Fortinet black logo

Administration Guide

SSL/SSH Inspection

SSL/SSH Inspection

Secure sockets layer (SSL) content scanning and inspection allows you to apply antivirus scanning, web filtering, and email filtering to encrypted traffic. You can apply SSL inspection profiles to firewall policies.

Deep inspection (also known as SSL/SSH inspection) is typically applied to outbound policies where destinations are unknown. Depending on your policy requirements, you can configure the following:

  • Which CA certificate will be used to decrypt the SSL encrypted traffic
  • Which SSL protocols will be inspected
  • Which ports will be associated with which SSL protocols for inspection
  • Whether or not to allow invalid SSL certificates
  • Whether or not SSH traffic will be inspected
  • Which addresses or web category allowlists can bypass SSL inspection

SSL/SSH inspection profile

To view the available SSL/SSH inspection profiles, go to Security Profiles > SSL/SSH Inspection.

Hover over the leftmost edge of the column heading to display the Configure Table icon, which you can use to select the columns to display or to reset all the columns to their default settings. You can also drag column headings to change their order.

The following options are available:

Create New

Create an SSL/SSH inspection profile. See Create or edit an SSL/SSH inspection profile.

Edit

Modify the selected SSL/SSH inspection profile. See Create or edit an SSL/SSH inspection profile.

Clone

Make a copy of the selected SSL/SSH inspection profile.

Delete

Remove the selected SSL/SSH inspection profile.

Search

Enter a search term to find in the SSL/SSH inspection profile list.

Name

The name of the SSL/SSH inspection profile.

Read Only

The certificate-inspection, deep-inspection, and no-inspection profiles are read only and cannot be edited.

Comments

An optional description of the SSL/SSH inspection profile.

Ref.

Displays the number of times the object is referenced to other objects.

To view the location of the referenced object, select the number in Ref.; the Object Usage window opens and displays the various locations of the referenced object.

SSL/SSH Inspection

Secure sockets layer (SSL) content scanning and inspection allows you to apply antivirus scanning, web filtering, and email filtering to encrypted traffic. You can apply SSL inspection profiles to firewall policies.

Deep inspection (also known as SSL/SSH inspection) is typically applied to outbound policies where destinations are unknown. Depending on your policy requirements, you can configure the following:

  • Which CA certificate will be used to decrypt the SSL encrypted traffic
  • Which SSL protocols will be inspected
  • Which ports will be associated with which SSL protocols for inspection
  • Whether or not to allow invalid SSL certificates
  • Whether or not SSH traffic will be inspected
  • Which addresses or web category allowlists can bypass SSL inspection

SSL/SSH inspection profile

To view the available SSL/SSH inspection profiles, go to Security Profiles > SSL/SSH Inspection.

Hover over the leftmost edge of the column heading to display the Configure Table icon, which you can use to select the columns to display or to reset all the columns to their default settings. You can also drag column headings to change their order.

The following options are available:

Create New

Create an SSL/SSH inspection profile. See Create or edit an SSL/SSH inspection profile.

Edit

Modify the selected SSL/SSH inspection profile. See Create or edit an SSL/SSH inspection profile.

Clone

Make a copy of the selected SSL/SSH inspection profile.

Delete

Remove the selected SSL/SSH inspection profile.

Search

Enter a search term to find in the SSL/SSH inspection profile list.

Name

The name of the SSL/SSH inspection profile.

Read Only

The certificate-inspection, deep-inspection, and no-inspection profiles are read only and cannot be edited.

Comments

An optional description of the SSL/SSH inspection profile.

Ref.

Displays the number of times the object is referenced to other objects.

To view the location of the referenced object, select the number in Ref.; the Object Usage window opens and displays the various locations of the referenced object.