<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN certificates in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70028#M12005</link>
    <description>&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk30501" target="_self"&gt;&lt;SPAN&gt;Setting up the ICA Management Tool&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk102837" target="_self"&gt;&lt;SPAN&gt;Best Practices - ICA Management Tool configuration&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101049" target="_self"&gt;&lt;SPAN&gt;Expired certificates cannot be deleted from the Management Database&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Basically you can just run &lt;EM&gt;"cpca_client&amp;nbsp;&amp;nbsp;set_mgmt_tool on&amp;nbsp; -no_ssl"&lt;/EM&gt; in expert mode of your SmartCenter, connect to the ICA Management Tool via http://SmartCenter-IP:18265/ and configure your certificates and turn off the Management Tool via&amp;nbsp;&lt;EM&gt;"cpca_client&amp;nbsp;&amp;nbsp;set_mgmt_tool off"&lt;/EM&gt; afterwards.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 11 Dec 2019 08:08:38 GMT</pubDate>
    <dc:creator>Danny</dc:creator>
    <dc:date>2019-12-11T08:08:38Z</dc:date>
    <item>
      <title>VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70001#M12002</link>
      <description>&lt;P&gt;Hello CheckMates,&lt;/P&gt;&lt;P&gt;Does anyone know how to control which certificate gets sent in a certificate-based site-to-site VPN?&lt;BR /&gt;There's a nice repository of certificates available on the gateway, but it always seems to send the ICA signed certificate. We only want to use the ICA certificate for CP&amp;lt;-&amp;gt;CP VPN's that are managed by the same management. We also have some third-party DAIP gateways we want to use another PKI infrastructure for (that already has CRL publicly available, unlike the CP ICA).&lt;/P&gt;&lt;P&gt;Any ideas how to accomplish this? Browsing the documentation and SK's for half a day didn't seem to reveal a solution.&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Nik&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 06:55:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70001#M12002</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-11T06:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70014#M12003</link>
      <description>&lt;P&gt;This can be configured in the gateway object &amp;gt; IPsec Site-to-Site VPN. There you can choose which certificate from the cert repository it has to use.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Access-Control-Products/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/td-p/38371" target="_self"&gt;&lt;SPAN&gt;HowTo Set Up Certificate Based VPNs with Check Point Appliances&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 07:38:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70014#M12003</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2019-12-11T07:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70018#M12004</link>
      <description>I still don't quite understand how. I found that post yesterday and I know you can configure what CA the certificate of the other side has to belong to (with the Matching Critera on the Interoperable Device) but I don't understand how to control the certificate that is sent from Check Point to the third party DAIP gateway. The post shows how to do it with an Externally Managed CP gateway, but the GW we're dealing with on the other end is not Check Point.</description>
      <pubDate>Wed, 11 Dec 2019 07:47:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70018#M12004</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-11T07:47:58Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70028#M12005</link>
      <description>&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk30501" target="_self"&gt;&lt;SPAN&gt;Setting up the ICA Management Tool&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk102837" target="_self"&gt;&lt;SPAN&gt;Best Practices - ICA Management Tool configuration&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101049" target="_self"&gt;&lt;SPAN&gt;Expired certificates cannot be deleted from the Management Database&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Basically you can just run &lt;EM&gt;"cpca_client&amp;nbsp;&amp;nbsp;set_mgmt_tool on&amp;nbsp; -no_ssl"&lt;/EM&gt; in expert mode of your SmartCenter, connect to the ICA Management Tool via http://SmartCenter-IP:18265/ and configure your certificates and turn off the Management Tool via&amp;nbsp;&lt;EM&gt;"cpca_client&amp;nbsp;&amp;nbsp;set_mgmt_tool off"&lt;/EM&gt; afterwards.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 08:08:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70028#M12005</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2019-12-11T08:08:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70060#M12006</link>
      <description>I don't see how the ICA Management Tool is going to help me. It's for downloading or revoking the ICA issued certificates.&lt;BR /&gt;&lt;BR /&gt;I have 2 certificates available in the IPSEC VPN pane of the Check Point gateway:&lt;BR /&gt;1. the default Check Point ICA issued certificate&lt;BR /&gt;2. a certificate signed by our internal PKI infrastructure CA&lt;BR /&gt;&lt;BR /&gt;What I need to know if how to configure Check Point to send the non-ICA certificate (2) to a third party VPN peer instead of the internal ICA one (1).</description>
      <pubDate>Wed, 11 Dec 2019 09:31:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70060#M12006</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-11T09:31:55Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70147#M12007</link>
      <description>For these third party DAIP gateways, are they part of the same VPN community or a different one?</description>
      <pubDate>Wed, 11 Dec 2019 16:58:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70147#M12007</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-12-11T16:58:24Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70164#M12008</link>
      <description>&lt;P&gt;On Management Server using object Explorer you can create under Servers - Trusted CA an object that defines a external CA, you will need the Root CA Certificate ... Once done you can use Digital Certificates issued by that external CA for the VPNs that you need.&lt;/P&gt;&lt;P&gt;Simply add the Certificate under Gateway - IPSec VPN properties page !!&lt;/P&gt;&lt;P&gt;I did myself a couple of times using Comodo issued Certificates !!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Warm regards&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 19:18:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70164#M12008</guid>
      <dc:creator>Malopro</dc:creator>
      <dc:date>2019-12-11T19:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70227#M12014</link>
      <description>They are part of the same community since they are trusted locations. They just don't have Check Point gateways at those locations (yet).</description>
