<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/63520#M13005</link>
    <description>i have Checkpoint VPN Gateway with R77.30 and the other end we have Cisco ASA firewall. Not sure if we can have Certificate based VPN to negotiate tunnel.</description>
    <pubDate>Tue, 24 Sep 2019 07:20:28 GMT</pubDate>
    <dc:creator>Roshan_Sinha</dc:creator>
    <dc:date>2019-09-24T07:20:28Z</dc:date>
    <item>
      <title>HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/38371#M13001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H1 class="" lang="en-US"&gt;Preface&lt;/H1&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;Securing virtual private networks (VPNs) in enterprise Site-to-Site environments is an important task for keeping the trusted network and data protected. Also it's critical to avoid any loss of data sovereignty.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;When it comes to VPN security many security experts first think of encryption algorithms, perfect forward secrecy (PFS), Diffie-Hellman groups... and a long &lt;SPAN style="text-decoration: underline;"&gt;pre-shared key (PSK). &lt;/SPAN&gt;&lt;SPAN style="text-decoration: underline;"&gt;Ouch!&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;What about VPN certificates?&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;Every security expert knows how much better certificates are for gaining high security levels. Therefore &lt;SPAN style="text-decoration: underline;"&gt;certificates are always best practice&lt;/SPAN&gt; in enterprise grade security environments.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;However, most VPN Site-to-site setups are still based on simple, long lasting pre-shared keys. In many cases these keys were even forgotten by the administrators in charge of keeping the network secure because once configured for the VPN tunnel they are not needed anymore.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;This is because it's much quicker and really easy to set up a VPN with a simple pre-shared key than having to deal with certificates and a certificate authority (CA).&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;But is it really that hard to implement a way better security architecture based on certificates? This article shows how simple it can be when you work with &lt;A href="https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide"&gt;&lt;SPAN style="background: transparent;"&gt;Check Point Firewall &amp;amp; VPN security gateways&lt;/SPAN&gt;&lt;/A&gt;.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="color: #33cc66;"&gt;&lt;STRONG&gt;So let's get started!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;When working with VPN tunnels between Check Point gateways there is &lt;/STRONG&gt;&lt;STRONG&gt;absolutely &lt;/STRONG&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;no reason not to use VPN certificates&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58222" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58222_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;Setup:&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;Management : &lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt;Check Point SmartCenter&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;Gateway : &lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt;Check Point Firewall &amp;amp; VPN&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;Remote Office : &lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt;Check Point 1100 Appliance&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; line-height: 200%; page-break-before: always;"&gt;&lt;/P&gt;&lt;H1 class="" lang="en-US"&gt;Centrally managed&lt;/H1&gt;&lt;P&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;Check Point is well-known for its superior security management solution to which all Check Point gateways are connected. This central management approach makes it so easy to deploy security settings to all connected gateways with a single click on policy installation.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;Check Point's security management is called SmartCenter Server (or Multi-Domain Security Management) and has an internal certificate authority built-in. This &lt;EM&gt;InternalCA&lt;/EM&gt; enables the global use of certificates between all connected components and gateways right out-of-the-box.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58229" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58229_pastedImage_2.png" style="width: 620px; height: 322px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;Check Point automatically generates certificates when a new Check Point object is created, so you don't have to take of certificate handling. Check Point does it all for you.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58230" class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58230_pastedImage_3.png" style="width: 620px; height: 417px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;Establishing a certificate based VPN in centrally managed Check Point environments is as easy as 1-2-3.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;First, create a VPN community for certificate based VPNs (Mesh or Star topology)&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58231" class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58231_pastedImage_4.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;Configure your preferred VPN encryption settings for Phase 1 (IKE) and Phase 2 (IPsec).