<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Mobile Access Blade - Checkpoint EndPoint Security in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mobile-Access-Blade-Checkpoint-EndPoint-Security/m-p/118634#M16793</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;So MAB and Endpoint Sec are different things, and do have different portals. But if you are migrating between VSX and Physical hardware I'm almost certain you're going to have to create a new object in the SmartConsole for the gateway(s) which will mean a new certificate will need to be created.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Your users will receive a "certificate warning" to say it's been changed, providing everything else is the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Daniel&lt;/P&gt;</description>
    <pubDate>Tue, 18 May 2021 12:50:45 GMT</pubDate>
    <dc:creator>Daniel_Collins</dc:creator>
    <dc:date>2021-05-18T12:50:45Z</dc:date>
    <item>
      <title>Mobile Access Blade - Checkpoint EndPoint Security</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mobile-Access-Blade-Checkpoint-EndPoint-Security/m-p/118620#M16790</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We are migrating from VSX to Physical boxes. In this environment we are using the same existing policy by cloning it.&lt;/P&gt;&lt;P&gt;We have Mobile Access blade with Checkpoint endpoint Security enabled here. So after migration do we need to update any certificate or anything else that needs to be considered for Checkpoint Endpoint Certificate to work without any issues? All the IPs that are in the VSX platform will be configured as the VIP IPs in the migration to Physical box. So IPs will remain same for Endpoint to work. Just concerned about Certificate and any other parameters which should be checked. Please help.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sanjay S&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 10:03:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mobile-Access-Blade-Checkpoint-EndPoint-Security/m-p/118620#M16790</guid>
      <dc:creator>Sanjay_S</dc:creator>
      <dc:date>2021-05-18T10:03:53Z</dc:date>
    </item>
    <item>
      <title>Re: Mobile Access Blade - Checkpoint EndPoint Security</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mobile-Access-Blade-Checkpoint-EndPoint-Security/m-p/118634#M16793</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;So MAB and Endpoint Sec are different things, and do have different portals. But if you are migrating between VSX and Physical hardware I'm almost certain you're going to have to create a new object in the SmartConsole for the gateway(s) which will mean a new certificate will need to be created.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Your users will receive a "certificate warning" to say it's been changed, providing everything else is the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Daniel&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 12:50:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mobile-Access-Blade-Checkpoint-EndPoint-Security/m-p/118634#M16793</guid>
      <dc:creator>Daniel_Collins</dc:creator>
      <dc:date>2021-05-18T12:50:45Z</dc:date>
    </item>
    <item>
      <title>Re: Mobile Access Blade - Checkpoint EndPoint Security</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mobile-Access-Blade-Checkpoint-EndPoint-Security/m-p/118636#M16794</link>
      <description>&lt;P&gt;Thank you Daniel.&lt;/P&gt;&lt;P&gt;I was talking about the Client based VPN which can be enabled in Mobile Access blade, the oprion is Endpoint Security VPN.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sanjay S&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 13:22:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mobile-Access-Blade-Checkpoint-EndPoint-Security/m-p/118636#M16794</guid>
      <dc:creator>Sanjay_S</dc:creator>
      <dc:date>2021-05-18T13:22:55Z</dc:date>
    </item>
    <item>
      <title>Re: Mobile Access Blade - Checkpoint EndPoint Security</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mobile-Access-Blade-Checkpoint-EndPoint-Security/m-p/118663#M16802</link>
      <description>&lt;P&gt;Yes, so that's the same client but called Check Point Mobile. Same applies, so if you're creating new gateway objects then you'll get a new certificate which will be presented to the users unless you're using a valid certificate for the device.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;There is sometimes a way to export the existing VPN certificate, but this has been challenging in the past.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 15:33:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mobile-Access-Blade-Checkpoint-EndPoint-Security/m-p/118663#M16802</guid>
      <dc:creator>Daniel_Collins</dc:creator>
      <dc:date>2021-05-18T15:33:52Z</dc:date>
    </item>
  </channel>
</rss>

