO from FortiSASE for an
endpoint mode SSO configuration and demonstrates general steps that also apply to a secure
web gateway mode SSO configuration.
l Client ID
l Client Secret
From FortiSASE, you can test the single sign on (SSO) configuration settings end-to-end by logging into a user account
configured on your SSO server. This feature allows you to open a popup test window that points to the SSO login page.
This test provides SSO configuration test results and raw log output of SAML debug from the Security PoP that can help
you troubleshoot issues with any misconfigured SSO configuration settings.
Currently, testing SSO configuration from FortiSASE is supported for endpoint mode using
either Entra ID SSO or Okta SSO via Configuration > VPN User SSO.
The example below is for testing an Entra ID SSO configuration and demonstrates general
steps that also apply to Okta SSO.
1. Go to Configuration > VPN User SSO. Ensure that you configured Entra ID SSO and that you clicked Submit at the
end of the configuration steps. For details, see Configuring FortiSASE with Entra ID SSO in endpoint mode on page
160.
2. In right-hand gutter, click Start Test.
Ensure that you disable or exempt any web browser popup blockers to allow popups for
the Configuration > VPN User SSO page prior to clicking Start Test. Otherwise, you see
the error message Failed to trigger SSO configuration test and the test SSO configuration
feature does not work as desired.
Ensure that the web browser remains on the Configuration > VPN User SSO page for the
test duration. Going to another page cancels the test.
3. A popup from the SSO provider prompts for login information. This is the user account that has already been set up
on the SSO server that you want to use for the test. When prompted, enter the username and password of the user
account to use for the test.
Ensure that you enter the username and password of the user account within one minute.
The test times out if FortiSASE does not get a successful login response within a minute
with the error message SSO configuration test timed out.
4. You see that the notification SSO configuration verified successfully displays in the right-hand gutter when the
SAML connection test succeeds. If the test fails, one of the following error messages displays:
l Failed to trigger SSO configuration test.
l Within one minute of starting the test, the SSO Configuration Test Output slide-in window appears.
i. In the Test Results tab, you see the corresponding icons that help you to narrow down your SAML
troubleshooting steps:
l Green checkmark next to test steps that succeeded
l Red X next to test steps that failed, which suggests issues with the SSO configuration. The window
The following shows an example Test Results tab with a failed test step that an identity provider entity ID
misconfiguration caused.
ii. In the Raw Log Output tab, observe the SAML debug raw log output from the security point of presence
with sensitive information removed. The following shows an example of the Raw Log Output tab with
successful test steps.
The following shows an example Raw Log Output tab with a failed test step that an identity provider entity
ID misconfiguration caused.
Notice the number next to the Raw Log Output tab title indicating the number of error messages in the
output. See the SAML_ERROR: Error receiving SAML response 1 as the last line of the output.
Users
PKI
A public key infrastructure (PKI) user are users identified by a digital certificate.
PKI users are used to define peer users and are used with SPA Service Connections using IPsec VPN when
Authentication Method is configured as Certificate.
See Configuring a new service connection on page 59 for details on how to configure a defined PKI user.
Endpoints
In Endpoints, you can define the configuration of FortiClient software on endpoints. You can also monitor endpoint
statuses and deregister endpoints.
Endpoint features do not apply for secure web gateway mode users. See SWG mode on page
13.
Profiles
FortiSASE supports multiple endpoint profiles to provide granular behavior for different groups of users, such as:
l IT can disconnect from always-on VPN.
l Marketing can use removable media and authenticates using LDAP.
l All other users cannot disconnect from always-on VPN or use removable media, and authenticate using single sign
on (SSO).
Configuration > Profiles presents a table of profiles, with the Default profile assigned to all other users if you have not
defined custom profiles. You cannot delete the Default profile.
You can prioritize and assign endpoint profiles to on-net endpoints based on matching Active Directory (AD) domain
users and groups.
Viewing users and groups from an AD server requires an LDAP server configuration. LDAP user and group information
is shared with the FortiSASE Endpoint Management service, which assigns profiles to endpoints that are locally
connected to the LDAP domain whenever domain users are logged in by matching selected users or groups.
If you have an existing LDAP server configured prior to FortiSASE 23.4, the custom endpoint
profile cannot use it immediately. First, you must synchronize the LDAP server settings with
the FortiSASE Endpoint Management Service using these steps:
1. From Configuration > LDAP, Edit the existing LDAP server.
2. Click Back twice to get back to the first page, Set up server.
3. On the Set up server page, click Next.
4. On the Authenticate page, select the Bind type, reenter the LDAP administrator
credentials, and click Next.
5. On the Review page, click Submit.
The FortiSASE Endpoint Management Service does not support importing LDAP subdomains
if you have already imported the LDAP parent domain previously into it.
When using custom endpoint profiles with FortiSASE Endpoint Management Service, LDAP
servers must use public IP addresses or publicly accessible FQDNs and may require some
configuration or topology changes.
From Configuration > LDAP, by right-clicking any LDAP server, you can synchronize custom endpoint profiles with any
updates from the LDAP server, if necessary:
When creating a new endpoint profile, you can use the AD Users & Groups tab to select which AD users/groups the
profile will apply to, and you can use an option in the Access tab to enable/disable SSO authentication per profile.
Access
3. Enable or disable Allow disconnecting from FortiClient with password. When enabled, a slide in prompts to set a
password, which you can later use as an offline method for deregistering a FortiClient endpoint from the FortiSASE
Endpoint Management Service when clicking Disconnect in Zero Trust Telemetry.
4. Enable or disable Notify endpoint of VPN connectivity issues. When enabled, a notification displays to the end user
when FortiClient cannot connect to FortiSASE VPN.
5. Enable or disable Authenticate with SSO. When enabled and you have configured SSO in Configuration > VPN
User SSO, this endpoint profile uses SSO authentication. If SSO is not yet configured, a warning icon displays next
to this setting to remind you to perform the required configuration.
FortiSASE supports authentication using multiple SSO providers using FortiTrust Identity.
See Configuring FortiSASE with FortiAuthenticator Cloud as SAML IdP proxy for Entra ID
SSO on page 166.
6. Enable or disable Auto Connect to FortiSASE. When enabled, FortiClient automatically connects to the FortiSASE
VPN tunnel when the end user logs into the endpoint. The end user must have established connection to the
FortiSASE VPN tunnel at least once before.
7. Enable or disable Force Always On VPN. When enabled, the end user cannot manually connect or disconnect from
FortiSASE.
8. Under Bypass FortiSASE, configure Split tunneling destinations. Traffic configured as a split tunneling destination
considered to be a trusted destination that is excluded from the FortiSASE VPN tunnel and redirected to the
endpoint physical interface. This also helps optimize FortiSASE bandwidth usage. For example, you may want to
add a high bandwidth-consuming application, such as Microsoft Teams or Zoom, as a split tunneling destination.