&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;We'll be using a permanent VPN tunnel &lt;/STRONG&gt;&lt;STRONG&gt;here&lt;/STRONG&gt;&lt;STRONG&gt;, because the Remote Office is a dynamically assigned IP address (DAIP) gateway. &lt;/STRONG&gt;&lt;STRONG&gt;Therefore, when it's IP address changes it will automatically re-establish the VPN tunnel. Cool feature, isn't it?&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58232" class="image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58232_pastedImage_5.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;Leave the checkbox for pre-shared keys unchecked!&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58233" class="image-6 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58233_pastedImage_6.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;Activate IPsec VPN &lt;/STRONG&gt;&lt;STRONG&gt;on your participant gateways &lt;/STRONG&gt;&lt;STRONG&gt;if it isn't already.&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58234" class="image-7 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58234_pastedImage_7.png" style="width: 620px; height: 417px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;Choose your VPN community..&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58235" class="jive-image image-8" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58235_pastedImage_8.png" style="width: 620px; height: 417px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;..and select the VPN encryption domain of the specific gateway.&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58236" class="image-9 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58236_pastedImage_9.png" style="width: 620px; height: 417px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;EM&gt;Please note&lt;/EM&gt;&lt;/SPAN&gt;&lt;EM&gt; that you &lt;/EM&gt;&lt;EM&gt;can&lt;/EM&gt;&lt;EM&gt; either configure the VPN topology in wizard mode when creating a new Check Point object or in classic mode when the gateway object is already existing. Depending on where you configure it your graphics might look a bit different to the screen shots used here.&lt;/EM&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;Verify your VPN certificate and IPsec VPN community.&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58237" class="jive-image image-10" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58237_pastedImage_10.png" style="width: 620px; height: 586px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;After you have configured the VPN topology for your VPN gateways you should add them to your VPN community.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;Add your VPN gateways to your VPN community.&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58238" class="image-11 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58238_pastedImage_11.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58239" class="image-12 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58239_pastedImage_12.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;Finally, i&lt;/STRONG&gt;&lt;STRONG&gt;nstall the security policy.&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58240" class="image-13 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58240_pastedImage_13.png" style="width: 620px; height: 336px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;The&lt;/STRONG&gt;&lt;STRONG&gt; certificate based VPN tunnel is &lt;/STRONG&gt;&lt;STRONG&gt;now &lt;/STRONG&gt;&lt;STRONG&gt;up an working!&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58241" class="jive-image image-14" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58241_pastedImage_14.png" style="width: 620px; height: 183px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;H1 class="" lang="en-US"&gt;Externally managed&lt;/H1&gt;&lt;H1 class="" lang="en-US"&gt;&lt;/H1&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;Other companies love Check Point, too! They have their own SmartCenter Server (or Multi-Domain Security Management) as central Check Point security management.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;To configure a certificate based VPN tunnel with their VPN gateway you just need to exchange certificates!&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="color: #33cc66;"&gt;&lt;STRONG&gt;Let's go!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;Navigate to &lt;EM&gt;&lt;STRONG&gt;Manage &amp;gt; Servers and OPSEC Applications... &amp;gt; internal_ca &amp;gt; Edit... &amp;gt; Local Security Management Server &amp;gt; Save As...&lt;/STRONG&gt;&lt;/EM&gt; and export your CA certificate in order to send it to the firewall administrators of that other company. Tell them to send you theirs as well.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58242" class="image-15 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58242_pastedImage_15.png" style="width: 620px; height: 322px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;Import their CA certificate via &lt;EM&gt;&lt;STRONG&gt;Manage &amp;gt; Servers and OPSEC Applications... &amp;gt; &lt;/STRONG&gt;&lt;/EM&gt;&lt;EM&gt;&lt;STRONG&gt;New &amp;gt; CA &amp;gt; Trusted&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN style="font-weight: normal; font-style: normal;"&gt; select &lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;External Check Point CA&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN style="font-weight: normal; font-style: normal;"&gt; and open the tab &lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;External Check Point CA&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58243" class="image-16 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58243_pastedImage_16.png" style="width: auto; height: auto;" /&gt;&lt;IMG __jive_id="58244" class="image-17 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58244_pastedImage_17.