      <pubDate>Thu, 12 Dec 2019 07:47:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70227#M12014</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-12T07:47:54Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70228#M12009</link>
      <description>As mentioned, I have the trusted CA certificate available under IPSec VPN tab along with the ICA certificate, it just doesn't send it to peers, it only sends the ICA certificate.</description>
      <pubDate>Thu, 12 Dec 2019 07:49:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70228#M12009</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-12T07:49:12Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70260#M12015</link>
      <description>&lt;P&gt;Nik ...&lt;/P&gt;&lt;P&gt;I did it to stablish a Certificate authentication based Site to Site VPN with a Cisco appliance.&lt;/P&gt;&lt;P&gt;Did you delete the ICA Certificate on the IPSec VPN properties ??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 11:13:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70260#M12015</guid>
      <dc:creator>Malopro</dc:creator>
      <dc:date>2019-12-12T11:13:06Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70315#M12016</link>
      <description>&lt;P&gt;Uff ... forget my previous post ... you have CheckPoint and no-Checkpoint on the same community ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 15:55:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70315#M12016</guid>
      <dc:creator>Malopro</dc:creator>
      <dc:date>2019-12-12T15:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70371#M12010</link>
      <description>&lt;P&gt;why not using preshared key, if your remote GWs are a third party?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2019 08:45:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70371#M12010</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-12-13T08:45:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70380#M12011</link>
      <description>Because they're DAIP. Check Point doesn't allow PSK for DAIP peers.</description>
      <pubDate>Fri, 13 Dec 2019 10:03:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70380#M12011</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-13T10:03:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70385#M12017</link>
      <description>&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38926"&gt;@Malopro&lt;/a&gt;: indeed, I want to use the ICA certificate for the CP-CP centrally managed VPN's. Besides, what's the point of having a certificate repository if you can only actually use one certificate... Deleting the other certificate should not be the solution.</description>
      <pubDate>Fri, 13 Dec 2019 11:18:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70385#M12017</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-13T11:18:11Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70387#M12012</link>
      <description>&lt;P&gt;So i would suggest to use the CP internal CAs certificates - for S2S VPN this has no drawbacks...&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2019 11:44:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70387#M12012</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-12-13T11:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70404#M12013</link>
      <description>But we have a PKI infrastructure for which the CRL is publically available. This is not the case with CP PKI. It should be possible to use a different PKI infrastructure. It is also managed by different people than the CP ICA infrastructure. So there is a drawback.</description>
      <pubDate>Fri, 13 Dec 2019 12:27:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70404#M12013</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-13T12:27:34Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70456#M12018</link>
      <description>&lt;P&gt;For the peers in question, do you have them configured to require presenting a certificate signed by a specific CA?&lt;BR /&gt;You would have to import and configure an OPSEC CA object.&lt;BR /&gt;This is described in the "Trusting an Externally Managed CA" section of the R80.30 Site-to-Site VPN guide:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_SitetoSiteVPN_AdminGuide/html_frameset.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_SitetoSiteVPN_AdminGuide/html_frameset.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Then you go into the external object and configure the matching criteria, as shown here:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-12-13 at 11.17.16 AM.png" style="width: 592px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/3749iA295E199CE9BE2BE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2019-12-13 at 11.17.16 AM.png" alt="Screen Shot 2019-12-13 at 11.17.16 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2019 19:22:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70456#M12018</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-12-13T19:22:20Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70548#M12019</link>
      <description>Yes, I have the Matching Criteria enabled and that part works. The Check Point accepts the PKI signed certificate from the third party peer gateway properly (I have a one-way IKE Main mode), that's not the problem. The problem is that Check Point sends the ICA certificate to the third party, which is not trusted obviously and the negotiation fails. On the third party gateway I can easily configure what certificate to send to a peer, but on Check Point this seems either impossible or needlessly obscure, while they force you to use certs for authentication.</description>
      <pubDate>Mon, 16 Dec 2019 07:30:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70548#M12019</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-16T07:30:52Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70591#M12020</link>
      <description>Specifically, we force the use of certificates for DAIP gateways in particular as Pre-Shared Keys are not entirely secure in this configuration.&lt;BR /&gt;Trying to confirm with R&amp;amp;D if it's possible to use different certificates.</description>
      <pubDate>Mon, 16 Dec 2019 16:31:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70591#M12020</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-12-16T16:31:07Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70659#M12021</link>
      <description>Thank you. It would be really odd if it wasn't possible. What's the point of having a certificate repository for IPSec then... Also, it's something that's easily possible on even 10 year old ScreenOS devices. I can just select what certificate to use for a peer gateway from a simple dropdown.</description>
      <pubDate>Tue, 17 Dec 2019 12:59:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70659#M12021</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-17T12:59:50Z</dc:date>
    </item>
  </channel>
</rss>