Configure a split tunneling destination:
a. Click Create.
b. Configure the following fields:
Option Description
Match l If you selected Infrastructure, select the desired application from the dropdown list.
l If you selected FQDN, enter the desired fully qualified domain name (FQDN). The FQDN
resolved IP address is dynamically added to the route table when in use, and is removed
after disconnection. For example, if you want to exclude YouTube from the VPN tunnel, you
can enter youtube.com. When endpoint users use any popular browser such as Chrome,
Edge, or Firefox to access youtube.com or *.youtube.com, this traffic does not go through
the VPN tunnel.
l If you selected Local Application, specify an application using its process name, full path, or
the directory where it is installed. When entering the directory, you must end the value with
\. You can enter file and directory paths using environment variables, such as
%LOCALAPPDATA%, %programfiles%, and %appdata%. Do not use spaces in the tail or
head, or add double quotes to full paths with spaces. You can add multiple entries by
separating them with a semicolon.
For example, to exclude Microsoft Teams and Firefox from the VPN tunnel, you can enter
any of the following combinations:
l Application Name: teams.exe;firefox.exe
l Full Path:
C:\Users\<username>appData\Local\Microsoft\Teams\current\Teams.exe;C:\Progra
m Files\Mozilla Firefox\firefox.exe
Option Description
l Directory:
C:\Users\<username>appData\Local\Microsoft\Teams\current\;C:\Program
Files\Mozilla Firefox\
To find a running application's full path, on the Details tab in Task Manager, add the Image
path name column.
l If you selected Subnet, enter the desired subnet. The subnet is dynamically added to the
route table when in use, and is removed after disconnection.
You can select host groups when using the Subnet match type. You must create host
groups in Configuration > Hosts before they become visible in the Edit Match dialog.
Wildcard FQDNs are not supported when configuring an FQDN split tunneling
destination.
c. Click OK.
9. Under Bypass FortiSASE, configure Endpoints will not auto connect to VPN from these public IPs. Endpoints with
public IPs matching the configured public IPs are considered trusted or on-net, meaning they are in a corporate
network which should have some level of on-premise security and do not need to automatically connect to
FortiSASE VPN for security inspection. This also helps optimize FortiSASE bandwidth usage. For example, when
you add the public IP of your corporate network, the endpoints on this network will not automatically connect to
FortiSASE VPN when they are on-net. Therefore, only when endpoints have public IPs that do not match the
configured trusted public IPs will they auto connect to FortiSASE VPN, meaning when they are considered
untrusted or off-net and require FortiSASE security inspection. Configure a public IP to prevent auto connect to
FortiSASE VPN when endpoints are on-net:
a. Click Create.
b. Enter the public IP address in the Public IP text field.
c. Click OK.
Protection
3. Enable Automatically Scan for Vulnerabilities. FortiClient includes a vulnerability scan component to check
endpoints for known vulnerabilities. You can view a summary of endpoint vulnerability information on the
Dashboard.
4. Enable Anti-Ransomware. This feature only works for endpoints where Malware Protection was enabled when
installing FortiClient. Antiransomware protects all content in the selected folders against unauthorized changes.
You can click Create to add a custom directory. To remove a folder, select it then click the Delete button.
5. Enable Removable Media Access Control. This feature only works for endpoints where Malware Protection was
enabled when installing FortiClient.
a. Enable Notify Endpoint of Blocks to display a bubble notification when FortiClient takes action with a removable
media device.
b. Click Create to create a removal media access rule. Configure the following fields. For the class, manufacturer,
vendor ID, product ID, and revision, you can find the desired values for the device in one of the following ways:
l Microsoft Windows Device Manager: select the device and view its properties.
l USBDeview
Option Description
Action Configure the action to take with removable media devices connected to
the endpoint that match this rule. Available options are:
l Allow: Allow access to removable media devices connected to the
c. Click OK.
Sandbox
2. On the Sandbox tab, configure the following. This feature only works for endpoints where Sandbox Detection was
enabled when installing FortiClient. Configure the following options:
Options Description
Username Optional. Enter the FortiSandbox username. This option is only available for a
standalone FortiSandbox.
Password Optional. Enter the FortiSandbox password. This option is only available for a standalone
FortiSandbox.
All Files Executed Submit all files executed on removable media, such as USB drives, to FortiSandbox for
from Removable analysis.
Media
All Files Executed Submit all files executed from mapped network drives.
from Mapped
Network Drives
Remediation Actions
Action Choose Quarantine or Alert & Notify for infected files. Whether FortiClient quarantines
the file depends on if FortiSandbox reports the file as malicious and the Sandbox
Detection Verdict Level setting.
Sandbox Detection Select the desired detection verdict level. For FortiClient to apply the action selected in
Verdict Level the Action field to an infected file, FortiSandbox must detect the file as this level or higher.
For example, if Action is configured as Quarantine and FortiSandbox Detection Verdict
Level is configured as Medium, FortiClient quarantines all infected files that
FortiSandbox detects as Medium or a higher level (High or Malicious). FortiClient does
not quarantine files for which FortiSandbox returns a verdict below this level (Low Risk or
Clean).
Exceptions
Exclude Files from Exclude files signed by trusted sources from FortiSandbox submission. Following is a list
Trusted Sources of sources that FortiSandbox trusts:
l Microsoft
l Fortinet
l Mozilla
l Windows
Options Description
l Google
l Skype
l Apple
l Yahoo!
l Intel
Exclude Specified Exclude specified folders/files from FortiSandbox submission. You must also create the
Folders/Files exclusion list.
ZTNA
Viewing users and groups from an AD server requires an LDAP server configuration. See
Configuring FortiSASE with an LDAP server for remote user authentication in endpoint
mode on page 151.
If you have an existing LDAP server configured prior to FortiSASE 23.4, the custom
endpoint profile cannot use it immediately. First, you must synchronize the LDAP server
settings with the FortiSASE Endpoint Management Service using these steps:
1. From Configuration > LDAP, Edit the existing LDAP server.
2. Click Back twice to get back to the first page, Set up server.
3. On the Set up server page, click Next.
4. On the Authenticate page, select the Bind type, reenter the LDAP administrator
credentials, and click Next.
5. On the Review page, click Submit.
The FortiSASE Endpoint Management Service does not support importing LDAP
subdomains if you have already imported the LDAP parent domain previously into it.
a. By default, FortiSASE adds Non-AD Groups to the table. You may want to keep this group or select it and
delete it accordingly.
b. Click Add and select AD Users or AD Groups:
l When selecting AD Users, a slide-in appears, which allows you to view the domains corresponding to
configured LDAP servers. You can collapse the LDAP domain and select AD users from the list of users.
l When selecting AD Groups, a slide-in appears, which allows you to view the domains corresponding to
configured LDAP servers. You can collapse the LDAP domain and select AD groups from a tree view of
groups.
c. Select AD Users or AD Groups from the respective slide-in.
d. Click OK.
e. Repeat steps b to d to add more AD users or groups.
f. Click OK.
This example demonstrates how to configure a custom endpoint profile applied to an Active Directory (AD) group. It
demonstrates how to configure an LDAP server that allows group matching, how to configure a custom endpoint profile
to use this LDAP sever to select a specific AD group with which this profile will be applied, and how to test that the correct
profile is applied to an AD user within the selected AD group.
This example makes the following assumptions:
l The LDAP server has already been configured with AD services, AD users, and AD groups. The AD user johnlocus
is a member of the Finance-Employees AD group.
l You have already configured SSO authentication on the SSO provider side and in FortiSASE.
l The endpoint used for testing the AD group matching is on-net, that is, locally on the same network as the LDAP
server and joined to the LDAP domain.
l Default endpoint profile has been configured with Authenticate with SSO disabled to ensure that the configuration
uses LDAP for VPN user authentication.
