Fortinet ZTNA Part VII

Abood Alakhras | Mar 11, 2025 min read

Introduction

Welcome to the seventh installment of our Fortinet ZTNA series! In this guide, we explore the configuration of ZTNA tags and tagging rules—essential components that determine whether an endpoint is compliant or non-compliant when accessing data center (DC) resources. This step-by-step tutorial will walk you through setting up ZTNA tags, defining tagging rules, and understanding the available configuration options.

Zero-Trust Tagging Rules

Tagging rules are configured within FortiClient EMS (Endpoint Management System) and help classify endpoints based on compliance criteria.

Rule Types

My Image

Tagging Rules

  • Tagging rules vary depending on the operating system of the endpoint.
  • The image above showcases some rule options available for Windows OS. (Fortinet continuously enhances telemetry to collect more endpoint data and update rules accordingly.)
  • Each rule type provides different selection criteria. For example, when using an Active Directory (AD) Group rule, you must specify an AD group from the available domain groups. (Ensure your domain is properly configured under Endpoints to use this option.)
  • Multiple conditions can be applied to any rule.
  • By default, an endpoint must meet all conditions to satisfy a rule. However, using the “NOT” operator (where supported) or modifying the rule logic allows flexibility—e.g., an endpoint can match condition (1 AND 2) OR 3 instead.
  • The screenshot below illustrates this logic in action:

My Image

Tag Logic Example

For our Proof of Concept (PoC), we’ve configured two tagging rules in EMS:

Rule 1: “lab-test”
  • Tag Name: got-the-file
  • Logic: The endpoint must satisfy all conditions to be tagged as got-the-file.

My Image

Rule 2: “net-sec-ops-domain”
  • Tag Name: net-sec-ops-domain
  • Logic: The endpoint must be logged into the net-sec-ops.com.au domain. If this condition is met, the endpoint is tagged as net-sec-ops-domain.

My Image

Zero Trust Tag Monitor

The Zero Trust Tag Monitor provides a real-time view of dynamically assigned endpoint tags based on configured rules. If an endpoint connected to EMS meets the rule conditions, the corresponding tags appear in the monitor.

My Image

Additionally, you can verify assigned tags directly on the FortiClient:

My Image

ZTNA Tags in Fortigate

Once the Security Fabric connection between FortiGate and FortiClient EMS is established, all ZTNA tags sync back to FortiGate and are displayed under ZTNA > ZTNA Tags. For this PoC, we focus on two tags:

  • net-sec-ops-domain
  • got-the-file

Each tag exists in two forms:

  • ZTNA IP Tag – Used for full ZTNA (mainly for remote user access).
  • ZTNA MAC Tag – Used for on-premises security, controlling access between on-fabric devices, internal web servers, and the internet. (This method does not require an access proxy and can be directly applied to firewall policies.)

My Image

Conclusion

ZTNA tags and tagging rules play a crucial role in Fortinet’s Zero Trust security model, ensuring that only compliant endpoints gain access to critical resources. By leveraging FortiClient EMS tagging rules, Zero Trust Tag Monitor, and FortiGate ZTNA tags, organizations can implement a robust access control mechanism for both remote and on-premises users.

Stay tuned for the next part of the Fortinet ZTNA series! 🚀