<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multiple IPsec VPN certificates in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/164960#M29561</link>
    <description>&lt;P&gt;It is supported, but you must add a trusted CA for each certificate, which is unnecessary admin overhead.&lt;/P&gt;</description>
    <pubDate>Tue, 13 Dec 2022 08:05:43 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2022-12-13T08:05:43Z</dc:date>
    <item>
      <title>Multiple IPsec VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/164833#M29542</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;do we support Multiple VPN certificates per GW? I mean GW should use different External VPN certificate per VPN community tunnel?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The partner manages one firewall of two different entities(customers), and each entity has its own CA which signs the VPN certificate used for IPSec VPN tunnel. There are two communities and two different VPN certificates.&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;Community A - use my.firewall.com signed by ICA-1&lt;/P&gt;&lt;P&gt;Community B - use my.firewall.com signed by ICA-2&lt;/P&gt;&lt;P&gt;Both certificates are imported in GW object under IPsec VPN tab, but when establishing VPN tunnels, GW is always sending the first certificate signed by ICA-1 no matter what tunnel is it.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 15:49:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/164833#M29542</guid>
      <dc:creator>Martin_Raska</dc:creator>
      <dc:date>2022-12-12T15:49:26Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple IPsec VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/164835#M29543</link>
      <description>&lt;P&gt;I would rather advise defining your own CA as trusted with either partner and using your existing GW VPN cert.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 15:57:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/164835#M29543</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-12-12T15:57:25Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple IPsec VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/164843#M29544</link>
      <description>&lt;P&gt;So its not supported?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 16:46:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/164843#M29544</guid>
      <dc:creator>Martin_Raska</dc:creator>
      <dc:date>2022-12-12T16:46:04Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple IPsec VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/164884#M29555</link>
      <description>&lt;P&gt;Have you imported the public key for the other CA into a newly created OPSEC CA object?&lt;BR /&gt;Have you configured that CA as one of the trusted certificate authorities for that gateway?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 23:15:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/164884#M29555</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-12T23:15:38Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple IPsec VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/164888#M29557</link>
      <description>&lt;P&gt;Im fairly positive its supported, seen people have it that way and it works. Will see if I can find the process to make that work.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 23:35:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/164888#M29557</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-12-12T23:35:14Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple IPsec VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/164960#M29561</link>
      <description>&lt;P&gt;It is supported, but you must add a trusted CA for each certificate, which is unnecessary admin overhead.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 08:05:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/164960#M29561</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-12-13T08:05:43Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple IPsec VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/164993#M29572</link>
      <description>&lt;P&gt;I dont have access there but from the screenshot, I can see its done. The customer's CAs are imported as trusted.&lt;/P&gt;&lt;P&gt;The customer is already using it in this configuration -&amp;nbsp;&lt;SPAN&gt;Community A - my.firewall.com signed by ICA-1 and its working.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;They want to add this configuration -&amp;nbsp;&lt;SPAN&gt;Community B - my.firewall.com signed by ICA-2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But in IKE negotiation for tunnel Community B, FW is sending only&amp;nbsp;my.firewall.com signed by ICA-1 not the second one or all of them.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The question here is how can you tell GW which certificate should use it for each VPN tunnel? I am not aware of such configuration.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 10:39:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/164993#M29572</guid>
      <dc:creator>Martin_Raska</dc:creator>
      <dc:date>2022-12-13T10:39:50Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple IPsec VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/164999#M29573</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/13122"&gt;@Martin_Raska&lt;/a&gt;&amp;nbsp;...that is EXCELLENT question, it really is. Im trying so hard to find an email where I know customer had a process how to make this work. If I can find it, I will be more than happy to share.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 11:11:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/164999#M29573</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-12-13T11:11:28Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple IPsec VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/165003#M29575</link>
      <description>&lt;P&gt;As the policy of each GW is separated, peer should be defined as externally managed GW - containing a Certificate Matching Criteria, as in Traditional Mode VPN long times ago...&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 11:19:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/165003#M29575</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-12-13T11:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple IPsec VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/165025#M29580</link>
      <description>&lt;P&gt;Peers are Interoperable devices and the Certificate matching criteria is for the peer to present the right certificate. Here we need to tell our GW to send the right one if you have more than one imported.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 12:33:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/165025#M29580</guid>
      <dc:creator>Martin_Raska</dc:creator>
      <dc:date>2022-12-13T12:33:24Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple IPsec VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/165044#M29586</link>
      <description>&lt;P&gt;You would not happen to have screenshot of that config, would you? However, if you do, would you mind share? Please blur out any sensitive info.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 13:51:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/165044#M29586</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-12-13T13:51:39Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple IPsec VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/165120#M29597</link>
      <description>&lt;P&gt;I am also trying to gather full VPN debug from the customer. GW is sending only the fw-pha CM certificate&amp;nbsp;in IKE.elg&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.jpg" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18793i5288852E3ABC0070/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.jpg" alt="Screenshot_1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2022 07:46:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/165120#M29597</guid>
      <dc:creator>Martin_Raska</dc:creator>
      <dc:date>2022-12-14T07:46:02Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple IPsec VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/165144#M29603</link>
      <description>&lt;P&gt;Reviewing debugs and we can see -&amp;nbsp;&lt;STRONG&gt;Unrecognized CA, getCertToSend: looking for default cert to send,&lt;/STRONG&gt; I am going to verify with the customer.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2022 11:12:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/165144#M29603</guid>
      <dc:creator>Martin_Raska</dc:creator>
      <dc:date>2022-12-14T11:12:17Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple IPsec VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/167063#M30154</link>
      <description>&lt;P&gt;adding info: We have TAC ticket. The support says that GW should send all certificates for Auth., but this is not happening. There are three certs, two from public CA and one from internal CA. GW is always sending one certificate and the wrong one.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 09:25:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/167063#M30154</guid>
      <dc:creator>Martin_Raska</dc:creator>
      <dc:date>2023-01-09T09:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple IPsec VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/167165#M30207</link>
      <description>&lt;P&gt;TAC is correct: that's what should happen (all certs are sent).&lt;BR /&gt;The fact it's not suggests a bug, which will require investigation by R&amp;amp;D with TAC's assistance.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 18:53:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-IPsec-VPN-certificates/m-p/167165#M30207</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-01-09T18:53:32Z</dc:date>
    </item>
  </channel>
</rss>