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;Import their CA certificate and confirm with &lt;EM&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/EM&gt;.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58245" class="jive-image image-18" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58245_pastedImage_18.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;Now you have two Trusted CA certificates that you can use for your VPN setup.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;Create a new Check Point &lt;EM&gt;&lt;STRONG&gt;Externally Managed VPN Gateway...&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN style="font-weight: normal; font-style: normal;"&gt; and configure your certificate based VPN according centrally managed VPNs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58246" class="image-19 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58246_pastedImage_19.png" style="width: 620px; height: 207px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-style: normal; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal; font-style: normal;"&gt;Select their CA certificate as &lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;Matching Criteria&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN style="font-weight: normal; font-style: normal;"&gt; for your &lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;IPSec VPN&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN style="font-weight: normal; font-style: normal;"&gt; setup.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-style: normal; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-style: normal; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58247" class="image-20 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58247_pastedImage_20.png" style="width: 620px; height: 431px;" /&gt;&lt;/P&gt;&lt;P align="center" lang="en-US" style="margin-bottom: 0cm; font-style: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="left" lang="en-US" style="margin-bottom: 0cm; font-style: normal; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;SPAN style="background: transparent;"&gt;In case the &lt;EM&gt;&lt;STRONG&gt;Externally Managed VPN Gateway&lt;/STRONG&gt;&lt;/EM&gt; is a dynamically assigned IP address (&lt;STRONG&gt;DAIP&lt;/STRONG&gt;) gateway make sure &lt;STRONG&gt;CRL checking&lt;/STRONG&gt; works and the VPN tunnel is configured to be permanent. Check that your gateway can reach the CRL distribution points (&lt;EM&gt;check if DNS resolving is required&lt;/EM&gt;), &lt;STRONG&gt;CRL retrieval via HTTP&lt;/STRONG&gt; and &lt;STRONG&gt;CRL Caching&lt;/STRONG&gt; is checked and enter the &lt;STRONG&gt;correct DN&lt;/STRONG&gt; for their VPN certificate! (&lt;EM&gt;i.e. the DN of their defaultCert as shown under IPSec VPN of their Check Point Gateway object&lt;/EM&gt;)&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="center" lang="en-US" style="margin-bottom: 0cm; font-style: normal; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="center" lang="en-US" style="margin-bottom: 0cm; font-style: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;H1 class="" lang="en-US"&gt;Locally managed&lt;/H1&gt;&lt;H1 class="" lang="en-US"&gt;&lt;/H1&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;Check Point's 700 appliances are locally managed. So can be 1100 / 1400 appliances.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2176-check-point-1400-appliance-faq"&gt;Check Point 1400 Appliance FAQ&lt;/A&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;Using the same technique as described for externally managed Check Point gateways won't work as 600/1100 appliance don't have a SmartCenter server running. Still, these SMB appliances have their own local CA!&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;Check Point's SecureKnowledge article &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk94028"&gt;sk94028&lt;/A&gt; describes the correct procedure.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;First, let's export our &lt;EM&gt;InternalCA&lt;/EM&gt; to the 1100 / 1400 appliance at our remote office.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;In SmartDashboard just n&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;avigate to &lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Manage &amp;gt; Servers and OPSEC Applications... &amp;gt; internal_ca &amp;gt; Edit... &amp;gt; Local Security Management Server &amp;gt; Save As...&lt;/EM&gt; &lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt;and export &lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;the&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt; certificate.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58248" class="jive-image image-21" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58248_pastedImage_21.png" style="width: 620px; height: 322px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;Verify that the locally managed SMB appliance has Site-to-Site VPN enabled.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58249" class="image-22 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58249_pastedImage_22.png" style="width: 620px; height: 284px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;I&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;mport the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;internal_ca.crt&lt;/EM&gt;&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt; file to your locally managed SMB appliance.