Encrypted HTTPS traffic requires inspection to identify potential threats hidden within the data. FortiGate supports two main modes of SSL/TLS inspection.
Certificate Inspection:
Deep Inspection:
Generate FortiGate CA Certificates:
Create a self-signed CA certificate in FortiGate to act as the intermediary for HTTPS traffic decryption.
Example CLI:
config vpn certificate local
edit "FortiGate_CA"
set certificate "-----BEGIN CERTIFICATE-----..."
set private-key "-----BEGIN PRIVATE KEY-----..."
end
Distribute Certificates to Clients:
Enable SSL/SSH Inspection in Policies:
Apply the inspection profile in the relevant firewall policy.
GUI: Policy & Objects > SSL/SSH Inspection > Create or Edit Profile.
CLI Example:
config firewall policy
edit 1
set ssl-ssh-profile "deep-inspection"
end
Web filtering helps control access to web content, ensuring compliance with security policies.
Enable FortiGuard Web Filtering:
Blocking Specific Categories:
Example CLI:
config webfilter profile
edit "WebFilter"
config categories
set 4 block
set 5 block
end
end
Categories 4 and 5 correspond to gambling and malicious websites.
Custom URL Blacklists/Whitelists:
Regular Expressions for URL Matching:
Use regex to match patterns within URLs.
Example CLI:
config webfilter urlfilter
edit 1
set url "example.com"
set type regex
set action block
end
FortiGate can identify and control application traffic using its signature database.
Block Specific Applications:
Restrict Specific Features:
Allow partial access to an application. For example:
CLI Example:
config application list
edit "AppControl"
config entries
edit 1
set application "YouTube"
set action block
end
end
Prevent Malware Propagation:
Scans incoming and outgoing files for viruses and malicious content.
Protocols such as HTTP, HTTPS, FTP, and SMTP can be scanned.
Example CLI:
config antivirus profile
edit "AntiVirusProfile"
set inspection-mode proxy
end
Advanced Options:
Block Vulnerability Exploits:
Custom IPS Signatures:
Create signatures tailored to your network's unique threats.
Example CLI:
config ips sensor
edit "IPS_Sensor"
config entries
edit 1
set signature "custom_signature"
set action block
end
end
Enable IPS in Policies:
Apply IPS profiles in firewall policies.
Example CLI:
config firewall policy
edit 1
set ips-sensor "IPS_Sensor"
end
Each feature enhances your FortiGate's ability to protect and manage network traffic effectively.
When performing Deep SSL Inspection, FortiGate acts as a man-in-the-middle (MITM) by decrypting and re-encrypting HTTPS traffic. While this is powerful for threat detection, it may cause issues with certain sensitive or security-critical websites, such as:
These sites often use certificate pinning or strict security controls that break if their traffic is intercepted, even for inspection.
SSL exemptions allow you to bypass SSL inspection for specific destinations, services, or ports, even when using Deep Inspection globally.
config firewall ssl-ssh-profile
edit "deep-inspection"
config ssl-exempt
edit 1
set address "BankingSites"
set port 443
next
end
end
address object (BankingSites) contains the IPs or FQDNs of websites you want to exclude from inspection.You can also exempt based on:
Sensitive_Sites) for easier management.The FortiGuard Web Filtering engine relies on a cloud-based classification database that dynamically categorizes websites into topics like:
These ratings are queried in real-time when a user attempts to access a URL.
If the FortiGate device cannot reach the FortiGuard servers (e.g., due to network issues or license expiration), it will not be able to determine the category of a requested website.
In such cases, FortiGate follows a configured fallback action, which must be clearly defined in the web filter profile.
GUI:
CLI Example:
config webfilter profile
edit "Strict_Filter"
set ftgd-unrated-action block
end
| Supplementary Topic | Description | Exam Value |
|---|---|---|
| SSL Inspection Exceptions | Bypass SSL decryption for sensitive sites to avoid service disruption | High – CLI + scenario |
| FortiGuard Rating Availability | Defines behavior when URL categorization is not possible | Medium – policy config |
Why might users receive certificate warnings after SSL deep inspection is enabled?
Because the FortiGate SSL inspection certificate is not trusted by the client devices.
When SSL deep inspection is enabled, the firewall decrypts and re-encrypts HTTPS traffic using its own certificate. If client devices do not trust the FortiGate CA certificate, browsers will display certificate warnings. The correct solution is deploying the FortiGate CA certificate to client devices or enterprise trust stores. Many administrators mistakenly believe SSL inspection is malfunctioning when the real issue is simply missing certificate trust.
Demand Score: 91
Exam Relevance Score: 92
Why might some HTTPS websites fail to load after enabling deep inspection?
Because certain applications use certificate pinning that prevents SSL interception.
Some websites and applications verify the server certificate directly and reject connections if the certificate changes. Since SSL deep inspection replaces the original certificate with the FortiGate certificate, these applications may refuse the connection. The typical solution is creating SSL inspection exemptions for those domains or applications. This scenario frequently appears in troubleshooting discussions when administrators enable deep inspection globally.
Demand Score: 88
Exam Relevance Score: 90
Why might a web filtering profile fail to block certain websites?
Because the traffic is encrypted and SSL inspection is not enabled.
Modern websites commonly use HTTPS encryption. Without SSL inspection, the firewall cannot view the full URL or web content and must rely only on limited information such as the domain name. If category filtering depends on URL paths or page content, the firewall may not apply the correct filtering action. Enabling SSL inspection allows FortiGate to fully inspect encrypted traffic and enforce web filtering policies more effectively.
Demand Score: 83
Exam Relevance Score: 89
What is the purpose of an antivirus security profile in FortiGate?
To detect and block malware within network traffic.
The antivirus security profile scans files transferred through supported protocols such as HTTP, HTTPS, FTP, and email protocols. It uses signature databases and heuristic analysis to identify malware before it reaches internal systems. Administrators attach the antivirus profile to firewall policies so that traffic matching the policy is inspected for malicious content.
Demand Score: 74
Exam Relevance Score: 86
Why might a file download be blocked even when the firewall policy allows the traffic?
A security profile such as antivirus or web filtering may be blocking the content.
Firewall policies control whether traffic is permitted or denied, but security profiles inspect the traffic content. If a profile detects malware, prohibited file types, or restricted categories, it can block the traffic even though the firewall policy allows it. Administrators troubleshooting blocked downloads must review the security profiles applied to the policy.
Demand Score: 71
Exam Relevance Score: 85