Description |
This article describes how to renew FortiGate's VPN certificates after a FortiManager upgrade to version 7.2.5 (and above) or 7.4.2 (and above). For further information, see the release notes: |
Scope | FortiManager, FortiGate. |
Solution |
Warning:
Do not perform any 'Policy Package & Device Settings' or 'Device Settings (only)' installation before applying this procedure. Otherwise, expired VPN tunnels will not renegotiate.
Go to Policy & Objects -> Object Configurations -> Advanced -> CA Certificates. CA2 is the former CA and CA3 is the new one.
Warning: Make sure the peer list and especially peer group members are the same among all the devices. In a text editor, remove .<ADOM_Name> (.root in this example) and replace CA2 with CA3.
Return to FortiManager and go to Device manager -> Scripts > + Create New and select 'Script'. Enter a Script Name, set the Type to 'CLI Script', specify Run Script on as Device Database and paste the previously edited data, then select 'OK'.
Select the newly created script and select the 'Run Script' button. Select all required devices, move them to the right pane using the right arrow, and select 'Run Now'. A confirmation window will appear. Select OK. Once the script has successfully run, select 'Close'.
show user peer | grep 'edit\|config\|end'
In a text editor, replace edit with delete.
Return to FortiManager and go to Device manager -> Scripts -> + Create New and select 'Script'. Enter a Script Name, set Type to 'CLI Script', specify Run Script as 'Device Database', and paste the previously edited data, then select OK.
Select the newly created script and select the Run Script button. Select all required devices, move them to the right pane using the right arrow, and select Run Now. A confirmation window will appear. Select OK. Once the script has run successfully, select 'Close'.
Warning: The script may end with errors. This is most likely due to the peer list not being the same among all the devices (a script cannot delete something that does not exist). It is recommended to adapt the script to failed device configurations.
Once the installation has been completed, select Finish.
Go to System -> Certificates, open 'OVERLAY-VPN-CERTIFICATE', and verify the common name does not have the .<ADOM_Name> extension.
Open the CLI. By now, the control peer and peer group will have been successfully updated. There should be no mention of .<ADOM_Name> and CA2, especially in the peer group members list.
config vpn certificate ca delete "root_CA2" end
Select the newly created script and select the Run Script button. Select all required devices, move them to the right pane using the right arrow and select Run Now. A confirmation window will appear. Select OK. Once the script has successfully run, select Close.
Afterwards, install the modification as detailed in 2.g.
The procedure to remove CA2 from FortiManager will differ depending on the implementation and its dependencies. As a result, it is not documented in this article. Note that this has no impact. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.