| Description |
This article describes how to configure Certificate Revocation List (CRL) checks for dial-up IPsec VPN users authenticated with certificates on a FortiGate. Both file-based CRL import and online CRL updating methods are covered. In this setup, FortiAuthenticator serves as the CRL provider. |
| Scope | FortiGate, FortiAuthenticator. |
| Solution |
Prerequisites:
Note: If the CA certificate of the CRL provider is not imported into the FortiGate, the system will display an error when attempting to import the CRL.
The downloaded .crl file should be selected and uploaded. Once imported, the CRL will appear in the Certificates -> CRL section. Double-clicking the entry will display the list of revoked certificate serial numbers.
Before configuring the FortiGate, it is recommended to verify the CRL URL in a web browser. A properly configured URL should automatically download the CRL file when accessed.
Correct URL Format: 'http://<FortiAuthenticator_Interface_IP_Address>/app/cert/crl/<rootCA>.crl'.
On the FortiGate: go under System -> Certificates -> Create/Import -> CRL -> Import Method: Online Updating -> HTTP -> URL.
The verified URL must be entered. The imported CRL will now appear in the Certificates -> CRL section.
CLI Configuration Example:
config vpn certificate crl
Note: A low update interval ensures the CRL remains current.
config vpn certificate crl
Verification Examples:
Successful Login (Certificate Not Revoked):
Revoked Certificates List (FortiGate CRL):
Debug output:
Failed Login (Certificate Revoked):
Debug output:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.