Fortigate client
Author: m | 2025-04-25
The LDAPS server requests a client certificate to identify the FortiGate as a client. The FortiGate provides a configured client certificate, issued to zach.com, to the LDAPS server. The following communication between the FortiGate and the LDAPS server shows the client certificate is sent by the FortiGate: Create the RADIUS client (FortiGate) on the FortiAuthenticator. On the FortiAuthenticator, go to Authentication RADIUS Service Clients to add the FortiGate as a RADIUS client
FortiGate as SSL VPN Client
Packets with destinations on the 192.168.10.0 network through the VPN, encrypted and encapsulated. Similarly, the Site B FortiGate unit is configured to send packets with destinations on the 10.10.1.0 network through the VPN tunnel to the Site A VPN gateway.In the site-to-site, or gateway-to-gateway VPN shown below, the FortiGate units have static (fixed) IP addresses and either unit can initiate communication.You can also create a VPN tunnel between an individual PC running FortiClient and a FortiGate unit, as shown below. This is commonly referred to as Client-to-Gateway IPsec VPN.VPN tunnel between a FortiClient PC and a FortiGate unitOn the PC, the FortiClient application acts as the local VPN gateway. Packets destined for the office network are encrypted, encapsulated into IPsec packets, and sent through the VPN tunnel to the FortiGate unit. Packets for other destinations are routed to the Internet as usual. IPsec packets arriving through the tunnel are decrypted to recover the original IP packets.Clients, servers, and peersA FortiGate unit in a VPN can have one of the following roles:Server — responds to a request to establish a VPN tunnel.Client — contacts a remote VPN gateway and requests a VPN tunnel.Peer — brings up a VPN tunnel or responds to a request to do so.The site-to-site VPN shown above is a peer-to-peer relationship. Either FortiGate unit VPN gateway can establish the tunnel and initiate communications. The FortiClient-to-FortiGate VPN shown below is a client-server relationship. The FortiGate unit establishes a tunnel when the FortiClient PC requests one.A FortiGate unit cannot An SSH client on your management computer to connect to the CLI. The following instructions use PuTTy. The steps may vary in other terminal emulators. To connect to the CLI using SSH: On your management computer, start PuTTy. In the Host Name (or IP address) field, enter the IP address of the network interface that you are connected to and that has SSH access enabled. Set the port number to 22, if it is not set automatically. Select SSH for the Connection type. Click Open. The SSH client connect to the FortiGate.The SSH client may display a warning if this is the first time that you are connecting to the FortiGate and its SSH key is not yet recognized by the SSH client, or if you previously connected to the FortiGate using a different IP address or SSH key. This is normal if the management computer is connected directly to the FortiGate with no network hosts in between. Click Yes to accept the FortiGate's SSH key.The CLI displays the log in prompt. Enter a valid administrator account name, such as admin, then press Enter. Enter the administrator account password, then press Enter.The CLI console shows the command prompt (FortiGate hostname followed by a #). You can now enter CLI commands. If three incorrect log in or password attempts occur in a row, you will be disconnected. If this occurs, wait for one minute, then reconnect and attempt to log in again.Fortigate: How to configure SSL VPN Client to site on Fortigate
Hello,we having trouble with throughput the SSL VPN on WindowsLatency from the client to the Fortigate is about 20ms and bandwidth in Fortigate site is 1Gbps and client site is 100MbbpsFirst, when connecting locally over the internal gigabit network (with near-zero latency), performance easily exceeds about 60Mbps for download on the client. I verified through trace routes, the route table, and Task Manager that tested traffic was indeed flowing through SSL VPN. This tells me that the underlying hardware is capable. However, when testing from off-site (at least 100Mbps and 20ms latency), the performance changes. From the client' s perspective, the download rate through SSL VPN is about 13Mbps and the upload is the problem in that it cannot exceed about 2-3Mbps.It seems that the increased latency is the contributing factor. Given that the SSL VPN uses TCP, my guess is that there' s an issue with TCP window scaling of the SSL VPN connection itself, especially when the client is sending data to the Fortigate.I tried disable all UTM, change IP on wan. wan has no errors, MTU 1500, speed 1GbitFD (fix).Important: If I configured IPsec VPN and test it, throughput from the corporate LAN to the client is over 80Mbps on both sides. And also traffic to the internet (through the Fortigate, no split-tunnel) reaches