<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Peer certificate verification failed after certificate replacement in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Peer-certificate-verification-failed-after-certificate/m-p/255332#M42908</link>
    <description>&lt;P&gt;You need to fetch the CERT Fingerprint from the subscriber via&amp;nbsp;&lt;SPAN&gt;$FWDIR/bin/BrokerCertFetcher &amp;lt;&lt;/SPAN&gt;&lt;EM&gt;IP Address of Subscriber&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it is all described here:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/Topics-IDAG/Identity-Broker-Configuration.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/Topics-IDAG/Identity-Broker-Configuration.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you probably will face the Problem on your other PDP Broker as well, when they will check the cert again. Before you fetch the new cert via the mentioned command delete the old .pem&lt;/P&gt;&lt;P&gt;You want to do the whole cert replacement process during a maintenace Window to restart the pdp process the make sure, the other Brokers accept the new cert fingerprint.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;best regards&lt;/P&gt;</description>
    <pubDate>Mon, 18 Aug 2025 13:26:22 GMT</pubDate>
    <dc:creator>ProxyOps</dc:creator>
    <dc:date>2025-08-18T13:26:22Z</dc:date>
    <item>
      <title>Peer certificate verification failed after certificate replacement</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Peer-certificate-verification-failed-after-certificate/m-p/255324#M42902</link>
      <description>&lt;P&gt;Dear Mates,&lt;/P&gt;
&lt;P&gt;After replacing the certificate on one Identity Broker cluster and checking the status on the others, all peers show as Connected except for one specific site.&lt;/P&gt;
&lt;P&gt;On that site, after the certificate replacement, the command&lt;/P&gt;
&lt;P&gt;pdp broker status -e&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;shows Peer certificate verification failed.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 12:02:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Peer-certificate-verification-failed-after-certificate/m-p/255324#M42902</guid>
      <dc:creator>RemoteUser</dc:creator>
      <dc:date>2025-08-18T12:02:36Z</dc:date>
    </item>
    <item>
      <title>Re: Peer certificate verification failed after certificate replacement</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Peer-certificate-verification-failed-after-certificate/m-p/255325#M42903</link>
      <description>&lt;P&gt;Hey bro,&lt;/P&gt;
&lt;P&gt;I ran this through chatgpt (for what is worth) and it gave some things that to me, at least, make sense.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;*************&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 data-start="334" data-end="354"&gt;&lt;span class="lia-unicode-emoji" title=":magnifying_glass_tilted_right:"&gt;🔎&lt;/span&gt; Common Causes&lt;/H3&gt;
&lt;OL data-start="355" data-end="967"&gt;
&lt;LI data-start="355" data-end="518"&gt;
&lt;P data-start="358" data-end="384"&gt;&lt;STRONG data-start="358" data-end="384"&gt;Mismatched trust chain&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="388" data-end="518"&gt;
&lt;LI data-start="388" data-end="469"&gt;
&lt;P data-start="390" data-end="469"&gt;The certificate presented by the peer is not signed by a CA trusted by the PDP.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="473" data-end="518"&gt;
&lt;P data-start="475" data-end="518"&gt;Intermediate CA certs missing in the chain.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI data-start="520" data-end="587"&gt;
&lt;P data-start="523" data-end="546"&gt;&lt;STRONG data-start="523" data-end="546"&gt;Expired certificate&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="550" data-end="587"&gt;
&lt;LI data-start="550" data-end="587"&gt;
&lt;P data-start="552" data-end="587"&gt;The peer’s certificate has expired.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI data-start="589" data-end="730"&gt;
&lt;P data-start="592" data-end="608"&gt;&lt;STRONG data-start="592" data-end="608"&gt;Wrong CN/SAN&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="612" data-end="730"&gt;
&lt;LI data-start="612" data-end="730"&gt;
&lt;P data-start="614" data-end="730"&gt;The peer certificate’s Common Name (CN) or Subject Alternative Name (SAN) does not match the expected hostname/FQDN.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI data-start="732" data-end="812"&gt;
&lt;P data-start="735" data-end="764"&gt;&lt;STRONG data-start="735" data-end="764"&gt;Certificate not yet valid&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="768" data-end="812"&gt;
&lt;LI data-start="768" data-end="812"&gt;
&lt;P data-start="770" data-end="812"&gt;Time/date mismatch on one of the machines.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI data-start="814" data-end="967"&gt;
&lt;P data-start="817" data-end="856"&gt;&lt;STRONG data-start="817" data-end="856"&gt;Not installed in proper trust store&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="860" data-end="967"&gt;
&lt;LI data-start="860" data-end="967"&gt;
&lt;P data-start="862" data-end="967"&gt;The CA or peer certificate isn’t properly imported into the PDP’s trust store (e.g., &lt;CODE data-start="947" data-end="965"&gt;$FWDIR/conf/pdp/&lt;/CODE&gt;).&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;HR data-start="969" data-end="972" /&gt;
&lt;H3 data-start="974" data-end="1000"&gt;&lt;span class="lia-unicode-emoji" title=":hammer_and_wrench:"&gt;🛠&lt;/span&gt; How to Troubleshoot&lt;/H3&gt;
&lt;OL data-start="1001" data-end="1748"&gt;
&lt;LI data-start="1001" data-end="1175"&gt;
