<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN certificates in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/181272#M33162</link>
    <description>&lt;P&gt;After a lot of back and forth and pulling my brains out I reached a conclusion &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is an issue with Cloudguard and ECDSA based CA.&lt;/P&gt;&lt;P&gt;I created my own CA, cert, all with RSA, imported it as OPSEC Trusted CA, disabled CRL -&amp;gt; all worked, I got IPSEC up.&lt;/P&gt;&lt;P&gt;I created my own CA, cert, all with ECDSA (&lt;SPAN&gt;prime256v1), imported it as OPSEC Trusted CA, disabled CRL -&amp;gt; vpnd process keeps restarting.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Initially I had a trust chain on Aviatrix (Root CA, Intermediate). When I built my custom ones I did it directly Root CA -&amp;gt; client cert, no more Intermediate to also eliminate this from the variables.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In the log dir ($FWDIR/log) 4 files see changes constantly:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE&gt;-rw-rw---- 1 admin root   118557 May 17 13:56 fwd.elg
-rw-rw---- 1 admin root  1563209 May 17 13:56 vpnd.elg
-rw-r--r-- 1 admin root    58000 May 17 13:56 core_uploader.elg --&amp;gt; has just one bash.11759.core (I see Checkpoint runs separate bash shells to start its own processes)
-rw-rw---- 1 admin root  7034033 May 17 13:56 sxl_statd.elg&lt;/PRE&gt;&lt;P&gt;&lt;SPAN&gt;vpnd.elg logs:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="c"&gt; Unable to open '/dev/fw6v0': No such file or directory
 fw_get_kernel_instance_num: Invalid instance num 0 - return 0

 Unable to open '/dev/fw6v0': No such file or directory&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;fwd.elg&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="cpp"&gt;[17 May 14:16:37] fwd: restarting vpnd
restarting in 4 seconds
[17 May 14:16:46] fwd: restarting vpnd
restarting in 4 seconds
[17 May 14:16:57] fwd: restarting vpnd
restarting in 4 seconds
[17 May 14:17:06] fwd: restarting vpnd
restarting in 4 seconds&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the positive side it does not coredump, it does seem not to like something while it probably loads the Trusted Imported ECDSA CA though and keep restarting in a loop.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Restarting the GW stopped the loop with the processing being reloaded.&lt;/P&gt;&lt;P&gt;tp_events.elg&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="c"&gt;05/17/23 14:14:03;****CI:0, IPS:0, MALWARE:0, TP:0****
05/17/23 14:15:03;****CI:0, IPS:0, MALWARE:0, TP:0****
05/17/23 14:16:03;****CI:0, IPS:0, MALWARE:0, TP:0****
05/17/23 14:17:03;****CI:0, IPS:0, MALWARE:0, TP:0****
05/17/23 14:18:03;****CI:0, IPS:0, MALWARE:0, TP:0****
05/17/23 14:19:03;****CI:0, IPS:0, MALWARE:0, TP:0****
05/17/23 14:20:03;****CI:0, IPS:0, MALWARE:0, TP:0****&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(these log entries grow at a rapid rate)&lt;/P&gt;&lt;P&gt;P.S. I used the same fields in both RSA and ECDSA Trusted CA + certificate case to be sure that I narrow down the behaviour:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="python"&gt;# with custom fields
[req]
default_bits = 2048
distinguished_name = req_distinguished_name
req_extensions = req_ext

[ req_distinguished_name ]
countryName = Country Name (2 letter code)
stateOrProvinceName = State or Province Name (full name)
localityName = Locality Name (eg, city)
organizationName = Organization Name (eg, company)
commonName = Common Name (e.g. server FQDN or YOUR name)

# Optionally, specify some defaults.
countryName_default = CH
stateOrProvinceName_default = Bern
localityName_default = Bern
organizationName_default = Fooling around
commonName_default = mihaigw.com
organizationalUnitName_default = research
emailAddress_default = mihai@mihaigw.com

