Created on
08-05-2024
12:37 AM
Edited on
11-05-2024
06:45 AM
By
Jean-Philippe_P
Description | This article provides information on PCI compliance of port 8013. |
Scope | FortiGate v7.4.2 and later. |
Solution |
On v7.4.2 and later, the PCI compliance scan on port 8013 may fail due to the use of a local self-signed certificate on the FortiGate if 'Security Fabric Connection' access is configured on the scanned interface.
FortiTelemetry uses TCP port 8013 by default. CAPWAP uses UDP ports 5246-5247 by default. Both functions are enabled or disabled together.
For more information regarding the consolidation, refer to the following document: New features or enhancements.
Beginning in v7.4.2, Security Fabric Connection uses a local self-signed certificate (FortiGate factory default local certificate) to support an SSL connection for FortiClient Security Posture tag update from remote FortiClients.
An SSL connection is used to collect the ZTNA client certificate used to authenticate the FortiClient. Replacing the local self-signed certificate used by the FortiGate is not possible for now.
Workarounds: Take one of the following workarounds based on respective requirements:
To do this, create a new service object for TCP 8013 by navigating to Policy & Objects -> Services.
Make a new local-in policy using this service object.
Note:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.