FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
rain
Staff
Staff
Article Id 359555
Description

 

This article describes how to block TLS 1.3 PQC and the users' environment cannot use Deep Inspection and Proxy Mode enable.

 

Scope

 

FortiOS.

 

Solution

 

When using Web Filter in a policy with flow-base and SSL Certificate inspection the environment does not allow using deep inspection or proxy mode because there is not an option to modify the certificates on the devices that use the network resources and the behavior experimented is that pages already blocked with Web Filter are being bypassed because of a TLS 1.3 PQC certificate is necessary to follow the next:

 

  1. Analyze the 'false positive' block on the Web Filter Log (Log and report -> Security events -> Web Filter).

 

KB_01.png

 

The action is 'Block' but can access the web page even if the action is executed correctly.

 

  1. On the policy used to limit the content with the Web Filter enable, enable a custom 'Application Control' profile:

    Note: It is mandatory to enable the profile to see logs about the protocol used by the page. To see the logs go to 'Log & report -> Security Events  -> Application Control'.

     

    KB_02.png

     

  2. At the moment the user tries to access the 'blocked' page, see the next Log on the Application Control section where the protocol TLS 1.3 PQC is 'Pass' state, that means that the communication is being forwarded and granted correctly and the Web Filter is being bypassed by the protocol that is being in use by the Web Page even if in the Web Filter is hitting the correct filter and is in a 'blocked' state.

     

    KB_03.png

     

  3. In this scenario, it is necessary to enable inside the Application Control custom profile done in step 2 an exception inside the 'Application and filter Overrides' that contains the protocol 'SSL_TLSv1.3.PQC' with a 'Block' action.

     

    KB_04.png

     

  4. With this change, the page is going to be blocked and inaccessible to the user. After this change, see the Log on the Application Control that the protocol is blocked but the SSL communication continues to be granted.

     

    KB_07.png

     

    KB_06.png

 

Note: If blocking TLS 1.3 with application control is not possible, the issue can be addressed using DNS filtering. This solution applies to FortiOS 7.4.X and later. For detailed instructions, refer to Option 1 in this FortiGate knowledge base article.

Comments
MaryBolano
Staff
Staff

Amazing! Keep up the great job @rain !!

JorgeMonroyPad

Awesome job, @rain !!! Keep it up!!!

GILMENDO
Staff
Staff

Great job @rain THANK YOU!