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58250" class="image-23 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58250_pastedImage_23.png" style="width: 620px; height: 379px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;You may want to &lt;/SPAN&gt;&lt;STRONG&gt;disable CRL checking&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;if your Management &lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;as primary CRL Distribution Point &lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;can't be reach&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;ed &lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;or isn't resolvable. &lt;/SPAN&gt;&lt;SPAN style="font-weight: normal; text-decoration: underline;"&gt;In an ideal world this shouldn't be required.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58251" class="image-24 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58251_pastedImage_24.png" style="width: 620px; height: 433px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk94028"&gt;sk94028&lt;/A&gt; &lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;details the CRL verification mechanism of Check Point's SMB appliances.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;Easy, isn't it? N&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;ow &lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;we want to export &lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;the &lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;SMB &lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;appliance'&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;s certificate to our Management &lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;or (if you prefer) issue a certificate request to be signed by our Managements &lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;&lt;EM&gt;Internal_CA&lt;/EM&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="color: #800080;"&gt;&lt;STRONG&gt;Option A - Export the SMB appliance's certificate&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;Highlight the &lt;/SPAN&gt;&lt;STRONG&gt;Internal CA&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt; of our SMB appliance (NOT the one we just imported), then click "&lt;/SPAN&gt;&lt;STRONG&gt;Export&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt;" and save the file.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58252" class="jive-image image-25" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58252_pastedImage_25.png" style="width: 620px; height: 166px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;Go to &lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;VPN &amp;gt; Certificates &amp;gt; Installed Certificates&lt;/EM&gt;&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt; and open the &lt;/SPAN&gt;&lt;STRONG&gt;Details&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt; of the &lt;/SPAN&gt;&lt;STRONG&gt;Default Certificate&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58253" class="image-26 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58253_pastedImage_26.png" style="width: 620px; height: 262px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;Copy the &lt;/SPAN&gt;&lt;STRONG&gt;Subject&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;of the &lt;/SPAN&gt;&lt;STRONG&gt;Default Certificate&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58254" class="image-27 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58254_pastedImage_27.png" style="width: 620px; height: 449px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;C&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;reate a &lt;/SPAN&gt;&lt;STRONG&gt;VPN Site&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt; for the certificate based VPN tunnel to our VPN Gateway.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;Configure the VPN site to use &lt;/SPAN&gt;&lt;STRONG&gt;Certificate&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt; authentication.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58255" class="image-28 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58255_pastedImage_28.png" style="width: 620px; height: 451px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;In the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Advanced&lt;/EM&gt;&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt; tab &amp;gt; &lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Certificate Matching&lt;/EM&gt;&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt; set the "&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;&lt;EM&gt;Remote Site Certificate should be issued by&lt;/EM&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;" to our Management Trusted CA's Name.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;We are now finalizing our way cool VPN setup in SmartDashboard on our Management.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;Navigate to &lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Manage &amp;gt; Servers and OPSEC Applications... &amp;gt; &lt;/EM&gt;&lt;EM&gt;New &amp;gt; CA &amp;gt; Trusted&lt;/EM&gt;&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal; font-style: normal;"&gt; select &lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;OPSEC PKI&lt;/EM&gt;&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal; font-style: normal;"&gt; and open the tab &lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;OPSEC PKI&lt;/EM&gt;&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal; font-style: normal;"&gt; to import our saved SMB &lt;/SPAN&gt;&lt;SPAN style="font-style: normal;"&gt;&lt;STRONG&gt;Internal CA&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal; font-style: normal;"&gt; file.