diag debug enable diag debug console timestamp enable diag debug flow show console enable diag debug flow show function-name enable diag debug flow filter addr 10.9.193.232 diag debug flow filter port 443 diag debug flow trace start 50Then try from 10.9.193.232. To stop and clear:
diag debug disable diag debug flow filter clear diag debug resetAlso try this:
diag debug enable diag debug console timestamp enable diag debug app ssl -1To stop and reset:
diag debug disable diag debug resetYou may want to log printable output to a file by using puTTy. You might be seeing TCP RST because of your browser.
2013-06-14 15:12:06 69:ssl srv port close recv 2013-06-14 15:12:06 69:shouldReset, type 1 2013-06-14 15:12:06 [65]-<000.000000> [69]: 10.9.193.232:45210 --> 74.125.229.178:443: [SSL SVRRDRDY ] Event - RESET_EVENT 2013-06-14 15:12:06 [65]-<000.000000> [69]: 10.9.193.232:45210 --> 74.125.229.178:443: [SSL SVRRDRDY ] RESET_STATE 2013-06-14 15:12:06 [65]-[69] ips closed 2013-06-14 15:12:06 ipsapp ses 69 close 2013-06-14 15:12:06 ipsapp ses 69 send end msg 145 len 0 dir 0 2013-06-14 15:12:06 69:checkConnectionEvent 2013-06-14 15:12:06 69:resetConn 2013-06-14 15:12:06 69:proxy_ssl_port_exit 2013-06-14 15:12:06 69:proxy_ssl_port_close ... 2013-06-14 15:12:09 70:checkConnectionEvent 2013-06-14 15:12:09 check fd 12 2013-06-14 15:12:09 clear client read 2013-06-14 15:12:09 set client write 2013-06-14 15:12:09 check fd 13 2013-06-14 15:12:09 set server read 2013-06-14 15:12:09 set server write 2013-06-14 15:12:09 70:sslStateCheck 2013-06-14 15:12:09 reset event 2013-06-14 15:12:09 [65]-<000.000000> [70]: 10.9.193.232:45211 --> 74.125.229.178:443: [SSL LOOPEND ] Event - RESET_EVENT 2013-06-14 15:12:09 [65]-<000.000000> [70]: 10.9.193.232:45211 --> 74.125.229.178:443: [SSL LOOPEND ] RESET_STATE 2013-06-14 15:12:09 [65]-[70] ips closed 2013-06-14 15:12:09 ipsapp ses 70 close 2013-06-14 15:12:09 ipsapp ses 70 send end msg 147 len 0 dir 0 2013-06-14 15:12:09 70:resetConn 2013-06-14 15:12:09 70:proxy_ssl_port_exit 2013-06-14 15:12:09 70:proxy_ssl_port_close..seem interesting. Looks like your client is sending a RST. Sounds like a certificate error? What configuration method did you use? Did you install both the private key of the cert and the public cert to make the Fortigate a subordinate CA? " CA:TRUE" is listed in Certificate Details? [this was done by either using `openssl ca -extensions v3_ca` or by requesting a " subordinate CA" cert from a MSFT Windows CA] Sorry to review the trivialities.
).
The certificate was created in the Fortigate itself (Certificates -> Local Certificates -> Generate), so there shouldn' t be any issues with the keys, the CSR was downloaded and sent to our root_CA for validation, then the validated certificate was uploaded, i' m attaching a screenshot of the certificate itself.
Oh, and i' ve already tried generating the key+cert outside the FG, then importing it, still same result.
I thought of the browser, already tried IE 10, Firefox 21 & Chrome 27, plus the test machine used for the traces i' ve sent is a brand new installed Linux Mint 15 with Firefox 20 and Chromium 25, all browsers same result, tried using SSL 3.0 only, again, the result is the same.
Don' t be sorry for asking the trivialities, i usually make mistakes so no harm done in checking again. :)
Thanks for the input, its really appreciated.
curl --insecure https://google.comThat' s interesting, seeing:
<HTML><HEAD><meta http-equiv=" content-type" content=" text/html;charset=utf-8" > <TITLE>301 Moved</TITLE></HEAD><BODY> <H1>301 Moved</H1> The document has moved <A HREF=" https://www.google.com/" >here</A>. </BODY></HTML>What happens if: 1) you create a URL Filter and exempt google.com? 2) you disable " Block HTTP Redirects by Rating" ? (I know this won' t do anything) 3) you access another 301 redirected page? 4) Try to review the logs to see if web filter or app control are dropping the packets... what about other layers in your packet flow beyond the ssl mitm proxy and the firewall policies? 5) If this was working before, but now is not, you can also try to restart the ssl daemon:
diag test app ssl 99
| User | Count |
|---|---|
| 2728 | |
| 1417 | |
| 812 | |
| 739 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.