When using custom endpoint profiles with FortiSASE Endpoint Management Service, LDAP
servers must use public IP addresses or publicly accessible FQDNs and may require some
configuration or topology changes.
Field Value
If desired, you can enable Advanced Group Matching, where you can further configure
Group Member Check, Group Filter/Group Object Filter, Group Search Base, and Member
Attribute. This configuration does not require Advanced Group Matching.
d. Click OK.
e. Review the selected AD group.
f. Click OK.
g. Observe that the newly created endpoint profile has an associated AD group and is enabled.
3. Alternatively, you can view all endpoints with different profiles using Network > Managed Endpoints under the
Endpoints tab.
Tagging
You can create zero trust network access tagging rules for Windows, macOS, Linux, iOS, and Android endpoints based
on their OS versions, logged in domains, running processes, and other criteria. FortiSASE uses the rules to dynamically
tag endpoints.
The following occurs when using tagging rules with FortiSASE and FortiClient:
1. FortiSASE sends tagging rules to endpoints.
2. FortiClient checks endpoints using the provided rules and sends the results to FortiSASE.
3. FortiSASE receives the results from FortiClient.
4. FortiSASE dynamically tags endpoints using the tag configured for each rule. You can view the dynamically tagged
endpoints in Configuration > Tagging.
See Tagging rule types on page 193 for descriptions of all tagging rule types.
You can use tags to build dynamic policies that do not need to be manually reconfigured whenever endpoints statuses
change. For example, consider that you want to block endpoints that are running Windows 7 and do not have antivirus
(AV) running from accessing the Internet. You would configure the following:
l A rule that applies a "Win7NoAV" tag to endpoints that are running Windows 7 and do not have AV running
l A policy that blocks endpoints with the Win7NoAV tag applied from accessing the Internet.
As FortiSASE receives information from endpoints, it dynamically removes and applies the Win7NoAV tag to endpoints.
For example, if an endpoint that previously had the Win7NoAV tag applied upgraded to Windows 10 and enabled the
FortiClient AV feature, FortiSASE would automatically remove the Win7NoAV tag from the endpoint. That endpoint
would then be able to access the Internet.
The following instructions detail how to configure a dynamic policy that uses tags, using the Win7NoAV example:
The following table describes tagging rule types and the OSes that they are available for. For all rule types, you can
configure multiple conditions using the + button.
User in AD Group l Windows From the User in AD Group dropdown list, select the desired Active
l macOS Directory (AD) group that users should be members of. You can also
use the Negate option for the rule to require that the user not be a part of
the selected AD group.
Viewing users and groups from an AD server requires an LDAP server
configuration.
The endpoint must satisfy all configured conditions to satisfy this rule.
AntiVirus l Windows From the AntiVirus dropdown list, select the desired conditions. You can
l macOS require that an endpoint have antivirus (AV) software installed and
l Linux running and that the AV signature is up-to-date. You can also use the
Negate option for the rule to require that the endpoint does not have AV
software installed or running or that the AV signature is not up-to-date.
This rule applies for FortiClient AV.
For Windows endpoints, this rule type also applies for third-party AV
software that registers to the Windows Security Center. The third-party
software notifies the Windows Security Center of the status of its
signatures. FortiClient queries the Windows Security Center to
determine what third-party AV software is installed and if the software
reports signatures as up-to-date.
The endpoint must satisfy all configured conditions to satisfy this rule.
Certificate l Windows In the Subject CN and Issuer CN fields, enter the certificate subject and
l macOS issuer. You can also use the Negate option to indicate that the rule
l Linux requires that a certain certificate is not present for the endpoint.
FortiClient checks certificates in the current user personal store and
local computer personal store. It does not check in trusted root or other
stores.
The endpoint must satisfy all conditions to satisfy this rule. For example,
if the rule is configured to require certificate A, certificate B, and not
certificate C, then the endpoint must have both certificates A and B and
not certificate C.
Domain l Windows In the Domain field, enter the domain name. If the rule is configured for
l macOS multiple domains, FortiSASE considers the endpoint as satisfying the
rule if it belongs to one of the configured domains.
EMS Management l Windows FortiSASE considers the endpoint as satisfying the rule if the endpoint
l macOS has FortiClient installed and Telemetry is connected.
l Linux
l iOS
l Android
File l Windows In the File field, enter the file path. You can also use the Negate option
l macOS to indicate that the rule requires that a certain file is not present on the
l Linux endpoint.
The endpoint must satisfy all configured conditions to satisfy this rule.
For example, if the rule is configured to require file A, file B, and NOT file
C, then the endpoint must have both files A and B and not file C.
IP Range l Windows In the IP Range field, enter the IP address, IP address range, or IP
l macOS address with subnet. If multiple IP ranges and/or addresses are
l Linux configured, FortiSASE considers the endpoint as satisfying the rule if its
l iOS IP address matches one of the configured ranges or addresses.
l Android
Operating System l Windows From the Operating System Version field, select the OS version. If the
Version l macOS rule is configured for multiple OS versions, FortiSASE considers the
l Linux endpoint as satisfying the rule if it has one of the configured OS
l iOS versions installed.
l Android
Registry Key l Windows In the Key field, enter the registry path or value name. End the path with
\ to indicate a registry path, or without \ to indicate a registry value
name. You can also use the Negate option to indicate that the rule
requires that a certain registry path or value name is not present on the
endpoint. This rule does not support using the value data.
The endpoint must satisfy all configured conditions to satisfy this rule.
For example, if the rule is configured to require registry key A, registry
key B, and NOT registry key C, then the endpoint must have both
registry keys A and B and not registry key C.
Running Process l Windows In the Process Name field, enter the process name. You can also use
l macOS the Negate option to indicate that the rule requires that a certain
l Linux process is not running on the endpoint.
The endpoint must satisfy all configured conditions to satisfy this rule.
For example, if the rule is configured to require process A, process B,
and NOT process C, then the endpoint must have both processes A and
B running and process C not running.
Sandbox l Windows From the Sandbox Detection dropdown list, select the desired
l macOS condition. You can require that Sandbox detected malware on the
l Linux endpoint in the last seven days. You can also use the Negate option for
the rule to require that Sandbox did not detect malware on the endpoint
in the last seven days.
Severity Level l Windows From the Severity Level dropdown list, select the desired vulnerability
l macOS severity level.
l Linux
Windows Security l Windows From the Windows Security dropdown list, select the desired
conditions. You can require that an endpoint have Windows Defender,
Bitlocker Disk Encryption, Exploit Guard, Application Guard, and/or
Windows Firewall enabled. You can also use the Negate option for the
rule to require that the endpoint have Windows Defender, Bitlocker Disk
Encryption, Exploit Guard, Application Guard, and/or Windows firewall
disabled.
The endpoint must satisfy all configured conditions to satisfy this rule.
For some rule types, such as the Running Process rule type, the endpoint must satisfy all
conditions to satisfy the rule. There may be situations where you want FortiSASE to apply the
same tag to endpoints that satisfy different conditions. Consider that you want FortiSASE to
tag endpoints that are running Process A or Process B as "RP". In this case, you can create
two rule sets: one for endpoints running Process A and another rule for endpoints running
Process B, both of which apply the "RP" tag to eligible endpoints.
