<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Renew external (3rd party) certificate for IPSEC VPN in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/97035#M19066</link>
    <description>&lt;P&gt;I am too wondering if there is a lengthy time between when the CSR is generated and the Cert is installed if a CRL is checked and the tunnels goes down because the old cert is revoked?&lt;/P&gt;</description>
    <pubDate>Fri, 18 Sep 2020 19:42:22 GMT</pubDate>
    <dc:creator>Douglas_Rich</dc:creator>
    <dc:date>2020-09-18T19:42:22Z</dc:date>
    <item>
      <title>Renew external (3rd party) certificate for IPSEC VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/74703#M15139</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I want to renew external certificate in IPSEC VPN TAB as it will expire soon. I have gone thru some docs and came to know that,&lt;/P&gt;
&lt;P style="box-sizing: border-box; color: #3c3d41; font-family: montserrat; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; line-height: 24px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px 0px 20px 0px;"&gt;In a typical SSL configuration, you receive all the necessary certificates after you generate the CSR Code and your CA validates your request. After the CA signs an SSL Certificate, it sends a ZIP folder with the installation files to the applicant’s email.&lt;/P&gt;
&lt;P style="box-sizing: border-box; color: #3c3d41; font-family: montserrat; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; line-height: 24px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px 0px 20px 0px;"&gt;Since Checkpoint VPN works the other way around, you have no choice but to contact your SSL vendor and ask for the x509/pem versions of your root and intermediate certificates. then generate CSR and give it to vendor for certificate generation.&lt;/P&gt;
&lt;P style="box-sizing: border-box; color: #3c3d41; font-family: montserrat; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; line-height: 24px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px 0px 20px 0px;"&gt;Is this the method I need to follow?&lt;/P&gt;
&lt;P style="box-sizing: border-box; color: #3c3d41; font-family: montserrat; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; line-height: 24px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px 0px 20px 0px;"&gt;Can someone please share step-by-step procedure to renew external certificate for VPN?&lt;/P&gt;
&lt;P style="box-sizing: border-box; color: #3c3d41; font-family: montserrat; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; line-height: 24px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px 0px 20px 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 16:05:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/74703#M15139</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2020-02-10T16:05:14Z</dc:date>
    </item>
    <item>
      <title>Re: Renew external (3rd party) certificate for IPSEC VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/74887#M15165</link>
      <description>You’re talking about IPSEC certificates in one hand but TLS certificates on the other.&lt;BR /&gt;Which is it?&lt;BR /&gt;In any case, I suspect you will follow the same process you followed to install the third party certificate to begin with.&lt;BR /&gt;That may mean recreating the OPSEC CA key (if that changed).</description>
      <pubDate>Wed, 12 Feb 2020 01:55:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/74887#M15165</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-02-12T01:55:29Z</dc:date>
    </item>
    <item>
      <title>Re: Renew external (3rd party) certificate for IPSEC VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/75990#M15408</link>
      <description>&lt;P&gt;Hi PhoneBoy,&lt;/P&gt;
&lt;P&gt;Thanks for reply.&lt;/P&gt;
&lt;P&gt;I am talking about below certificate.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Snap.JPG" style="width: 587px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4548i92741044EFCF9533/image-size/large?v=v2&amp;amp;px=999" role="button" title="Snap.JPG" alt="Snap.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Trusted CA is already generated for this certificate but now it is about to expire so I have to generate new CA? Can you please share steps to renew this certificate?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:36:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/75990#M15408</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2020-02-21T09:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: Renew external (3rd party) certificate for IPSEC VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/76004#M15412</link>
      <description>You need to remove existing cert, add/create a new one.&lt;BR /&gt;By adding a new one you get a CSR to view. Copy this and get it signed by your CA (digicert). Then you complete the CSR with the cert.&lt;BR /&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:38:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/76004#M15412</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2020-02-21T14:38:20Z</dc:date>
    </item>
    <item>
      <title>Re: Renew external (3rd party) certificate for IPSEC VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/76006#M15413</link>
      <description>&lt;P&gt;ok. So when I remove cert, that wildcard FQDN will be impacted?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:44:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/76006#M15413</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2020-02-21T14:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: Renew external (3rd party) certificate for IPSEC VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/76015#M15416</link>
      <description>&lt;P&gt;Delete the old one and publish the changes but don't do a policy push.&amp;nbsp; After that you can do the CSR and request/install the new cert with little or no downtime.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:06:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/76015#M15416</guid>
      <dc:creator>PBC_Cyber</dc:creator>
      <dc:date>2020-02-21T17:06:26Z</dc:date>
    </item>
    <item>
      <title>Re: Renew external (3rd party) certificate for IPSEC VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/76269#M15479</link>
      <description>&lt;P&gt;So we need a no change window for them?&amp;nbsp; Customer expects it to take 2-3 days to get it signed, so no change window for that long?&amp;nbsp; And if they have to make a change, we roll back to a migrate export we'll take before the change?&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2020 22:08:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/76269#M15479</guid>
      <dc:creator>Daniel_Westlund</dc:creator>
      <dc:date>2020-02-24T22:08:43Z</dc:date>
    </item>
    <item>
      <title>Re: Renew external (3rd party) certificate for IPSEC VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/97035#M19066</link>
      <description>&lt;P&gt;I am too wondering if there is a lengthy time between when the CSR is generated and the Cert is installed if a CRL is checked and the tunnels goes down because the old cert is revoked?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2020 19:42:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/97035#M19066</guid>
      <dc:creator>Douglas_Rich</dc:creator>
      <dc:date>2020-09-18T19:42:22Z</dc:date>
    </item>
    <item>
      <title>Re: Renew external (3rd party) certificate for IPSEC VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/138487#M24664</link>
      <description>&lt;P&gt;This whole thread is full of really great questions.&amp;nbsp; Questions that I have not seen any good answers to from Checkpoint anywhere. The fact that you can't generate a CSR without a CA is beyond bizarre to me and I can't think of any good reason for that.&amp;nbsp; The additional limitations to having more than one certificate to a "CA object" and not being able to have two identical cert chains referenced in different "CAs objects" make it impossible to use two certificates from the same CA using the same cert chain.&lt;/P&gt;&lt;P&gt;Certificate changes are a routine operational task and it should be as simple as generate a CSR (no need for CA cert chain ahead of time) get the CSR signed by 3rd party, upload signed certificate bundle to complete the installation, and then change the reference to the certificate used for whichever service needs a cert change.&amp;nbsp; None of that should be disruptive in any way and when the certificate reference is changed the new public key and certificate get provided for any connections established after that point.&amp;nbsp; Fallback is as simple as changing the reference back to the old certificate.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am blown away at how complicated such a simple task is for Checkpoint to pull off.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 15:20:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Renew-external-3rd-party-certificate-for-IPSEC-VPN/m-p/138487#M24664</guid>
      <dc:creator>dwilliams-dmu</dc:creator>
      <dc:date>2022-01-14T15:20:20Z</dc:date>
    </item>
  </channel>
</rss>

