<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SNX not working after portal certificate change in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNX-not-working-after-portal-certificate-change/m-p/275679#M105001</link>
    <description>&lt;P&gt;The PFX of the certificate included the entire chain. We used it on other systems with no issues.&lt;/P&gt;</description>
    <pubDate>Fri, 17 Apr 2026 11:12:43 GMT</pubDate>
    <dc:creator>Jonathan</dc:creator>
    <dc:date>2026-04-17T11:12:43Z</dc:date>
    <item>
      <title>SNX not working after portal certificate change</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNX-not-working-after-portal-certificate-change/m-p/275600#M104977</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;My question is about changing a 3rd party certificate for the SSLVPN portal.&lt;/P&gt;&lt;P&gt;I run a R81.20 last take, as a VSX cluster.&lt;/P&gt;&lt;P&gt;Employees use SSLVPN for remote access, after authentication they click the green "Connect" button to launch the SNX connection in order to use native applications.&lt;/P&gt;&lt;P&gt;We use a public CA certificate which is set under the "Portal Settings" section in the gateway setting.&lt;/P&gt;&lt;P&gt;our current certificate was almost expired and the CA issued us a new one, while maintaining the same intermediate and root.&lt;/P&gt;&lt;P&gt;We already had the root+intermediate certs installed under the TrustedCA page (SmartDashboard &amp;gt; HTTPs inspection &amp;gt; trusted CAs).&lt;/P&gt;&lt;P&gt;After installing the new certificate the SNX stopped working. We clicked the "Connect" button, the progrees bar showed up and then it just reverted to the "Connect" again.&lt;/P&gt;&lt;P&gt;I checked the slimsvc.log file on the client and noticed errors regarding certain certificates fingerprints not matched.&lt;/P&gt;&lt;P&gt;The only thing that solved the issue was to add again the root+intermediate certs to the trustedCAs repository, even though they were identical (now we have a duplicate).&lt;/P&gt;&lt;P&gt;Furthermoe, the fingerprint that is shown in the CA itself doesn't look nothing like the fingerprint shown in the GUI in the portal setting page. I guess it's a custom Checkpoint fingerprint...&lt;/P&gt;&lt;P&gt;So, my question is why is this happening? why did I have to install the CAs again? will this happen everytime? is there a table holding the "Real fingerprint" vs. "CP's fingerprint" I can see?&lt;/P&gt;&lt;P&gt;We're trying to create a scripted automation for changing the portal certificate and we want to understand the flow.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2026 10:11:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNX-not-working-after-portal-certificate-change/m-p/275600#M104977</guid>
      <dc:creator>Jonathan</dc:creator>
      <dc:date>2026-04-16T10:11:58Z</dc:date>
    </item>
    <item>
      <title>Re: SNX not working after portal certificate change</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNX-not-working-after-portal-certificate-change/m-p/275648#M104987</link>
      <description>&lt;P&gt;Did you include the root and intermediate CAs when you imported the renewed certificate?&lt;/P&gt;
&lt;P&gt;I'm fairly certain what we print on connection is a "human readable hash" per RFC 1751 versus the hexadecimal hash encoded in the cerftificate.&lt;BR /&gt;There's a Python script to convert the hexadecimal hash to that readable hash on CheckMates:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Scripts/rfc1751-py/td-p/194975" target="_blank"&gt;https://community.checkpoint.com/t5/Scripts/rfc1751-py/td-p/194975&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2026 23:51:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNX-not-working-after-portal-certificate-change/m-p/275648#M104987</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-16T23:51:03Z</dc:date>
    </item>
    <item>
      <title>Re: SNX not working after portal certificate change</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNX-not-working-after-portal-certificate-change/m-p/275679#M105001</link>
      <description>&lt;P&gt;The PFX of the certificate included the entire chain. We used it on other systems with no issues.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Apr 2026 11:12:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNX-not-working-after-portal-certificate-change/m-p/275679#M105001</guid>
      <dc:creator>Jonathan</dc:creator>
      <dc:date>2026-04-17T11:12:43Z</dc:date>
    </item>
  </channel>
</rss>

