Deep Inspection on FortiGate firewall with 5 Examples

แชร์
ฝัง
  • เผยแพร่เมื่อ 19 ม.ค. 2025

ความคิดเห็น • 26

  • @fran_je3283
    @fran_je3283 ปีที่แล้ว +7

    The best explanation I had found about how to configure and use SSL inspection for FG, Thanks.

  • @vivekbannore2250
    @vivekbannore2250 2 ปีที่แล้ว +4

    Short and direct to the point.

  • @faisal04021987
    @faisal04021987 ปีที่แล้ว +1

    Great Video with Clear Explanation.

  • @sinnedam
    @sinnedam ปีที่แล้ว +2

    Thank you for the good explanation.

  • @psnfilms
    @psnfilms ปีที่แล้ว +3

    Incredible explanation, thanks mate!

  • @rexmundi273
    @rexmundi273 2 ปีที่แล้ว +4

    Great explanation, thanks.

  • @rajanrkv
    @rajanrkv ปีที่แล้ว +1

    Awesome mate, thank you😊

  • @norbertovelazquez320
    @norbertovelazquez320 2 ปีที่แล้ว +2

    Great explanation!

  • @Jisamaniac
    @Jisamaniac ปีที่แล้ว

    Video is much appreciated.
    Question can this work for Transparent Proxy?

  • @raffickmca
    @raffickmca 2 ปีที่แล้ว

    Thanks for your video, great work and I have 2 questions,
    1. I disabled the deep inspection and expect from DPI, eventhough I am intermediately getting SSL fatal error received error for proxy policy
    2. You uploaded the CA and Intermediate certificate to certificate authority and it show the validity of 2032 and the browser show 2022...

  • @Salmankhan-wb4xi
    @Salmankhan-wb4xi 2 ปีที่แล้ว +1

    Great work, can we buy ssl and use it for outbound deep inspection ? The user will not face any issue ?

    • @tothepointfortinet3823
      @tothepointfortinet3823  2 ปีที่แล้ว +2

      Hi Salman, great question. You cannot purchase an SSL certificate that can be used for deep inspection, and that is because the certificate provider (ie. say GoDaddy, Verisign, Google) will not provide an intermediate certificate (ie. a certificate that can sign other certificates) because it would eliminate the purpose for a 3rd party trusted root CA -> it gets a bit technical, but it's essentially possible from a technical standpoint, but not realistic due to how public CA's work
      What you can do, is use the built in Fortinet certificate, or create an intermediate certificate using an internal CA (such as using Microsoft CA, XCA, FortiAuthenticator etc.). Using an internal CA is a good approach for scalability and certificate revocation.

    • @movisajid
      @movisajid 2 ปีที่แล้ว

      @@tothepointfortinet3823 thanks for the answer, so if i wants to use deep packet inspection in workgroup environment and guest laptops/phones i have to import ssl cert manually on every device.. right

    • @tothepointfortinet3823
      @tothepointfortinet3823  2 ปีที่แล้ว

      @@movisajid Yes, the certificate needs to be on every device. As for whether you have to do it manually, or if there is an automatic alternative -> I haven't experienced this in a non-GPO environment. I'm sure there is a way to do it at scale, one thing that comes to mind is something like a NAC solution, but this would require some time/consideration.

    • @Salmankhan-wb4xi
      @Salmankhan-wb4xi 2 ปีที่แล้ว

      @@tothepointfortinet3823 so is it intermediate certificate authority on FortiGate ?

    • @tothepointfortinet3823
      @tothepointfortinet3823  2 ปีที่แล้ว

      @@Salmankhan-wb4xi Sort of. The FortiGate comes with an intermediate certificate that can be used for Deep Inspection -> it's automatically created and you can't for example go on the FortiGate and create more intermediate certificates to use for DPI -> if you want an application that can generate certificates (including intermediate certificates) then you could use FortiAuthenticator, or XCA, or Microsoft CA

  • @JheromSarmiento
    @JheromSarmiento ปีที่แล้ว

    Great tutorial...Just one question, how can I implement deep inspection for inbound traffic going to a public-facing website? We can't just instruct the public to install the fortinet CA cert everytime they have certificate warnings when accessing our public websites.

    • @tothepointfortinet3823
      @tothepointfortinet3823  ปีที่แล้ว

      You'd have to implement SSL offloading (also called inbound deep inspection) on the fortigate. And youll need to have a 3rd party CA like GoDaddy, Verisign etc to sign the cert for you since each PC/device has trusted root CAs with certs from third party CAs preinstalled

  • @Michael-er8dh
    @Michael-er8dh ปีที่แล้ว

    Hello, can we also do full ssl with firewall policy set to flow based instead of proxy based?

  • @MihaiIonescu-fx3yv
    @MihaiIonescu-fx3yv 2 ปีที่แล้ว

    Hi TTPF, great video(s), I see search support as bookmark , this means that you are already on the Dark Side!

  • @이호철-d1r
    @이호철-d1r 2 ปีที่แล้ว

    감사합니다!

  • @0x4b55
    @0x4b55 2 ปีที่แล้ว

    Blockig QUIC is still the answer? It is not a Google protocol but in the meantime standardized by the IETF. The Firewall Vendors should Start to learn how to do Deep Inspektion on QUIC…

    • @weis.victor
      @weis.victor ปีที่แล้ว

      Deep Inspection of HTTP3 over QUIC is supported in 7.2.0 and newer.