Certificate inspection
FortiGate supports certificate inspection. The default configuration has a built-in certificate-inspection profile which you can use directly. When you use certificate inspection, the FortiGate only inspects the headers up to the SSL/TLS layer.
If you do not want to deep scan for privacy reasons but you want to control web site access, you can use certificate-inspection.
SSL inspection options
The following options are available when configuring an SSL inspection profile:
Enable SSL inspection of |
Select Multiple Clients Connecting to Multiple Servers. This is normally used when inspecting outbound internet traffic |
Inspection method |
Select SSL Certificate Inspection. |
CA certificate |
Use the default Fortinet_CA_SSL certificate. |
Blocked certificates |
The FortiGate receives Botnet C&C SSL connections from FortiGuard that contain SHA1 fingerprints of malicious certificates. By default, these certificates are blocked. Click View Blocked Certificates to see a detailed list. |
Untrusted SSL certificates |
Configure the action to take when a server certificate is not issued by a trusted CA.
Click View Trusted CAs List to see a list of the factory bundled and user imported CAs that are trusted by the FortiGate. |
Server certificate SNI check |
Check the SNI in the hello message with the CN or SAN field in the returned server certificate.
|
Inspect non-standard HTTPS ports
The built-in certificate-inspection profile is read-only and only listens on port 443. If you want to make changes, you must create a new certificate inspection profile.
If you know the non-standard port that the web server uses, such as port 8443, you can add this port to the HTTPS field.
To add a port to the inspection profile in the GUI:
-
Go to Security Profiles > SSL/SSH Inspection.
-
Create a new profile, or clone the default profile.
-
If you do no know what port is used in the HTTPS web server, under Protocol Port Mappingenable Inspect All Ports.
If you know the port, such as port 8443, then set HTTPS to 443,8443.
-
Configure the remaining setting as needed.
-
Click OK.
Common options
Invalid SSL certificates can be blocked, allowed, or a different actions can be configured for the different invalid certificates types:
Expired certificates |
Action to take when the server certificate is expired. The default action is block. |
Revoked certificates | Action to take when the server certificate is revoked. The default action is block. |
Validation timed-out certificates | Action to take when the server certificate validation times out. The default action is allow. |
Validation failed certificates | Action to take when the server certificate validation fails. The default action is block. |
By default, SSL anomalies logging is enabled. Logs are generated in the UTM log type under the SSL subtype when invalid certificates are detected.