We are about to install HA 600E's and will be doing web filtering (including SSL inspection), and we will also use the 600E's for SSL VPN. We will buy certs rather than relying on the default self signed. Most internal devices will be domain joined and so have the cert deployed via GPO with the exception of BYOD devices.
I'm wondering what level of validation is recommended -DV, OV, or EV?
Given past experience I'd like to avoid the need for intermediate certs so has anyone had experience with a CA/cert that doesn't have a requirement for intermediate certs?
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
yes this is because SSL inspection (DPI) is a "man-in-the-middle". This means the FGT will take incoming/outgoing encrypted traffic, decrypt it, analyze it. To ship the traffic on to the original receiver it will have to be encrypted again. Since the FGT don't have the private key of the original cert it cannot encrypt using the original cert. So it has to use a cert it has the private key of for this. Since additionally it needs to still deliver the original CN/SAN of the original cert it needs to create a new cert for the encryption. To do this the cert used for DPI musst be of type CA or SUBCA. One can not afford an official CA and one cannot buy a subca. So you wil indeed have to use your own one.
--
"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1665 | |
1077 | |
752 | |
446 | |
220 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.