<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IKE certificate auto-renewal failure in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-certificate-auto-renewal-failure/m-p/83835#M12295</link>
    <description>Thanks man, I'll let you know</description>
    <pubDate>Fri, 01 May 2020 14:35:50 GMT</pubDate>
    <dc:creator>Douglas_Rich</dc:creator>
    <dc:date>2020-05-01T14:35:50Z</dc:date>
    <item>
      <title>IKE certificate auto-renewal failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-certificate-auto-renewal-failure/m-p/63183#M12291</link>
      <description>&lt;P&gt;Last night, I had a customer's gateway fail VPN authentication suddenly. &amp;nbsp;A quick VPN debug showed the IKE certificate was expired! &amp;nbsp;I checked SmartConsole and yep, the IKE certificate on the SmartCenter was expired!&lt;/P&gt;&lt;P&gt;(gateway is R77.30, mgmt R80.20; yes upgrades are scheduled, that's not the issue here)&lt;/P&gt;&lt;P&gt;IKE certificates are supposed to auto-renew by cpca at 75% expiry, yes? I haven't had issues with certificate auto-renewals in a very very long time, so this was a major surprise. &amp;nbsp;I found another gateway certificate that will expire in 5 days, so I manually renewed it (along with the problematic gateway), then pushed policy to all gateways. &amp;nbsp;I checked all other gateways and they are good into 2020 and 2021, so I have time to make any repairs if needed.&lt;/P&gt;&lt;P&gt;With R80.20 management, is there something new I missed or some behavior change? &amp;nbsp;The ICA was still valid (through year 2030), all gateways and management system times are current and valid (sync with known good NTP servers). &amp;nbsp;I checked all hosts date and time to be sure!&lt;/P&gt;&lt;P&gt;Management R80.20 was a migrate from R77.30, which has been working very well for 15+ years. &amp;nbsp;No corruption or strange issues over time.&lt;/P&gt;&lt;P&gt;I haven't found any smoking-gun SK articles about this (I have seen the SHA-1/SHA-256 articles,&amp;nbsp;&lt;SPAN&gt;sk103840, but that doesn't seem relevant). &amp;nbsp;sk59510 does not apply because this is site-to-site VPN, not Remote Access. &amp;nbsp;Manually renewing in SmartConsole was error-free, as it should be, so other SKs regarding renewal errors don't apply.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This is an odd one... anyone seen this lately, or have insight?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2019 15:34:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-certificate-auto-renewal-failure/m-p/63183#M12291</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2019-09-19T15:34:35Z</dc:date>
    </item>
    <item>
      <title>Re: IKE certificate auto-renewal failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-certificate-auto-renewal-failure/m-p/63301#M12292</link>
      <description>Maybe $FWDIR/log/cpca.elg* on the management will have a clue?</description>
      <pubDate>Fri, 20 Sep 2019 19:39:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-certificate-auto-renewal-failure/m-p/63301#M12292</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-09-20T19:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: IKE certificate auto-renewal failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-certificate-auto-renewal-failure/m-p/83780#M12293</link>
      <description>Hey Duane, you ever find a solution for this?&lt;BR /&gt;We're having the same issue on R80.20</description>
      <pubDate>Thu, 30 Apr 2020 21:42:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-certificate-auto-renewal-failure/m-p/83780#M12293</guid>
      <dc:creator>Douglas_Rich</dc:creator>
      <dc:date>2020-04-30T21:42:31Z</dc:date>
    </item>
    <item>
      <title>Re: IKE certificate auto-renewal failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-certificate-auto-renewal-failure/m-p/83827#M12294</link>
      <description>&lt;P&gt;Unfortunately, no &amp;nbsp;It hasn't come back up for other gateways (yet), but I'll be keeping an eye on it for this (and other) customers.&lt;/P&gt;&lt;P&gt;An obvious thing, perhaps, is making sure the gateway can reach the SmartCenter on port 18264 (ICA services) for auto-renewal and CRL fetching. &amp;nbsp;If your SmartCenter is behind NAT and via VPN, you'll have to modify the $FWDIR/lib/implied_rules.def to exclude FW1_ICA_SERVICES from the list at the top (comment out that pragma #define line), then push policy.&lt;/P&gt;&lt;P&gt;Other than that, I don't know what could be causing this. &amp;nbsp;If it comes up again, I'll go through the cpca.elg log as&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt; mentioned above. &amp;nbsp;At the the last incident, I don't recall anything helpful in the log. &amp;nbsp;I'll also find and run a cpca debug if necessary (there's a large SK on running debugs of various daemons,&amp;nbsp;&lt;SPAN&gt;sk97638).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you find anything yourself, please let us know. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2020 13:23:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-certificate-auto-renewal-failure/m-p/83827#M12294</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2020-05-01T13:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: IKE certificate auto-renewal failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-certificate-auto-renewal-failure/m-p/83835#M12295</link>
