Created on
08-26-2014
08:20 AM
Edited on
02-12-2025
09:46 PM
By
Anthony_E
Description
This article describes how to decide on which content inspection type to use.
Scope
FortiOS.
Solution
Background:
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols designed to provide communication security over the Internet. They use X.509 certificates and hence asymmetric cryptography to authenticate the counterpart with whom they are communicating, and to exchange a symmetric key. This session key is then used to encrypt data flowing between the parties.
As a consequence of choosing X.509 certificates, certificate authorities and a public key infrastructure are necessary to verify the relation between a certificate and its owner, as well as to generate, sign, and administer the validity of certificates.
Since protocols can operate either with or without TLS (or SSL), it is necessary for the client to indicate to the server the setup of a TLS connection. There are two main ways of achieving this.
One option is to use a different port number for TLS connections (for example, port 443 for HTTPS).
The other is for the client to request that the server switch the connection to TLS using a protocol-specific mechanism (for example, STARTTLS for mail and news protocols).
Once the client and server have agreed to use TLS, they negotiate a stateful connection by using a handshaking procedure.[6] During this handshake, the client and server agree on various parameters used to establish the connection's security:
Full SSL Inspection:
When using this kind of inspection, the FortiGate unit takes place of the server (from the point of view of the client) and for the server, the client is the FortiGate, not the PC. In this schema, is clear that the SSL/TLS handshake is interrupted, and the FortiGate is required to present a certificate for the URL requested by the real client. This certificate is signed by the FortiGate itself. As the FortiGate is usually not a recognized Certificate Authority (CA) to sign certificates a warning message will be shown to the client stating that the signer of the certificate is not a recognized entity.
When using this inspection, the traffic flows from server to the FortiGate encrypted, and from the FortiGate to the client is also encrypted. The only part where the traffic is unencrypted is into the FortiGate for inspection purposes.
This is the purpose for Ful SSL Inspection, to inspect the downloaded content. While SSL Certificate Inspection inspects only the URL (which suites perfect for web filtering only), is not designed to identify attacks, viruses or applications. This features are available on Full SSL Inspection.
But it is needed to be clear that the Full SSL Inspection the certificate used to sign those sites (by default SSL_Proxy_Inspection into the FortiGate) is needed to be recognized as a valid CA. Otherwise, the warning message will be shown everytime an SSL/TLS connection is made.
This certificate (SSL_Proxy_Inspection) must be installed in each PC to be used by their Operating System and/or for browsers/applications (Mozilla Firefox or Java JRE) which has its own Certificate repository.
SSL certificate vs Full inspection:
Feature | SSL Certificate Inspection | Full SSL Inspection |
Traffic Decryption | No | Yes |
SSL Handshake Inspection | Yes | Yes |
SNI Parsing | Yes | Yes |
Server Certificate Validation | Yes | Yes |
URL Extraction from SNI | Yes | Yes |
URL Extraction from Certificate | Yes (If SNI is not present) | Yes |
Web Filtering | Yes | Yes |
Application Control | Yes | Yes |
Inspection of Encrypted Payload | No | Yes |
SSL Proxying | No | Yes |
Protection from HTTPS-based Attacks | Limited | Yes |
Note:
When a firewall policy is in flow-based inspection mode, SSL Certificate Inspection does not validate the certificate. Untrusted SSL certificates and Server Certificate SNI checks are not performed. If these features are needed, use proxy‑based inspection mode.
Some applications like Cloud applications require Full SSL inspection in the firewall policy.
Conclusion:
Related articles:
Certificate inspection - FortiGate administration guide
Technical Tip: List of cloud application that required deep inspection
Technical Tip: How to check which application requires deep SSL inspection under Application Control
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.