maximum client line (about 90Mbps).Has anyone else been able to achieve better performance on either Windows SSL VPN clients? Our clients need good throughput in both directions from corporate LAN and Internet-based sources where latency far from zero...My testing has included Windows 7 and Windows 10 Transfer tests included iperf (tcp and udp modes), SMB, FTP, Speedtest.net (and similar tools hosted by the ISP). Fortigate 100D running on v5.4.3,build1111 and FortiClient 5.4.2.0860config vpn ssl settingsset reqclientcert disableset sslv3 disableset tlsv1-0 disableset tlsv1-1 enableset tlsv1-2 enableunset banned-cipherset ssl-big-buffer disableset ssl-insert-empty-fragment enableset https-redirect disableset ssl-client-renegotiation disableset force-two-factor-auth disableset servercert "**********"set algorithm highset idle-timeout 0set auth-timeout 28800set tunnel-ip-pools "*********"set dns-suffix "*******.local"set dns-server1 172.22.91.100set dns-server2 172.22.91.101set wins-server1 172.22.91.100set wins-server2 172.22.91.101set ipv6-dns-server1 ::set ipv6-dns-server2 ::set ipv6-wins-server1 ::set ipv6-wins-server2 ::set route-source-interface disableset url-obscuration disableset http-compression disableset http-only-cookie enableset port. The LDAPS server requests a client certificate to identify the FortiGate as a client. The FortiGate provides a configured client certificate, issued to zach.com, to the LDAPS server. The following communication between the FortiGate and the LDAPS server shows the client certificate is sent by the FortiGate:The FortiGate as a DHCP client is not abl - Fortinet
FTP proxy FTP proxies can be configured on the FortiGate so that FTP traffic can be proxied. When the FortiGate is configured as an FTP proxy, FTP client applications should be configured to send FTP requests to the FortiGate. To configure explicit FTP proxy in the GUI: Enable and configure explicit FTP proxy: Go to Network > Explicit Proxy. Enable Explicit FTP Proxy. Select port2 as the Listen on Interfaces and set the HTTP Port to 21. Configure the Default Firewall Policy Action as needed. Click Apply. Create an explicit FTP proxy policy: Go to Policy & Objects > Proxy Policy. Click Create New. Set Proxy Type to FTP and Outgoing Interface to port1. Also set Source and Destination to all, Schedule to always, and Action to ACCEPT. Click OK to create the policy. This example creates a basic policy. If required, security profiles can be enabled. Configure the FTP client application to use the FortiGate IP address. To configure explicit FTP proxy in the CLI: Enable and configure explicit FTP proxy:config ftp-proxy explicit set status enable set incoming-port 21endconfig system interface edit "port2" set vdom "vdom1" set ip 10.1.100.1 255.255.255.0 set allowaccess ping https ssh snmp http telnet set type physical set explicit-ftp-proxy enable set snmp-index 12 nextend Create an explicit FTP proxy policy:config firewall proxy-policy edit 4 set name "proxy-policy-ftp" set proxy ftp set dstintf "port1" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" nextend This example creates a basic policy. If required, security profiles can be enabled. Configure the FTP client application to use the FortiGate IP address. Changing the FTP mode from active to passive for explicit proxy An explicit FTP proxy can convert an active FTP connection initiated by an FTP client to a passive FTP connection between the explicit FTP proxy and FTP server.config ftp-proxy explicit set server-data-mode {client | passive}end server-data-mode {client | passive} Set the data selection mode on the FTP server side: client: use the same transmission mode for client and server data sessions (default). passive: use passive mode for server data sessions. In this example, a client that only supports active mode FTP connects to a remote FTP server through the explicit FTP proxy to download a text file (test1.txt). The explicit FTP proxy converts the active FTP connection to a passive connection between the explicit FTP proxy and the FTP server. To configure passive mode for FTP server data sessions: Configure the web proxy:config ftp-proxy explicit set status enable set incoming-port 21 set server-data-mode passiveend Enable the explicit FTP proxy on port1:config system interface edit "port1" set ip 10.1.100.2 255.255.255.0 set explicit-ftp-proxy enable nextend Configure the firewall policy:config firewall proxy-policy edit 1 set proxy ftp set dstintf "port3" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" nextend Get the client to download the text file from the FTP server (NcFTP is used in this example):ncftpget -E -r 0 -d stdout -u [email protected] -p 123456 10.1.100.2 ./ /home/pc4user1/test1.txt...Cmd: PORT 10,1,100,11,151,115200: PORT command On-wire rogue AP detection techniqueOther APs that are available in the same area as your own APs are not necessarily rogues. A