FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
kmohan
Staff
Staff
Article Id 387247
Description This article describes how to fix an issue where the SSL Deep Inspection is blocking Google Meet.
Scope FortiGate.
Solution
  1. Exempt Google Meet from SSL Inspection: 

Access the FortiGate GUI. 
Some Google Meet FQDN is not added on the address list, configure on Address list with FQDN as below.

 

Go to Policy & Object -> Create a New Object -> Addressesm -> Wildcard with FQDN Type as below list.

 

  • *.meet.google.com.
  • *.hangouts.google.com.
  • *.talk.google.com.
  • clients4.google.com.
  • clients5.google.com.
  • clients6.google.com.

    FQDN.png

 

  1. Go to Security Profiles -> SSL/SSH Inspection.
    Edit the SSL inspection profile in use.

    Example: SSL Deep Inspection; make it a clone of Customs Deep Inspection and edit it.

    FADN@@@.png

     Save the changes to the SSL inspection profile.

     

  2. Download the FortiGate certificate from Customs Deep Inspection and install it on the client PC or domain server so it will work on customers' PCs.

     

    Download the FortiGate certificate used for SSL inspection.

    Import it as a trusted root CA in the web browser or PC. This can help prevent certificate warnings.

  3. Disable HTTPS Replacement Message:
    Prefer not to show block pages for HTTPS sites, then disable the replacement message: ```


config webfilter profile
    edit {name}
        set https-replacemsg disable
end

 

  1. Apply on the Firewall Policy:

Ensure that the updated SSL inspection profile is applied to the relevant firewall policies.

Now, it will work fine without blocking Google Meet.

Related articles:
Troubleshooting Tip: A guide to FortiGate and certificate issues
Technical Tip: How to download the right certificate for SSL/SSH deep inspection