Hello,
I have the following question regarding the SSL inspection process performed by Fortigate, specifically the options below:
I'm trying to understand the order in which these options are analyzed. I understand that a verification flow must be followed, and my current understanding is as follows:
My Logic:
It all starts with cert-probe-failure.
cert-probe-failure = Couldn't get the certificate, so it stops here and takes a block or allow action. If successful, continue >>
cert-validation = Opens the certificate and checks CA, revocation, expiration, and SNI.
According to the information obtained from cert-validation, it will perform the actions set below:
sni-server-cert-check = enable (I understand this check already occurs in cert-validation)
revoked = allow or drop
expired = allow or drop
untrusted = allow or drop
I'm a little confused about these checks. I read in the documentation that cert-probe-failure already
performs validations that other options do, such as untrusted certificate and expired certificate.
Is there any documentation explaining this flow?
Thanks for any help!
relevant document: https://community.fortinet.com/t5/FortiGate/Troubleshooting-Tip-How-to-allow-HTTPS-port-443-traffic-...
https://community.fortinet.com/t5/FortiGate/Troubleshooting-Tip-How-to-fix-SSL-connection-is-blocked...
cert-probe is fortigate pre-probing the destination before allowing the connection between client and server to establish. When this fails, the connection is blocked - this is the default setting. This is the case for versions 7.0, 7.2 and 7.4. From 7.6 onwards, the default action for cert-probe failure is Allow.
User | Count |
---|---|
2538 | |
1351 | |
795 | |
642 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.