neighboring AP that has no connection to your network might cause interference, but it is not a security threat. A rogue AP is an unauthorized AP connected to your wired network. This can enable unauthorized access. When rogue AP detection is enabled, the On-wire column in the Rogue AP Monitor list shows a green up-arrow on detected rogues.Rogue AP monitoring of WiFi client traffic builds a table of WiFi clients and the Access Points that they are communicating through. The FortiGate unit also builds a table of MAC addresses that it sees on the LAN. The FortiGate unit’s on-wire correlation engine constantly compares the MAC addresses seen on the LAN to the MAC addresses seen on the WiFi network.There are two methods of Rogue AP on-wire detection operating simultaneously: Exact MAC address match and MAC adjacency.Exact MAC address matchIf the same MAC address is seen on the LAN and on the WiFi network, this means that the wireless client is connected to the LAN. If the AP that the client is using is not authorized in the FortiGate unit configuration, that AP is deemed an ‘on-wire’ rogue. This scheme works for non-NAT rogue APs.MAC adjacencyIf an access point is also a router, it applies NAT to WiFi packets. This can make rogue detection more difficult.However, an AP’s WiFi interface MAC address is usually in the same range as its wired MAC address. So, the MAC adjacency rogue detection method matches LAN and WiFi network MAC addresses that are within a defined numerical distance of each other. By default, the MAC adjacency value is 7. If the AP for these matching MAC addresses is not authorized in the FortiGateConfiguring FortiGate for PXE Client booting
SSL VPN Choosing a mode of operation and applying the proper levels of security depends on your specific environment and requirements. In tunnel mode, the SSL VPN client encrypts all traffic from the remote client computer and sends it to the FortiGate through an SSL VPN tunnel over the HTTPS link between the user and the FortiGate. It supports a wide range of applications, and provides a transparent user experience when properly configured. FortiClient might enable a DTLS tunnel that allows the SSL VPN to encrypt traffic using TLS, and uses UDP as the transport layer instead of TCP. This avoids retransmission issues that can occur with TCP-inTCP that result in lower throughput. For information on troubleshooting slow SSL VPN throughput, see Troubleshooting common issues in the FortiOS Administration Guide. Web mode provides clientless network access using a web browser with built-in SSL encryption. It is easier to set up than tunnel mode and does not require that an application be installed on the endpoint, but it has limited application support and requires more resources on the FortiGate. For more information, see SSL VPN best practices in the FortiOS Administration Guide. Starting in 7.6.0, FortiGate models with 2GB of memory no longer support SSL VPN. Fortinet Inc. recommends to use IPsec VPN or other non-VPN secure remote access solutions such as ZTNA and FortiSASE. See SSL VPN to IPsec VPN migration and Non-VPN remote access for more details.FortiGate acting as a SSL VPN client
To the cache, the new update file is available to all users, and all subsequent requests for this update are rapidly downloaded from the cache.Traffic shaping.Controls data flow for specific applications, giving administrators the flexibility to choose which applications take precedence over the WAN. A common use case of traffic shaping prevents one protocol or application from flooding a link over other protocols deemed more important by the administrator.SSL acceleration.SSL is used by many organizations to keep WAN communications private. WAN Optimization boosts SSL acceleration properties of FortiGate FortiASIC hardware by accelerating SSL traffic across the WAN. The FortiGate unit handles SSL encryption/decryption for corporate servers providing SSL encrypted connections over the WAN.Explicit web proxy server.Allows users on the internal network to browse the Internet through the explicit web proxy server.Explicit FTP proxy server.Allows users on the internal network to access FTP servers through the explicit FTP proxy server.Reverse proxy.The web and FTP proxies can be configured to protect access to web or FTP servers that are behind the FortiGate using a reverse proxy configuration. Reverse proxies retrieve resources on behalf of a client from one or more servers. These resources are then returned to the client as if they originated from the proxy server.WCCP.The Web Cache Communication Protocol (WCCP) allows to offload web caching to redundant web caching servers. This traffic redirection helps to improve response time and optimize network resource usage.WAN optimization and HA.Configure WAN optimization on a FortiGate HA cluster. The recommended HA configuration for WAN optimization. The LDAPS server requests a client certificate to identify the FortiGate as a client. The FortiGate provides a configured client certificate, issued to zach.com, to the LDAPS server. The following communication between the FortiGate and the LDAPS server shows the client certificate is sent by the FortiGate: Create the RADIUS client (FortiGate) on the FortiAuthenticator. On the FortiAuthenticator, go to Authentication RADIUS Service Clients to add the FortiGate as a RADIUS clientStrongswan as vpn client connect to Fortigate
