<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What System TLS Configuration do? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-System-TLS-Configuration-do/m-p/259622#M50916</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings to you and Japan, brother!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Fri, 10 Oct 2025 11:03:10 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-10-10T11:03:10Z</dc:date>
    <item>
      <title>What System TLS Configuration do?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-System-TLS-Configuration-do/m-p/259077#M50805</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found presumably newly-added setting, which is System TLS Configuration under&amp;nbsp; System Management &amp;gt; System Logging.&lt;/P&gt;&lt;P&gt;What kind of behaviour can be configured here? I cannot find a detailed document.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Saitoh&lt;/P&gt;</description>
      <pubDate>Mon, 06 Oct 2025 05:44:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-System-TLS-Configuration-do/m-p/259077#M50805</guid>
      <dc:creator>saitoh</dc:creator>
      <dc:date>2025-10-06T05:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: What System TLS Configuration do?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-System-TLS-Configuration-do/m-p/259081#M50806</link>
      <description>&lt;P&gt;These are the Syslog over TLS settings, please&amp;nbsp;refer:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_Gaia_AdminGuide/Content/Topics-GAG/System-Logging-Gaia-Portal.htm" target="_blank" rel="noopener"&gt;Configuring System Logging in Gaia Portal&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Oct 2025 12:12:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-System-TLS-Configuration-do/m-p/259081#M50806</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-10-06T12:12:24Z</dc:date>
    </item>
    <item>
      <title>Re: What System TLS Configuration do?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-System-TLS-Configuration-do/m-p/259127#M50819</link>
      <description>&lt;P&gt;There you go, my friend...greetings for Japan : - )&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;************************************&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The &lt;STRONG&gt;System TLS Configuration&lt;/STRONG&gt; setting you're referring to—found under &lt;STRONG&gt;System Management &amp;gt; System Logging&lt;/STRONG&gt;—likely relates to how Transport Layer Security (TLS) is used to secure system log transmissions, especially when logs are sent to remote servers (e.g., syslog over TLS). While the exact behavior can vary depending on the platform (e.g., Windows Server, Cisco NX-OS, Juniper OS), here's a general overview of what can be configured under such a setting:&lt;/P&gt;
&lt;H3&gt;&lt;span class="lia-unicode-emoji" title=":locked_with_key:"&gt;🔐&lt;/span&gt; What System TLS Configuration Typically Does&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Enable Secure Log Transmission&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;TLS encrypts log messages sent from the system to a remote syslog server, ensuring confidentiality and integrity.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Configure Authentication Modes&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Server Authentication&lt;/STRONG&gt;: The client verifies the identity of the server.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Mutual Authentication&lt;/STRONG&gt;: Both client and server verify each other using certificates.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Certificate Management&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;You can specify which &lt;STRONG&gt;X.509 certificates&lt;/STRONG&gt; are used for authentication.&lt;/LI&gt;
&lt;LI&gt;Configure &lt;STRONG&gt;trusted Certificate Authorities (CAs)&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Set up &lt;STRONG&gt;certificate mapping&lt;/STRONG&gt; (e.g., one-to-one or many-to-one user mappings).&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;TLS Protocol and Cipher Suite Settings&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Define which versions of TLS are allowed (e.g., TLS 1.2, TLS 1.3).&lt;/LI&gt;
&lt;LI&gt;Control cipher suite order and availability for secure communication.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Session Caching and Timeout Settings&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Configure how long TLS sessions are cached to improve performance.&lt;/LI&gt;
&lt;LI&gt;Adjust cache size and timeout intervals.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;OCSP Stapling and Trusted Issuer Lists&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Enable or disable OCSP stapling for certificate revocation checks.&lt;/LI&gt;
&lt;LI&gt;Decide whether to send a list of trusted certificate authorities to clients.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;🧩 Example Use Case&lt;/H3&gt;
&lt;P&gt;If you're using Windows Server, these settings are managed via the &lt;STRONG&gt;Schannel Security Support Provider (SSP)&lt;/STRONG&gt;. You can configure them using:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Registry keys&lt;/STRONG&gt; (e.g., &lt;CODE&gt;HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL&lt;/CODE&gt;)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Group Policy&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;PowerShell&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For example, enabling mutual TLS for syslog might involve:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Installing certificates on both client and server.&lt;/LI&gt;
&lt;LI&gt;Configuring the syslog daemon to use TLS.&lt;/LI&gt;
&lt;LI&gt;Setting registry keys or configuration files to enforce TLS-only connections.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 06 Oct 2025 15:14:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-System-TLS-Configuration-do/m-p/259127#M50819</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-06T15:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: What System TLS Configuration do?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-System-TLS-Configuration-do/m-p/259621#M50915</link>
      <description>&lt;P&gt;Dear&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;, and&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for sharing the document, and unbelievably detailed explanation!!&lt;/P&gt;&lt;P&gt;Much appreciated, and big respect for you and the time which it took you to acquire this level of knowledge.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Saitoh&lt;/P&gt;</description>
      <pubDate>Fri, 10 Oct 2025 11:01:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-System-TLS-Configuration-do/m-p/259621#M50915</guid>
      <dc:creator>saitoh</dc:creator>
      <dc:date>2025-10-10T11:01:03Z</dc:date>
    </item>
    <item>
      <title>Re: What System TLS Configuration do?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-System-TLS-Configuration-do/m-p/259622#M50916</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings to you and Japan, brother!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 10 Oct 2025 11:03:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-System-TLS-Configuration-do/m-p/259622#M50916</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-10T11:03:10Z</dc:date>
    </item>
  </channel>
</rss>

