<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: https Inspection in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4143#M307</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Thomas, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm facing the same issue as you.&lt;/P&gt;&lt;P&gt;I was looking for the same solution.&lt;/P&gt;&lt;P&gt;Generating CSR, get a Signed CRT from a CA already known by clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The point is, no article/sk even mention that option.&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/101685.htm" title="https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/101685.htm"&gt;Using Threat Prevention with HTTPS Traffic&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the Documentation, it's mention how to generate the CA certificate and how to deploy.&lt;BR /&gt;&lt;SPAN class=""&gt;&lt;A _jive_internal="true" class="" data-userid="2075" data-username="dwelccfe6e688-522c-305c-adaa-194bd7a7becc" href="https://community.checkpoint.com/people/dwelccfe6e688-522c-305c-adaa-194bd7a7becc"&gt;Dameon Welch Abernathy&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;A _jive_internal="true" class="" data-userid="2075" data-username="dwelccfe6e688-522c-305c-adaa-194bd7a7becc" href="https://community.checkpoint.com/people/dwelccfe6e688-522c-305c-adaa-194bd7a7becc"&gt;Dameon Welch Abernathy&lt;/A&gt;&lt;/SPAN&gt; is right. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For that https inspection features, we need to CA feature and key, because we need to resign cert. A simple CRT is not enought for doing the job. &lt;BR /&gt;If an organization is providing your the sub CA key for the CheckPoint features, they could lose they CA aggrement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope my clarification about Dameon's answer have clarified the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;Anthony Joubaire&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 21 Jul 2017 16:55:44 GMT</pubDate>
    <dc:creator>Anthony_Joubai1</dc:creator>
    <dc:date>2017-07-21T16:55:44Z</dc:date>
    <item>
      <title>https Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4139#M303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Folks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we are trying to do Https inspection on firewall , created CSR from firewall and got signed from 3rd party root CA.&lt;/P&gt;&lt;P&gt;but still https logs shows that client doent&amp;nbsp;have root ca installed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In client browser the 3rd party root ca is already there in trusted root ca .&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do we need to import the&amp;nbsp;certificate on client&amp;nbsp;?&lt;/P&gt;&lt;P&gt;as per my understanding if the CSR is signed from 3rd party trusted root CA then there is no need to import the certificate on client as the client already have the root ca in browser store.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Jul 2017 14:41:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4139#M303</guid>
      <dc:creator>Libin_Thomas</dc:creator>
      <dc:date>2017-07-17T14:41:19Z</dc:date>
    </item>
    <item>
      <title>Re: https Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4140#M304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the firewall itself needs to be the root ca (or sub ca), and all your clients need to trust this root ca (or sub ca) certificate of your firewall.&lt;/P&gt;&lt;P&gt;You won't get a ca certificate from a 3rd party provider.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Jul 2017 14:48:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4140#M304</guid>
      <dc:creator>cstueckrath</dc:creator>
      <dc:date>2017-07-17T14:48:37Z</dc:date>
    </item>
    <item>
      <title>Re: https Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4141#M305</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your firewall will need a certificate authority key that is able to generate a certificate for any site a user tries to access.&lt;/P&gt;&lt;P&gt;It can either be the one that is created through SmartConsole or a sub-CA created through your enterprise CA.&lt;/P&gt;&lt;P&gt;No globally trusted certificate authority will grant you a CA key for this purpose--it's against the terms of service.&lt;/P&gt;&lt;P&gt;The relevant CA key must be configured as "trusted" in your end users browsers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Jul 2017 16:50:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4141#M305</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-07-17T16:50:11Z</dc:date>
