| Description | This article describes how to force a specific certificate chain on both SSL VPN and SSL/SSH Inspection in FortiGate. |
| Scope | FortiGate. |
| Solution |
It is possible to force a specific certificate chain on both SSL VPN and SSL/SSH Inspection in FortiGate, but the method differs slightly between them:
Steps: Go to System -> Certificates -> Local Certificates and ensure the certificate includes the full chain (leaf + intermediate + root, if needed).
Go to VPN -> SSL VPN Settings.
Under Server Certificate, select the desired certificate.
The certificate must include the full chain when imported. FortiGate does not construct the chain on the fly - it uses what is imported.
Steps:
Go to System -> Certificates -> CA Certificates.
Import the intermediate and root CA properly if the inspection certificate is issued by a non-root CA.
Go to Security Profiles -> SSL/SSH Inspection.
Edit the deep inspection profile.
Under the CA Certificate, select the certificate the FortiGate has to use for re-signing.
Again, make sure the full chain is included in the CA import (not just the issuing cert) if the clients require chain validation.
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.