Created on
10-09-2025
02:54 AM
Edited on
10-09-2025
02:54 AM
By
Jean-Philippe_P
Description | This article describes how to enforce the OSCP certificate revocation status when the CRL certificate check is already configured. |
Scope | FortiOS v7.4.2 and later. |
Solution |
When certificate revocation status checking is configured for CRL and OCSP, the firewall will check by default only against the CRL, regardless of whether the result will be returned as 'GOOD' or 'REVOKED'.
The CRL is not usually updated very frequently, and this might lead to incorrect certificate status, opposed to the user's desire, meaning that the CRL can return the certificate revocation status of 'GOOD' while the certificate has already been revoked and the CRL has not been updated yet.
An OCSP revocation check uses the Online Certificate Status Protocol (OCSP) to query a server for the real-time revocation status of a digital certificate, providing a faster alternative to downloading and checking large Certificate Revocation Lists (CRLs).
To enforce the OSCP revocation check simultaneously with the CRL revocation check, the status of the OCSP has to be set to mandatory under the certificate settings.
config vpn certificate setting
After the OCSP status is set to mandatory, the certificate revocation status will be checked as follows:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.