Skip to main content
Version: 2.7.0 (Current)

FortiGate

SecTrail CM enables automatic deployment and renewal of SSL certificates by establishing agentless connections to FortiGate firewall devices.

Connection Requirements​

RequirementDetailDescription
ProtocolREST API (HTTPS)FortiGate's native REST API is used
Port443Standard HTTPS port or custom management port
AuthenticationUsername and PasswordAuthentication via Username and Password
User PermissionAdmin or Certificate Manager roleCertificate upload and configuration permission

Automated Operations​

SecTrail CM automatically performs the following operations on FortiGate:

  1. Certificate and Key Upload: Secure transfer of SSL certificate and private key to the device
  2. SSL Profile Update: Updating SSL inspection profiles
  3. Policy Update: Updating firewall policies to use the new profile
  4. Configuration Commit: Making configuration persistent

Configuration Steps​

1. Creating FortiGate User​

Navigate to Automation > Device Users and create a user for FortiGate.

2. Adding FortiGate Device to SecTrail CM​

Click Automation > Devices > Add New Device button and enter the following information:

FortiGate Device Creation

  • Name: Provide a descriptive name for the device
  • Device Users: Select the user created in Step 1
  • IP: Enter the FortiGate device IP address or hostname
  • Device Type: Select FortiGate from the dropdown menu
  • Deployment Type: Select deployment type
    • Generative - Append: Creates a new SSL profile, adds the new certificate to it, and associates it with matching policies
    • Generative - Replace: Creates a new SSL profile, replaces the certificate within it, and associates it with matching policies
    • Override - Append: Adds the new certificate to the existing SSL profile
    • Override - Replace: Removes the current certificate from the existing SSL profile and adds the new one
  • VDOM: FortiGate VDOM name (e.g. root)
  • Execution Server: Server to use for executing deployment operations
Automatic Discovery and Monitoring

After the FortiGate device is added to SecTrail CM, all certificates defined on the device are automatically included in the discovery period and scanned regularly. Automatic alarms are created for certificates that are about to expire or have issues.

3. Viewing Device Information​

After the device is added, it will be displayed in the Automation > Devices list. Click on the row to view device details:

FortiGate Device Details

  • SSL Profile: SSL inspection profile name associated with the certificate
  • Scope: Scope of the SSL profile (e.g. Protecting SSL Server, Multiple Clients to Multiple Servers)
  • Cert Name: Name of the certificate defined on the device
  • Common Name: Common Name (CN) information of the certificate
  • Not After: Certificate expiration date
  • Fingerprint: Certificate fingerprint
  • Deploy: For certificate deployment

Certificate Deployment​

Step 1: SSL Profile and Certificate Selection​

  1. Select your FortiGate device from Automation > Devices
  2. In the device details, find the SSL profile where you want to deploy the certificate
  3. Click the Deploy button on the relevant row
  4. In the Deploy Certificate window that opens:
    • Virtual Servers: Target virtual server information is displayed (SSL Profile / Common Name / Installation Target / Not After format)
    • Deploy Type: Displays the configured deployment type (e.g. Generative-Replace)
    • Replace Certificate: Select the existing certificate on the device to be replaced
    • Certificate: Select the new certificate to deploy from the dropdown menu

Certificate Deployment Screen

Step 2: Starting the Deployment Process​

Click the Deploy button to start the certificate deployment process.

Step 3: Process Tracking​

The deployment process can be tracked from Automation > Processes:

FortiGate Deployment Operations

Operation Details​

The following steps are performed during deployment:

StepOperation Description
1SSL profile is fetched and cert mode is determined
2Certificate is uploaded to the device
3SSL profile body is built
4SSL profile is stored successfully
5Firewall policies are fetched
6Matching policies are updated to use the new profile
7Deployment completed successfully

Rollback Operation​

The Manual Rollback feature can be used in case of issues after certificate deployment.

Automatic Rollback

If an error occurs at any step during the deployment process, the system automatically performs a rollback and all changes are reverted.

Rollback Steps​

  1. Navigate to Automation > Processes
  2. Find the operation you want to rollback
  3. Use the Manual-Rollback option in the Status column
  4. Confirm

Operations During Rollback​

StepOperation
1Rollback plan is created and certificate to be deleted is identified
2Firewall policies are fetched
3Matching policies are reverted to the previous profile
4New SSL profile is deleted
5Certificate is deleted from the device
6Rollback completed successfully