
Created on
07-14-2009
02:52 PM
Edited on
02-25-2025
12:11 AM
By
Jean-Philippe_P
Description
This article describes the basic steps needed to enable this feature.
FortiOS versions 4.0 MR3, 5.0.x, and higher include a deep scanning option that supports scanning encrypted protocols when used with Anti Virus and Webfilter Profiles. To run this security information, server and client certificates must be obtained.
Scope
FortiOS firmware versions up to the latest branch 7.6.
Solution
To determine if a FortiGate unit supports deep scanning, run the below command and verify the ASIC version:
FGT # get hardware status
[...]
ASIC version: CP6
[...]
To enable deep scanning, follow the below steps:
FortiOS firmware version 4.0 MR3:
Go to Policy -> Protocol Options -> HTTPS -> Deep Scan -> Enable and select Apply to save the changes.
Go to Policy -> SSL inspection -> HTTPS port 443 -> Enable and select Apply to save the changes.
Go to Policy -> UTM Proxy Options -> SSL inspection -> HTTPS port 443 -> Enable and select Apply to save the changes.
To avoid the warning message that pops up in the browser when using a custom certificate, a key, and a password will need to be loaded onto the FortiGate, and a certificate will have to be loaded into the PC's web browser.
- Go to the System -> Certificates ->Local, and select Import.
- Set the Type to Certificate.
- Select the CRT and KEY files that were created and enter the passcode to upload the cert.
Related articles:
Troubleshooting Tip : Verifying server certificate on SSL Inspection
Technical Note: FortiGate HTTPS web URL filtering and HTTPS FortiGuard web filtering