<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using Certificate Authentication for S2S VPN in Full HA standalone setup in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Certificate-Authentication-for-S2S-VPN-in-Full-HA/m-p/223509#M42862</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/97431"&gt;@Elmoki&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cluster members must be the same. However when we talk about 3rd party VPN cert this is Policy related as I know.&amp;nbsp;&lt;BR /&gt;Under: Cluster Object -&amp;gt; IPSec VPN -&amp;gt; Repository of Cert.........&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2024-08-13 16_19_16-Cloud Demo Server [ID_340687372]-R81.20-SmartConsole.png" style="width: 762px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27228i71BEDDACE98B9107/image-size/large?v=v2&amp;amp;px=999" role="button" title="2024-08-13 16_19_16-Cloud Demo Server [ID_340687372]-R81.20-SmartConsole.png" alt="2024-08-13 16_19_16-Cloud Demo Server [ID_340687372]-R81.20-SmartConsole.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;After a failver, you can check the cert easily with openssl&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;#openssl s_client -connect google.com:443&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Overall, I think you should sign by the new GW's cert by BCS, because the GAIA portal will use that (new) certificate&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Akos&lt;/P&gt;</description>
    <pubDate>Tue, 13 Aug 2024 14:22:39 GMT</pubDate>
    <dc:creator>AkosBakos</dc:creator>
    <dc:date>2024-08-13T14:22:39Z</dc:date>
    <item>
      <title>Using Certificate Authentication for S2S VPN in Full HA standalone setup</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Certificate-Authentication-for-S2S-VPN-in-Full-HA/m-p/223074#M42774</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;Scenario:&lt;BR /&gt;I have a banking client, they have standalone setup (Sec GW+ Sec MGMT, 6400). They have 4 S2S VPN using certificate for authentication and signed by BCS.&lt;BR /&gt;They want to add a new device (6400) to form Full HA Cluster (I followed sk104699) and will keep the old firewall IP as the clustered IP.&lt;/P&gt;&lt;P&gt;Queries:&lt;BR /&gt;1. Will there be a problem with S2S VPN after forming Full HA cluster?&lt;BR /&gt;2. Is the existing certificate will still be valid after creation of the cluster?&lt;BR /&gt;3. If #2 is not valid anymore do I need to generate individual cert for each device or 1 only?&lt;/P&gt;&lt;P&gt;Hoping for response and guidance.&lt;/P&gt;&lt;P&gt;Thanks in Advance!&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2024 13:32:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Certificate-Authentication-for-S2S-VPN-in-Full-HA/m-p/223074#M42774</guid>
      <dc:creator>Elmoki</dc:creator>
      <dc:date>2024-08-08T13:32:29Z</dc:date>
    </item>
    <item>
      <title>Re: Using Certificate Authentication for S2S VPN in Full HA standalone setup</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Certificate-Authentication-for-S2S-VPN-in-Full-HA/m-p/223113#M42780</link>
      <description>&lt;P&gt;Have you already added the new gateway as firewall object to SmartConsole?&lt;/P&gt;
&lt;P&gt;If so, maybe just try to create a new cluster object. In this object add the current firewall and new one.&lt;/P&gt;
&lt;P&gt;Then see what will happen in the VPN section if you see a new certificate or the current one you use.&lt;/P&gt;
&lt;P&gt;Then make sure to cancel all changes and do not publish. Also make snapshot of mgmt to be sure.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2024 20:56:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Certificate-Authentication-for-S2S-VPN-in-Full-HA/m-p/223113#M42780</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-08-08T20:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: Using Certificate Authentication for S2S VPN in Full HA standalone setup</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Certificate-Authentication-for-S2S-VPN-in-Full-HA/m-p/223129#M42782</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/97431"&gt;@Elmoki&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;The S2S settings are stored in the Policy Package (PSK etc.:) so if you don't change the policy there were no issues.&lt;/LI&gt;
&lt;LI&gt;The new GW will have a new certificate&lt;/LI&gt;
&lt;LI&gt;The certificate generation happens automatically, and the issuer is the Internal CA&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;This is my basic findings, but why do you want to cretate a new certificate? You will (want) sign in with the Bank's PKI?&lt;/P&gt;
&lt;P&gt;A short advise:&lt;/P&gt;
&lt;P&gt;When you create the the new cluster object, compare the object settings with the simple cluster settings (eg.: Connection Persistence). This step could avoid of a lot of inconvience. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Akos&lt;/P&gt;</description>