[ req_ext ]
subjectAltName = @alt_names

[alt_names]
DNS.1 = mihai.mihaigw.com
DNS.2 = 10.1.0.36&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Checkpoint sees the imported Trusted CA as:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Subject: Email=info@aviamix.com,CN=aviamix.com,OU=IT,O=Aviamix,L=Bern,ST=Bern,C=CH
Issuer: Email=info@aviamix.com,CN=aviamix.com,OU=IT,O=Aviamix,L=Bern,ST=Bern,C=CH
Not Valid Before: Wed May 17 16:33:08 2023 Local Time
Not Valid After:  Fri Jan  1 16:33:08 2038 Local Time
Serial No.:  0085d75319cc2ea55b
Public Key: ECDSA (256 bits)
Signature: ECDSA with SHA256
Basic Constraint:
	is CA
MD5 Fingerprint:
   BD:5C:77:56:73:4A:A1:1E:3D:3E:CA:1B:8A:75:C5:11
SHA-1 Fingerprints:
1. D4:F8:BA:4E:8F:1F:05:69:39:CC:55:B9:20:DA:B3:5F:06:C9:63:7A
2. RUSS NOSE HANS IQ TRUE LUST SAC CALL CUTS TOO LAUD LIND&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the Aviatrix/Strongswan side I can see:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;198[CFG] added vici connection: gw-10_1_0_36-137_117_143_50
198[CFG] initiating 'net-0_0_0_0_0-0_0_0_0_0'
198[IKE] initiating IKE_SA gw-10_1_0_36-137_117_143_50[25] to 10.10.10.4
198[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
198[NET] sending packet: from 10.1.0.36[500] to 10.10.10.4[500] (330 bytes)
211[IKE] retransmit 1 of request with message ID 0
211[NET] sending packet: from 10.1.0.36[500] to 10.10.10.4[500] (330 bytes)
216[IKE] retransmit 2 of request with message ID 0
216[NET] sending packet: from 10.1.0.36[500] to 10.10.10.4[500] (330 bytes)
221[IKE] retransmit 3 of request with message ID 0
221[NET] sending packet: from 10.1.0.36[500] to 10.10.10.4[500] (330 bytes)

226[IKE] giving up after 3 retransmits
226[IKE] establishing IKE_SA failed, peer not responding&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so the Cloudguard does not send anything back.&lt;/P&gt;&lt;P&gt;At some point (before all tests) I thought it was an MTU problem and I decreased (I know, better to activate MSS clamping) the MTU on the physical interface to 1400 (both sides).&lt;BR /&gt;I did not look in Wireshark to see the packet length, was a bit lazy with having to disable RX/TX offloading in order to see the real packet size and not huge values.&lt;/P&gt;&lt;P&gt;Activating&amp;nbsp;&lt;STRONG&gt;vpn debug trunc ALL=5 shows:&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;[vpnd 4335 4071397376]@checkpointgw2[17 May 15:00:34][io] [NEGOTIATIONS]: Adding negotiation to peer: &amp;lt;my remote ip&amp;gt;. Current negotiations=2