You can deny or authorize a FortiGate in ZTNA Access Proxies. Authorized FortiGates synchronize endpoint and
tagging data from EMS. FortiClient does not directly connect to FortiGates listed on this page.
Certificates
You can upload a certificate for use with SSL deep inspection, and LDAP and SAML SSO authentication.
To upload a certificate:
HTML Templates
You can customize block pages that display on endpoints in certain situations, such as if FortiSASE blocks access
based on Application Control With Inline-CASB settings. For example, you can customize the message to add your
company logo and include your helpdesk phone number so that users can contact the network administrator about their
machine. You can also customize the email to send to users to invite them to FortiSASE.
This example modifies the Application Control block page to use the Fortinet logo instead of the FortiSASE logo and
include a phone number.
SWG Configuration
You can enable the secure web gateway (SWG) feature. When you enable the SWG feature, you can have end users
configure their client software, such as a browser, to proxy all of its traffic through FortiSASE. You must manually send
the SWG server information to end users. End users then configure their browser to send requests directly to the SWG.
default SWG policies and create custom ones in Configuration > SWG Policies. See SWG Policies on page 103.
Under Analytics, you can generate reports and view logs. Reports and logs are useful components to help you
understand what is happening on your network, and to inform you about network activities, such as a virus detection,
visit to an invalid website, intrusion, failed login attempt, and others.
Reports
You can generate data reports from logs by using the Reports feature. You can configure FortiSASE to regularly run
reports at scheduled intervals, and manually run reports when desired.
Scheduling a report
Report types
Each report type has FortiSASE configuration dependencies that you must have configured in
your FortiSASE instance to obtain valid data for the report.
You can view the configuration dependencies in Analytics > Scheduled Reports by following
one of these steps:
l Scrolling to the right and viewing them in the Dependencies column
l Selecting the report, clicking Customize report, and viewing them in the Dependencies
For those reports with Application Control as a configuration dependency, you must also
configure Intrusion Prevention. See Application Control With Inline-CASB on page 140.
The following lists the report types that you can generate in FortiSASE:
Title Description
Application
Application Risk and Control Risks that applications introduce on endpoints and efforts to control those risks.
The report organizes applications into categories and includes information such
as high-risk application, high-risk application by bandwidth, web categories,
vulnerability exploits, virus, botnet, adware malicious attacks, zero day, and file
transfers.
Bandwidth and Applications Traffic, bandwidth, and sessions that users and applications use on endpoints.
Report Also includes a summary of destinations that the user and applications accessed.
Cyber-Bullying Indicators Report Users exhibiting behavior that aligns with common cyberbullying indicators, such
as use of offensive phrases on social media.
High Bandwidth Application Applications with high bandwidth usage that may affect network performance.
Usage Report This report focuses on the following application types:
l Peer-to-peer, such as BitTorrent, Xunlei, Gnutella, and Filetopia
Title Description
l Voice or video applications, such as YouTube, Skype, Spotify, Vimeo, and
Netflix
Self-Harm and Risk Indicators Users exhibiting behavior that aligns with common self-harm and risk indicators,
Report such as use of risky terms on social media.
Shadow IT Report Summarizes the usage of SaaS apps compared to all applications, sanctioned vs
unsanctioned SaaS applications, and total bandwidth by SaaS Sanctioned and
Unsanctioned apps.
Currently, this report does not support the Top 10 inline CASB applications by
occurrences section.
Security
Cyber Threat Assessment Risk of applications on endpoints to cyber threats. Includes a review of application
visibility and control, threat detection, threat prevention, and recommended
actions.
Security Events and Incidents Security-related events or incidents that FortiSASE collected.
Summary
Threat Report Malware and botnet attempts on endpoints. Includes detected malware and
botnets. Also includes blocked intrusions, sources, and a timeline of the
attempted intrusions as well as the blocked intrusion's severity rating.
VPN Report VPN traffic on endpoints, including authenticated and failed user logins as well as
top VPN users. Identifies SSL VPN tunnels and users as well as web mode by
bandwidth and duration.
Web Usage Summary Report Web usage on endpoints and a bandwidth summary. Includes top active users
and bandwidth usage. Also identifies users who are blocked the most from
websites.
Logging
Logging and monitoring are useful components to help you understand what is happening on your network and to inform
you about network activities, such as a virus detection, visit to an invalid website, intrusion, failed login attempt, and
others.
3. Right-click the user that you want to drill down on. Select one of the following options:
l Show In FortiView: goes to the FortiView VPN dashboard, which displays real-time VPN connection
information for the selected user. To view historical data for the user, select 1 Day or 1 Week from the
dropdown list in the top right corner.
l Show Matching Traffic Logs: displays real-time traffic logs for the selected user. To view historical data for the
user, select the applied Date filter. Apply a new filter for the desired timerange.
You can configure FortiSASE to forward logs to an external server, such as FortiAnalyzer.
4. In the Server Address and Server Port fields, enter the desired address and port for FortiSASE to communicate with
the server.
5. Enable Reliable Connection to use TCP for log forwarding instead of UDP.
6. Click OK.
You must import the remote CA certificate for the external syslog server to FortiSASE to
establish trust with the external syslog server. Otherwise, the TLS connection fails and the
external syslog server cannot read the forwarded logs.
Log anonymization
Log anonymization allows you to hide personally identifiable user information, such as their username, in Dashboard
widgets, logs, and other areas of FortiSASE.
The following shows the Connected Users page when log anonymization is disabled. The username information in the
User field is visible.
The following shows the Connected Users page when log anonymization is enabled. The username information in the
User field is anonymized.
The following shows log anonymization's effect on Analytics > Logs > Traffic. In the following example, all logs are from
the same source (user fme) and log anonymization was enabled at 15:48. All logs for traffic that occurred before 15:48
show the source information. All logs that occurred after 15:48 have the source information anonymized.
You cannot retroactively anonymize or deanonymize source information by enabling or disabling anonymization. The
source information remains anonymized or not anonymized based on whether log anonymization was enabled or
disabled when the traffic occurred.
The following shows the Managed Endpoints page when log anonymization is disabled. The username information is
visible.
The following shows the Managed Endpoints page when log anonymization is enabled. The username is anonymized.
When log anonymization is enabled, reports may be less useful, as personally identifiable
information will be anonymized.
Administrator Events
Administrator Events logs under Analytics > Events provide granular logs that are useful to monitor and audit
administrator activities such as login, MSSP portal access, configuration changes made by normal Identity & Access
Management (IAM)/single sign on (SSO)/API user accounts or impersonated SSO/IAM accounts, contributing to
effective auditing and compliance management. FortiSASE stores Administrator Events logs for the number of days that
you specify in the log retention policy. See Log retention policy on page 208.
Currently, in FortiSASE, administrator event logs are displayed after some delay. Therefore, different timestamp fields
are available for administrator events only to distinguish between the event’s actual occurrence time and the time that
the log was exported to FortiSASE.
Administrator Events log type Timestamp field for actual Timestamp field for log export
event time time to FortiSASE
(Unix timestamp in seconds) (Unix timestamp in nano-
seconds)
Currently, log storage is fixed and log storage usage depends on factors such as number of
users, number of policies with logging enabled, and logging type selected (security events, all
sessions) for such policies. If log rotation occurs ahead of the configured log retention period,
open a new FortiCare support ticket to request an log storage increase for your instance.
You can configure FortiSASE to store logs up to a certain number of days that you specify as the log retention policy.
FortiSASE automatically deletes logs that are older than the specified log retention (days).
For existing FortiSASE instances, this feature remains disabled by default, which allows a default log retention period of
60 days until you explicitly configure this setting. New FortiSASE instances have a log retention period of 30 days by
default. You can configure the log retention policy to between 2 to 30 days. The policy applies to traffic, security, and
event logs.
To store logs for a longer duration, configuring log forwarding to an external server is advised. See Forwarding logs to an
external server on page 204.
To provide integration with FortiGuard SOC-as-a-Service (SOCaaS), FortiSASE supports the ability to configure log
forwarding from FortiSASE to a SOCaaS collector using Log Forwarding to SOCaaS in Analytics > Settings.
Currently, you cannot disable the Log Forwarding to SOCaaS feature from Analytics >
Settings once you have enabled it because the toggle is grayed out. To disable this feature,
you must create a new FortiCare ticket.
Clients using managed endpoints connect using VPN. You can onboard them using the Onboard Users slide-in.
You can access the Onboard Users page by doing one of the following:
l Go to Dashboard > Status and under the Remote Users widget, click Onboard Users. If this widget does not exist,
add a new Remote Users widget as Adding a custom dashboard on page 19 describes.
l Go to Configuration > Users and click Onboard Users at the top right of the page.
When you click the Onboard Users button, the Onboard Users slide-in page appears. The page consists of the following
sections:
l Managed Endpoint Users. See Managed endpoint client onboarding on page 210.
l Secure Web Gateway Users. See SWG client onboarding on page 212.
Onboard Users > Managed Endpoint Users includes features to support onboarding managed endpoint clients.
Feature Description
remaining features in this table appear when you select this method.
l Send link to users: send invitation email to selected users containing links to
FortiClient installers for all major operating systems (OS). When you select
this method, the following options appear:
l Installer Type:
l Pre-configured: installer is preconfigured to connect with
FortiSASE, that is, the invitation code is built-in.
l Manual: after downloading and launching the installer, users must
manually enter the invitation code sent in the email.
l Invite Users: click + to add a blank field where you can enter the email
address of the managed endpoint users to onboard to FortiSASE. Click
+ as many times as desired to enter email addresses. When you
complete entering the email addresses of managed endpoint users,
click Send.
Preconfigured installer
OS Use the OS dropdown to select the installer for the major OS that you want to
download. These installers are preconfigured with your FortiSASE invitation code.
Download Installer After selecting an OS, clicking Download Installer downloads the preconfigured
installer for the selected OS to your local machine.
Manual Installer
Invitation Code After downloading and launching the FortiClient installer, this is the code to input
into FortiClient to allow managed users to be automatically provisioned to connect
to FortiSASE.
In FortiClient, on the Zero Trust Telemetry tab, input the invitation code from
FortiSASE in the Register with Zero Trust Fabric field, and click Connect.
OS Use the OS dropdown to select the installer for the major OS that you want to
download. These installers are not preconfigured with your FortiSASE invitation
code.
Download Installer After selecting an OS, clicking Download Installer downloads the preconfigured
installer for the selected OS to your local machine.
Generic FortiClient Installers These installers are publicly available installers that do not come preconfigured
with your FortiSASE invitation code. Clicking a generic installer for a supported
OS goes to a download page where you can select and download the installer to
your local machine.
For the Preconfigured Installer or Manual Installer, you can proceed to provision your endpoints by doing one of the
following:
l Using a mobile device management (MDM) software suite using the installer
l Distributing the installer to end users and having them install it on their endpoints
When using the Manual Installer, whether you decide to provision your endpoints using this installer and an MDM, or
distribute this installer to end users, end users must still input the invitation code that you provide for your FortiSASE
instance.
FortiSASE secure web gateway (SWG) mode involves configuring and hosting a proxy autoconfiguration (PAC) file for
respective endpoints to connect to the FortiSASE gateway.
A PAC file is based on JavaScript and contains rules for the proxy client to follow to route traffic to the proxy server or
directly to the Internet. For FortiSASE SWG users:
l The proxy client is a web browser or another proxy-aware application.
l The proxy server is the FortiSASE SWG.
l Routing traffic to the proxy uses the FortiSASE SWG as a web proxy.
l Routing traffic directly to the Internet bypasses the FortiSASE SWG.
Typically, some web applications require traffic to be routed directly to the Internet for specific domains which do not
support redirection for security reasons or are required for authentication, such as common SAML identity providers, to
load correctly. In these cases, you must customize the PAC file with specific IP addresses and hostnames, and then host
the custom PAC file on a server that the endpoints can access.
The workflow for customizing and using a PAC file is as follows:
1. FortiSASE provides a preconfigured PAC file hosted on the FortiSASE server for use. Download the PAC file to a
computer for editing.
2. Customize the PAC file in a text editor to exclude certain hosts from being proxied.
3. Host the custom PAC file on a server accessible by the endpoints.
4. On an endpoint, download and install the SWG certificates provided in the FortiSASE portal.
5. On an endpoint, install and configure the client browser or OS settings to point to the hosted custom PAC file.
System > SWG Configuration displays the secure web gateway (SWG) servers, port, and hosted proxy
autoconfiguration (PAC) file. You can download the predefined PAC file to customize.
By default, the FortiSASE hosted PAC file contains the global (recommended) URL and the SWG port specific to your
instance. This global (recommended) URL automatically directs users to the closest geographical location for all
browsers and proxy-aware applications. For example:
function FindProxyForURL(url, host) {
return "PROXY turbo-hqwdvq17.edge.prod.fortisase.com:10925; DIRECT";
}
This simple PAC file specifies that the web request should be sent through the proxy server turbo-
hqwdvq17.edge.prod.fortisase.com on TCP port 10925 and if the proxy does not respond to this request, the browser
sends the web request directly to the Internet without using the proxy.
This example customizes the PAC file to exclude common external URLs and networks from being forwarded to the
FortiSASE secure web gateway (SWG) server, which allows specific domains which do not support redirection for
security reasons or are required for authentication, such as common SAML identity providers, to load correctly.