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58256" class="jive-image image-29" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58256_pastedImage_29.png" style="width: auto; height: auto;" /&gt;&lt;IMG __jive_id="58257" class="image-30 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58257_pastedImage_30.png" style="width: 620px; height: 369px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;Again, you may want to disable CRL checking if required.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58258" class="image-31 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58258_pastedImage_31.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;You'll then find our imported SMB certificate '&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;&lt;EM&gt;CP1100&lt;/EM&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;' next to our &lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;&lt;EM&gt;internal_ca&lt;/EM&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal; font-style: normal;"&gt; within the &lt;/SPAN&gt;&lt;SPAN style="font-style: normal;"&gt;&lt;STRONG&gt;Trusted CAs&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal; font-style: normal;"&gt; list of our Management.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-style: normal; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58259" class="jive-image image-32" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58259_pastedImage_32.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="color: #800080;"&gt;&lt;STRONG&gt;Option B - Issue a certificate request&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;Go to &lt;STRONG&gt;VPN&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Certificates&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Installed Certificates&lt;/STRONG&gt; and click &lt;STRONG&gt;New Signing Request&lt;/STRONG&gt; to generate a new certificate.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;BR /&gt; Enter a &lt;STRONG&gt;Certificate name&lt;/STRONG&gt; and &lt;STRONG&gt;Subject DN&lt;/STRONG&gt;.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58260" class="image-33 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58260_pastedImage_33.png" style="width: 620px; height: 393px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;Export the Signing Request to a file&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58261" class="image-34 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58261_pastedImage_34.png" style="width: 620px; height: 161px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;Copy the contents of the exported file&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58262" class="image-35 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58262_pastedImage_35.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;On the Management start the &lt;STRONG&gt;ICA Management Tool &lt;/STRONG&gt;&lt;STRONG&gt;(&lt;/STRONG&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk39915"&gt;sk&lt;/A&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk39915"&gt;39915&lt;/A&gt;&lt;STRONG&gt;), &lt;/STRONG&gt;go to&lt;STRONG&gt; Certificate Creation&lt;/STRONG&gt; and paste the certificate request into the PKCS#10 text box.&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58263" class="jive-image image-36" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58263_pastedImage_36.png" style="width: 620px; height: 341px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;SPAN style="background: transparent;"&gt;&lt;STRONG&gt;Create&lt;/STRONG&gt; the signed certificate.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;If required change the filename extension of the created certificate to &lt;STRONG&gt;.crt&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58264" class="image-37 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58264_pastedImage_37.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;On the SMB appliance &lt;/SPAN&gt;&lt;STRONG&gt;Upload the Signed Certificate&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt; and &lt;/SPAN&gt;&lt;STRONG&gt;Complete&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58265" class="image-38 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58265_pastedImage_38.png" style="width: 620px; height: 315px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #800080;"&gt;End of O&lt;/SPAN&gt;&lt;SPAN style="color: #800080;"&gt;ption B&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;Now simply create an &lt;/SPAN&gt;&lt;STRONG&gt;Externally Managed Check Point Gateway&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt; for our SMB appliance and your are all set up and done.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58266" class="image-39 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58266_pastedImage_39.png" style="width: 620px; height: 207px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;When configuring the &lt;/SPAN&gt;&lt;STRONG&gt;Matching Criteria&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt; for our SMB appliance, check the &lt;/SPAN&gt;&lt;STRONG&gt;DN&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt; box and paste the Subject of our SMB appliances &lt;/SPAN&gt;&lt;STRONG&gt;Default Certificate &lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt;if you took &lt;/SPAN&gt;&lt;SPAN style="color: #800080;"&gt;&lt;STRONG&gt;Option A&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58267" class="image-40 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58267_pastedImage_40.