<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Certificate renewal in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/90975#M80083</link>
    <description>&lt;P&gt;tnx, sr is created&lt;/P&gt;</description>
    <pubDate>Thu, 09 Jul 2020 09:08:59 GMT</pubDate>
    <dc:creator>Vincent_Bacher</dc:creator>
    <dc:date>2020-07-09T09:08:59Z</dc:date>
    <item>
      <title>VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/85999#M80077</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I'm wondering if anyone has a creative way to monitor/manage VPN and SIC certificate renewal.&amp;nbsp; I manage a large environment and most of the equipment outlives its 5 year life cycle which is the default length of the IKE certificates.&amp;nbsp; I have been bitten by the certificate expiration and VPN tunnel drops causing an outage.&amp;nbsp; I have developed a process to run the cpca_client lscert -kind IKE and comb the data for expirations but its currently a manual process.&amp;nbsp; Wondering if we can use the mgmt_cli to do something more automated.&amp;nbsp; Any ideas?&lt;/P&gt;</description>
      <pubDate>Thu, 21 May 2020 14:18:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/85999#M80077</guid>
      <dc:creator>Timothy_Shover</dc:creator>
      <dc:date>2020-05-21T14:18:49Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/86131#M80078</link>
      <description>You can call that specific command using the run-script API but beyond that, there aren't any APIS for this.&lt;BR /&gt;Of course, if you're using the ICA, certificates should auto-renew on their own.</description>
      <pubDate>Sun, 24 May 2020 04:02:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/86131#M80078</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-05-24T04:02:27Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/90909#M80079</link>
      <description>&lt;P&gt;I am sorry, i just wanted to click on reply and clocked on solution by mistake.&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;: I have a question regarding VPN certificate renewal.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;You wrote that when using ICA, IKE certificates should be renewed automatically. So far so good.&lt;BR /&gt;My question is: When is this performed? Directly after the time of expiry? Or earlier?&lt;/P&gt;&lt;P&gt;I have a customer here with ~300 SMB appliances (1100 series) where round about 150 certificates will expire in the next weeks.&lt;BR /&gt;All gateways are managed by SmartProvisioning except central gateway which is not a smb of course.&lt;/P&gt;&lt;P&gt;So for them it's really important to know this exactly. Where can we get a proof explanation of that?&lt;/P&gt;&lt;P&gt;Will open a SR in addition to this reply as soon as i have necessary rights in uc for that customer account.&lt;BR /&gt;&lt;BR /&gt;Cheers&lt;/P&gt;&lt;P&gt;Vincent&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jul 2020 15:06:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/90909#M80079</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2020-07-08T15:06:19Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/90921#M80080</link>
      <description>For SIC in particular, it looks like that does not auto-renew on SMB per: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk158333" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk158333&lt;/A&gt;&lt;BR /&gt;For VPN certificates, if we didn't support it, you wouldn't have an SK like: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108064" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108064&lt;/A&gt;&lt;BR /&gt;I believe it starts the auto-renewal process 60 days before.</description>
      <pubDate>Wed, 08 Jul 2020 16:33:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/90921#M80080</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-07-08T16:33:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/90928#M80081</link>
      <description>&lt;P&gt;In this case, the next certificates will expire at 12th of July. So here something is going wrong,&amp;nbsp; right?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jul 2020 19:06:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/90928#M80081</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2020-07-08T19:06:17Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/90937#M80082</link>
      <description>Agreed and it might be good to get the TAC involved.</description>
      <pubDate>Wed, 08 Jul 2020 22:17:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/90937#M80082</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-07-08T22:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/90975#M80083</link>
      <description>&lt;P&gt;tnx, sr is created&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 09:08:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/90975#M80083</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2020-07-09T09:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/91027#M80084</link>
      <description>&lt;P&gt;Like you, I've been seeing IKE certificates [SmartCenter-managed] not getting auto-renewed like they should. &amp;nbsp;Not sure what's failing, but something certainly is amiss. &amp;nbsp;This seems to be some R80-specific issue; I certainly don't recall this error with R77 and earlier.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 13:35:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/91027#M80084</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2020-07-09T13:35:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/91030#M80085</link>
      <description>&lt;P&gt;Interesting. I think it's not relevant if it's SmartProvisioning or SmartCenter as it's the same internal ca.&lt;/P&gt;&lt;P&gt;Opened a high prio sr 6 hours ago and had to press escalate to get the first update "is this internal or external ca" &lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 13:49:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/91030#M80085</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2020-07-09T13:49:20Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/91279#M80086</link>
