I have setup fortinet DPI but im getting untrusted cert error
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
This can be changed only via CLI as below :
config firewall ssl-ssh-profile
edit <>
set untrusted-caname "Fortinet_CA_Untrusted" --> change to certificate that you wish to use for untrusted connections
end
end
Fortigate showing the "Server certificate is re-signed as untrusted, certificate-status: untrusted" in the logs as the CA that signed the server's cert is not in the trusted store of the Fortigate.
Now from the below url
https://www.ssllabs.com/ssltest/analyze.html?d=sigupdates.marshal.com&s=152.199.6.70#whyNotTrusted
You need to import the root CA "of the website/srv" you are accessing into the FortiGate trust store
FGT have certificate store and in that store we keep root CA certs. The Root CA of the website that you are visiting is not there in the store that's why you are getting that untrusted cert
Due to the nature of DPI this is expected if the configuration is not completed. You can take a look at this article that goes into details explaining why this happens and how to complete the implementation.
Hi,
Please check the SSL event and see what logs you are getting.
Have you install the CA cert used for DPI on the end user machine. If possible share snapshot for better understanding
Yes have install the certificate on the end user.
The error I'm getting on the SSL event logs msg="Server certificate is re-signed as untrusted, certificate-status: untrusted.
And it is happening when accessing some of the website and not all the website
--> By default, FGT checks the server certificate of the destination website. When FortiGate cannot successfully authenticate the server certificate (i.e. untrusted root CA, expired, self-signed certificate) it will present the CA certificate configured via set untrusted-caname in the SSL inspection profile (default CA certificate name: Fortinet_CA_Untrusted).
This can be changed only via CLI as below :
config firewall ssl-ssh-profile
edit <>
set untrusted-caname "Fortinet_CA_Untrusted" --> change to certificate that you wish to use for untrusted connections
end
end
Fortigate showing the "Server certificate is re-signed as untrusted, certificate-status: untrusted" in the logs as the CA that signed the server's cert is not in the trusted store of the Fortigate.
Now from the below url
https://www.ssllabs.com/ssltest/analyze.html?d=sigupdates.marshal.com&s=152.199.6.70#whyNotTrusted
You need to import the root CA "of the website/srv" you are accessing into the FortiGate trust store
FGT have certificate store and in that store we keep root CA certs. The Root CA of the website that you are visiting is not there in the store that's why you are getting that untrusted cert
ok i will check
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1711 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.