<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN using certificates between two different Checkpoint domains in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-using-certificates-between-two-different-Checkpoint-domains/m-p/208370#M39456</link>
    <description>&lt;P&gt;Can you send a screenshot?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2024 18:01:49 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2024-03-11T18:01:49Z</dc:date>
    <item>
      <title>VPN using certificates between two different Checkpoint domains</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-using-certificates-between-two-different-Checkpoint-domains/m-p/208369#M39455</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have two MDS domains,&amp;nbsp; so gateways are managed by a different SMS.&lt;/P&gt;&lt;P&gt;Between these gateways a vpn site to site is up and running on PSK.&lt;/P&gt;&lt;P&gt;I want switch from PSK to Certificate issue by Internal CA.&lt;/P&gt;&lt;P&gt;I imported the "partner" root CA on trusted CA OPSEC PKI server objects.&lt;/P&gt;&lt;P&gt;Error message, invalid certificate and invalid cookie.&lt;/P&gt;&lt;P&gt;Verificated root certificates MD5 fingerprints and it is fine.&lt;/P&gt;&lt;P&gt;What I have missed?&lt;/P&gt;&lt;P&gt;I found a guide but it is for SMB only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2024 17:46:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-using-certificates-between-two-different-Checkpoint-domains/m-p/208369#M39455</guid>
      <dc:creator>Ilovecheckpoint</dc:creator>
      <dc:date>2024-03-11T17:46:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN using certificates between two different Checkpoint domains</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-using-certificates-between-two-different-Checkpoint-domains/m-p/208370#M39456</link>
      <description>&lt;P&gt;Can you send a screenshot?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2024 18:01:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-using-certificates-between-two-different-Checkpoint-domains/m-p/208370#M39456</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-11T18:01:49Z</dc:date>
    </item>
    <item>
      <title>Re: VPN using certificates between two different Checkpoint domains</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-using-certificates-between-two-different-Checkpoint-domains/m-p/208377#M39459</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;On i think you have an externally managed vpn gateway object on each SMS. Di you configure certificate matching criteria on these objects? you should specify the CA the issued the certificate and the DN. Should be done on both sides.&lt;/P&gt;
&lt;DIV id="tinyMceEditor_60035d1b5f0e66RS_Daniel_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MatchingCriteria.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/24809i62D924E3C6163ECE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MatchingCriteria.png" alt="MatchingCriteria.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2024 18:15:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-using-certificates-between-two-different-Checkpoint-domains/m-p/208377#M39459</guid>
      <dc:creator>RS_Daniel</dc:creator>
      <dc:date>2024-03-11T18:15:47Z</dc:date>
    </item>
    <item>
      <title>Re: VPN using certificates between two different Checkpoint domains</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-using-certificates-between-two-different-Checkpoint-domains/m-p/208425#M39463</link>
      <description>&lt;P&gt;I have selected on each external managed gateways the certificate issue by the other internal domain CA and the DN, but no improvements. I will recheck the configuration and I will run a vpn debug, hoping ikeview will help. Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2024 21:47:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-using-certificates-between-two-different-Checkpoint-domains/m-p/208425#M39463</guid>
      <dc:creator>Ilovecheckpoint</dc:creator>
      <dc:date>2024-03-11T21:47:23Z</dc:date>
    </item>
    <item>
      <title>Re: VPN using certificates between two different Checkpoint domains</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-using-certificates-between-two-different-Checkpoint-domains/m-p/208891#M39565</link>
      <description>&lt;P&gt;I deleted OPSEC PKI and created EXTERNAL CA trust server object and it works, traffic pass into vpn.&lt;/P&gt;&lt;P&gt;Anyway, the following message appears from time to time: "Certificate defaultCert cannot be validated. Could not retrieve CRL."&lt;/P&gt;&lt;P&gt;Executed telnet to management ip on port 18264 and it shows as open. Gateway is version 80.20. Any suggestion?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 14:49:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-using-certificates-between-two-different-Checkpoint-domains/m-p/208891#M39565</guid>
      <dc:creator>Ilovecheckpoint</dc:creator>
      <dc:date>2024-03-15T14:49:24Z</dc:date>
    </item>
  </channel>
</rss>