RADIUS vulnerability Fortinet has resolved a RADIUS vulnerability as described in CVE-2024-3596. As a result, firewall authentication, FortiGate administrative web UI authentication, and WiFi authentication may be affected depending on the functionality of the RADIUS server software used in your environment. RFC 3579 contains information on the affected RADIUS attribute, message-authenticator. In order to protect against the RADIUS vulnerability described in CVE-2024-3596, as a RADIUS client, FortiGate will: Force the validation of message-authenticator. Reject RADIUS responses with unrecognized proxy-state attribute. Message-authenticator checking is made mandatory under UDP/TCP. It is not mandatory when using TLS. Users are highly encouraged to use RADSEC with the RADIUS server configuration. For more information, see Configuring a RADSEC client. If FortiGate is using UDP/TCP mode without RADSEC, the RADIUS server should be patched to ensure the message-authenticator attribute is used in its RADIUS messages. Affected Product Integration FortiAuthenticator version 6.6.1 and older. Third party RADIUS server that does not support sending the message-authenticator attribute. Solution Upgrade FortiAuthenticator to version 6.4.10, 6.5.6, or 6.6.2 and follow the Upgrade instructions. Upgrade the RADIUS server and/or enable it to send the correct message-authenticator attribute.Comments
Packets with destinations on the 192.168.10.0 network through the VPN, encrypted and encapsulated. Similarly, the Site B FortiGate unit is configured to send packets with destinations on the 10.10.1.0 network through the VPN tunnel to the Site A VPN gateway.In the site-to-site, or gateway-to-gateway VPN shown below, the FortiGate units have static (fixed) IP addresses and either unit can initiate communication.You can also create a VPN tunnel between an individual PC running FortiClient and a FortiGate unit, as shown below. This is commonly referred to as Client-to-Gateway IPsec VPN.VPN tunnel between a FortiClient PC and a FortiGate unitOn the PC, the FortiClient application acts as the local VPN gateway. Packets destined for the office network are encrypted, encapsulated into IPsec packets, and sent through the VPN tunnel to the FortiGate unit. Packets for other destinations are routed to the Internet as usual. IPsec packets arriving through the tunnel are decrypted to recover the original IP packets.Clients, servers, and peersA FortiGate unit in a VPN can have one of the following roles:Server — responds to a request to establish a VPN tunnel.Client — contacts a remote VPN gateway and requests a VPN tunnel.Peer — brings up a VPN tunnel or responds to a request to do so.The site-to-site VPN shown above is a peer-to-peer relationship. Either FortiGate unit VPN gateway can establish the tunnel and initiate communications. The FortiClient-to-FortiGate VPN shown below is a client-server relationship. The FortiGate unit establishes a tunnel when the FortiClient PC requests one.A FortiGate unit cannot
2025-04-16An SSH client on your management computer to connect to the CLI. The following instructions use PuTTy. The steps may vary in other terminal emulators. To connect to the CLI using SSH: On your management computer, start PuTTy. In the Host Name (or IP address) field, enter the IP address of the network interface that you are connected to and that has SSH access enabled. Set the port number to 22, if it is not set automatically. Select SSH for the Connection type. Click Open. The SSH client connect to the FortiGate.The SSH client may display a warning if this is the first time that you are connecting to the FortiGate and its SSH key is not yet recognized by the SSH client, or if you previously connected to the FortiGate using a different IP address or SSH key. This is normal if the management computer is connected directly to the FortiGate with no network hosts in between. Click Yes to accept the FortiGate's SSH key.The CLI displays the log in prompt. Enter a valid administrator account name, such as admin, then press Enter. Enter the administrator account password, then press Enter.The CLI console shows the command prompt (FortiGate hostname followed by a #). You can now enter CLI commands. If three incorrect log in or password attempts occur in a row, you will be disconnected. If this occurs, wait for one minute, then reconnect and attempt to log in again.