[vpnd 4335 4071397376]@checkpointgw2[17 May 15:00:34] findSAByPeer: Find SA with cookies 9ed9034f6bdbf05c,0000000000000000 from packet
[vpnd 4335 4071397376]@checkpointgw2[17 May 15:00:34] findSAByPeer: Valid ISAKMP SA was not found.  me=0, peer=1404818e
..
[vpnd 4335 4071397376]@checkpointgw2[17 May 15:07:22] find_sa_by_ike_peer: Find IKE SA for IKE peer &amp;lt;&amp;lt;my remote ip&amp;gt;,0000000000000000&amp;gt;
[vpnd 4335 4071397376]@checkpointgw2[17 May 15:07:22] find_sa_by_ike_peer: No IKE SA for this IKE peer found
[vpnd 4335 4071397376]@checkpointgw2[17 May 15:07:22][ikev2] vpn1IKEConfiguration::hasExchangeFailed: Identified peer &amp;lt;my remote ip&amp;gt; in failed exchanges list
[vpnd 4335 4071397376]@checkpointgw2[17 May 15:07:22][ikev2] getIkeVersion: ikev2 exchange has failed. try ikev1 (peer: &amp;lt;my remote ip&amp;gt;), failoverFromIKEv2: -1
[vpnd 4335 4071397376]@checkpointgw2[17 May 15:07:22][tunnel] RequestByMethods_ikev1: enter&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;IKEview shows "waiting for arriving message", final status: failure, on Proposal 1.&amp;nbsp;&lt;BR /&gt;&lt;/STRONG&gt;I do know it's not Aviatrix not sending them...as when I switch to the RSA CA, then it all works.&lt;/P&gt;&lt;P&gt;Now here I got stuck and I have a feeling this is more for support / TAC :).&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 17 May 2023 19:22:58 GMT</pubDate>
    <dc:creator>mihaime</dc:creator>
    <dc:date>2023-05-17T19:22:58Z</dc:date>
    <item>
      <title>VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70001#M12002</link>
      <description>&lt;P&gt;Hello CheckMates,&lt;/P&gt;&lt;P&gt;Does anyone know how to control which certificate gets sent in a certificate-based site-to-site VPN?&lt;BR /&gt;There's a nice repository of certificates available on the gateway, but it always seems to send the ICA signed certificate. We only want to use the ICA certificate for CP&amp;lt;-&amp;gt;CP VPN's that are managed by the same management. We also have some third-party DAIP gateways we want to use another PKI infrastructure for (that already has CRL publicly available, unlike the CP ICA).&lt;/P&gt;&lt;P&gt;Any ideas how to accomplish this? Browsing the documentation and SK's for half a day didn't seem to reveal a solution.&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Nik&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 06:55:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70001#M12002</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-11T06:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70014#M12003</link>
      <description>&lt;P&gt;This can be configured in the gateway object &amp;gt; IPsec Site-to-Site VPN. There you can choose which certificate from the cert repository it has to use.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Access-Control-Products/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/td-p/38371" target="_self"&gt;&lt;SPAN&gt;HowTo Set Up Certificate Based VPNs with Check Point Appliances&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 07:38:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70014#M12003</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2019-12-11T07:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70018#M12004</link>
      <description>I still don't quite understand how. I found that post yesterday and I know you can configure what CA the certificate of the other side has to belong to (with the Matching Critera on the Interoperable Device) but I don't understand how to control the certificate that is sent from Check Point to the third party DAIP gateway. The post shows how to do it with an Externally Managed CP gateway, but the GW we're dealing with on the other end is not Check Point.</description>
      <pubDate>Wed, 11 Dec 2019 07:47:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70018#M12004</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-11T07:47:58Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70028#M12005</link>
      <description>&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk30501" target="_self"&gt;&lt;SPAN&gt;Setting up the ICA Management Tool&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk102837" target="_self"&gt;&lt;SPAN&gt;Best Practices - ICA Management Tool configuration&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101049" target="_self"&gt;&lt;SPAN&gt;Expired certificates cannot be deleted from the Management Database&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Basically you can just run &lt;EM&gt;"cpca_client&amp;nbsp;&amp;nbsp;set_mgmt_tool on&amp;nbsp; -no_ssl"&lt;/EM&gt; in expert mode of your SmartCenter, connect to the ICA Management Tool via http://SmartCenter-IP:18265/ and configure your certificates and turn off the Management Tool via&amp;nbsp;&lt;EM&gt;"cpca_client&amp;nbsp;&amp;nbsp;set_mgmt_tool off"&lt;/EM&gt; afterwards.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 08:08:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70028#M12005</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2019-12-11T08:08:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70060#M12006</link>
      <description>I don't see how the ICA Management Tool is going to help me. It's for downloading or revoking the ICA issued certificates.&lt;BR /&gt;&lt;BR /&gt;I have 2 certificates available in the IPSEC VPN pane of the Check Point gateway:&lt;BR /&gt;1. the default Check Point ICA issued certificate&lt;BR /&gt;2. a certificate signed by our internal PKI infrastructure CA&lt;BR /&gt;&lt;BR /&gt;What I need to know if how to configure Check Point to send the non-ICA certificate (2) to a third party VPN peer instead of the internal ICA one (1).</description>
      <pubDate>Wed, 11 Dec 2019 09:31:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70060#M12006</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-11T09:31:55Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70147#M12007</link>
      <description>For these third party DAIP gateways, are they part of the same VPN community or a different one?</description>
      <pubDate>Wed, 11 Dec 2019 16:58:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70147#M12007</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-12-11T16:58:24Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70164#M12008</link>
      <description>&lt;P&gt;On Management Server using object Explorer you can create under Servers - Trusted CA an object that defines a external CA, you will need the Root CA Certificate ... Once done you can use Digital Certificates issued by that external CA for the VPNs that you need.&lt;/P&gt;&lt;P&gt;Simply add the Certificate under Gateway - IPSec VPN properties page !!&lt;/P&gt;&lt;P&gt;I did myself a couple of times using Comodo issued Certificates !!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Warm regards&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 19:18:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70164#M12008</guid>
      <dc:creator>Malopro</dc:creator>
      <dc:date>2019-12-11T19:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70227#M12014</link>
