Chapter 7 Firewall for FortiOS 5.0 : Firewall objects : SSL/SSH Inspection
  
SSL/SSH Inspection
While the profile configuration for this is not found in the Security Profiles section but in the Policy Section, it is set in the policy along with the security profiles. This sort of analysis is some times referred to as deep scanning.
Deep Inspection works along the following lines. If your FortiGate unit has the correct chipset it will be able to scan HTTPS traffic in the same way that HTTP traffic can be scanned. The FortiGate firewall will essentially receive the traffic on behalf of the client and open up the encrypted traffic. Once it is finished it re-encrypts the traffic and sends it on to its intended recipient. It is very similar to a man-in-the-middle attack. By enabling this feature, it allows the FortiGate firewall to filter on traffic that is using the HTTPS protocol.
Sometimes the regular web filter can be circumvented by using https:// instead of http:// in the URL and this would prevent that circumvention. However, because when the encrypted traffic is decrypted it has to be re-encrypted with the FortiGate’s certificate rather than the original certificate it can cause errors because the name on the certificate does not match the name on the web site.
At one point deep inspection was something that was either turned on or off. Now individual deep inspection profiles can be created depending on the requirements of the policy. Depending on the Inspection Profile, you can:
Configure which CA certificate will be used to decrypt the SSL encrypted traffic.
Configure which SSL protocols will be inspected.
Configure which ports will be associated with which SSL protocols for the purpose of inspection.
Configure whether or not to allow invalid SSL certificates.
Configure whether or not SSH traffic will be inspected.