Description | This article describes how to resolve the issue where a client's FortiGate fails PCI Compliance due to the utilization of a FortiGate self-signed certificate for admin GUI access |
Scope | FortiGate v7.4. |
Solution |
The issue is resolved by identifying that the self-signed certificate used for GUI admin access is the root cause of the PCI Compliance failure. The steps to resolve this issue are:
config system global set admin-server-cert "self-sign"
set admin-sport 4443 end
Follow the link to get the certificate signed by a CA: Getting the certificate signed by a CA
Follow the link to import a certificate as Local CA: Technical Tip: How to import a certificate as Local CA
config system global set admin-server-cert "name-of-signed-cert"
It should be noted that PCI compliance may flag other services that are using self-signed certificates apart from FortiGate's GUI admin access. This article only applies to the scenario when the self-signed certificate is being used for GUI admin access.
Note: It will also depend on what the PCI scan is performed i.e. If the scan is run with the FQDN or the public IP address on which the FQDN resolves this will also result in failure of the PCI scan. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.