FortiClient
FortiClient proactively defends against advanced attacks. Its tight integration with the Security Fabric enables policy-based automation to contain threats and control outbreaks. FortiClient is compatible with Fabric-Ready partners to further strengthen enterprises’ security posture.
btan
Staff
Staff
Article Id 347481
Description This article describes how to troubleshoot when end users are getting the 'Revocation information for the security certificate for this site is not available' prompt when connecting to a VPN.
Scope FortiClient 7.0 and above.
Solution

Sometimes, end users may receive the below message randomly: 


9927464-revocation-sample.PNG
This is due to the below option enabled in the FortiClient EMS endpoint profile:


octthis.PNG

 

The message prompt is due to the Certificate Revocation List (CRL) FQDN of the VPN gateway being somehow inaccessible during the VPN connection attempt. 

To check which CRL FQDN the SSL VPN gateway is using:

  1. Enter the SSL VPN gateway in any web browser -> Select the padlock icon -> Select 'Certificate is Valid'.
                                                              9927464-kb1.png                                     
  2. Check the 'Issued by' section in the Certificate Viewer.
                                             
    9927464-kb2.PNG                                             
    9927464-kb2.PNG

In this example, fortinet.com's SSL certificate is issued by DigiCert Inc.

  1. Select Details, scroll down, and look for CRL Distribution Points, CRL FQDN will be shown here:


replace-kb2.PNG
In case the CRL info is not there, or not valid, search online or go to the Certificate Authority's official website to look for CRL FQDN:
For DigiCert, there are a couple of CRL FQDN listed at https://knowledge.digicert.com/alerts/digicert-certificate-status-ip-address.

Checklist to do after knowing the CRL FQDN:

  1. Ensure that the CRL FQDN is not blocked in the network environment or firewall on the end user's site.
  2. If required, remove any Security Profiles applied to the Firewall Policy towards the CRL FQDN, such as Web Filter, Antivirus, and SSL inspection profile.