<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Gateway appliances reliance on management server in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-appliances-reliance-on-management-server/m-p/212380#M40313</link>
    <description>&lt;P&gt;Thank you, that makes sense. We will look to increase the CRL timeout.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Much appreciated. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 26 Apr 2024 13:06:27 GMT</pubDate>
    <dc:creator>Mike-H</dc:creator>
    <dc:date>2024-04-26T13:06:27Z</dc:date>
    <item>
      <title>Gateway appliances reliance on management server</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-appliances-reliance-on-management-server/m-p/212366#M40309</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a number of 1450's and 1570's connected in a site to site VPN to our primary co-lo VSX firewalls. These are also connected to an MDSM. Should the MDSM become unavailable for a period of time (+12 hours) we find that the 1450's and 1570's will fail to rekey thus taking down their VPN connection, which is less than ideal.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this 'by design'/'unavoidable' or is there something we can do to prevent the gateways from dropping should the management server experience issues?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 08:33:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-appliances-reliance-on-management-server/m-p/212366#M40309</guid>
      <dc:creator>Mike-H</dc:creator>
      <dc:date>2024-04-26T08:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway appliances reliance on management server</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-appliances-reliance-on-management-server/m-p/212374#M40311</link>
      <description>&lt;P&gt;I believe it used to be 24 hours, but might be different now. Is there anything you can do to prevent that? personally, I cant think of anything, because it relies on mgmt server for that sort of communication.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 12:26:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-appliances-reliance-on-management-server/m-p/212374#M40311</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-04-26T12:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway appliances reliance on management server</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-appliances-reliance-on-management-server/m-p/212375#M40312</link>
      <description>&lt;P&gt;The VPN is going down because certificates are used for IKE Phase 1 authentication; when a rekey occurs the CRL must be retrieved from the SMS/MDS to ensure the certificate has not been revoked.&amp;nbsp; There is a cache for the CRL on the gateways that will help if the SMS/MDS is down for a short period, but if it is down long enough the cached CRL entries will expire and the VPN breaks at the next rekey.&lt;/P&gt;
&lt;P&gt;You can extend the CRL cache timeout or even disable the CRL checking completely as described here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/SMB-Gateways-Spark/How-does-SMB-gateway-CRL-fetching-work/m-p/198172/highlight/true#M9798" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/SMB-Gateways-Spark/How-does-SMB-gateway-CRL-fetching-work/m-p/198172/highlight/true#M9798&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 12:32:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-appliances-reliance-on-management-server/m-p/212375#M40312</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-04-26T12:32:19Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway appliances reliance on management server</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-appliances-reliance-on-management-server/m-p/212380#M40313</link>
      <description>&lt;P&gt;Thank you, that makes sense. We will look to increase the CRL timeout.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Much appreciated. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 13:06:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-appliances-reliance-on-management-server/m-p/212380#M40313</guid>
      <dc:creator>Mike-H</dc:creator>
      <dc:date>2024-04-26T13:06:27Z</dc:date>
    </item>
  </channel>
</rss>

