<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Untrusted SSL on Cluster's outside interface in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143508#M72757</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have managed to implement internal CA signed SSL cert for our Cluster (with multiportal enabled).&lt;/P&gt;&lt;P&gt;All platform portals are accessible by internal interfaces and SSL is trusted and okay.&lt;/P&gt;&lt;P&gt;Accessibility of platform portal is as in following picture:&lt;/P&gt;&lt;DIV class=""&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="1.png" style="width: 242px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15666iDB1A8027C5B88AA2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I read that IPSec do not use SSL cert. If I remove checkbox for "Including VPN encrupted interfaces" will our S2S IPSec VPN and RAVPN be interrupted?&lt;/P&gt;&lt;P&gt;Our Check Point cluster public IP is not trusted. How to make cluster public IP not self signed/default&amp;nbsp; certificate?&lt;/P&gt;&lt;P&gt;When we scan our public cluster IP by ssl checker we get not trusted warning in browser and following default cert is used:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.png" style="width: 396px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15663i0054F6797A4AC2A3/image-dimensions/396x484?v=v2" width="396" height="484" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to change this cert too? Will it affect our VPNs?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Fri, 11 Mar 2022 14:29:41 GMT</pubDate>
    <dc:creator>mjovovic</dc:creator>
    <dc:date>2022-03-11T14:29:41Z</dc:date>
    <item>
      <title>Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143508#M72757</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have managed to implement internal CA signed SSL cert for our Cluster (with multiportal enabled).&lt;/P&gt;&lt;P&gt;All platform portals are accessible by internal interfaces and SSL is trusted and okay.&lt;/P&gt;&lt;P&gt;Accessibility of platform portal is as in following picture:&lt;/P&gt;&lt;DIV class=""&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="1.png" style="width: 242px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15666iDB1A8027C5B88AA2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I read that IPSec do not use SSL cert. If I remove checkbox for "Including VPN encrupted interfaces" will our S2S IPSec VPN and RAVPN be interrupted?&lt;/P&gt;&lt;P&gt;Our Check Point cluster public IP is not trusted. How to make cluster public IP not self signed/default&amp;nbsp; certificate?&lt;/P&gt;&lt;P&gt;When we scan our public cluster IP by ssl checker we get not trusted warning in browser and following default cert is used:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.png" style="width: 396px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15663i0054F6797A4AC2A3/image-dimensions/396x484?v=v2" width="396" height="484" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to change this cert too? Will it affect our VPNs?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 14:29:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143508#M72757</guid>
      <dc:creator>mjovovic</dc:creator>
      <dc:date>2022-03-11T14:29:41Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143667#M72758</link>
      <description>&lt;P&gt;The platform portal setting you picture should have no impact on IPsec VPN or SSL VPN.&lt;/P&gt;
&lt;P&gt;As for the untrusted certificate you see, if you're using Mobile Access Blade, you can replace it using something like:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk69660&amp;amp;partition=Advanced&amp;amp;product=Mobile" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk69660&amp;amp;partition=Advanced&amp;amp;product=Mobile&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 15:39:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143667#M72758</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-03-14T15:39:05Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143678#M72759</link>
      <description>&lt;P&gt;Hello PhoneBoy,&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Customer is using&amp;nbsp; CPSB-EP-ACCESS-P-LICENSE&amp;nbsp;for RAVPN not mobile access, but this untrusted cert is presented on outside interfaces in cluster (GW1, GW2 and VIP).&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 19:23:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143678#M72759</guid>
      <dc:creator>mjovovic</dc:creator>
      <dc:date>2022-03-14T19:23:32Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143684#M72760</link>
      <description>&lt;P&gt;If MAB isn't active, it's the legacy SNX portal.&lt;BR /&gt;If you're not using SNX at all, might as well disable it as shown here:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk86680&amp;amp;partition=Advanced&amp;amp;product=SSL" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk86680&amp;amp;partition=Advanced&amp;amp;product=SSL&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 20:56:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143684#M72760</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-03-14T20:56:05Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143706#M72761</link>
      <description>&lt;P&gt;Thanks PhoneBoy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So just once more, we can exclude IPSec VPN (S2S and RAVPN) that it does not use this self signed SSL on outside interface?&lt;/P&gt;&lt;P&gt;Having that in mind, only two features that can use&amp;nbsp; self signed cert on outside interfaces are Mobile access blade or SNX legacy?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to check it, to be sure what uses it (cli..)?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 07:03:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143706#M72761</guid>
      <dc:creator>mjovovic</dc:creator>
      <dc:date>2022-03-15T07:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143713#M72762</link>
      <description>&lt;P&gt;Can you explain what the issue is with self signed certificates ? Usually, all portals use internal CA. You can replace the cert by a 3rd party 1 for MAB and SSL inspection, but there is no difference from a users viewpoint: If i want to access services, i would have to accept the self-signed certificate once. If i use a 3rd party certificate it also has to be accepted once. Looking at how certs are stolen or missused i prefer my own internal CA !&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 08:15:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143713#M72762</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-03-15T08:15:21Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143717#M72763</link>