    </item>
    <item>
      <title>Re: https Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4142#M306</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #2a2e2e;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #2a2e2e;"&gt;To avoid installing a certificate on every browser, we need to generate a CSR from thecheckpoint &amp;nbsp;and have it signed by a third-party, trusted CA that most major browsers will recognize and accept without a warning automatically.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #2a2e2e;"&gt;this is what i am trying to do , after this step also we are seeing the certificate error from the client side&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jul 2017 18:18:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4142#M306</guid>
      <dc:creator>Libin_Thomas</dc:creator>
      <dc:date>2017-07-18T18:18:06Z</dc:date>
    </item>
    <item>
      <title>Re: https Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4143#M307</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Thomas, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm facing the same issue as you.&lt;/P&gt;&lt;P&gt;I was looking for the same solution.&lt;/P&gt;&lt;P&gt;Generating CSR, get a Signed CRT from a CA already known by clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The point is, no article/sk even mention that option.&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/101685.htm" title="https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/101685.htm"&gt;Using Threat Prevention with HTTPS Traffic&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the Documentation, it's mention how to generate the CA certificate and how to deploy.&lt;BR /&gt;&lt;SPAN class=""&gt;&lt;A _jive_internal="true" class="" data-userid="2075" data-username="dwelccfe6e688-522c-305c-adaa-194bd7a7becc" href="https://community.checkpoint.com/people/dwelccfe6e688-522c-305c-adaa-194bd7a7becc"&gt;Dameon Welch Abernathy&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;A _jive_internal="true" class="" data-userid="2075" data-username="dwelccfe6e688-522c-305c-adaa-194bd7a7becc" href="https://community.checkpoint.com/people/dwelccfe6e688-522c-305c-adaa-194bd7a7becc"&gt;Dameon Welch Abernathy&lt;/A&gt;&lt;/SPAN&gt; is right. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For that https inspection features, we need to CA feature and key, because we need to resign cert. A simple CRT is not enought for doing the job. &lt;BR /&gt;If an organization is providing your the sub CA key for the CheckPoint features, they could lose they CA aggrement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope my clarification about Dameon's answer have clarified the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;Anthony Joubaire&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jul 2017 16:55:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4143#M307</guid>
      <dc:creator>Anthony_Joubai1</dc:creator>
      <dc:date>2017-07-21T16:55:44Z</dc:date>
    </item>
    <item>
      <title>Re: https Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4144#M308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How I &amp;nbsp;solved this for some of our customers where like this:&lt;/P&gt;&lt;P&gt;- The customer(s) either had a&amp;nbsp;multi-tier PKI solution for their Active Directory domain or we offered to install one for them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;As part of the PKI solution the customers AD CS install would have an offline Root CA (ORCA) and an Enterprise Intermediate Sub CA (EICA). The offline root (ORCA) was injected into active directory and would be trusted by all clients. We then use the following setup for creating a new "intermediate CA" signed by the EICA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- on a machine with openssl create the following conf file.&lt;/P&gt;&lt;P&gt;r80.10_httpsi_sub_ca.conf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;# OpenSSL intermediate CA configuration file.&lt;BR /&gt;# Copy to `/root/ca/intermediate/openssl.cnf`.&lt;/P&gt;&lt;P&gt;[ ca ]&lt;BR /&gt;# `man ca`&lt;BR /&gt;default_ca = CA_default&lt;/P&gt;&lt;P&gt;[ CA_default ]&lt;BR /&gt;# Directory and file locations.&lt;BR /&gt;dir = ./intermediate&lt;BR /&gt;certs = $dir/certs&lt;BR /&gt;crl_dir = $dir/crl&lt;BR /&gt;new_certs_dir = $dir/newcerts&lt;BR /&gt;database = $dir/index.txt&lt;BR /&gt;serial = $dir/serial&lt;BR /&gt;RANDFILE = $dir/private/.rand&lt;/P&gt;&lt;P&gt;# The root key and root certificate.