The content you are looking for has been archived. View related content below.
Created on
05-01-2019
12:15 PM
Edited on
02-19-2025
10:31 PM
By
Anthony_E
Description
Scope
Solution
Note: Password is not required if key is not encrypted:
The CSR needs to be signed with either the public CA or the private CA to generate the certificate. In this demo, FortiAuthenticator is used as the CA server:
In FortiAnalyzer, import the signed certificate:
The certificate status will change from Pending to OK once the certificate is uploaded correctly:
Once the certificate has been imported, configure the use of the local certificate in the CLI and restart the OFTP daemon:
exec log fortianalyzer test-connectivity
Alternative FortiAnalyzer configuration:
This alternative method explains how to use any previously imported Local Certificate for OFTP. Use the following CLI commands to change the certificate used on OFTP port TCP/514:
config system certificate oftp
set mode local
set local "<LOCAL_CETRIFICATE_NAME>"
end
Note:
This option is often used to replace the embedded SHA1 certificate of the older FortiAnalyzer hardware platforms (for example E-series), where the BIOS certificate is SHA1, but there is also a firmware updated SHA256 default local certificate, named 'Fortinet_Local'.
This certificate also contains the unit serial number in the CN field, which allows the FortiAnalyzer certificate verification to remain enabled on the FortiGate.
After changing this configuration, restart the 'oftpd' process for the changes to take effect:
diag test application oftpd 99
(Or reboot the FortiAnalyzer).
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.