Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
bfogliano
New Contributor

Cannot secure Fortigate public IP with CA signed certificate

I have read every article on the internet on this topic and worked with Fortinet TAC for 2 days.  All of the articles say you can secure the public IP of the Fortigate by putting the public IP in the Host IP section for the common name in the CSR.  Done this, does not work.  Once the wildcard is rekeyed for the subdomain it shows the top level domain in the cert and that it is applied on the IP login but the browser still says not secure.  I have tried this with the SAN as the DNS name for the site, and it secures the DNS name for the site but not the IP.  Has anyone successfully done this and how, and why would Fortinet documentation say this can be done if it can't (this is what TAC says and would not escalate)?

17 REPLIES 17
bfogliano
New Contributor

Ok if my customer is good with just securing the DNS name is there a way to block 443 access then to firewall on the WAN interface?  Today they use 10443 for admin access on the WAN interface.  I have put in local in policy to block 443 on the WAN interface but telnet test to 443 still works.  Am I missing something? 

AEK

Local in policy if it is well configured should block the access as expected.

Should be like that.

config firewall local-in-policy
edit 1
set intf "wan1"
set srcaddr "all"
set dstaddr "1.2.3.4"
set service "HTTPS"
set schedule "always"
set action deny
next
end
AEK
AEK
bfogliano
New Contributor

Ok here is the weirdest thing.  I have applied that exact Local In you showed on both firewalls and only 1 is blocking the connection to 443.  

This one works

config firewall local-in-policy
edit 2
set uuid 2c381c5e-e4cd-51ef-fc7a-6cfcc55b8019
set intf "wan1"
set srcaddr "all"
set srcaddr-negate disable
set dstaddr "wan1-IP"
set internet-service-src disable
set dstaddr-negate disable
set action deny
set service "HTTPS"
set service-negate disable
set schedule "always"
set status enable
set comments ''

 

This one does not

config firewall local-in-policy
edit 2
set uuid 78d309cc-e4c6-51ef-d267-3c77db370faf
set intf "wan1"
set srcaddr "all"
set srcaddr-negate disable
set dstaddr "wan1-IP"
set internet-service-src disable
set dstaddr-negate disable
set action deny
set service "HTTPS"
set service-negate disable
set schedule "always"
set status enable
set comments ''

 

Am I missing something

AEK

And what the first rule (edit 1) looks like?

AEK
AEK
bfogliano
New Contributor

This is the two rules for each firewall

 

 
 

config firewall local-in-policy
edit 1
set uuid ae9f5406-9bbb-51ef-f6dd-2a8d82bb10ee
set intf "wan1"
set srcaddr "all"
set srcaddr-negate disable
set dstaddr "wan1-IP"
set internet-service-src disable
set dstaddr-negate disable
set action deny
set service "TIMESTAMP"
set service-negate disable
set schedule "always"
set status enable
set comments ''
next
edit 2
set uuid 78d309cc-e4c6-51ef-d267-3c77db370faf
set intf "wan1"
set srcaddr "all"
set srcaddr-negate disable
set dstaddr "wan1-IP"
set internet-service-src disable
set dstaddr-negate disable
set action deny
set service "HTTPS"
set service-negate disable
set schedule "always"
set status enable
set comments ''
next
end

 

AEK

It looks fine. So probably a bug. Which FortiOS version?

AEK
AEK
bfogliano
New Contributor

7.6.2 on both boxes

AEK

There is a bug in 7.6.2 that "may" have relationship with your issue.

1104649

If a local-in policy, DoS policy, interface policy, multicast policy, TTL policy, or central SNAT map used an interface in version 7.4.5, 7.6.0 or any previous GA version that was part of the SD-WAN zone, these policies will be deleted or show empty values after upgrading to version 7.4.6 or 7.6.1.

Workaround: After upgrading to 7.4.6 or 7.6.1 GA, users must manually recreate these policies and assign them to the appropriate SD-WAN zone.

 

Try purge your local-in policies and recreate them again.

Hope it helps.

AEK
AEK
Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors