Fortinet white logo
Fortinet white logo

Administration Guide

Configuring certificate probe failure option

Configuring certificate probe failure option

Note The cert-probe-failure command is not available for FortiGate models with 2 GB RAM or less, including FortiGate/FortiWiFi 40F and 60F series of devices and their variants, and FortiGate-Rugged 60F (2 GB versions only). See Proxy-related features not supported on FortiGate 2 GB RAM models.

With an SSL inspection profile configured for either certificate or deep inspection, the FortiGate performs certificate probing where it checks a server certificate before a client-server HTTPS connection is established. Certificate probe failures can occur due to issues like TCP or TLS handshake failures, misrouted traffic, or untrusted root or intermediate CA certificates. If a certificate is invalid, untrusted, or mismatched, then the FortiGate flags a certificate probe failure in the logs.

Certificate probe failure can be allowed or blocked for HTTPS and SSL:

config firewall ssl-ssh-profile
    edit <name>
        config https
            set cert-probe-failure {allow | block}
        end
        config ssl
            set cert-probe-failure {allow | block}
        end
    next
end

Option

Description

allow

Bypass the session when unable to retrieve server's certificate for inspection.

block

Block the session when unable to retrieve server's certificate for inspection.

For cases that have increased security requirements or stringent organization security policy, certificate probe failure may need to be configured to block. cert-probe-failure is available for custom SSL deep inspection profiles. This option applies to flow mode policies and is available when inspecting all ports is disabled (set inspect-all disable).

Configuring certificate probe failure option

Configuring certificate probe failure option

Note The cert-probe-failure command is not available for FortiGate models with 2 GB RAM or less, including FortiGate/FortiWiFi 40F and 60F series of devices and their variants, and FortiGate-Rugged 60F (2 GB versions only). See Proxy-related features not supported on FortiGate 2 GB RAM models.

With an SSL inspection profile configured for either certificate or deep inspection, the FortiGate performs certificate probing where it checks a server certificate before a client-server HTTPS connection is established. Certificate probe failures can occur due to issues like TCP or TLS handshake failures, misrouted traffic, or untrusted root or intermediate CA certificates. If a certificate is invalid, untrusted, or mismatched, then the FortiGate flags a certificate probe failure in the logs.

Certificate probe failure can be allowed or blocked for HTTPS and SSL:

config firewall ssl-ssh-profile
    edit <name>
        config https
            set cert-probe-failure {allow | block}
        end
        config ssl
            set cert-probe-failure {allow | block}
        end
    next
end

Option

Description

allow

Bypass the session when unable to retrieve server's certificate for inspection.

block

Block the session when unable to retrieve server's certificate for inspection.

For cases that have increased security requirements or stringent organization security policy, certificate probe failure may need to be configured to block. cert-probe-failure is available for custom SSL deep inspection profiles. This option applies to flow mode policies and is available when inspecting all ports is disabled (set inspect-all disable).