Description | This article describes an issue where web filter or any other security profile is not applied to TLS traffic for proxy-based policies |
Scope | FortiGate. |
Solution |
The solution is to revert the profile protocol options to the default and avoid configuring port 443 for HTTP inspection. Per default the protocol options define HTTP to be detected only on port 80:
config firewall profile-protocol-options
A default SSL profile is per default configured to listen on port 443 to detect TLS-encrypted traffic. Traffic on port 443 is then sent to for example the wad process for TLS decryption (deep inspection) or TLS inspection (certificate inspection).
The default deep inspection profile:
config firewall ssl-ssh-profile edit "deep-inspection"
The default certificate inspection profile:
config firewall ssl-ssh-profile edit "certificate-inspection"
If the protocol options are configured to treat ports 80 and 443 as HTTP, then the TLS profiles will no longer be applied. Modified protocol options that expect HTTP on port 443:
config firewall profile-protocol-options
Any traffic on port 443 will be recognized as plain text HTTP and not be sent to the sub-engines for TLS inspection. This will result in security profiles no longer working on port 443.
For example, when using a web filter, the configured categories will no longer be blocked but passed through without any web filter scanning. The reason here is that a web filter cannot work on TLS traffic unless it is deep or the certificate is inspected to detect the accessed host or certificate SNI.
Down below is an example of a wad debug with such a misconfiguration. Highlighted is the line that indicates that no SSL profile is being applied.
[I]2024-10-09 09:38:55.167272 [p:29323][s:1471577235][r:520935138] wad_dump_http_request :2621 hreq=0x7f7713730788 Received request from client: 10.19.4.33:52123 CONNECT www.test.com:443 HTTP/1.1 Proxy-Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36 Edg/129.0.0.0
[I]2024-10-09 09:38:55.167279 [p:29323][s:1471577235][r:520935138] wad_http_str_canonicalize :2198 enc=0 path=/ len=1 changes=0 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.