      <description>&lt;P&gt;Hello Albrecht,&lt;/P&gt;&lt;P&gt;Customer wants to avoid SSL check tools to not show self-signed cert warnings. I agree with You that encryption is guaranteed and they know that system is theirs. But again they want that.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 08:56:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143717#M72763</guid>
      <dc:creator>mjovovic</dc:creator>
      <dc:date>2022-03-15T08:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143719#M72764</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Sorry, but this demand is absolute nonsense in my eyes as it adds nothing to security at all -&amp;nbsp;Customer wants to avoid that SSL check tools he uses himself show him that his FW has a&amp;nbsp;self-signed cert ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I would rather suggest to care for more important things like DDoS Protection, allowed Ciphers and TLS versions instead...&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 09:30:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143719#M72764</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-03-15T09:30:29Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143805#M72765</link>
      <description>&lt;P&gt;IPSec VPN (either S2S or C2S) doesn't use this cert.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 22:11:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143805#M72765</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-03-15T22:11:21Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143812#M72766</link>
      <description>&lt;P&gt;It sounds like if they dont want that, in that case, you may need 3rd party CA cert.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 23:54:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143812#M72766</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-03-15T23:54:17Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143896#M72767</link>
      <description>&lt;P&gt;I&amp;nbsp; totally agree with You.&lt;/P&gt;&lt;P&gt;It is important to educate customers, but again if they want something so much what will make them happy (if it does not produce any consequence to system and security), it's okay.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 11:57:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143896#M72767</guid>
      <dc:creator>mjovovic</dc:creator>
      <dc:date>2022-03-16T11:57:44Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143897#M72768</link>
      <description>&lt;P&gt;Does this self signed cert by MGMT CA, auto renew?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 11:58:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143897#M72768</guid>
      <dc:creator>mjovovic</dc:creator>
      <dc:date>2022-03-16T11:58:33Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143898#M72769</link>
      <description>&lt;P&gt;It is best just to disable this cert (mab or snx).&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 12:03:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143898#M72769</guid>
      <dc:creator>mjovovic</dc:creator>
      <dc:date>2022-03-16T12:03:28Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143911#M72770</link>
      <description>&lt;P&gt;The default web UI portal cert is good for 10 years and as far as vpn cert, that was changed recently to 1, rather than 5 years validity.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 12:56:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143911#M72770</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-03-16T12:56:28Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143916#M72771</link>
      <description>&lt;P&gt;This cert is only valid until 7th May:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="valid.png" style="width: 481px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15734iD172715CEF1D0750/image-dimensions/481x372?v=v2" width="481" height="372" role="button" title="valid.png" alt="valid.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 13:12:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143916#M72771</guid>
      <dc:creator>mjovovic</dc:creator>
      <dc:date>2022-03-16T13:12:22Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143919#M72772</link>
      <description>&lt;P&gt;Thats because it was created in 2017...if it was created recently, only good for 1 year.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 13:16:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/143919#M72772</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-03-16T13:16:18Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/144262#M72773</link>
      <description>&lt;P&gt;Hello PhoneBoy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This cluster does not use mobile access blade (not active), nor it supports&amp;nbsp;&lt;EM&gt;SSL Network Extender &lt;/EM&gt;nor it&amp;nbsp;&lt;EM&gt;Support Clientless VPN.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;How to check what CP feature gives SSL client VPN cert on outside cluster interface?&lt;/P&gt;&lt;P&gt;Do I need to check this possible workaround:&lt;/P&gt;&lt;P&gt;Edit the 'index.html' file specifically for SNX. If SNX client connects to a cluster, then perform these changes on&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;all&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;cluster members (reboot / policy installation are not required).&lt;/P&gt;&lt;PRE&gt;[Expert@HostName]# cd $FWDIR/conf/extender
[Expert@HostName]# ls -la index*
[Expert@HostName]# cp index.html index.notworking
[Expert@HostName]# rm -i index.html
[Expert@HostName]# ls -la index*&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2022 08:49:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/144262#M72773</guid>
      <dc:creator>mjovovic</dc:creator>
      <dc:date>2022-03-21T08:49:55Z</dc:date>
    </item>
    <item>
      <title>Re: Untrusted SSL on Cluster's outside interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/144319#M72774</link>
      <description>&lt;P&gt;It may be active even if you've not explicitly enabled SNX, thus those steps might be appropriate.&lt;BR /&gt;However, it doesn't necessarily get rid of the initial TLS connection.&lt;BR /&gt;For that...you may need a TAC case, as I'm not sure how to change the certificate for (or better yet disable) the legacy SNX portal.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2022 16:11:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Untrusted-SSL-on-Cluster-s-outside-interface/m-p/144319#M72774</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-03-21T16:11:10Z</dc:date>
    </item>
  </channel>
</rss>