You must replace the final return statement at the end of the PAC file with the corresponding proxy URL and port listed
in your preconfigured PAC file in the previous step Downloading the preconfigured PAC file on page 212.
function FindProxyForURL(url, host) {
// Apple
if (dnsDomainIs (host, "albert.apple.com") ||
dnsDomainIs (host, "captive.apple.com") ||
dnsDomainIs (host, "gs.apple.com") ||
dnsDomainIs (host, "humb.apple.com") ||
dnsDomainIs (host, "static.ips.apple.com") ||
dnsDomainIs (host, "sq-device.apple.com") ||
dnsDomainIs (host, "tbsc.apple.com") ||
shExpMatch (host, "*.push.apple.com") ||
dnsDomainIs (host, "deviceenrollment.apple.com") ||
dnsDomainIs (host, "deviceservices-external.apple.com") ||
dnsDomainIs (host, "gdmf.apple.com") ||
dnsDomainIs (host, "identity.apple.com") ||
// VMWare
if (shExpMatch (host, "*.awmdm.com"))
return "DIRECT";
// Okta
if (shExpMatch (host, "*.okta.com") ||
shExpMatch (host, "*.oktacdn.com"))
return "DIRECT";
// Microsoft
if (dnsDomainIs (host, "login.microsoftonline.com") ||
shExpMatch (host, "*.officeconfig.msocdn.com") ||
dnsDomainIs (host, "config.office.com") ||
dnsDomainIs (host, "graph.windows.net") ||
dnsDomainIs (host, "enterpriseregistration.windows.net") ||
shExpMatch (host, "*.manage.microsoft.com") ||
dnsDomainIs (host, "manage.microsoft.com") ||
shExpMatch (host, "*.microsoftonline.com") ||
shExpMatch (host, "*.msauth.net"))
return "DIRECT";
// Google
if (dnsDomainIs (host, "client1.google.com") ||
dnsDomainIs (host, "client2.google.com") ||
dnsDomainIs (host, "client3.google.com") ||
dnsDomainIs (host, "client4.google.com") ||
dnsDomainIs (host, "client5.google.com") ||
dnsDomainIs (host, "client6.google.com") ||
dnsDomainIs (host, "chrome.google.com") ||
dnsDomainIs (host, "commondatastorage.googleapis.com") ||
dnsDomainIs (host, "dl-ssl.google.com") ||
dnsDomainIs (host, "dl.google.com") ||
dnsDomainIs (host, "gweb-gettingstartedguide.appspot.com") ||
dnsDomainIs (host, "m.google.com") ||
dnsDomainIs (host, "hangouts.google.com") ||
dnsDomainIs (host, "pack.google.com") ||
dnsDomainIs (host, "safebrowsing-cache.google.com") ||
dnsDomainIs (host, "safebrowsing.google.com") ||
dnsDomainIs (host, "ssl.gstatic.com") ||
dnsDomainIs (host, "storage.googleapis.com") ||
dnsDomainIs (host, "tools.google.com") ||
dnsDomainIs (host, "www.googleapis.com") ||
shExpMatch (host, "*.gstatic.com") ||
dnsDomainIs (host, "play.google.com") ||
dnsDomainIs (host, "mtalk.google.com") ||
dnsDomainIs (host, "accounts.google.com") ||
dnsDomainIs (host, "aadcdn.msftauthimages.net") ||
dnsDomainIs (host, "aadcdn.msftauth.net") ||
dnsDomainIs (host, "omahaproxy.appspot.com") ||
dnsDomainIs (host, "cros-omahaproxy.appspot.com"))
return "DIRECT";
// Replace this line with the corresponding line from your FortiSASE deployment’s
preconfigured PAC file
return "PROXY turbo-hqwdvq17.edge.prod.fortisase.com:10925; DIRECT";
}
To selectively use sections of exempted URLs above, you can comment them out using the double slash // at the
beginning of each JavaScript line to prevent the URLs from being exempted and force them to go through the FortiSASE
SWG.
For example, to ensure VMware Workspace One traffic is sent to the proxy, since the rule consists of an if statement and
a return statement, comment out both lines:
// VMWare
// if (shExpMatch (host, "*.awmdm.com"))
// return "DIRECT";
Once you have modified the proxy autoconfiguration (PAC) file, you should host it on a web server (such as Amazon S3)
that your remote users can externally access. You must configure the web server to allow .PAC file extensions to be
downloaded and specified using the MIME type application/x-ns-proxy-autoconfig.
The PAC file does not require user authentication to access. However, any user that points to the PAC file is subject to
authentication by FortiSASE when it accesses the Internet.
To complete the workflow for using a custom proxy autoconfiguration (PAC) file, the end user must download and install
the secure web gateway (SWG) certificate on the endpoint and point the endpoint’s web browsers to this hosted PAC
file.
For details on downloading and installing the SWG certificate on an endpoint, see Certificate installation on page 217.
For details on configuring the endpoint to use the custom hosted PAC file, refer to the steps in Proxy configuration on
page 220.
Certificate installation
When users connect to FortiSASE in secure web gateway (SWG) mode, FortiSASE proxies traffic from the client. While
being proxied, connections using secure protocols like HTTPS have their certificates replaced and signed by FortiSASE.
To avoid seeing warnings and errors, the client must trust the signing certificate authority (CA) and have a valid
certificate chain back to the root CA. Therefore, installing FortiSASE’s CA certificate on the client’s trusted certificate
store is important.
You should provide users with the required CA certificate during onboarding. In SWG mode, when you onboard users
from the GUI, download the SWG certificates package that appears at the end of the Secure Web Gateway Users
instructions. You can also find this on the right side of the System > SWG Configuration page.
Windows
1. Double-click the FortiSASE certificate that the administrator provided during onboarding.
2. On the General tab, click Install Certificate.
3. You can install the certificate for the current user or local machine. Installing for the local machine requires
administrator permissions. Select the desired option and click Next.
4. Choose where you want the certificate to be kept. To customize this, select Place all certificates in the following
store and browse the store. Then select Trusted Root Certification Authorities. Click Next.
5. Review and click Finish to install the certificate.
macOS
To properly browse any HTTPS websites, you must install the FortiSASE root certificate on the endpoint.
1. Double-click the FortiSASE certificate that the administrator provided during onboarding.
2. From the Keychain dropdown list, select System, then click Add.
3. When you view the certificate, the root certificate appears as not trusted. Expand the Trust section. From the When
using this certificate dropdown list, select Always Trust.
4. Save the configuration and add the certificate to the system keychain. You can connect to HTTPS websites without
seeing a warning.
Chrome OS
8. You have now imported the FortiSASE CA certificate. Scroll down to see the org-Fortinet entry. Expand to see the
certificate and view its details.
Managed Chromebook
If your organization manages Chromebooks using the Google Admin console, you can centrally install the FortiSASE
certificate authority certificate on the Admin console and distribute it to each managed Chromebook.
Proxy configuration
To connect to FortiSASE in secure web gateway (SWG) mode, each endpoint client must configure proxy settings within
its network or browser settings to point to FortiSASE’s servers. You can configure this individually on the endpoint or, if
you are using an enterprise management system, push it out to managed endpoints centrally.
You should provide users one of the following during the user onboarding process:
l URL to the hosted proxy autoconfiguration (PAC) file
l Proxy server addresses and port if users are to configure proxy settings manually.
From the System > SWG Configuration page, make note of the following information:
Field Description
Secure Web Gateway Server(s) Lists address of each individual regional FortiSASE server for your instance.
Secure Web Gateway Port Port that client should connect to in their proxy settings.
PAC File Static copy of the PAC file, which you can customize and rehost on your server.
Hosted PAC File Address of the PAC file hosted on the FortiSASE server.
Windows
The end user can configure proxy settings at the operating system (OS) level or in a browser. When you configure
Secure Web Gateway (SWG) settings at the OS level, Windows applies them to all installed browsers. The following
gives instructions for configuring SWG settings at the OS level on a Windows 10 device.
