Description
This article describes how to enable a deep inspection profile in the Firewall Policy and import the certificate in the browser to avoid certificate warnings.
Scope
FortiGate.
Solution
When in the policy multiple security profiles is being added and a full SSL inspection or 'deep-inspection' profile is required to be used a message will be shown in the policy that the endpoint user may experience a certificate warning. To get rid of the warning the certificate that is being used in the security profile in SSL & SSH inspection needed to be installed in the trusted root certificate store of the endpoint.
As the full SSL inspection certificate mostly requires a certificate generated by private CA the browser might not trust the certificate that is being used for the inspection which leads to the work of inserting it into the trusted root certificate on the workstation.
Here is an example of the error that can appear in the browser for a certificate that is not trusted and is being used for full SSL inspection:
Refer to this document for more information:
Obtain, setup, and download an SSL certificate package from a certificate authority
Continuing the Importing Certificate section:
The CA certificate will be listed in the CA Certificates section of the certificates list.
Important Note:
Deep inspection only works if there is at lest one Security Profile enabled. Without a Security Profile enabled, deep inspection is not triggered.
Related articles:
Technical Tip: How to import the CA certificate for full SSL inspection
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.