FortiManager
FortiManager supports network operations use cases for centralized management, best practices compliance, and workflow automation to provide better protection against breaches.
iyotov
Staff
Staff
Article Id 418143
Description

 

This article describes how to import local CA certificates for SSL/SSH inspection profiles via FortiManager by creating and mapping a new Dynamic Local Certificate object.

 

Scope

 

FortiManager v7.4 and v7.6. 

 

Solution

 

  1. Go to Policy & Objects -> Advanced -> Dynamic Local Certificates and select 'Create New'.
     

    Step-1-create-new-dynamic-local-certificate.png

     

  2. In the menu, Create New Dynamic Local Certificate, type a name
  3. Expand the Per-Device Mapping table and select 'Create New"

    step-2-3.png

     

  4. In the Per-Device Mapping menu, select the FortiGate where the certificate should be imported
  5. Leave the Local Certificate field blank, and select 'Import'.

    step-4-5.png

 

  1. Import the certificate as either a .p12 file (PKCS#12) or as separate certificate and key files (Certificate). Since this is a local CA, both public and private keys are required to allow this CA to sign the temporary inspection certificates. In this example, a PKCS#12 file is used:

    step-6.png

     

Note:

The certificate was only imported into the respective Device Database, but is not yet installed on the real FortiGate. 

  1. Back in the Per-Device Mapping menu, under Local Certificate, select the certificate created in step 6, then select the OK button.

    step-7.png

 

  1. Back in the Create New Dynamic Local Certificate menu, confirm that the mapping was created and select OK to save the object.

    step-8.png

Note:

Since these certificates are individual for each FortiGate, separate import and per-device mapping would be needed for multiple managed FortiGates.

  1. Use this new Dynamic Certificate in an SSL/SSH Inspection Profile and install it to the managed FortiGate(s) as required.

    step-9.png
Contributors