<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Check Point Firewall: Certificate-Based Site-to-Site VPN in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-Certificate-Based-Site-to-Site-VPN/m-p/272193#M103693</link>
    <description>&lt;P&gt;&lt;SPAN&gt;In this video, we configure a site-to-site VPN using certificate-based authentication instead of pre-shared keys. This approach reflects how real enterprise VPNs are deployed in production environments. Rather than relying on a shared secret, both gateways authenticate each other using digital certificates issued by trusted Certificate Authorities (CAs).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FMaeyeP-B9UI%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DMaeyeP-B9UI&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FMaeyeP-B9UI%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="600" height="337" scrolling="no" title="Check Point Firewall: Certificate-Based Site-to-Site VPN" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 02 Mar 2026 09:28:44 GMT</pubDate>
    <dc:creator>Moudar</dc:creator>
    <dc:date>2026-03-02T09:28:44Z</dc:date>
    <item>
      <title>Check Point Firewall: Certificate-Based Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-Certificate-Based-Site-to-Site-VPN/m-p/272193#M103693</link>
      <description>&lt;P&gt;&lt;SPAN&gt;In this video, we configure a site-to-site VPN using certificate-based authentication instead of pre-shared keys. This approach reflects how real enterprise VPNs are deployed in production environments. Rather than relying on a shared secret, both gateways authenticate each other using digital certificates issued by trusted Certificate Authorities (CAs).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FMaeyeP-B9UI%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DMaeyeP-B9UI&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FMaeyeP-B9UI%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="600" height="337" scrolling="no" title="Check Point Firewall: Certificate-Based Site-to-Site VPN" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2026 09:28:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-Certificate-Based-Site-to-Site-VPN/m-p/272193#M103693</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2026-03-02T09:28:44Z</dc:date>
    </item>
  </channel>
</rss>

