FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
ppatel
Staff & Editor
Staff & Editor
Article Id 199563
Description This article describes how to allow Expired/Invalid Certificates in firewall ssl-ssh-profile.
Scope

FortiGate.

Solution

v6.0.

 

config firewall ssl-ssh-profile

    edit <SSL-SSH-PROFILE-NAME>

        set allow-invalid-server-cert [enable | disable]

    end

 

ppatel_0-1637845254515.png

 

v6.2.

 

config firewall ssl-ssh-profile

    edit <SSL-SSH-PROFILE-NAME>

config <ssl|https|ftps|imaps|pop3s|smtps>

    set invalid-server-cert [allow|block]

end

 

ppatel_1-1637845254516.png

 

v6.4 and v7.0.

 

config firewall ssl-ssh-profile

    edit <SSL-SSH-PROFILE-NAME>

config <ssl|https|ftps|imaps|pop3s|smtps>

    set expired-server-cert [allow|block|ignore]

end

 

ppatel_2-1637845254516.png

 

 

 

Configuration requirements.

  • Firewall Policy Requirements:
    • Web-filter.
    • Proxy-based inspection.
  • SSH/SSL inspection:
    • Certificate inspection enabled (deep-inspection optional).

 

Configuration Example to block expired and revoked certificates (showing only related elements).

 

SSL/SSH certificate:

 

F2 (Clone of deep-in~ion) # show
 config firewall ssl-ssh-profile
  edit "Clone of deep-inspection"

    config https
       set ports 443
       set expired-server-cert block
       set revoked-server-cert block

Firewall Policy:

 

config firewall policy
  edit 1
    set name "IN-OUT-H"
        set utm-status enable
        set inspection-mode proxy
        set ssl-ssh-profile "Clone of deep-inspection"
        set webfilter-profile "default"
next
end