Created on
‎05-01-2019
12:15 PM
Edited on
‎02-19-2025
10:31 PM
By
Anthony_E
Description
Scope
Solution
- import the CA certificate to all managed FortiGates.
- import the server certificate and private key in PEM format to the FortiAnalyzer.

set set private-key " -- " ---->> PEM format private key.
end
Note: Password is not required if key is not encrypted:
- Once the configuration is done, FortiAnalyzer will restart the OFTP communication with FortiGates.
- The hostname of the certificate should be the serial # of the FortiAnalyzer

Signing the Certificate with an external CA:
The CSR needs to be signed with either the public CA or the private CA to generate the certificate. In this demo, FortiAuthenticator is used as the CA server:
In FortiAnalyzer, import the signed certificate:
The certificate status will change from Pending to OK once the certificate is uploaded correctly:
Once the certificate has been imported, configure the use of the local certificate in the CLI and restart the OFTP daemon:
set mode local
set local "FAZ_SSL"
end
diag test app oftpd 99
exec log fortianalyzer test-connectivity
Alternative FortiAnalyzer configuration:
This alternative method explains how to use any previously imported Local Certificate for OFTP. Use the following CLI commands to change the certificate used on OFTP port TCP/514:
config system certificate oftp
set mode local
set local "<LOCAL_CETRIFICATE_NAME>"
end
Note:
This option is often used to replace the embedded SHA1 certificate of the older FortiAnalyzer hardware platforms (for example E-series), where the BIOS certificate is SHA1, but there is also a firmware updated SHA256 default local certificate, named 'Fortinet_Local'.
This certificate also contains the unit serial number in the CN field, which allows the FortiAnalyzer certificate verification to remain enabled on the FortiGate.
After changing this configuration, restart the 'oftpd' process for the changes to take effect:
diag test application oftpd 99
(Or reboot the FortiAnalyzer).