&lt;BR /&gt;private_key = $dir/private/intermediate.key.pem&lt;BR /&gt;certificate = $dir/certs/intermediate.cert.pem&lt;/P&gt;&lt;P&gt;# For certificate revocation lists.&lt;BR /&gt;crlnumber = $dir/crlnumber&lt;BR /&gt;crl = $dir/crl/intermediate.crl.pem&lt;BR /&gt;crl_extensions = crl_ext&lt;BR /&gt;default_crl_days = 30&lt;/P&gt;&lt;P&gt;# SHA-1 is deprecated, so use SHA-2 instead.&lt;BR /&gt;default_md = sha256&lt;/P&gt;&lt;P&gt;name_opt = ca_default&lt;BR /&gt;cert_opt = ca_default&lt;BR /&gt;default_days = 375&lt;BR /&gt;preserve = no&lt;BR /&gt;policy = policy_loose&lt;/P&gt;&lt;P&gt;[ policy_strict ]&lt;BR /&gt;# The root CA should only sign intermediate certificates that match.&lt;BR /&gt;# See the POLICY FORMAT section of `man ca`.&lt;BR /&gt;countryName = match&lt;BR /&gt;stateOrProvinceName = match&lt;BR /&gt;organizationName = match&lt;BR /&gt;organizationalUnitName = optional&lt;BR /&gt;commonName = supplied&lt;BR /&gt;emailAddress = optional&lt;/P&gt;&lt;P&gt;[ policy_loose ]&lt;BR /&gt;# Allow the intermediate CA to sign a more diverse range of certificates.&lt;BR /&gt;# See the POLICY FORMAT section of the `ca` man page.&lt;BR /&gt;countryName = optional&lt;BR /&gt;stateOrProvinceName = optional&lt;BR /&gt;localityName = optional&lt;BR /&gt;organizationName = optional&lt;BR /&gt;organizationalUnitName = optional&lt;BR /&gt;commonName = supplied&lt;BR /&gt;emailAddress = optional&lt;/P&gt;&lt;P&gt;[ req ]&lt;BR /&gt;# Options for the `req` tool (`man req`).&lt;BR /&gt;default_bits = 2048&lt;BR /&gt;distinguished_name = req_distinguished_name&lt;BR /&gt;string_mask = utf8only&lt;/P&gt;&lt;P&gt;# SHA-1 is deprecated, so use SHA-2 instead.&lt;BR /&gt;default_md = sha256&lt;/P&gt;&lt;P&gt;# Extension to add when the -x509 option is used.&lt;BR /&gt;x509_extensions = v3_ca&lt;/P&gt;&lt;P&gt;[ req_distinguished_name ]&lt;BR /&gt;&lt;SPAN&gt;# See &amp;lt;&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://en.wikipedia.org/wiki/Certificate_signing_request" rel="nofollow"&gt;https://en.wikipedia.org/wiki/Certificate_signing_request&lt;/A&gt;&lt;SPAN&gt;&amp;gt;.&lt;/SPAN&gt;&lt;BR /&gt;countryName = Country Name (2 letter code)&lt;BR /&gt;stateOrProvinceName = State or Province Name&lt;BR /&gt;localityName = Locality Name&lt;BR /&gt;0.organizationName = Organization Name&lt;BR /&gt;organizationalUnitName = Organizational Unit Name&lt;BR /&gt;commonName = Common Name&lt;BR /&gt;emailAddress = Email Address&lt;/P&gt;&lt;P&gt;# Optionally, specify some defaults.&lt;BR /&gt;countryName_default = GB&lt;BR /&gt;stateOrProvinceName_default = England&lt;BR /&gt;localityName_default =&lt;BR /&gt;0.organizationName_default = Alice Ltd&lt;BR /&gt;organizationalUnitName_default =&lt;BR /&gt;emailAddress_default =&lt;/P&gt;&lt;P&gt;[ v3_ca ]&lt;BR /&gt;# Extensions for a typical CA (`man x509v3_config`).&lt;BR /&gt;subjectKeyIdentifier = hash&lt;BR /&gt;authorityKeyIdentifier = keyid:always,issuer&lt;BR /&gt;basicConstraints = critical, CA:true&lt;BR /&gt;keyUsage = critical, digitalSignature, cRLSign, keyCertSign&lt;/P&gt;&lt;P&gt;[ v3_intermediate_ca ]&lt;BR /&gt;# Extensions for a typical intermediate CA (`man x509v3_config`).&lt;BR /&gt;subjectKeyIdentifier = hash&lt;BR /&gt;authorityKeyIdentifier = keyid:always,issuer&lt;BR /&gt;basicConstraints = critical, CA:true, pathlen:0&lt;BR /&gt;keyUsage = critical, digitalSignature, cRLSign, keyCertSign&lt;/P&gt;&lt;P&gt;[ usr_cert ]&lt;BR /&gt;# Extensions for client certificates (`man x509v3_config`).&lt;BR /&gt;basicConstraints = CA:FALSE&lt;BR /&gt;nsCertType = client, email&lt;BR /&gt;nsComment = "OpenSSL Generated Client Certificate"&lt;BR /&gt;subjectKeyIdentifier = hash&lt;BR /&gt;authorityKeyIdentifier = keyid,issuer&lt;BR /&gt;keyUsage = critical, nonRepudiation, digitalSignature, keyEncipherment&lt;BR /&gt;extendedKeyUsage = clientAuth, emailProtection&lt;/P&gt;&lt;P&gt;[ server_cert ]&lt;BR /&gt;# Extensions for server certificates (`man x509v3_config`).&lt;BR /&gt;basicConstraints = CA:FALSE&lt;BR /&gt;nsCertType = server&lt;BR /&gt;nsComment = "OpenSSL Generated Server Certificate"&lt;BR /&gt;subjectKeyIdentifier = hash&lt;BR /&gt;authorityKeyIdentifier = keyid,issuer:always&lt;BR /&gt;keyUsage = critical, digitalSignature, keyEncipherment&lt;BR /&gt;extendedKeyUsage = serverAuth&lt;/P&gt;&lt;P&gt;[ crl_ext ]&lt;BR /&gt;# Extension for CRLs (`man x509v3_config`).&lt;BR /&gt;authorityKeyIdentifier=keyid:always&lt;/P&gt;&lt;P&gt;[ ocsp ]&lt;BR /&gt;# Extension for OCSP signing certificates (`man ocsp`).&lt;BR /&gt;basicConstraints = CA:FALSE&lt;BR /&gt;subjectKeyIdentifier = hash&lt;BR /&gt;authorityKeyIdentifier = keyid,issuer&lt;BR /&gt;keyUsage = critical, digitalSignature&lt;BR /&gt;extendedKeyUsage = critical, OCSPSigning&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Run the following commands to create the Intermediate SUB CA for HTTPSI&lt;/P&gt;&lt;P&gt;openssl genrsa -aes256 -out r80.10gw_httpsi_sub_ca_intermediate.key.pem 4096&lt;BR /&gt;openssl req -config r80.10_httpsi_sub_ca.conf&amp;nbsp;-new -sha256 \&lt;BR /&gt; -key r80.10gw_httpsi_sub_ca_intermediate.key.pem \&lt;BR /&gt; -out r80.10gw_httpsi_sub_ca.intermediate.csr.pem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take the CSR to the AD EICA and sign the certificate. Take the signed cert file back - and create a P12 with OpenSSL and import &amp;nbsp;that P12 into your Check Point configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For enterprise/company users - the signing sub CA is trusted by default&lt;/P&gt;&lt;P&gt;For guest users - redirect them to a page which tells them how to download, install and trust the CRT file&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Arnvid&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Aug 2017 21:48:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4144#M308</guid>
      <dc:creator>Arnvid_Karstad</dc:creator>
      <dc:date>2017-08-05T21:48:29Z</dc:date>
    </item>
    <item>
      <title>Re: https Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4145#M309</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I edited the configuration file part of the openssl command as my local file was named slightly differently than the one I used as example &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Aug 2017 21:54:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4145#M309</guid>
      <dc:creator>Arnvid_Karstad</dc:creator>
      <dc:date>2017-08-05T21:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: https Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4146#M310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;While I agree your approach would work for employees of a given company, a typical user of&amp;nbsp;guest WiFi is unlikely to go through the trouble of installing and trusting a third party CA certificate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Aug 2017 21:56:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4146#M310</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-08-05T21:56:13Z</dc:date>
    </item>
    <item>
      <title>Re: https Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4147#M311</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In most of these installations the installation is running heavy on Application Control, DLP and now DA - and there's been very little resistance from guests to install the 3rd party CA. There are however mobile only "guest" wireless access in some cases - and there there is no https-inspection either. &amp;nbsp;One of these installation protect&amp;nbsp;users from about&amp;nbsp;20 different countries with different legal issues to handle.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Aug 2017 22:06:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4147#M311</guid>
      <dc:creator>Arnvid_Karstad</dc:creator>
      <dc:date>2017-08-05T22:06:12Z</dc:date>
    </item>
    <item>
      <title>Re: https Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4148#M312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is it possible that we push the certificate using the group policy from the AD group. does it work for the the organization clients? .&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Aug 2017 03:43:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4148#M312</guid>
      <dc:creator>Sagar_Manandhar</dc:creator>
      <dc:date>2017-08-06T03:43:24Z</dc:date>
    </item>
    <item>
      <title>Re: https Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4149#M313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's one of the approaches we recommend--using GPO to push the certificate authority.&lt;/P&gt;&lt;P&gt;Keep in mind this will only work for the key store in Windows&amp;nbsp;and will not work for certificate stores that might exist in other applications (e.g. Firefox, Java).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Aug 2017 04:02:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4149#M313</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-08-06T04:02:09Z</dc:date>
    </item>
    <item>
      <title>Re: https Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4150#M314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The way to distribute a new CA through AD is like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;certutil -dspublish -f "pkiorca_Root CA.crt" RootCA&lt;/P&gt;&lt;P&gt;certutil –dspublish -f "&lt;SPAN&gt;pkiorca_Root CA&lt;/SPAN&gt;crl"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how you automatically enroll it&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also like this:&lt;/P&gt;&lt;P&gt;In the DC, Start -&amp;gt; Administrative Tools -&amp;gt; Group Policy Management. From the left pane, expand the forest name -&amp;gt; expand Domains -&amp;gt; expand the relevant domain name -&amp;gt; right click on “Default domain policy” -&amp;gt; Edit. From the left pane, under “Computer Configuration” -&amp;gt; expand Policies -&amp;gt; expand “Windows Settings” -&amp;gt; expand “Security Settings” -&amp;gt; expand “Public Key Policies” -&amp;gt; right click on “Trusted Root Certification Authorities” -&amp;gt; Import -&amp;gt; click Next -&amp;gt; click Browse to locate the CRT file from the Root CA (C:\Windows\System32\CertSrv\CertEnroll) -&amp;gt; click Open -&amp;gt; click Next twice -&amp;gt; click Finish -&amp;gt; click OK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you do not need to distribute the intermediate encryption CA to any clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is part of implementing an PKI solution in your organization.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Aug 2017 08:05:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4150#M314</guid>
      <dc:creator>Arnvid_Karstad</dc:creator>
      <dc:date>2017-08-06T08:05:55Z</dc:date>
    </item>
    <item>
      <title>Re: https Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4151#M315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Easiest way to achieve this is to download the certificate from the gateway and install it into the System Roots certificate store on each PC or deploy it out through GPO in AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Firefox and Java (and maybe Chrome) you'll need to install the certificate into their certificate stores.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On macOS, import the certificate into the System keychain and update the trust settings to Always Trust. &amp;nbsp;Restart Safari or Chrome if you had them open when you did this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember also that if you're using HTTPS Inspection on a system that is also using SandBlast Mobile, you'll need to import the certificate into your SandBlast Mobile admin dashboard otherwise you'll be plagued with alerts for MITM attacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;S&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Aug 2017 16:33:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4151#M315</guid>
      <dc:creator>Stuart_Green</dc:creator>
      <dc:date>2017-08-10T16:33:58Z</dc:date>
    </item>
    <item>
      <title>Re: https Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4152#M316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/42195"&gt;Arnvid Karstad&lt;/A&gt;‌ you are a lifesaver!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check Point does not have a publicly accessible resource where it explains how to create the CSR and how to convert, import the certificates if you do want to do your SSL inspection with third party CA/SubCA. For a fact i know there is an internal document circulating within the SE community but there is no SK published.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After many tries and errors i did use your conf and managed to make everything work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just to point out the last steps missing from the original post:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #333333;"&gt;&lt;EM&gt;"Take the CSR to the AD EICA and sign the certificate. "&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Once you have the CSR you need to go to &lt;A href="https://&amp;lt;IP_OF_CA&amp;gt;/certsrv"&gt;https://&amp;lt;IP_OF_CA&amp;gt;/certsrv&lt;/A&gt;&amp;nbsp;and Request a certificate then "sumit advanced request"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/76334_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And pick the Template for Subordinate CA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this is generated export the Base64 encoded version and move it to the CP Gateway.