<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SG and OCSP Service in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SG-and-OCSP-Service/m-p/219433#M41947</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Is there a case where security gateways check the OCSP service for obtaining the revocation status of an X.509 digital certificate? In what case will the gateway do that?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 02 Jul 2024 14:12:31 GMT</pubDate>
    <dc:creator>Ihenock1011</dc:creator>
    <dc:date>2024-07-02T14:12:31Z</dc:date>
    <item>
      <title>SG and OCSP Service</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SG-and-OCSP-Service/m-p/219433#M41947</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Is there a case where security gateways check the OCSP service for obtaining the revocation status of an X.509 digital certificate? In what case will the gateway do that?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 14:12:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SG-and-OCSP-Service/m-p/219433#M41947</guid>
      <dc:creator>Ihenock1011</dc:creator>
      <dc:date>2024-07-02T14:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: SG and OCSP Service</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SG-and-OCSP-Service/m-p/219468#M41965</link>
      <description>&lt;P&gt;If you have it configured it can do OCSP, default is CRL.&lt;/P&gt;
&lt;P&gt;You can check the CRL URL in the certificate itself.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk37803" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk37803&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For HTTPS inspection:&lt;/P&gt;
&lt;P&gt;&lt;A class="checkpoint_toggle" target="_blank"&gt;Does HTTPS Inspection check for CRLs? What about OCSP?&lt;/A&gt;&lt;/P&gt;
&lt;DIV id="Q12"&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Yes. By default, the CRL check is done on the certificate.&lt;BR /&gt;The check is done without holding the connection, so the first time a user accesses a specific site, it will pass without CRL validation, and the next connection will be validated.&lt;BR /&gt;By default, if the CRL can't be reached, the certificate is considered to be trusted (this is also the default behavior of the common browsers).&lt;/P&gt;
&lt;P&gt;If you wish to enforce CRL fetch, and to mark the certificate as untrusted, if the CRL can not be reached, you can use&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk13009" target="_blank" rel="noopener"&gt;GuiDBedit Tool&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to change the value of attribute "&lt;EM&gt;&lt;STRONG&gt;drop_if_crl_cannot_be_reached&lt;/STRONG&gt;&lt;/EM&gt;" to "&lt;EM&gt;&lt;STRONG&gt;true&lt;/STRONG&gt;&lt;/EM&gt;" (Tables -&amp;gt; "&lt;EM&gt;Other&lt;/EM&gt;" -&amp;gt; "&lt;EM&gt;SSL Inspection&lt;/EM&gt;" table -&amp;gt; "&lt;EM&gt;general_confs_obj&lt;/EM&gt;" Object).&lt;/P&gt;
&lt;P&gt;OCSP is supported from R80.10 and from Jumbo Hotfix Accumulator for R77.30 (Take 266).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Config related to HTTPS: SmartConsole -&amp;gt; Manage &amp;amp; settings -&amp;gt; blades -&amp;gt; all the way down , configure in SmartDashboard (https inspection).&lt;BR /&gt;Then in legacy SmartDashboard go to HTTPS inspection tab and then trusted CA's.&lt;BR /&gt;Here you can change settings related to CA updates.&amp;nbsp;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 02 Jul 2024 19:04:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SG-and-OCSP-Service/m-p/219468#M41965</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-07-02T19:04:49Z</dc:date>
    </item>
    <item>
      <title>Re: SG and OCSP Service</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SG-and-OCSP-Service/m-p/219634#M41992</link>
      <description>&lt;P&gt;It happens with HTTPS traffic passing through the gateway as part of the SNI verification process.&lt;BR /&gt;It also happens with VPNs.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 21:16:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SG-and-OCSP-Service/m-p/219634#M41992</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-03T21:16:59Z</dc:date>
    </item>
  </channel>
</rss>

