<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NET::ERR_CERT_COMMON_NAME_INVALID GAIA Portal. in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/213642#M40716</link>
    <description>&lt;P&gt;I dont think you are missing anything, that sk seems valid for the issue they have. Just curious, does it make any difference if they try private browser window?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Wed, 08 May 2024 12:47:22 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2024-05-08T12:47:22Z</dc:date>
    <item>
      <title>NET::ERR_CERT_COMMON_NAME_INVALID GAIA Portal.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/213626#M40714</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;A customer has a requirement to prevent this message from appearing when accessing GAIA.&lt;/P&gt;&lt;P&gt;I am aware of&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;sk174383.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;However I have explained that this certificate is generated automatically by the system and pragmatically the fact that you trust the Checkpoint ICA, and all certificates signed by it, should be sufficient to mitigate any concerns.&lt;/P&gt;&lt;P&gt;The customer could generate a CSR and submit to an internal PKI I guess as per&amp;nbsp;&lt;SPAN&gt;sk69660.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;But that's quite a lot of work to do per gateway (they have a large estate) and every time the certificate expires.&lt;/P&gt;&lt;P&gt;The customer also has no internal PKI and I see no reason why they should pay for third party certificates just so a malicious user would trust the certificate chain.&lt;/P&gt;&lt;P&gt;I also suggested they export the certificate chain and push out by GPO but this will still likely get picked up by external scans and tests.&lt;/P&gt;&lt;P&gt;So my question is: is there any way to influence the behaviour of the SAN via the built in ICA to avoid this problem going forwards?&lt;/P&gt;&lt;P&gt;Is this something that is being looked at for upcoming JHF?&lt;/P&gt;&lt;P&gt;Am I just being dumb and missing something obvious? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Any Input would be appreciated - thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 11:40:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/213626#M40714</guid>
      <dc:creator>LazarusG</dc:creator>
      <dc:date>2024-05-08T11:40:01Z</dc:date>
    </item>
    <item>
      <title>Re: NET::ERR_CERT_COMMON_NAME_INVALID GAIA Portal.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/213642#M40716</link>
      <description>&lt;P&gt;I dont think you are missing anything, that sk seems valid for the issue they have. Just curious, does it make any difference if they try private browser window?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 12:47:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/213642#M40716</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-08T12:47:22Z</dc:date>
    </item>
    <item>
      <title>Re: NET::ERR_CERT_COMMON_NAME_INVALID GAIA Portal.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/213699#M40725</link>
      <description>&lt;P&gt;The certificate for the Gaia portal is not generated via the ICA.&lt;BR /&gt;There appears to be a procedure to add information to the SAN for the Gaia Portal Certificate in sk97648, but the SK is internal.&lt;BR /&gt;Please consult with TAC: &lt;A href="https://help.checkpoint.com" target="_blank" rel="noopener"&gt;https://help.checkpoint.com&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 23:03:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/213699#M40725</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-05-08T23:03:19Z</dc:date>
    </item>
    <item>
      <title>Re: NET::ERR_CERT_COMMON_NAME_INVALID GAIA Portal.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/213830#M40767</link>
      <description>&lt;P&gt;Hi unfortunately not and it seems exporting the ICA cert and importing to the Root Certificate store on the PC doesn't solve the issue (even if the appliance gaia cert is also imported into Personal and the chain is shown as OK in mmc).&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 09:30:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/213830#M40767</guid>
      <dc:creator>LazarusG</dc:creator>
      <dc:date>2024-05-10T09:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: NET::ERR_CERT_COMMON_NAME_INVALID GAIA Portal.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/213832#M40768</link>
      <description>&lt;P&gt;Thanks Phone boy, Can I clarify on the signing? I just exported the gateway cert from the Gaia browser and added it to personal store but it was shown as untrusted. I then exported the ICA cert from Smartconsole and imported to root store and now the certificate chain is shown as ok.&lt;BR /&gt;&lt;BR /&gt;I will maybe engage TAC but if customers will have requirements to address this browser warning it would be good if it was something we could influence easily (or automatically in the system without effort on customer part).&lt;/P&gt;&lt;P&gt;I just found&amp;nbsp;sk181410 which looks like this would address the issue (?) still seems like a lot of effort for something that 'isn't' broken just to make a browser happy.&lt;/P&gt;&lt;P&gt;##update although I didn't get this Phoneboy so apologies (I thought the appliance gaia cert was chained)&lt;BR /&gt;&lt;SPAN&gt;sk181410&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;"Note - Each Gaia OS has a unique self-signed certificate"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;##Update again = ok so I was confused, when a firewall is built it has a self signed cert, but if you enable VPN blade and push policy the gai cert becomes the vpn cert - which &lt;U&gt;is&lt;/U&gt; signed by the ICA.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So it seems we need to follow&amp;nbsp;sk181410 to generate new self signed certs that satisfy the browser CN/SAN requirements - and/or renew the vpn cert with additional criteria?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 16:16:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/213832#M40768</guid>
      <dc:creator>LazarusG</dc:creator>
      <dc:date>2024-05-10T16:16:52Z</dc:date>
    </item>
    <item>
      <title>Re: NET::ERR_CERT_COMMON_NAME_INVALID GAIA Portal.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/213895#M40793</link>
      <description>&lt;P&gt;Maybe TAC case is not a bad idea, just to confirm the steps, but sounds logical to me.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 11 May 2024 01:51:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/213895#M40793</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-11T01:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: NET::ERR_CERT_COMMON_NAME_INVALID GAIA Portal.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/214013#M40851</link>
      <description>&lt;P&gt;looks like&amp;nbsp;&lt;SPAN&gt;sk181410 made the mgmt server agreeable to the browser.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Then adding the ICA cert and vpn gateway cert to the trusted and personal store made the vpn gateway ok too&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2024 12:02:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/214013#M40851</guid>
      <dc:creator>LazarusG</dc:creator>
      <dc:date>2024-05-13T12:02:42Z</dc:date>
    </item>
    <item>
      <title>Re: NET::ERR_CERT_COMMON_NAME_INVALID GAIA Portal.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/214065#M40867</link>
      <description>&lt;P&gt;&lt;SPAN&gt;sk181410 looks like the correct procedure in this case, yes.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2024 16:30:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/214065#M40867</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-05-13T16:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: NET::ERR_CERT_COMMON_NAME_INVALID GAIA Portal.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/214066#M40868</link>
      <description>&lt;P&gt;That fixed it?&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2024 16:39:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NET-ERR-CERT-COMMON-NAME-INVALID-GAIA-Portal/m-p/214066#M40868</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-13T16:39:15Z</dc:date>
    </item>
  </channel>
</rss>