2025-03-29Hello,we having trouble with throughput the SSL VPN on WindowsLatency from the client to the Fortigate is about 20ms and bandwidth in Fortigate site is 1Gbps and client site is 100MbbpsFirst, when connecting locally over the internal gigabit network (with near-zero latency), performance easily exceeds about 60Mbps for download on the client. I verified through trace routes, the route table, and Task Manager that tested traffic was indeed flowing through SSL VPN. This tells me that the underlying hardware is capable. However, when testing from off-site (at least 100Mbps and 20ms latency), the performance changes. From the client' s perspective, the download rate through SSL VPN is about 13Mbps and the upload is the problem in that it cannot exceed about 2-3Mbps.It seems that the increased latency is the contributing factor. Given that the SSL VPN uses TCP, my guess is that there' s an issue with TCP window scaling of the SSL VPN connection itself, especially when the client is sending data to the Fortigate.I tried disable all UTM, change IP on wan. wan has no errors, MTU 1500, speed 1GbitFD (fix).Important: If I configured IPsec VPN and test it, throughput from the corporate LAN to the client is over 80Mbps on both sides. And also traffic to the internet (through the Fortigate, no split-tunnel) reaches maximum client line (about 90Mbps).Has anyone else been able to achieve better performance on either Windows SSL VPN clients? Our clients need good throughput in both directions from corporate LAN and Internet-based sources where latency far from zero...My testing has included Windows 7 and Windows 10 Transfer tests included iperf (tcp and udp modes), SMB, FTP, Speedtest.net (and similar tools hosted by the ISP). Fortigate 100D running on v5.4.3,build1111 and FortiClient 5.4.2.0860config vpn ssl settingsset reqclientcert disableset sslv3 disableset tlsv1-0 disableset tlsv1-1 enableset tlsv1-2 enableunset banned-cipherset ssl-big-buffer disableset ssl-insert-empty-fragment enableset https-redirect disableset ssl-client-renegotiation disableset force-two-factor-auth disableset servercert "**********"set algorithm highset idle-timeout 0set auth-timeout 28800set tunnel-ip-pools "*********"set dns-suffix "*******.local"set dns-server1 172.22.91.100set dns-server2 172.22.91.101set wins-server1 172.22.91.100set wins-server2 172.22.91.101set ipv6-dns-server1 ::set ipv6-dns-server2 ::set ipv6-wins-server1 ::set ipv6-wins-server2 ::set route-source-interface disableset url-obscuration disableset http-compression disableset http-only-cookie enableset port
2025-03-27FTP proxy FTP proxies can be configured on the FortiGate so that FTP traffic can be proxied. When the FortiGate is configured as an FTP proxy, FTP client applications should be configured to send FTP requests to the FortiGate. To configure explicit FTP proxy in the GUI: Enable and configure explicit FTP proxy: Go to Network > Explicit Proxy. Enable Explicit FTP Proxy. Select port2 as the Listen on Interfaces and set the HTTP Port to 21. Configure the Default Firewall Policy Action as needed. Click Apply. Create an explicit FTP proxy policy: Go to Policy & Objects > Proxy Policy. Click Create New. Set Proxy Type to FTP and Outgoing Interface to port1. Also set Source and Destination to all, Schedule to always, and Action to ACCEPT. Click OK to create the policy. This example creates a basic policy. If required, security profiles can be enabled. Configure the FTP client application to use the FortiGate IP address. To configure explicit FTP proxy in the CLI: Enable and configure explicit FTP proxy:config ftp-proxy explicit set status enable set incoming-port 21endconfig system interface edit "port2" set vdom "vdom1" set ip 10.1.100.1 255.255.255.0 set allowaccess ping https ssh snmp http telnet set type physical set explicit-ftp-proxy enable set snmp-index 12 nextend Create an explicit FTP proxy policy:config firewall proxy-policy edit 4 set name "proxy-policy-ftp" set proxy ftp set dstintf "port1" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" nextend This example creates a basic policy. If required, security profiles can be enabled. Configure the FTP client application to use the FortiGate IP address. Changing the FTP mode from active to passive for explicit proxy An explicit FTP proxy can convert an active FTP connection initiated by an FTP client to a passive FTP connection between the explicit FTP proxy and FTP server.config ftp-proxy explicit set server-data-mode {client | passive}end server-data-mode {client | passive} Set the data selection mode on the FTP server side: client: use the same transmission mode for client and server data sessions (default). passive: use passive mode for server data sessions. In this example, a client that only supports active mode FTP connects to a remote FTP server through the explicit FTP proxy to download a text file (test1.txt). The explicit FTP proxy converts the active FTP connection to a passive connection between the explicit FTP proxy and the FTP server. To configure passive mode for FTP server data sessions: Configure the web proxy:config ftp-proxy explicit set status enable set incoming-port 21 set server-data-mode passiveend Enable the explicit FTP proxy on port1:config system interface edit "port1" set ip 10.1.100.2 255.255.255.0 set explicit-ftp-proxy enable nextend Configure the firewall policy:config firewall proxy-policy edit 1 set proxy ftp set dstintf "port3" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" nextend Get the client to download the text file from the FTP server (NcFTP is used in this example):ncftpget -E -r 0 -d stdout -u [email protected] -p 123456 10.1.100.2 ./ /home/pc4user1/test1.txt...Cmd: PORT 10,1,100,11,151,115200: PORT command
2025-04-23On-wire rogue AP detection techniqueOther APs that are available in the same area as your own APs are not necessarily rogues. A neighboring AP that has no connection to your network might cause interference, but it is not a security threat. A rogue AP is an unauthorized AP connected to your wired network. This can enable unauthorized access. When rogue AP detection is enabled, the On-wire column in the Rogue AP Monitor list shows a green up-arrow on detected rogues.Rogue AP monitoring of WiFi client traffic builds a table of WiFi clients and the Access Points that they are communicating through. The FortiGate unit also builds a table of MAC addresses that it sees on the LAN. The FortiGate unit’s on-wire correlation engine constantly compares the MAC addresses seen on the LAN to the MAC addresses seen on the WiFi network.There are two methods of Rogue AP on-wire detection operating simultaneously: Exact MAC address match and MAC adjacency.Exact MAC address matchIf the same MAC address is seen on the LAN and on the WiFi network, this means that the wireless client is connected to the LAN. If the AP that the client is using is not authorized in the FortiGate unit configuration, that AP is deemed an ‘on-wire’ rogue. This scheme works for non-NAT rogue APs.MAC adjacencyIf an access point is also a router, it applies NAT to WiFi packets. This can make rogue detection more difficult.However, an AP’s WiFi interface MAC address is usually in the same range as its wired MAC address. So, the MAC adjacency rogue detection method matches LAN and WiFi network MAC addresses that are within a defined numerical distance of each other. By default, the MAC adjacency value is 7. If the AP for these matching MAC addresses is not authorized in the FortiGate
2025-04-15SSL VPN Choosing a mode of operation and applying the proper levels of security depends on your specific environment and requirements. In tunnel mode, the SSL VPN client encrypts all traffic from the remote client computer and sends it to the FortiGate through an SSL VPN tunnel over the HTTPS link between the user and the FortiGate. It supports a wide range of applications, and provides a transparent user experience when properly configured. FortiClient might enable a DTLS tunnel that allows the SSL VPN to encrypt traffic using TLS, and uses UDP as the transport layer instead of TCP. This avoids retransmission issues that can occur with TCP-inTCP that result in lower throughput. For information on troubleshooting slow SSL VPN throughput, see Troubleshooting common issues in the FortiOS Administration Guide. Web mode provides clientless network access using a web browser with built-in SSL encryption. It is easier to set up than tunnel mode and does not require that an application be installed on the endpoint, but it has limited application support and requires more resources on the FortiGate. For more information, see SSL VPN best practices in the FortiOS Administration Guide. Starting in 7.6.0, FortiGate models with 2GB of memory no longer support SSL VPN. Fortinet Inc. recommends to use IPsec VPN or other non-VPN secure remote access solutions such as ZTNA and FortiSASE. See SSL VPN to IPsec VPN migration and Non-VPN remote access for more details.
2025-04-02