| Description |
This article discusses a known/expected issue with Admin HTTPS access that can occur when enabling FIPS-CC mode on a FortiGate with an existing configuration. Expected symptoms are as follows:
ENOENT: no such file or directory, open '/tmp/admin_server.key' |
| Scope | FortiGate, FIPS, Admin Web GUI. |
| Solution |
Enabling FIPS-CC mode on the FortiGate will result in any existing configuration being removed. This is to ensure that FIPS compliance is met by removing any configurations that could be non-compliant (especially those involving configurable encryption algorithms). This does not mean that all configurations are cleared, and, the warning message presented when enabling FIPS-CC mode states this:
Warning: most configuration will be lost,
One observed side-effect of this is that X.509 certificates installed by administrators on the FortiGate before enabling FIPS-CC are preserved after the mode is enabled. Additionally, if the Admin HTTPS GUI is configured to use one of these certificates, then that setting is preserved as well (i.e. set admin-server-cert under config system global will still point to the admin-uploaded certificate).
However, there are differences with how FIPS-mode and non-FIPS-mode FortiGates handle encrypting and storing certificate private keys on the device, and a side effect of this behavior is that processes like the node daemon will be unable to load the certificate's corresponding private key for functions like the Admin HTTPS GUI. The end-result is that the node daemon will not be able to start properly due to being unable to load the Admin HTTPS GUI certificate and corresponding private key, and so the Admin HTTPS GUI will not work correctly.
Resolution: To resolve this issue, delete and then re-upload/re-deploy any admin-uploaded certificates to the FortiGate AFTER enabling FIPS-CC mode. Additionally, it is generally recommended to avoid trying to preserve configurations from non-FIPS FortiGates when enabling FIPS-CC for the first time, and instead treat the new FIPS-CC mode FortiGate as a new deployment (i.e. after enabling FIPS-CC mode, the FortiGate requires full reconfiguration).
Workaround: Built-in certificates for FortiOS appear to load without issue after enabling FIPS-CC mode, so one option for a workaround is to change the Admin HTTPS certificate to a built-in certificate like Fortinet_Factory to re-enable GUI access, then fix the admin-uploaded certificates afterwards:
config sys global set admin-server-cert Fortinet_Factory end
Technical Tip: FortiOS FIPS Resource List Troubleshooting Tip: Cannot access the FortiGate web admin interface (GUI) |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.