- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi All,
This is about Creating CSR and importing third party certificate to gateway for Mobile Access Blade. We have already SK69660 but adding snapshot for better idea.
First generate Request to generate certificate (CSR) with below command.
cpopenssl req -new -out <CERT.CSR> -keyout <KEYFILE.KEY> -config $CPDIR/conf/openssl.cnf
Then you can send this *.csr file to third party so that they can create certificate for you.
Third party will give you combined certificate where 3 certificates (Primary SSL, Intermediate & Root) will resides or separate certificates. If you receive separate certificates then you need to combine all certificates in Text Editor as suggested in sk69660. Please make combined file in *.crt format.
Now the final stage is to import certificate in Firewall but before that we need to convert this certificate ext from *.crt to *.P12 You need to use below command for conversion.
cpopenssl pkcs12 -export -out <New file name as P12> -in <Your combined certificate> -inkey <Private key which is generated during CSR>
Now this *.P12 file you need to import in Gateway --> Properties --> Mobile Access --> Portal Setting --> Import the file.
Save & Push policy.
Now when you connect sslvpn (https://Gateway_IP/sslvpn), you will not get any certificate error and you can see certificate that is provided by third party.
I am getting a pop up to key-in password, but I didn't set any password on .p12 file. Any idea please?
I have kept password. If you didn't set password then just keep it blank and enter, it fails then I think you can regenerate the .p12 and keep password.
Thanks for the reply, I had tried that too. Received the same "password is incorrect" error regardless the certificate is with or without password.
Hmm. Strange.
I've managed to make it work with a workaround. Export the .P12 cert using openssl on windows server and import to CP gateway.
CP tech support is still checking why the cert exported from security gateway is not working.
Ok. Please let us know whatever the result is.
I had a similar issue importing server certs for https inspection, i found that i needed to use the -passin and -passout options with openssl when creating the p12 or else the import always failed with incorrect password
openssl pkcs12 -export -out website.p12 -inkey website.key -in website.pem -certfile ca-chain.pem -passin pass:privatekeypass -passout pass:privatekeypass
I recently encountered the same problem when importing a certificate - an error message about an incorrect password. I tried different options with openssl and a banal change in the extension of the certificate file from pfx to p12 helped me.
Is there any procedure on how to do it on cluster firewalls?
Hi there, I would like to know the same thing. Did you perhaps managed to get it to work in cluster environment.
I am about to do this in a clustered production environment and will try to remember to update this thread. Of note though is that when generating CSR, I had to include "-newkey rsa:2048" in the command:
"openssl req -new -newkey rsa:2048 -nodes -out gw8010.blablabla.com.rsa.csr -keyout gw8010.blablabla.com.rsa.pkey -subj "/C=US/ST=New Jersey/L=Wayne/O=Higher Intelligence LLC/CN=gw8010.blablabla.com"
Else the CA was complaining.
No problem with deployment in the clustered environment.
Just completed it today.
You perform CLI certificate operations on a single cluster member, but import resultant certificate in the SmartConsole in the Cluster Object's properties.
I started this process last week, creating the CSR and requested the cert. Today when I was going to finish it, I realised that I should have noted the key-file which I used to sign the CSR request. Because I need to re-use that same key now to install the certificate, right?
Question is, what to do if I lost the pw to the .key file?
The solution was to just create a new csr.
Now I know I need to save the password for the inkey file.
Hi,
I am using IPsec for remote access. How do i import the p12 certificate for that ?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
Wed 03 Sep 2025 @ 11:00 AM (SGT)
Deep Dive APAC: Troubleshooting 101 for Quantum Security GatewaysThu 04 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: External Risk Management for DummiesWed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksWed 03 Sep 2025 @ 11:00 AM (SGT)
Deep Dive APAC: Troubleshooting 101 for Quantum Security GatewaysThu 04 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: External Risk Management for DummiesWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY