<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inbound HTTPS Inspection - Importing Certificate in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-Importing-Certificate/m-p/176358#M29359</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/86777"&gt;@Digo11&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;Not sure if you were kidding when you asked for "&lt;SPAN&gt;a way to skip/bypass the private key&amp;nbsp;&lt;/SPAN&gt;"&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;.&lt;/P&gt;
&lt;P&gt;From CKP HTTPS Inspection documentation, we have the below paragraph explaining what is need:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="100%" height="91px"&gt;&lt;SPAN&gt;When a client from outside the organization initiates an HTTPS connection to an internal server, the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;intercepts the traffic. The&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;inspects the inbound traffic and creates a new HTTPS connection from the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_gw variable"&gt;gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;to the internal server. To allow&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_httpsi variable"&gt;HTTPS Inspection&lt;/SPAN&gt;&lt;SPAN&gt;, the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;must use the original server certificate and private key. The&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;uses this certificate and the private key for SSL connections to the internal servers.&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD height="572px"&gt;
&lt;H2&gt;Inbound HTTPS Connections&lt;/H2&gt;
&lt;P&gt;Inbound connections are HTTPS connections that arrive from an external client and connect to a server in the DMZ or the internal network.&lt;/P&gt;
&lt;DIV class="MCDropDown dropDown MCDropDown_Open" data-mc-state="open"&gt;&lt;SPAN class="MCDropDownHead dropDownHead"&gt;&lt;A class="MCDropDownHotSpot dropDownHotspot MCDropDownHotSpot_ MCHotSpotImage" role="button" href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_DataLossPrevention_AdminGuide/Topics-DLPG/Inspecting-HTTPS-Packets.htm?tocpath=Installation%20and%20Configuration%7CConfiguring%20HTTPS%20Inspection%7CInspecting%20HTTPS%20Packets%7C_____0#" aria-expanded="true" aria-controls="mc-dropdown-bodyf02b52c4-cf9f-465f-af69-a77b7fbcf9ee" target="_blank"&gt;Inbound connection flow&lt;/A&gt;&lt;/SPAN&gt;
&lt;DIV id="mc-dropdown-bodyf02b52c4-cf9f-465f-af69-a77b7fbcf9ee" class="MCDropDownBody dropDownBody"&gt;
&lt;OL&gt;
&lt;LI value="1"&gt;
&lt;P&gt;An HTTPS request (from an external client to an internal server) arrives at the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="2"&gt;
&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;inspects the HTTPS request.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="3"&gt;
&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;determines whether the HTTPS request matches an existing&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_httpsi variable"&gt;HTTPS Inspection&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;rule:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;If the HTTPS request does&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;not&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;match a rule, then the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;does not inspect the HTTPS payload.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;If the HTTPS request matches a rule, then the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;continues to the next step.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI value="4"&gt;
&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;uses the certificate for the internal server to create an HTTPS connection with the external client.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="5"&gt;
&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;creates a new HTTPS connection with the internal server.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="6"&gt;
&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;decrypts the HTTPS connection.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="7"&gt;
&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;inspects the decrypted HTTPS connection.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="8"&gt;
&lt;P&gt;If the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_secpol variable"&gt;Security Policy&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;allows this traffic, the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;encrypts the HTTPS connection and sends it to the internal server.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now on your problem, you can't, because when we do INBOUND HTTP Inspection , meaning we decrypt traffic that comes from outside to our DMZ servers, the CKP HAS TO Present itself as the "original server", therefore, in order to do that, the server SSL certificate and the private key, needs to be installed to he can substitute itself into the communication.&lt;/P&gt;
&lt;P&gt;As example:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="100%"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SSL%20Decryption_Fig9" style="width: 624px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/20263iC2FB8D9924D36F85/image-size/large?v=v2&amp;amp;px=999" role="button" title="SSL%20Decryption_Fig9" alt="SSL%20Decryption_Fig9" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hopefully is clearer for you now.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ty,&lt;/P&gt;</description>
    <pubDate>Mon, 27 Mar 2023 19:34:30 GMT</pubDate>
    <dc:creator>Sorin_Gogean</dc:creator>
    <dc:date>2023-03-27T19:34:30Z</dc:date>
    <item>
      <title>Inbound HTTPS Inspection - Importing Certificate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-Importing-Certificate/m-p/176237#M29334</link>
      <description>&lt;P&gt;Hello Experts.&lt;/P&gt;&lt;P&gt;I am trying to perform inbound HTTPS inspection; I do not have any private key password assigned to the certificate (wildcard certificate). While trying to import the internal server certificate for the inbound rules, I cannot import the certificate without providing the password.&lt;/P&gt;&lt;P&gt;Is there a way to skip/bypass the private key password section? It shows an error when I try to skip the password section.&lt;/P&gt;&lt;P&gt;*Note: When I provide the export password of the certificate in the private key password section, it accepts and imports the certificate.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Digo.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 06:42:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-Importing-Certificate/m-p/176237#M29334</guid>
      <dc:creator>Digo11</dc:creator>
      <dc:date>2023-03-27T06:42:55Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inspection - Importing Certificate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-Importing-Certificate/m-p/176358#M29359</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/86777"&gt;@Digo11&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;Not sure if you were kidding when you asked for "&lt;SPAN&gt;a way to skip/bypass the private key&amp;nbsp;&lt;/SPAN&gt;"&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;.&lt;/P&gt;
&lt;P&gt;From CKP HTTPS Inspection documentation, we have the below paragraph explaining what is need:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="100%" height="91px"&gt;&lt;SPAN&gt;When a client from outside the organization initiates an HTTPS connection to an internal server, the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;intercepts the traffic. The&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;inspects the inbound traffic and creates a new HTTPS connection from the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_gw variable"&gt;gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;to the internal server. To allow&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_httpsi variable"&gt;HTTPS Inspection&lt;/SPAN&gt;&lt;SPAN&gt;, the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;must use the original server certificate and private key. The&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;uses this certificate and the private key for SSL connections to the internal servers.&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD height="572px"&gt;
&lt;H2&gt;Inbound HTTPS Connections&lt;/H2&gt;
&lt;P&gt;Inbound connections are HTTPS connections that arrive from an external client and connect to a server in the DMZ or the internal network.&lt;/P&gt;
&lt;DIV class="MCDropDown dropDown MCDropDown_Open" data-mc-state="open"&gt;&lt;SPAN class="MCDropDownHead dropDownHead"&gt;&lt;A class="MCDropDownHotSpot dropDownHotspot MCDropDownHotSpot_ MCHotSpotImage" role="button" href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_DataLossPrevention_AdminGuide/Topics-DLPG/Inspecting-HTTPS-Packets.htm?tocpath=Installation%20and%20Configuration%7CConfiguring%20HTTPS%20Inspection%7CInspecting%20HTTPS%20Packets%7C_____0#" aria-expanded="true" aria-controls="mc-dropdown-bodyf02b52c4-cf9f-465f-af69-a77b7fbcf9ee" target="_blank"&gt;Inbound connection flow&lt;/A&gt;&lt;/SPAN&gt;
&lt;DIV id="mc-dropdown-bodyf02b52c4-cf9f-465f-af69-a77b7fbcf9ee" class="MCDropDownBody dropDownBody"&gt;
&lt;OL&gt;
&lt;LI value="1"&gt;
&lt;P&gt;An HTTPS request (from an external client to an internal server) arrives at the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="2"&gt;
&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;inspects the HTTPS request.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="3"&gt;
&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;determines whether the HTTPS request matches an existing&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_httpsi variable"&gt;HTTPS Inspection&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;rule:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;If the HTTPS request does&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;not&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;match a rule, then the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;does not inspect the HTTPS payload.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;If the HTTPS request matches a rule, then the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;continues to the next step.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI value="4"&gt;
&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;uses the certificate for the internal server to create an HTTPS connection with the external client.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="5"&gt;
&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;creates a new HTTPS connection with the internal server.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="6"&gt;
&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;decrypts the HTTPS connection.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="7"&gt;
&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;inspects the decrypted HTTPS connection.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="8"&gt;
&lt;P&gt;If the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_secpol variable"&gt;Security Policy&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;allows this traffic, the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;encrypts the HTTPS connection and sends it to the internal server.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now on your problem, you can't, because when we do INBOUND HTTP Inspection , meaning we decrypt traffic that comes from outside to our DMZ servers, the CKP HAS TO Present itself as the "original server", therefore, in order to do that, the server SSL certificate and the private key, needs to be installed to he can substitute itself into the communication.&lt;/P&gt;
&lt;P&gt;As example:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="100%"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SSL%20Decryption_Fig9" style="width: 624px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/20263iC2FB8D9924D36F85/image-size/large?v=v2&amp;amp;px=999" role="button" title="SSL%20Decryption_Fig9" alt="SSL%20Decryption_Fig9" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hopefully is clearer for you now.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ty,&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 19:34:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-Importing-Certificate/m-p/176358#M29359</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2023-03-27T19:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inspection - Importing Certificate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-Importing-Certificate/m-p/176366#M29364</link>
      <description>&lt;P&gt;What&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/16983"&gt;@Sorin_Gogean&lt;/a&gt;&amp;nbsp;gave pretty much explains it all. Sadly, there is NO way to skip private key portion, thats the whole point actually of this process, otherwise, it would not be secure.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 22:51:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-Importing-Certificate/m-p/176366#M29364</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-27T22:51:06Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inspection - Importing Certificate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-Importing-Certificate/m-p/176462#M29376</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Sorin_Gogean,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Good day!!&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Thanks a lot for explaining the connection flow. Somehow, I was able to import the certificate by entering the "export" password that I had created at the time of exporting the certificate. I had to convert the certificate to .P12 format as it was originally in .PEM format.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;I used the certificate for inbound inspection and the traffic is getting inspected as seen in the logs. I will check further and post here if assistance is required.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Thanks!!&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 16:07:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-Importing-Certificate/m-p/176462#M29376</guid>
      <dc:creator>Digo11</dc:creator>
      <dc:date>2023-03-28T16:07:51Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inspection - Importing Certificate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-Importing-Certificate/m-p/176465#M29377</link>
      <description>&lt;P&gt;Good job! &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 16:42:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-Importing-Certificate/m-p/176465#M29377</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-28T16:42:09Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inspection - Importing Certificate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-Importing-Certificate/m-p/176467#M29378</link>
      <description>&lt;P&gt;Here is also a very good reference doc for you. This was given to me by TAC couple of years back, but it explains inspection very well.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 16:47:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-Importing-Certificate/m-p/176467#M29378</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-28T16:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inspection - Importing Certificate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-Importing-Certificate/m-p/176478#M29379</link>
      <description>&lt;P&gt;Glad it helped&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/86777"&gt;@Digo11&lt;/a&gt;&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 18:37:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-Importing-Certificate/m-p/176478#M29379</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2023-03-28T18:37:05Z</dc:date>
    </item>
  </channel>
</rss>