3. In the Script address field, enter the Hosted PAC File URL.
4. The next time the user starts a browser session, the browser displays an authentication prompt. The end user
enters their FortiSASE credentials in the prompt. After ten minutes of inactivity, the browser reprompts for
authentication credentials.
macOS
This example demonstrates manually configuring proxy settings on macOS. See also Change proxy settings in Network
preferences on Mac.
6. The next time that the user starts a browser session, the browser displays an authentication prompt. The end user
enters their FortiSASE user credentials in the prompt to authenticate.
Chrome OS
If issues arise with some websites using SOCKS, you can work around this by disabling
Use the same proxy for all protocols. Then only define the proxy server address for HTTP
proxy and secure HTTP proxy.
5. On a successful connection, your browser prompts you to authenticate. Enter your user credentials to authenticate
to FortiSASFortiSASE and continue browsing the web.
If you receive a warning message from Chrome preventing you to go further, you must disable your proxy settings, and
install the FortiSASE certificate authority certificate before reenabling proxy.
Managed Chromebook
If your organization manages Chromebooks using the Google Admin console, you can centrally configure proxy settings
on the Admin console and distribute them to each managed Chromebook.
1. On the Google Admin console, go to Device > Chrome > Settings > Users & Browsers..
2. Select the organizational unit in which to apply these settings.
3. Under User and Browser Settings, filter for the keyword Proxy. The Network section appears.
4. For Proxy mode, use one of the following options:
a. Select Always use the proxy auto-config specified below. Enter FortiSASE’s hosted PAC file address. Save.
b. Select Always use the proxy specified below. Enter the proxy server URL in the format <proxy server
address>:<SWG port>. Save.
with an icon and warning that your administrator is enforcing this setting.
FortiSASE supports a Chrome extension that allows enforcing FortiSASE secure web gateway (SWG) connectivity for
selected endpoints with the Chrome browser installed, including Chromebooks, based on the endpoint operating system
(OS) and the corresponding extension policy that the Google Workspace administrator configured.
You can download the FortiSASE Secure Web Gateway Chrome extension from the Google Chrome Web store and add
it to the Chrome web browser.
Since this extension is not installed in incognito mode, SWG policies are not enforced when using incognito mode. The
Google Workspace administrator must disallow incognito mode to ensure that SWG is always enforced on the
Chromebook and other devices with managed Chrome browsers.
1. Go to Devices > Chrome > Settings > Users & browsers.
2. Select the desired organizational unit (OU).
3. Scroll to Security > Incognito mode.
You can apply the FortiSASE SWG extension to one or more user OUs within Google Workspace. All users assigned
within an OU that the FortiSASE SWG extension is applied to have the extension installed and SWG enforced on their
Chromebook and Chrome browser.
1. In the Google Admin console, go to Devices > Chrome > Apps & extensions > Users & browsers.
2. Select the desired OU to install and enforce the FortiSASE SWG extension.
3. Add the Chrome extension to the OU by clicking the + button on the bottom right, clicking Chrome app or extension
by ID, and searching using the ID aecejhdejcnfihadbfidmndehobfdpcc.
4. Select the FortiSASE Secure Web Gateway extension to push to Chromebooks and devices with managed Chrome
browsers.
5. Configure the policy using the following parameters:
Parameter Description
pacFileUrl PAC file that the extension will enforce. Configure one of the following:
l Default hosted PAC file link from FortiSASE in System > SWG
l Setting this value to true makes the PAC file URL visible to the
extension.
supportedPlatforms Possible values include cros, linux, mac, and win to specify ChromeOS
(Chromebook), Linux, macOS, and Windows, respectively.
To exempt a device from SWG enforcement, you can set one of these
options:
l Remove the device OS from the supportedPlatforms array
6. Click Save.
Following is an example extension policy configuration using a custom PAC file hosted on a LAN server with the PAC file
URL hidden from extension and the extension applied to ChromeOS, macOS, and Windows devices:
{
"pacFileUrl": {
"Value": "https://192.168.1.115/proxy.pac"
},
"showProxyInfo": {
"Value": false
},
"supportedPlatforms": {
"Value": ["cros", "mac", "win"]
}
}
The following shows the FortiSASE SWG extension and example extension policy applied to users within the Marketing
OU:
To verify the policy has been enforced on the device with the extension installed:
On the Chromebook or device with Chrome browser installed, go to chrome://policy from the Chrome browser to verify
the aforementioned example policy has been enforced on the Chromebook or device with managed Chrome browser:
FortiClient on different platforms supports integration with enterprise mobility management or mobile device
management software. You can use this software to onboard endpoints to successfully connect to and be managed by
FortiSASE.
You can find details for configuring Microsoft Intune integration with FortiClient iOS in Configuring Microsoft Intune
integration.
Since FortiSASE uses an invitation code instead of a direct IP address or hostname and port, ensure that cloud_
invite_code is configured in one of the following locations in Intune:
l In the Create app configuration policy window on the Settings tab
l For an existing configuration policy, click Properties and check under Settings. In the example, you can see that
cloud_invite_code is configured.
When FortiSASFortiSASE security components are configured to use SSL deep inspection, then the certificate authority
(CA) certificate is automatically installed on desktop FortiClient endpoints. However, for mobile endpoints such as Apple
devices running FortiClient iOS, then enterprise mobility management software must be used to install such CA
certificates.
You can find details on deploying a trusted root certificate such as the CA certificate configured on FortiSASE for SSL
deep inspection in Trusted root certificate profiles for Microsoft Intune.
FortiSASE includes a portal that managed security service providers (MSSP) can use to offer their end customers a
managed FortiSASE service by performing the following management functions for multitenant FortiSASE deployments:
l Monitor tenants’ FortiSASE instances
l Access and manage tenants’ FortiSASE instances
The FortiSASE MSSP portal is based on the use of FortiCloud Identity & Access Management (IAM) users and the
FortiCloud organizational unit structure. For details, see Organization Portal and Identity & Access Management (IAM),
respectively.
Prerequisites
You must apply a FortiCloud Premium contract to the root account to allow it to establish an organization and invite other
FortiCare accounts to join the organization.
Configuration workflow
The workflow for configuring FortiCloud Identity Access & Management (IAM) users and organization units (OU) and
using the managed security service provider (MSSP) portal is as follows:
l Read/write access
l Read-only access
When configuring IAM users for an organization, you typically configure the user type as
Organization with a Permission Scope configured to an organization unit (OU) or sub-OU.
These users can access the MSSP portal.
IAM users where the user type is configured as Local can directly access the FortiSASE portal
into a specific tenant’s instance. However, they cannot access the MSSP portal.
When new member accounts with new placeholder email addresses, also known as
placeholder accounts, have been added to sub-OUs, administrators of these sub-OUs can
provision new instances associated with these placeholder accounts from the MSSP portal
After configuring the required settings in the FortiCloud Identity & Access Management (IAM) portal and FortiCloud
Organization portal, you can access the managed security service provider (MSSP) portal.
The MSSP portal allows MSSP administrators to provide a managed FortiSASE service to end customers by performing
these tasks:
1. When an IAM user logs in to FortiSASE for the first time, there are some preliminary steps to complete to validate
the new IAM user. See Validating new IAM users.
