FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
anoushiravan
Staff
Staff
Article Id 244152
Description

This article describes that after the firmware upgrade (from v6.4.x) the below warning message might be seen on firewall policies on which the UTM profile has been enabled on.

 

This policy has the following issues:
'The no-inspection profile doesn't perform SSL inspection, so it shouldn't be selected with other UTM profiles'.

 

Firewall-Policy.JPG

Scope FortiGate.
Solution

The above warning message is for the new available SSL inspection profile named 'no-inspection' in the latest firmware patches and it does not affect the network traffic.

 

Note:

The warning message is applied only to the use of the SSL inspection profile 'no-inspection'. 
If cloning the 'no-inspection' and using the clone on firewall policy, it will not generate the warning.

This is a design choice for 'newer' security admin to not assume the default profile 'no-inspection' works in tandem with other UTM profiles for encrypted traffic.

The assumption is that if the security admin has created his own profile, understanding the impact on the different types of traffic.


To use 'no-inspection' on the firewall policy, follow below steps:

 

  1. Edit the firewall policy and disable all the Security Profiles then select 'OK'.
  2. Edit the firewall policy again.
  3.  Select 'no-inspection' for SSL Inspection before enabling Security Profiles then select 'OK'. A warning will appear.
  4. Select 'OK'.

 

Related documents:

Technical Tip: How to disable SSL Inspection

SSL Inspection