&lt;/P&gt;&lt;P&gt;Also go back to the&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://%3Cip_of_ca%3E/certsrv" style="color: #2989c5; text-decoration: none;"&gt;https://&amp;lt;IP_OF_CA&amp;gt;/certsrv&lt;/A&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&amp;nbsp; and also ask to export the Base64 version of the public CA "Download a CA" and select "Download CA Certificate Chain".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Take both exported &lt;STRONG&gt;SubCA.p7b&lt;/STRONG&gt; and CA Public cert and move them to the Security Gateway.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;You need to issue the commands (notice it's &lt;STRONG&gt;cpopenssl&lt;/STRONG&gt; and not &lt;STRONG&gt;openssl&lt;/STRONG&gt;) in order to convert the certificate to the expected format (this is taken from &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk69660"&gt;sk69660&lt;/A&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#&lt;STRONG&gt;cpopenssl&lt;/STRONG&gt; pkcs7 -print_certs -in &amp;lt;&lt;SPAN style="color: #333333;"&gt;&lt;STRONG&gt;SubCA.p7b&amp;gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&amp;nbsp;-out &lt;STRONG&gt;&amp;lt;subCA.cer&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN style="color: #3d3d3d;"&gt;&amp;lt;&lt;/SPAN&gt;&lt;SPAN style="color: #333333;"&gt;&lt;STRONG&gt;SubCA.p7b&amp;gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #3d3d3d;"&gt;&amp;nbsp;&lt;STRONG&gt; --&amp;gt; exported as base64 from the CA&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;STRONG style="color: #3d3d3d;"&gt;&lt;STRONG&gt;&amp;lt;subCA.cer&amp;gt; --&amp;gt; the actual file you will use in the below command, now converted to correct format&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Then proceed with the step mentioned in the original post:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #333333;"&gt;&lt;EM&gt;"and create a P12 with OpenSSL and import &amp;nbsp;that P12 into your Check Point configuration."&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;#&lt;STRONG&gt;cpopenssl&lt;/STRONG&gt; pkcs12 -export -in &lt;STRONG&gt;&amp;lt;subCA.cer&amp;gt;&lt;/STRONG&gt; -inkey&amp;nbsp;&lt;STRONG&gt;&amp;lt;csr_key.key&amp;gt;&lt;/STRONG&gt; -certfile&amp;nbsp;&lt;STRONG&gt;&amp;lt;public_CA.cer&amp;gt;&lt;/STRONG&gt; -out &lt;STRONG&gt;&amp;lt;final_subCA_for_GW.p12&amp;gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&amp;lt;subCA.cer&amp;gt; -- exported after sign request and converted according to the previous instruction&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;lt;csr_key.key&amp;gt; -- keyfile generated with the CSR&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;lt;csr_key.key&amp;gt; -- exported public CA&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;lt;final_subCA_for_GW.p12&amp;gt; -- the actual certificate that is to be imported to the Security Gateway Smart Console&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2018 14:06:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4152#M316</guid>
      <dc:creator>cezar_varlan1</dc:creator>
      <dc:date>2018-12-12T14:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: https Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4153#M317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/43515"&gt;Cezar Varlan&lt;/A&gt;‌&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason for using openssl vs cpopenssl is that I did everything on a different Linux server (not Gaia) - and imported it that way. You are correct that the procedure on Gaia would need cpopenssl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Personally I would hope the procedure could make it into an SK for everyone to easily find when searching as I too had a few trial and errors to get this to work properly.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This documentation was made after doing a few 2 tier and 3 tier PKI implementations for customers - a few things became a bit more clear to me in terms of what is a good way to create and distribute these intermediate signing CA authorities.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Arnvid&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2018 14:14:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/https-Inspection/m-p/4153#M317</guid>
      <dc:creator>Arnvid_Karstad</dc:creator>
      <dc:date>2018-12-12T14:14:12Z</dc:date>
    </item>
  </channel>
</rss>