      <description>They are part of the same community since they are trusted locations. They just don't have Check Point gateways at those locations (yet).</description>
      <pubDate>Thu, 12 Dec 2019 07:47:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70227#M12014</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-12T07:47:54Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70228#M12009</link>
      <description>As mentioned, I have the trusted CA certificate available under IPSec VPN tab along with the ICA certificate, it just doesn't send it to peers, it only sends the ICA certificate.</description>
      <pubDate>Thu, 12 Dec 2019 07:49:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70228#M12009</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-12T07:49:12Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70260#M12015</link>
      <description>&lt;P&gt;Nik ...&lt;/P&gt;&lt;P&gt;I did it to stablish a Certificate authentication based Site to Site VPN with a Cisco appliance.&lt;/P&gt;&lt;P&gt;Did you delete the ICA Certificate on the IPSec VPN properties ??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 11:13:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70260#M12015</guid>
      <dc:creator>Malopro</dc:creator>
      <dc:date>2019-12-12T11:13:06Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70315#M12016</link>
      <description>&lt;P&gt;Uff ... forget my previous post ... you have CheckPoint and no-Checkpoint on the same community ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 15:55:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70315#M12016</guid>
      <dc:creator>Malopro</dc:creator>
      <dc:date>2019-12-12T15:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70371#M12010</link>
      <description>&lt;P&gt;why not using preshared key, if your remote GWs are a third party?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2019 08:45:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70371#M12010</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-12-13T08:45:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70380#M12011</link>
      <description>Because they're DAIP. Check Point doesn't allow PSK for DAIP peers.</description>
      <pubDate>Fri, 13 Dec 2019 10:03:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70380#M12011</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-13T10:03:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70385#M12017</link>
      <description>&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38926"&gt;@Malopro&lt;/a&gt;: indeed, I want to use the ICA certificate for the CP-CP centrally managed VPN's. Besides, what's the point of having a certificate repository if you can only actually use one certificate... Deleting the other certificate should not be the solution.</description>
      <pubDate>Fri, 13 Dec 2019 11:18:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70385#M12017</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-13T11:18:11Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70387#M12012</link>
      <description>&lt;P&gt;So i would suggest to use the CP internal CAs certificates - for S2S VPN this has no drawbacks...&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2019 11:44:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70387#M12012</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-12-13T11:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70404#M12013</link>
      <description>But we have a PKI infrastructure for which the CRL is publically available. This is not the case with CP PKI. It should be possible to use a different PKI infrastructure. It is also managed by different people than the CP ICA infrastructure. So there is a drawback.</description>
      <pubDate>Fri, 13 Dec 2019 12:27:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70404#M12013</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-13T12:27:34Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70456#M12018</link>
      <description>&lt;P&gt;For the peers in question, do you have them configured to require presenting a certificate signed by a specific CA?&lt;BR /&gt;You would have to import and configure an OPSEC CA object.&lt;BR /&gt;This is described in the "Trusting an Externally Managed CA" section of the R80.30 Site-to-Site VPN guide:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_SitetoSiteVPN_AdminGuide/html_frameset.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_SitetoSiteVPN_AdminGuide/html_frameset.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Then you go into the external object and configure the matching criteria, as shown here:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-12-13 at 11.17.16 AM.png" style="width: 592px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/3749iA295E199CE9BE2BE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2019-12-13 at 11.17.16 AM.png" alt="Screen Shot 2019-12-13 at 11.17.16 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2019 19:22:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70456#M12018</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-12-13T19:22:20Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70548#M12019</link>
      <description>Yes, I have the Matching Criteria enabled and that part works. The Check Point accepts the PKI signed certificate from the third party peer gateway properly (I have a one-way IKE Main mode), that's not the problem. The problem is that Check Point sends the ICA certificate to the third party, which is not trusted obviously and the negotiation fails. On the third party gateway I can easily configure what certificate to send to a peer, but on Check Point this seems either impossible or needlessly obscure, while they force you to use certs for authentication.</description>
      <pubDate>Mon, 16 Dec 2019 07:30:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70548#M12019</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-16T07:30:52Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70591#M12020</link>
      <description>Specifically, we force the use of certificates for DAIP gateways in particular as Pre-Shared Keys are not entirely secure in this configuration.&lt;BR /&gt;Trying to confirm with R&amp;amp;D if it's possible to use different certificates.</description>
      <pubDate>Mon, 16 Dec 2019 16:31:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70591#M12020</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-12-16T16:31:07Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70659#M12021</link>
      <description>Thank you. It would be really odd if it wasn't possible. What's the point of having a certificate repository for IPSec then... Also, it's something that's easily possible on even 10 year old ScreenOS devices. I can just select what certificate to use for a peer gateway from a simple dropdown.</description>
      <pubDate>Tue, 17 Dec 2019 12:59:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70659#M12021</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-17T12:59:50Z</dc:date>
    </item>
  </channel>
</rss>