      <pubDate>Fri, 09 Aug 2024 06:57:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Certificate-Authentication-for-S2S-VPN-in-Full-HA/m-p/223129#M42782</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2024-08-09T06:57:32Z</dc:date>
    </item>
    <item>
      <title>Re: Using Certificate Authentication for S2S VPN in Full HA standalone setup</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Certificate-Authentication-for-S2S-VPN-in-Full-HA/m-p/223489#M42854</link>
      <description>&lt;P&gt;Hi Lesley,&lt;/P&gt;&lt;P&gt;Appreciate your response.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is a banking client. Our procedural steps must be accurate&lt;/P&gt;&lt;P&gt;I'm planning to take out the backup and replicate from the lab&amp;nbsp;and will try your advise.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 13:44:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Certificate-Authentication-for-S2S-VPN-in-Full-HA/m-p/223489#M42854</guid>
      <dc:creator>Elmoki</dc:creator>
      <dc:date>2024-08-13T13:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: Using Certificate Authentication for S2S VPN in Full HA standalone setup</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Certificate-Authentication-for-S2S-VPN-in-Full-HA/m-p/223493#M42856</link>
      <description>&lt;P&gt;Hi AkosBakos,&lt;/P&gt;&lt;P&gt;Thanks for your response.&lt;/P&gt;&lt;P&gt;Certificate has to be signed by BCS,&lt;/P&gt;&lt;P&gt;Since the new GW will have a new certificate then it should be signed by BCS? Otherwise when failover is triggered VPN connection will not work?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 13:50:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Certificate-Authentication-for-S2S-VPN-in-Full-HA/m-p/223493#M42856</guid>
      <dc:creator>Elmoki</dc:creator>
      <dc:date>2024-08-13T13:50:39Z</dc:date>
    </item>
    <item>
      <title>Re: Using Certificate Authentication for S2S VPN in Full HA standalone setup</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Certificate-Authentication-for-S2S-VPN-in-Full-HA/m-p/223497#M42858</link>
      <description>&lt;P&gt;I personally would not go for Full Management HA as this is a not a good setup ! If possible, use SMS in VM and a 6400 GW HA cluster.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 13:55:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Certificate-Authentication-for-S2S-VPN-in-Full-HA/m-p/223497#M42858</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2024-08-13T13:55:19Z</dc:date>
    </item>
    <item>
      <title>Re: Using Certificate Authentication for S2S VPN in Full HA standalone setup</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Certificate-Authentication-for-S2S-VPN-in-Full-HA/m-p/223509#M42862</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/97431"&gt;@Elmoki&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cluster members must be the same. However when we talk about 3rd party VPN cert this is Policy related as I know.&amp;nbsp;&lt;BR /&gt;Under: Cluster Object -&amp;gt; IPSec VPN -&amp;gt; Repository of Cert.........&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2024-08-13 16_19_16-Cloud Demo Server [ID_340687372]-R81.20-SmartConsole.png" style="width: 762px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27228i71BEDDACE98B9107/image-size/large?v=v2&amp;amp;px=999" role="button" title="2024-08-13 16_19_16-Cloud Demo Server [ID_340687372]-R81.20-SmartConsole.png" alt="2024-08-13 16_19_16-Cloud Demo Server [ID_340687372]-R81.20-SmartConsole.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;After a failver, you can check the cert easily with openssl&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;#openssl s_client -connect google.com:443&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Overall, I think you should sign by the new GW's cert by BCS, because the GAIA portal will use that (new) certificate&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Akos&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 14:22:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Certificate-Authentication-for-S2S-VPN-in-Full-HA/m-p/223509#M42862</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2024-08-13T14:22:39Z</dc:date>
    </item>
    <item>
      <title>Re: Using Certificate Authentication for S2S VPN in Full HA standalone setup</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Certificate-Authentication-for-S2S-VPN-in-Full-HA/m-p/223536#M42868</link>
      <description>&lt;P&gt;When you do full HA (or even just Management HA), the nodes share the Internal CA.&lt;BR /&gt;Which means this should work.&lt;/P&gt;
&lt;P&gt;However, I would advise against Full HA, opting for Smart-1 Cloud or a separate on-premise management (either an appliance or VM).&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 17:22:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Certificate-Authentication-for-S2S-VPN-in-Full-HA/m-p/223536#M42868</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-08-13T17:22:20Z</dc:date>
    </item>
  </channel>
</rss>

