Description |
This article describes how to control self-originated traffic when SSL inspection with flow mode is configured.
When ssl-inspection is used in flow mode, FortiGate will create some self-originated outgoing connections for the various certificate operations. These self-originated connections will use the outgoing interface IP according to the routing table by default. In some customer environments, these connections will not be allowed. The article will explain what are these connections and how to control source IP for these connections. |
Scope | FortiOS 7.0 and above. |
Solution |
When SSL inspection in flow mode is being used, FortiGate will create outgoing connections for two purposes:
The below article explains the behavior and how to control the source IP in detail :
TLS active probe sessions will be seen below in the session table. They will be outgoing HTTPS sessions:
fnbamd will need to download intermediate certificates from various sources for certificate verification (AIA or OCSP). AIA sessions will be HTTP in general and will be seen below in the session table: session info: proto=6 proto_state=02 duration=10 expire=2 timeout=1200 flags=00000000 socktype=0 sockport=0 av_idx=0 use=3 AIA sessions can be controlled with the below configuration option:
config vpn certificate setting set source-ip {string} --> Source IP address for dynamic AIA and OCSP queries. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.