      <description>&lt;P&gt;Now i received mail from tac:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;I wanted to update you that this option is not available and the certificates on the GW will need to be renewed manually.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;As we are talking about round about 250 certificates, I am not really amused.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jul 2020 05:33:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/91279#M80086</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2020-07-13T05:33:07Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/91281#M80087</link>
      <description>&lt;P&gt;well, someone from your team will be very happy to do this monkey job...&lt;/P&gt;
&lt;P&gt;But at least, he/she will get a lot of overtimes &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jul 2020 05:50:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/91281#M80087</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2020-07-13T05:50:29Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/91283#M80088</link>
      <description>In our case customer will have to do it. Would be bit expensive paying for that nonsense</description>
      <pubDate>Mon, 13 Jul 2020 06:59:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/91283#M80088</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2020-07-13T06:59:51Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/91331#M80089</link>
      <description>&lt;P&gt;That's particularly disturbing, as it worked in R77 and earlier. &amp;nbsp;Plus it also defeats the purpose of a centralized certificate and key management server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suspect someone at TAC is either A) wrong, or B) not realizing they have a bug. &amp;nbsp;Might could contact your SE and escalate (annoying, I know). &amp;nbsp;I say it's a bug.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jul 2020 13:21:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/91331#M80089</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2020-07-13T13:21:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/91350#M80090</link>
      <description>There are dozens of features which were available in R77, but are missing in R80. In most of cases, you are asked to create RFE...</description>
      <pubDate>Mon, 13 Jul 2020 15:39:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/91350#M80090</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2020-07-13T15:39:41Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/91364#M80091</link>
      <description>To be honest, I agree. But.&lt;BR /&gt;Before getting absolute certainty, my customer has already revoked all certs manually and nobody cares what will be in five years.</description>
      <pubDate>Mon, 13 Jul 2020 19:24:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/91364#M80091</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2020-07-13T19:24:26Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/123386#M80092</link>
      <description>&lt;P&gt;Now another case of customer's gateway VPN certificates expiring. &amp;nbsp;My customer is already asking about switching to Meraki. &amp;nbsp;They already did it for some smaller sites. &amp;nbsp;If Check Point isn't going to fix auto-renewal of VPN certificates, you'll be losing more customers. &amp;nbsp;What's the point of the FW1_ica_pull and FW1_ica_push services if certificates aren't being auto-renewed? &amp;nbsp;I never had to do this manually in R77 and lower.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The next time my customer(s) mention "Meraki" or "Firepower", I'm not going to stop them. &amp;nbsp;Esp. as I'm CCNP R/S, CCDP, and CCNP Security, too.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jul 2021 19:47:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/123386#M80092</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2021-07-08T19:47:17Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/132456#M80093</link>
      <description>&lt;P&gt;You could use this as a cron job from the management server:&lt;BR /&gt;1 1 * * * . /opt/CPshared/5.0/tmp/.CPprofile.sh; cpca_client lscert -stat Valid | tail -n +4 | awk 'BEGIN {RS="\n\n"; FS="\n";} {print $1,$2,$3;}' | logger -t lscert&lt;BR /&gt;&lt;BR /&gt;And then here is a nice splunk alert:&lt;BR /&gt;&lt;BR /&gt;index=gaia process=lscert&lt;BR /&gt;| rex field=_raw "lscert:\s+Subject\s+=\s+(?&amp;lt;dn&amp;gt;.*)\s+Status\s+=.*Not_After:\s+(?&amp;lt;expiry&amp;gt;.*)"&lt;BR /&gt;| eval expiry=strptime(expiry, "%a %B %d %H:%M:%S %Y")&lt;BR /&gt;| dedup dn,Kind&lt;BR /&gt;| where expiry &amp;lt; relative_time(_time, "+90d")&lt;BR /&gt;| eval days_left=floor((expiry-now())/86400)&lt;BR /&gt;| eval expiry=strftime(expiry,"%Y-%m-%dT%H:%M:%S%z")&lt;BR /&gt;| table _time,dn,Kind,expiry,days_left&lt;/P&gt;</description>
      <pubDate>Fri, 22 Oct 2021 20:17:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/132456#M80093</guid>
      <dc:creator>Don_Sudom</dc:creator>
      <dc:date>2021-10-22T20:17:20Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/188540#M80094</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;
&lt;P&gt;any update on auto-renewal VPN Certificates feature?&lt;/P&gt;
&lt;P&gt;any API Script?&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2023 09:46:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/188540#M80094</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2023-08-03T09:46:19Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/188549#M80095</link>
      <description>&lt;P&gt;From what I recall the autorenewal should work on most recent versions that are on the latest GA JHF. In the JHF release notes you will find some references into which things were fixed in which release.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you still have issues after the fact not listed in Secure Knowledge I strongly recommend a TAC case.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2023 11:22:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/188549#M80095</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2023-08-03T11:22:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Certificate renewal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/188557#M80096</link>
      <description>&lt;P&gt;autorenewal in latest JHF is related to ICA Root CA not certificates for vpn, multiportal etc. from what i know&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2023 12:26:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Certificate-renewal/m-p/188557#M80096</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2023-08-03T12:26:15Z</dc:date>
    </item>
  </channel>
</rss>