      <description>Thanks man, I'll let you know</description>
      <pubDate>Fri, 01 May 2020 14:35:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-certificate-auto-renewal-failure/m-p/83835#M12295</guid>
      <dc:creator>Douglas_Rich</dc:creator>
      <dc:date>2020-05-01T14:35:50Z</dc:date>
    </item>
    <item>
      <title>Re: IKE certificate auto-renewal failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-certificate-auto-renewal-failure/m-p/83838#M12296</link>
      <description>So, I don't think VPN Certs are auto-renewed. I can find zero documentation that says otherwise, but numerous comments that ICA is renewed at 75% and User Certs.. but that's it.. I'm concluding that IKE VPN certs are a manual process but typically we don't have to do it because a Firewall is replaced before 5 years.</description>
      <pubDate>Fri, 01 May 2020 14:58:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-certificate-auto-renewal-failure/m-p/83838#M12296</guid>
      <dc:creator>Douglas_Rich</dc:creator>
      <dc:date>2020-05-01T14:58:08Z</dc:date>
    </item>
    <item>
      <title>Re: IKE certificate auto-renewal failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-certificate-auto-renewal-failure/m-p/183757#M33724</link>
      <description>&lt;P&gt;Hello team,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;funny thing ... i saw the opposite happen, the MGMT has automatically renewed all IKE certificates ... and it worked.&lt;BR /&gt;yes i hade some VPN outage ... 2h for a couple of remote GW´s. but this was the first time i have encountered a working certificate renewal of IKE certificates ... environment is on &lt;STRONG&gt;R81.10 Take 87&lt;/STRONG&gt; ...&lt;BR /&gt;i was thinking this is working only for&amp;nbsp;&lt;STRONG&gt;R81.10 Take 95&lt;/STRONG&gt; ...&amp;nbsp; because the release notes state:&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cert_Renenewel_1.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21362i41C5BCAB37E97C4A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Cert_Renenewel_1.PNG" alt="Cert_Renenewel_1.PNG" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[cpca 13238 4116002688]@XXXXXX-ZZZZ[9 Jun 22:01:21] fwCA::CreateIkeCert: IKE cert created with dn "CN=XXXXFW01 VPN Certificate,O=XXXXXX-ZZZZ..bn78tq"&lt;BR /&gt;[cpca 13238 4116002688]@XXXXXX-ZZZZ[9 Jun 22:05:53] fwCA::CreateIkeCert: IKE cert created with dn "CN=YYYYYFWCL VPN Certificate,O=XXXXXX-ZZZZ..bn78tq"&lt;BR /&gt;[cpca 13238 4116002688]@XXXXXX-ZZZZ[9 Jun 22:13:20] fwCA::CreateIkeCert: IKE cert created with dn "CN=AAAAAFWCL VPN Certificate,O=XXXXXX-ZZZZ..bn78tq"&lt;BR /&gt;[cpca 13238 4116002688]@XXXXXX-ZZZZ[9 Jun 22:20:04] fwCA::CreateIkeCert: IKE cert created with dn "CN=BBBSFW01 VPN Certificate,O=XXXXXX-ZZZZ..bn78tq"&lt;BR /&gt;[cpca 13238 4116002688]@XXXXXX-ZZZZ[9 Jun 22:20:50] fwCA::CreateIkeCert: IKE cert created with dn "CN=CCCCCW01 VPN Certificate,O=XXXXXX-ZZZZ..bn78tq"&lt;BR /&gt;[cpca 13238 4116002688]@XXXXXX-ZZZZ[9 Jun 22:21:45] fwCA::CreateIkeCert: IKE cert created with dn "CN=JJJJJFW01 VPN Certificate,O=XXXXXX-ZZZZ..bn78tq"&lt;BR /&gt;[cpca 13238 4116002688]@XXXXXX-ZZZZ[9 Jun 22:26:17] fwCA::CreateIkeCert: IKE cert created with dn "CN=AAAAFWCL1 VPN Certificate,O=XXXXXX-ZZZZ..bn78tq"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interesting thing &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;best regards&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jun 2023 08:07:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-certificate-auto-renewal-failure/m-p/183757#M33724</guid>
      <dc:creator>Thomas_Eichelbu</dc:creator>
      <dc:date>2023-06-12T08:07:51Z</dc:date>
    </item>
    <item>
      <title>Re: IKE certificate auto-renewal failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-certificate-auto-renewal-failure/m-p/265396#M52290</link>
      <description>&lt;P&gt;Can you tell us how to achieve this?&lt;/P&gt;&lt;P&gt;I want to autorenew VPN certs on 1800 Appliances.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 16 Dec 2025 08:33:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-certificate-auto-renewal-failure/m-p/265396#M52290</guid>
      <dc:creator>GSoloperto</dc:creator>
      <dc:date>2025-12-16T08:33:28Z</dc:date>
    </item>
  </channel>
</rss>

