Created on
08-28-2023
08:12 AM
Edited on
06-13-2025
08:56 AM
By
Stephen_G
Description | This article describes what are the requirements for deep inspection and how to use a private CA for Deep inspection. |
Scope | FortiGate. |
Solution |
It is often necessary to implement a deep inspection of the Environment. In the deep inspection profile, there is always a requirement to select a certificate.
Most of the time, the certificate that is used here is simply a Local certificate which contains the private key and public key that are often installed for the SSL VPN.
However, this certificate will not be able to be used for the deep inspections. It will not even be possible to see the option to select those certificates.
The reason for this is that this is not the correct type of certificate needed for the deep inspection. In order to use the certificate for the deep inspection the type of the certificate needs to be private CA. A private CA is the type of certificate that can issue a certificate to others. The X509v3 Basic Constraints CA: True.
The same info can be found under the details of the certificate by opening the certificate on pc before uploading it. The subject type under basic constraints should be 'CA', as shown in the following example:
To not use the Fortinet_CA_SSL certificate, it is possible to install the own Private_CA certificate for the internal network:
Note: Make sure to apply UTM security profiles in the matching policy for the SSL deep inspection to work and replace the web server certificate with the CA certificate in the end user machine.
If any issues are experienced, feel free to contact the TAC team. |
During certificate inspection of blocked websites, users may encounter security warnings regarding the validity of the presented certificates. As outlined in this article, the implementation of a private Certificate Authority (CA) effectively mitigates these warnings, ensuring a consistent and secure user experience.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.