This article shows the guide to apply local certificate in multiple scenarios for FortiManager and FortiAnalyzer.
FortiManager/FortiAnalyzer.
Users can import custom certificate as local certificate in FortiManager and FortiAnalyzer.
The local certificate can be applied in multiple scenarios and require configuration to apply the changes. In order to apply local certificate for scenario below, CA certificate have to be imported into FortiManager/FortiAnalyzer. Examples are provided below for each application:
1) Admin GUI:
Login to FortiManager/FortiAnalyzer -> System Setting -> Admin -> Admin Setting and change the certificate to local certificate.
Or configure from CLI:
# config system admin
Set admin-server-cert <Local Certificate>
End
2) FortiManager fgfm-tunnel:
Configure the following in FortiManager CLI:
# config system global
set fgfm-ca-cert <CA Certificate>
set fgfm-local-cert <Local Certificate>
end
Configure the following in FortiGate CLI:
# config system central-management
set ca-cert <CA Certificate>
set local-cert <Local Certificate>
end
3) FortiAnalyzer oftp tunnel ( Logging).
Configure the following in FortiAnalyzer CLI:
# config system certificate oftp
set mode local
set local <Local Certificate>
end
Configure the following in FortiGate CLI:
# config log fortianalyzer setting
Set certificate <Local Certificate>
end
4) FortiManager/FortiAnalyzer HA
Please note that CN of the certificate must be SN of the FortiManager/FortiAnalyzer itself.
FortiManager/FortiAnalyzer Primary:
# config system ha
Set local-cert <Local Certificate>
end
FortiManager/FortiAnalyzer Secondary:
# config system ha
Set local-cert <Local Certificate>
end
5) FortiManager/FortiAnalyzer Syslog server
Or configure from CLI:
# config system syslog
Set reliable enable
Set secure connection enable
Set local-cert <Local Certificate>
end
6) FortiManager/FortiAnalyzer Mail Server.
Note that local certificate is only applicable for SMTPS and STARTTLS with port 587 only.
Hence, additional configurations are required as shown below:
# config system mail
Set port 587
Set secure-option <smtps | starttls>
Set auth-type certificate
Set local-cert <Local Certificate>
end
Related articles:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2023 Fortinet, Inc. All Rights Reserved.