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;In case of &lt;/SPAN&gt;&lt;SPAN style="color: #800080;"&gt;&lt;STRONG&gt;Option B&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt; first copy the &lt;/SPAN&gt;&lt;STRONG&gt;DN&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt; of the created Certificate from within &lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;&lt;STRONG&gt;ICA Management Tool&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58268" class="image-41 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58268_pastedImage_41.png" style="width: 620px; height: 266px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-weight: normal;"&gt;then paste it into the &lt;/SPAN&gt;&lt;STRONG&gt;DN&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt; field of the VPN certificate as issued by our &lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;internal_ca&lt;/EM&gt;&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58269" class="image-42 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58269_pastedImage_42.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; font-weight: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;STRONG&gt;I&lt;/STRONG&gt;&lt;STRONG&gt;nstall the security policy.&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58270" class="jive-image image-43" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58270_pastedImage_43.png" style="width: 620px; height: 419px;" /&gt;&lt;/P&gt;&lt;P align="justify" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="left" lang="en-US" style="margin-bottom: 0cm; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-style: normal;"&gt;&lt;STRONG&gt;A&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-style: normal;"&gt;&lt;STRONG&gt;nd check &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-style: normal;"&gt;&lt;STRONG&gt;out the&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-style: normal;"&gt;&lt;STRONG&gt; working VPN tunnel.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left" lang="en-US" style="margin-bottom: 0cm; font-style: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="left" lang="en-US" style="margin-bottom: 0cm; font-style: normal; orphans: 0; widows: 0;"&gt;&lt;IMG __jive_id="58271" class="image-44 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58271_pastedImage_44.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="58272" class="image-45 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58272_pastedImage_45.png" style="width: 620px; height: 168px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P align="left" lang="en-US" style="margin-bottom: 0cm; font-style: normal; orphans: 0; widows: 0;"&gt;&lt;SPAN style="font-size: large; font-family: Segoe UI,sans-serif;"&gt;&lt;STRONG&gt;&lt;SPAN style="background: transparent;"&gt;&lt;A href="http://linkedin.com/in/danjun"&gt;Danny Jung&lt;/A&gt; is passionate about VPN security and leads you through the joy of creating certificate based VPNs with Check Point appliances. Danny &lt;/SPAN&gt;&lt;SPAN style="background: transparent;"&gt;Jung &lt;/SPAN&gt;&lt;SPAN style="background: transparent;"&gt;is the Chief Technology Officer (CTO) at &lt;A href="http://techblog.esc.de/"&gt;ESC&lt;/A&gt; and has been working with Check Point Firewalls for more than a decade.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="center" lang="en-US" style="margin-bottom: 0cm; font-style: normal; orphans: 0; widows: 0;"&gt;&lt;/P&gt;&lt;P align="center" lang="en-US" style="margin-bottom: 0cm; font-style: normal; orphans: 0; widows: 0;"&gt;&lt;SPAN style="background: transparent; font-size: large; font-family: Segoe UI,sans-serif;"&gt;&lt;STRONG&gt;Thank you.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Aug 2017 11:44:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/38371#M13001</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2017-08-21T11:44:35Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/38372#M13002</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Danny this is a great article. I am looking to configure DAIP site to site with an external vendor&amp;nbsp;with R80.10. Do you have a similar article I can copy of you. Can't find anything that tells you how to do this. Much appreciated&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Mar 2018 02:50:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/38372#M13002</guid>
      <dc:creator>Edmund_Carbon</dc:creator>
      <dc:date>2018-03-29T02:50:49Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/63509#M13003</link>
      <description>hi Denny, Is it possible to use Certificate based VPN while negotiation with different Vendor like Cisco. I.e. "A" end Checkpiont VPN gateway and "B" end Cisco ASA firewall.</description>
      <pubDate>Tue, 24 Sep 2019 05:58:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/63509#M13003</guid>
      <dc:creator>Roshan_Sinha</dc:creator>
      <dc:date>2019-09-24T05:58:38Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/63514#M13004</link>
      <description>&lt;P&gt;You can find that in CP&amp;nbsp;Site to Site VPN Administration Guide R80.30 p.21ff !&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2019 06:58:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/63514#M13004</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-09-24T06:58:09Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/63520#M13005</link>
      <description>i have Checkpoint VPN Gateway with R77.30 and the other end we have Cisco ASA firewall. Not sure if we can have Certificate based VPN to negotiate tunnel.</description>
      <pubDate>Tue, 24 Sep 2019 07:20:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/63520#M13005</guid>
      <dc:creator>Roshan_Sinha</dc:creator>
      <dc:date>2019-09-24T07:20:28Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/69798#M13006</link>
