Created on
01-05-2016
08:39 AM
Edited on
08-12-2025
08:24 AM
By
Stephen_G
Description
Scope
Solution
Example 1: Testing the FortiGate SSL VPN interface for SSLv3 (any cipher suite):
curl https://10.0.0.5:10443 -k -v --location-trusted --sslv3
…
[output removed]
…
alert handshake failure (connection is NOT accepted)
Example 2: Testing the FortiGate management interface for TLSv1.2 using the 3DES bulk cipher/encryption algorithm:
curl https://10.0.0.1:443 -k -v --location-trusted --tlsv1.2 --ciphers 3DES
…
[output removed]
…
* Connection #0 to host 10.0.0.1 left intact (connection is accepted)
Example 3: Testing FortiGate SSLVPN for TLSv1.2 using the cipher suite AECDH-AES128-SHA.
curl https:// 10.0.0.5:10443 -k -v --location-trusted --tlsv1.2 --ciphers AECDH-AES128-SHA
…
[output removed]
…
* Connection #0 to host 10.0.0.1 left intact (connection is accepted)
Note that cURL uses OpenSSL. It therefore requires their terminology when selecting cipher suites for testing. AECDH-AES128-SHA is the OpenSSL terminology for the RFC name TLS_ECDH_anon_WITH_AES_128_CBC_SHA.
More details on the cipher suite are available at Technical Tip: Understanding the cipher suite 1.2 supported by Fortinet devices.
Related article:
Technical Tip: How to verify if a web page is cache-able using cURL
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.