FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
iskandar_lie
Staff
Staff
Article Id 247915
Description This article explains how the SSL Deep Inspection behaves in FortiGate and how it is correctly activated.   
Scope

FortiGate.

Solution

This example assumes a user is attempting to implement an SSL Deep Inspection for the first time.

 

iskandar_lie_0-1677772567293.png

 

iskandar_lie_1-1677772652560.png

 

In this case, the SSL Deep Inspection does not work as intended because the user still receives the original certificate from the website.

 

iskandar_lie_2-1677772730654.png

  

To activate the SSL Deep Inspection, it is necessary to enable at least one of the security profiles. This can be Webfilter, Application Control, Antivirus, or IPS.

 

Note: 

Enabling the DNS filter will not activate the SSL Deep Inspection. 

 

For example, after enabling the Web filter, the deep inspection feature can be activated:

 

iskandar_lie_3-1677773539753.png

 

FortiGate has now activated the deep inspection:

 

iskandar_lie_4-1677773636342.png

 

Note:

When deep inspection via a proxy policy combined with an application-control UTM profile (for example, to allow WeTransfer) fails, verify whether the policy destination is restricted to a specific FQDN. Many applications use multiple or dynamic IPs, so restricting by FQDN can cause failures. To fix this, set the policy destination to ALL (or Any) so traffic to all resolved IP addresses is permitted.