<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to extract auto-signed certificate info in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-extract-auto-signed-certificate-info/m-p/207131#M39142</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Last friday we got an issue when the Identity Collectors couldn't connect to a gateway. After a while we realised the certificate on the gateway expired. We fixed the issue by renewing it.&lt;/P&gt;&lt;P&gt;Now what we want is to monitor when that certificate will expire and to configure an alert to notify us 1 month earlier. The idea is to know what command tells us the expiration day of that certificate. We tried this command in all interfaces of the gateway, it shows the info from another certificate in the appliance, not the one we want:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;cpopenssl s_client -connect X.X.X.X:443 | cpopenssl x509 -text&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;The output of that command shows us the certificate is going to expire on &lt;STRONG&gt;2028&lt;/STRONG&gt; and the interesting certificate will expire on &lt;STRONG&gt;2025&lt;/STRONG&gt; so it's reading another cert.&lt;/P&gt;&lt;P&gt;Do you know the command to extract the info of that certificate?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Mon, 26 Feb 2024 11:33:03 GMT</pubDate>
    <dc:creator>Franktum</dc:creator>
    <dc:date>2024-02-26T11:33:03Z</dc:date>
    <item>
      <title>How to extract auto-signed certificate info</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-extract-auto-signed-certificate-info/m-p/207131#M39142</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Last friday we got an issue when the Identity Collectors couldn't connect to a gateway. After a while we realised the certificate on the gateway expired. We fixed the issue by renewing it.&lt;/P&gt;&lt;P&gt;Now what we want is to monitor when that certificate will expire and to configure an alert to notify us 1 month earlier. The idea is to know what command tells us the expiration day of that certificate. We tried this command in all interfaces of the gateway, it shows the info from another certificate in the appliance, not the one we want:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;cpopenssl s_client -connect X.X.X.X:443 | cpopenssl x509 -text&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;The output of that command shows us the certificate is going to expire on &lt;STRONG&gt;2028&lt;/STRONG&gt; and the interesting certificate will expire on &lt;STRONG&gt;2025&lt;/STRONG&gt; so it's reading another cert.&lt;/P&gt;&lt;P&gt;Do you know the command to extract the info of that certificate?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 11:33:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-extract-auto-signed-certificate-info/m-p/207131#M39142</guid>
      <dc:creator>Franktum</dc:creator>
      <dc:date>2024-02-26T11:33:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract auto-signed certificate info</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-extract-auto-signed-certificate-info/m-p/207133#M39143</link>
      <description>&lt;P&gt;Maybe this command helps you:&lt;/P&gt;
&lt;P&gt;[SMARTCENTER]# cpca_client lscert&lt;/P&gt;
&lt;P&gt;[SMARTCENTER]# cpca_client lscert ?&lt;BR /&gt;Error: odd argument ? for lscert&lt;BR /&gt;Usage: cpca_client [-d]&lt;BR /&gt;create_cert [-p &amp;lt;ca_port&amp;gt;] -n "CN=&amp;lt;common name&amp;gt;" -f &amp;lt;PKCS12 filename&amp;gt; [-w &amp;lt;password&amp;gt;] [-k &amp;lt;SIC|USER|IKE|ADMIN_PKG&amp;gt;] [-c cert_comment]&lt;BR /&gt;revoke_cert [-p &amp;lt;ca_port&amp;gt;] [-n "CN=&amp;lt;common name&amp;gt;"] [-s &amp;lt;serial_number&amp;gt;]&lt;BR /&gt;revoke_non_exist_cert -i &amp;lt;input_file_full_path&amp;gt;&lt;BR /&gt;init_certs [-p &amp;lt;ca_port&amp;gt;] -i input_file_full_path -o output_file_full_path&lt;BR /&gt;get_crldp [-p &amp;lt;ca_port&amp;gt;]&lt;BR /&gt;set_cert_validity -k &amp;lt;SIC|IKE|USER&amp;gt; [-y num_of_years] [-d num_of_days] [-h num_of_hours] [-s num_of_seconds]&lt;BR /&gt;set_mgmt_tool on|off|add|remove|clean|print [-p &amp;lt;ca_port&amp;gt;] { [-a &amp;lt;administrator DN&amp;gt;] [-u &amp;lt;user DN&amp;gt;] [-c &amp;lt;custom user DN&amp;gt;] }&lt;BR /&gt;set_ca_services on|off &lt;BR /&gt;get_pubkey [-p &amp;lt;ca_port&amp;gt;] output_file&lt;BR /&gt;lscert [-dn substr] [-stat Pending|Valid|Revoked|Expired|Renewed] [-kind SIC|IKE|User|LDAP] [-ser ser] [-dp dp]&lt;BR /&gt;double_sign [-p &amp;lt;ca_port&amp;gt;] -i &amp;lt;input file: cert in PEM format&amp;gt; [-o &amp;lt;output file&amp;gt;] &lt;BR /&gt;set_sign_hash [sha1|sha256|sha384|sha512]&lt;BR /&gt;search &amp;lt;string&amp;gt; [-where dn|comment|serial|device_type|device_id|device_name] [-kind SIC|IKE|User|LDAP] [-stat Pending|Valid|Revoked|Expired|Renewed] [-max &amp;lt;maximum number of results&amp;gt;] [-showfp y/n] &lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 12:00:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-extract-auto-signed-certificate-info/m-p/207133#M39143</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-02-26T12:00:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract auto-signed certificate info</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-extract-auto-signed-certificate-info/m-p/207138#M39145</link>
      <description>&lt;P&gt;Thanks for the answer Lesley! In management we were able to check the certificates (we got several gateways with Identity Awareness) with &lt;STRONG&gt;cpca_client lscert -ser XXXX&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards!&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 12:28:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-extract-auto-signed-certificate-info/m-p/207138#M39145</guid>
      <dc:creator>Franktum</dc:creator>
      <dc:date>2024-02-26T12:28:07Z</dc:date>
    </item>
  </channel>
</rss>