      <description>&lt;P&gt;Hi all, has some one configured an IPSEC using a Cisco router with Dynamic IP?&lt;BR /&gt;I don't know if it's better create the certificate and export both (CA and the one signed) from Cisco and then importing them to CP or do reversely.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Dec 2019 18:11:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/69798#M13006</guid>
      <dc:creator>Stefano_Bucci</dc:creator>
      <dc:date>2019-12-09T18:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/70881#M13007</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Is it possible to build a VPN with a locally managed SMB appliance while still retaining the option to send the logs to the SMS?&lt;BR /&gt;I can't really find it, but this seems to be mutually exclusive since logging requires SIC and therefor a regular Gateway object, but certificate matching/management for VPN requires an Externally Managed Gateway object. Is there some way to combine this?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Dec 2019 08:55:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/70881#M13007</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-19T08:55:11Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/102911#M13008</link>
      <description>&lt;P&gt;If the other vpn peer is an interoperable device(3rd party device) and you need to configure the VPN with certificate based authentication, you have 2 options:&lt;BR /&gt;1. Use the ICA of the checkpoint. In that case, you'd need to export the internal_ca from the SMS/DMS, and import it in the other peer. Then, from the other peer you'll need to generate the CSR , copy it and sign it with the ICA mgmt tool and export the certificate and import it in the other peer and on the interoperable device object select the new certificate in the matching criteria.&lt;BR /&gt;2. Use an external CA for the other peer and the ICA for the CKP. In that case, you'd need to export the external_ca and the certificate from the external CA that the other peer will use. Then import them using the ICA mgmt tool and on the interoperable device object select the new certificate in the matching criteria.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;There could be another option when you use and external CA for both the CKP and the interoperable device, in that case in both sides you'd need to have the root/inter ca certificate imported in the devices, also on both sides you'll need to generate a CSR and request the external CA to sign them and impor the certificates in both peers. Then import the bew certificate issued for the CKP and for the other peer using the ICA mgmt tool and on the interoperable device object select the new certificate in the matching criteria and on the CKP object add the new certificate in the IPSec VPN properties issued by the external CA.&lt;BR /&gt;&lt;BR /&gt;The SK relevante for the ICA mgmt tool is: sk30501 - Setting up the ICA Management Tool&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Nov 2020 00:00:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/102911#M13008</guid>
      <dc:creator>Felix_Adrian_Ga</dc:creator>
      <dc:date>2020-11-23T00:00:55Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/164483#M29445</link>
      <description>&lt;P&gt;Yes! It is possible to establish a vpn tunnel with cisco using certificates and having Check Point SMS as a Certification Authority, first, you need to create a Certificate signing request from cisco device, then you have to enable the ICA management tool in the Smart center server (Checkpoint Management) by connecting through command line (cpca_client set_mgmt_tool on -no-ssl), then you have to paste the CSR as PKS in Generating certificate as follow:&lt;/P&gt;
&lt;DIV id="tinyMceEditor_650d81f2f36ec7Isai_Herrera_Me_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="icam.png" style="width: 857px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18673iA03577E81C174BE8/image-size/large?v=v2&amp;amp;px=999" role="button" title="icam.png" alt="icam.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Then press button create and now you have a certificate for the router device, once you have the certificate of the ICA and the certificate for the cisco device you need to enroll the CA certificate first and then the certificate for the cisco device signed by ICA, from there the configuration on cisco device is pretty simple, you have to choose to authenticate using certificates in your cisco configuration.&lt;/P&gt;
&lt;P&gt;Note: sometimes the CRL is problematic because is not possible to verify the revocation list, so disable this verification on router side.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 04:04:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/164483#M29445</guid>
      <dc:creator>Isai_Herrera_Me</dc:creator>
      <dc:date>2022-12-08T04:04:13Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/211558#M40111</link>
      <description>&lt;P&gt;Hi, I had it and it was working&lt;/P&gt;
&lt;P&gt;VPN Tunnel - SMB locally managed - Interoperable device&lt;/P&gt;
&lt;P&gt;Log object - Check Point host with SIC -&amp;nbsp;SMB locally managed was sending logs to my log server.&lt;/P&gt;
&lt;DIV id="gtx-trans" style="position: absolute; left: 559px; top: 102.091px;"&gt;
&lt;DIV class="gtx-trans-icon"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 17 Apr 2024 08:56:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/211558#M40111</guid>
      <dc:creator>Martin_Raska</dc:creator>
      <dc:date>2024-04-17T08:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/211624#M40130</link>
