| Description | This article provides guidance on verifying and resolving issues where the FortiGate fails to present the full certificate chain for firewall-hosted services (like SSL VPN or the GUI) by using OpenSSL or online SSL checking tools. |
| Scope | FortiGate |
| Solution |
For compliance or security policy requirements, it may be necessary for the FortiGate to present the full certificate chain when accessing a service hosted on the firewall (such as the Web GUI or SSL VPN). It is possible to use the OpenSSL utility tools for this.
If the FortiGate is only presenting a single certificate instead of the full chain, the output will show only the server certificate with depth=0.
For the FortiGate to send the complete certificate chain, the intermediate certificate must be uploaded to the appliance as a CA Certificate. If the root CA certificate is not already present in the certificate store, it should also be uploaded.
fnsysctl killall sslvpnd Working Log:
After restarting the daemon, the certificate chain is presented correctly and the certificate error is no longer observed. Note: Restart the daemon during non-business hours or when no users are connected to VPN. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.