FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Dhruvin_patel
Article Id 283963
Description This article describes how to decrypt the HTTPS traffic on the client using Wireshark. While using virtual servers on FortiGate, it is sometimes necessary to decrypt the traffic on the client end to isolate the issue further.
Scope Windows Client, FortiGate.
Solution
  1. Ensure that the client has the necessary permissions to capture the traffic and have the Wireshark installed in the client's Windows machine to capture the traffic.

  2. Capture the client side of the session key.

  3. Close the Chrome completely, and make sure all the instances are closed. Verify from the task manager that all the instances are closed.

  4. Go to System and Security -> System, select Advanced system settings, select Environment Variables, and create the new variable by selecting 'New'. Give the variable name and variable value:

Variable name: SSLKEYLOGFILE.
Variable value: %USERPROFILE%\Desktop\sslkey.log.

 

2.png

 

  1. Start Wireshark, and start capturing the packet capture on the Internet interface.
  2. Open Chrome and verify that the sslkey.log file has been created.

 

3.png

 

  1. Open the website that would like to decrypt. In this example, it is tested with the website '123.net'.
  2. Verify that the packets are being captured on Wireshark.

 

4.png

 

  1. On Wireshark, go to Edit -> Preferences -> Protocols, select SSL. Under (Pre)-Master-Secret log filename, select the sslkey.log file from the PC where it has been stored and then, select 'OK'.

 

4.png

 

  1. The decrypted packet is now observed in Wireshark.

 

5.PNG

 

6.PNG

 

The steps may change when Windows or Chrome gets updated.