      <description>&lt;P&gt;I've also done this.&lt;BR /&gt;You configure it in Logs and Monitoring &amp;gt; Logs &amp;gt; External Log Servers &amp;gt; Check Point Log Server&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2024 14:38:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/211624#M40130</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-04-17T14:38:31Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/217671#M41481</link>
      <description>&lt;P&gt;Is there any SK that shows how to add and configure 1575 centrally managed&amp;nbsp; to SMS 81.20.&lt;/P&gt;
&lt;P&gt;I can add it but I am not sure if DIAP is working or not, i am getting this:&lt;/P&gt;
&lt;LI-CODE lang="ruby"&gt;Main Mode local machine configured not to respond to unknown IP addresses (i.e. not exportable for SR, and/or not included in the RemoteAccess community, and/or no DAIP's defined)&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Jun 2024 18:44:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/217671#M41481</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-06-16T18:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/217793#M41509</link>
      <description>&lt;P&gt;Is the 1575 configured as a DAIP object?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 15:43:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/217793#M41509</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-17T15:43:42Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/217800#M41511</link>
      <description>&lt;P&gt;yes,&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="smb-1.JPG" style="width: 737px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26309iDB3AD13046FEFF27/image-size/large?v=v2&amp;amp;px=999" role="button" title="smb-1.JPG" alt="smb-1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;on SMB I see these logs:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vpn1.png" style="width: 926px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26312iE6EDE22E00537BF9/image-size/large?v=v2&amp;amp;px=999" role="button" title="vpn1.png" alt="vpn1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vpn2.png" style="width: 916px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26313i1A8AEB428C075F84/image-size/large?v=v2&amp;amp;px=999" role="button" title="vpn2.png" alt="vpn2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vpn3.png" style="width: 302px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26314i420BE25BD7A48C8D/image-size/large?v=v2&amp;amp;px=999" role="button" title="vpn3.png" alt="vpn3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I wonder why all traffic is "drop" on SMB&lt;/P&gt;
&lt;P&gt;Logs from SMS:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vpn4.JPG" style="width: 236px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26321i782CADA091F49022/image-size/large?v=v2&amp;amp;px=999" role="button" title="vpn4.JPG" alt="vpn4.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vpn5.JPG" style="width: 226px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26322iEC562C4382315221/image-size/large?v=v2&amp;amp;px=999" role="button" title="vpn5.JPG" alt="vpn5.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 21:17:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/217800#M41511</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-06-17T21:17:36Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/217851#M41528</link>
      <description>&lt;P&gt;Do you have NAT configured for your management so your remote gateway can reach it?&lt;BR /&gt;The message about not being able to validate the certificate would speak to this being not set properly.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 00:06:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/217851#M41528</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-18T00:06:15Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/217889#M41543</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sms-nat2.JPG" style="width: 747px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26330iBD55E3B395AB0E0E/image-size/large?v=v2&amp;amp;px=999" role="button" title="sms-nat2.JPG" alt="sms-nat2.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;NAT is active on the SMS.&lt;/P&gt;
&lt;P&gt;We were unable to publish the SMS on our external IP address because it affected all our other VPN tunnels. When the SMS was published on the external IP, all other VPN tunnels went down as they started communicating with the SMS instead of the firewall.&lt;/P&gt;
&lt;P&gt;We are now using a different public IP that is on the same subnet as our external IP. However, when performing SIC between the SMB and SMS, only our external IP shows up, even if we select another public IP.&lt;/P&gt;
&lt;P&gt;I am unsure if this is correct or not!&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 06:25:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/217889#M41543</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-06-18T06:25:37Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo Set Up Certificate Based VPNs with Check Point Appliances - R77 edition</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/217964#M41555</link>
      <description>&lt;P&gt;So is the public IP that is supposed to be used configured in the object shown here?&lt;BR /&gt;Also, this doesn't take effect until a policy push occurs to the relevant gateways.&lt;/P&gt;
&lt;P&gt;Also when you say "only our external IP shows up" where exactly are you referring to?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 14:28:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/m-p/217964#M41555</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-18T14:28:14Z</dc:date>
    </item>
  </channel>
</rss>