2. Access the MSSP portal using an IAM user corresponding to the root account. See Accessing the MSSP portal on
page 232.
3. Monitor the status of a tenant’s FortiSASE instance. See Monitoring a tenant's instance on page 233.
4. Manage a tenant’s FortiSASE instance, namely, to preconfigure it prior to delivery to the end customer, troubleshoot
it, and resolve any configuration issues that the end customer reports. See Managing a tenant's instance on page
234.
The managed security service provider (MSSP) portal requires configuring an Identity & Access Management (IAM) user
corresponding to the root account, as Adding IAM users describes.
When configuring IAM users for an organization, you typically configure the user type as
Organization with a Permission Scope configured to an organization unit (OU) or sub-OU.
These users can access the MSSP portal.
IAM users where the user type is configured as Local can directly access the FortiSASE portal
into a specific tenant’s instance. However, they cannot access the MSSP portal.
user with the wizard. The MSSP portal for the organization displays.
1. From within a FortiSASE instance, select the context switch dropdown menu. Accounts within the organization
display.
2. Select the organization or sub-organization units (OU) to enter the MSSP portal for the selected context. In the
example, selecting the top-level organization MNC Corporation displays FortiSASE instances for all OUs. Selecting
the Sales OU displays FortiSASE instances for that OU only.
Once logged into the managed security service provider portal, the administrator CAN monitor the following FortiSASE
tenant data:
l Pie charts showing the distribution of FortiSASE users for active and inactive licenses and the distribution of
security points of presence (PoP)
l Tenant entries separated into Active Licenses and Inactive Licenses categories. The Inactive Licenses category is
for tenants for which data is not yet available for instances that are not yet provisioned.
l When Show subtree tenants is enabled, tenants for second- and third-level organization units (OU) display. When
this toggle is disabled, only tenants for the first-level OU (top-level organization only) display.
l Columns with data display. The following lists all available columns. Bolded columns display by default:
Column Description
Tenants FortiSASE tenant listed with its Identity & Access Management user email
address.
Average Throughput* Average transmitted data rate through the tenant’s instance.
Average Egress In* Average received data rate for tenant’s egress interface.
Average Egress Out* Average transmitted data rate for tenant’s egress interface.
Average Ingress In* Average received data rate for tenant’s ingress interface.
Average Ingress Out* Average transmitted data rate for tenant’s ingress interface.
A managed security service provider (MSSP) administrator can use the MSSP portal to select a tenant and manage its
FortiSASE instance. This allows the MSSP administrator to preconfigure the instance prior to handing off the instance to
end customer and to troubleshoot and resolve any configuration issues if the end customer reports any issues with the
instance.
To manage a tenant’s FortiSASE instance from the MSSP portal using the Manage button:
1. From the MSSP portal, in the Active License category, click a tenant.
2. Click Manage.
3. The tenant's FortiSASE instance loads as if you logged into the FortiSASE portal using the Identity & Access
Management (IAM) user account associated with the instance.
4. Perform any configuration within the FortiSASE instance with the same permissions as the IAM user account
associated with the instance.
To manage a tenant’s FortiSASE instance from the MSSP portal using the context switch dropdown
menu:
1. From within a FortiSASE instance, select the context switch dropdown menu. Accounts within the organization
display.
2. Enable Show accounts with active license only to filter the dropdown menu to only display organization units and
accounts with active licenses.
3. Select the IAM user or member account (with a real or placeholder email address) whose FortiSASE instance you
want to manage.
4. The tenant's FortiSASE instance as if you had logged into the FortiSASE portal using the account associated with
the instance.
5. Perform any configuration within the FortiSASE instance with the same permissions as the account associated with
the instance.
When new member accounts with new placeholder email addresses, also known as
placeholder accounts, have been added to sub-OUs, administrators of these sub-OUs can
provision new instances associated with these placeholder accounts from the MSSP portal
FortiSASE supports the FortiGate Support Tool. The FortiGate Support Tool is a Google Chrome extension that can
execute background debugs on the FortiSASE GUI to troubleshoot errors. Using the tool, you can create a file to provide
to the Fortinet Support for troubleshooting. See Troubleshooting Tip: GUI slowness and errors via FortiGate support tool.
The following provides information about FortiSASE data centers or points of presence (PoPs) available through the
FortiSASE Status page, global data centers list, and egress IP addresses feed. The following also provides information
about the number of security data centers accessible per license.
Status page
To view real-time information on the current status of data centers, visit the FortiSASE Status page at
https://status.fortisase.com and click the plus sign (+) next to Fortinet Cloud Locations or Public Cloud Locations.
For a table of global data center information for FortiSASE, see Global data centers.
For instances equipped with Dedicated Public IPs (via SKU addition, or through Advanced or
Comprehensive licenses), the IP addresses associated with each FortiSASE security PoP are
not included in the Egress IP API as they are customer-specific.
The egress IP addresses feed includes IP addresses for log forwarding and FortiSASE
Endpoint Management Service. It is recommended that administrators of all instances,
including those with dedicated IP addresses, use the egress IP addresses feed to allowlist
traffic from both FortiSASE services based on their specific needs.
The following describes how to configure a threat feed using this feed in FortiOS. For information on threat feeds, see
Threat feeds.
The number of data centers with security capabilities that are accessible by remote users depends on the FortiSASE
license tier and number of users, or user bands, applied to your FortiSASE instance. See the following table:
Standard 4 4 4
Advanced 4 4 4
Comprehensive 1 2 4
For all license tiers, you can purchase access to additional security data centers with the corresponding FortiSASE
Region Add-on license:
Standard
Fortinet Location Add-on
Advanced
Features marked as "Beta" are available to use but may have constraints. These features are subject to continual
improvements. Feedback is encouraged.
See the FortiSASE REST API reference on the Fortinet Developer Network.
Latency
High latency can have a significant impact on a user’s observed Internet performance.
When using FortiSASE, the goal is to ingress and egress traffic from the Fortinet network while introducing the smallest
possible amount of network latency. FortiSASE achieves this by using high-quality Internet service providers (ISP) and
Internet exchange points to minimize network hops.
In general, physical distance (e.g. the speed of light) and third party ISP routing to the last-mile introduce most network
latency between the user and FortiSASE point of presence (PoP).
Prior to provisioning FortiSASE, evaluating which FortiSASE PoP will provide the lowest latency to your end users’
locations and selecting these during provisioning is recommended.
To determine this, you can test the egress IP addresses in Appendix A - FortiSASE data centers on page 237 via ping,
traceroute, or mtr.
Keep these latency thresholds in mind when evaluating these selections:
Even if you observe ideal latency of under 20 ms in testing, packet loss and jitter can significantly impact performance.
l Jitter should be under 30 ms.
l Packet loss should be 0%.
You will observe significant degradation particularly for real-time communications (VoIP, video, and so on) beyond 30
ms of Jitter and/or 1% packet loss.
While downloading a large file (100 MB or above) when using FortiSASE, you may observe increased latency (280 ms or
above). SSL VPN support for DTLS is supported in FortiClient to resolve increase latency. See Supported FortiClient
features.
Starting in 23.4.b, DTLS support is enabled by default for existing and new FortiSASE instances.
Copyright© 2024 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s Chief Legal Officer, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.