<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPSi INBOUND with more than one certificate (SG9100, R82 JHFT39) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPSi-INBOUND-with-more-than-one-certificate-SG9100-R82-JHFT39/m-p/258944#M50793</link>
    <description>&lt;P&gt;You can work around this by creating a single certificate with&amp;nbsp;ALL the relevant FQDNs added as SANs.&lt;BR /&gt;This is exactly how Google serves many different services from the same IPv4 address, as shown below:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31605iD9F564499F885B46/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 09 Jan 2026 20:01:38 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2026-01-09T20:01:38Z</dc:date>
    <item>
      <title>HTTPSi INBOUND with more than one certificate (SG9100, R82 JHFT39)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPSi-INBOUND-with-more-than-one-certificate-SG9100-R82-JHFT39/m-p/258869#M50774</link>
      <description>&lt;P&gt;Dear Community,&lt;/P&gt;&lt;P&gt;We have several HTTPS-443 Services running in our datacenter, and start now to protect that with INBOUND HTTPSinspection.&lt;BR /&gt;So far everything works like a charm. But we also have one destination, which is a reverse proxy, and handles different HTTPS services in the backend. Unfortunately their services SSL certificates are different domains.&lt;BR /&gt;But I cannot place more than one SSL certificate per INBOUND rule.&lt;BR /&gt;Is there a way to make it work, like to make just a second rule with the same destination, but different certificate, even the rule will be identically, except the presented certificate?&lt;BR /&gt;Means, is the Checkpoint able, to see from the host the WAN client is calling, which rule and certificate he should present?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 05:13:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPSi-INBOUND-with-more-than-one-certificate-SG9100-R82-JHFT39/m-p/258869#M50774</guid>
      <dc:creator>freshwater84</dc:creator>
      <dc:date>2025-10-03T05:13:30Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPSi INBOUND with more than one certificate (SG9100, R82 JHFT39)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPSi-INBOUND-with-more-than-one-certificate-SG9100-R82-JHFT39/m-p/258944#M50793</link>
      <description>&lt;P&gt;You can work around this by creating a single certificate with&amp;nbsp;ALL the relevant FQDNs added as SANs.&lt;BR /&gt;This is exactly how Google serves many different services from the same IPv4 address, as shown below:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31605iD9F564499F885B46/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jan 2026 20:01:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPSi-INBOUND-with-more-than-one-certificate-SG9100-R82-JHFT39/m-p/258944#M50793</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-01-09T20:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPSi INBOUND with more than one certificate (SG9100, R82 JHFT39)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPSi-INBOUND-with-more-than-one-certificate-SG9100-R82-JHFT39/m-p/259050#M50797</link>
      <description>&lt;P&gt;You cannot sadly add more than one certificate per inbound rule, you would have to create multiple rules and use different certificate.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 05 Oct 2025 18:35:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPSi-INBOUND-with-more-than-one-certificate-SG9100-R82-JHFT39/m-p/259050#M50797</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-05T18:35:09Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPSi INBOUND with more than one certificate (SG9100, R82 JHFT39)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPSi-INBOUND-with-more-than-one-certificate-SG9100-R82-JHFT39/m-p/259133#M50823</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;while it is true that you can only have one certificate per rule, it is still possible to use multiple certificates.&lt;/P&gt;&lt;P&gt;The trick is to specify set an "Application/Site" Object in the "Category/Custom Application" colum. Now you can specify when a connection will match a rule, as the firewill will check the SNI header.&lt;/P&gt;&lt;P&gt;Just be aware that these Objects are made from a proxy perspective, not a reverse-proxy. Meaning, if you simply enter test.mydomain.com, it will also match newversion.test.mydomain.com. In case of a more complex setup, you may have to work with Regexes, like&lt;BR /&gt;for an exact hostname: "^test\.mydomain\.com$"&lt;BR /&gt;or for a wildcard cert: "^[^\.]+\.mydomain\.com$"&lt;/P&gt;&lt;P&gt;Tested on R81.20Mgmt+GW, and on R82Mgmt+R81.20GW. (Not yet used on a R82GW, but i don't see why it shoudn't work there)&lt;/P&gt;&lt;P&gt;I would wish for Checkpoint to implement an automatic solution for inbound inspection, but, alas, for now you have to do it manually.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Oct 2025 15:41:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPSi-INBOUND-with-more-than-one-certificate-SG9100-R82-JHFT39/m-p/259133#M50823</guid>
      <dc:creator>SomAustrianCity</dc:creator>
      <dc:date>2025-10-06T15:41:43Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPSi INBOUND with more than one certificate (SG9100, R82 JHFT39)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPSi-INBOUND-with-more-than-one-certificate-SG9100-R82-JHFT39/m-p/259612#M50914</link>
      <description>&lt;P&gt;Hi SomAustrianCity,&lt;/P&gt;&lt;P&gt;Thanks you, works like a charm on R82. In our case subdomains are fine, so without RegEx it works with *.domain.tld. Should be worth to make an SK about it...&lt;/P&gt;</description>
      <pubDate>Fri, 10 Oct 2025 10:16:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPSi-INBOUND-with-more-than-one-certificate-SG9100-R82-JHFT39/m-p/259612#M50914</guid>
      <dc:creator>freshwater84</dc:creator>
      <dc:date>2025-10-10T10:16:48Z</dc:date>
    </item>
  </channel>
</rss>