&lt;P data-start="1004" data-end="1038"&gt;&lt;STRONG data-start="1004" data-end="1038"&gt;Check the certificate directly&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary"&gt;
&lt;DIV class="sticky top-9"&gt;
&lt;DIV class="absolute end-0 bottom-0 flex h-9 items-center pe-2"&gt;
&lt;DIV class="bg-token-bg-elevated-secondary text-token-text-secondary flex items-center gap-4 rounded-sm px-2 font-sans text-xs"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="overflow-y-auto p-4" dir="ltr"&gt;&lt;CODE class="whitespace-pre! language-bash"&gt;&lt;SPAN&gt;pdp broker status -v
&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P data-start="1084" data-end="1175"&gt;(verbose output should show more details about which certificate it is failing to validate)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1177" data-end="1283"&gt;
&lt;P data-start="1180" data-end="1200"&gt;&lt;STRONG data-start="1180" data-end="1200"&gt;Verify date/time&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary"&gt;
&lt;DIV class="sticky top-9"&gt;
&lt;DIV class="absolute end-0 bottom-0 flex h-9 items-center pe-2"&gt;
&lt;DIV class="bg-token-bg-elevated-secondary text-token-text-secondary flex items-center gap-4 rounded-sm px-2 font-sans text-xs"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="overflow-y-auto p-4" dir="ltr"&gt;&lt;CODE class="whitespace-pre! language-bash"&gt;&lt;SPAN&gt;&lt;SPAN class="hljs-built_in"&gt;date&lt;/SPAN&gt;
&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P data-start="1230" data-end="1283"&gt;Ensure both machines (PEP/PDP) have correct NTP sync.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1285" data-end="1391"&gt;
&lt;P data-start="1288" data-end="1308"&gt;&lt;STRONG data-start="1288" data-end="1308"&gt;List trusted CAs&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary"&gt;
&lt;DIV class="sticky top-9"&gt;
&lt;DIV class="absolute end-0 bottom-0 flex h-9 items-center pe-2"&gt;
&lt;DIV class="bg-token-bg-elevated-secondary text-token-text-secondary flex items-center gap-4 rounded-sm px-2 font-sans text-xs"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="overflow-y-auto p-4" dir="ltr"&gt;&lt;CODE class="whitespace-pre! language-bash"&gt;&lt;SPAN&gt;pdp broker trust list
&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P data-start="1355" data-end="1391"&gt;Make sure the issuing CA is present.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1393" data-end="1619"&gt;
&lt;P data-start="1396" data-end="1427"&gt;&lt;STRONG data-start="1396" data-end="1427"&gt;Reimport the CA certificate&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="1431" data-end="1619"&gt;
&lt;LI data-start="1431" data-end="1546"&gt;
&lt;P data-start="1433" data-end="1483"&gt;If missing, import the peer’s CA certificate with:&lt;/P&gt;
&lt;DIV class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary"&gt;
&lt;DIV class="sticky top-9"&gt;
&lt;DIV class="absolute end-0 bottom-0 flex h-9 items-center pe-2"&gt;
&lt;DIV class="bg-token-bg-elevated-secondary text-token-text-secondary flex items-center gap-4 rounded-sm px-2 font-sans text-xs"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="overflow-y-auto p-4" dir="ltr"&gt;&lt;CODE class="whitespace-pre! language-bash"&gt;&lt;SPAN&gt;pdp broker trust add &amp;lt;CA_cert_file&amp;gt;
&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI data-start="1550" data-end="1619"&gt;
&lt;P data-start="1552" data-end="1571"&gt;Then re-check with:&lt;/P&gt;
&lt;DIV class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary"&gt;
&lt;DIV class="sticky top-9"&gt;
&lt;DIV class="absolute end-0 bottom-0 flex h-9 items-center pe-2"&gt;
&lt;DIV class="bg-token-bg-elevated-secondary text-token-text-secondary flex items-center gap-4 rounded-sm px-2 font-sans text-xs"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="overflow-y-auto p-4" dir="ltr"&gt;&lt;CODE class="whitespace-pre! language-bash"&gt;&lt;SPAN&gt;pdp broker status -e
&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI data-start="1621" data-end="1748"&gt;
&lt;P data-start="1624" data-end="1648"&gt;&lt;STRONG data-start="1624" data-end="1648"&gt;Check hostname vs CN&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="1652" data-end="1748"&gt;
&lt;LI data-start="1652" data-end="1748"&gt;
&lt;P data-start="1654" data-end="1748"&gt;The CN or SAN in the peer certificate must match the hostname you use in &lt;CODE data-start="1727" data-end="1747"&gt;pdp broker connect&lt;/CODE&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Mon, 18 Aug 2025 12:09:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Peer-certificate-verification-failed-after-certificate/m-p/255325#M42903</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-08-18T12:09:54Z</dc:date>
    </item>
    <item>
      <title>Re: Peer certificate verification failed after certificate replacement</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Peer-certificate-verification-failed-after-certificate/m-p/255332#M42908</link>
      <description>&lt;P&gt;You need to fetch the CERT Fingerprint from the subscriber via&amp;nbsp;&lt;SPAN&gt;$FWDIR/bin/BrokerCertFetcher &amp;lt;&lt;/SPAN&gt;&lt;EM&gt;IP Address of Subscriber&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it is all described here:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/Topics-IDAG/Identity-Broker-Configuration.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/Topics-IDAG/Identity-Broker-Configuration.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you probably will face the Problem on your other PDP Broker as well, when they will check the cert again. Before you fetch the new cert via the mentioned command delete the old .pem&lt;/P&gt;&lt;P&gt;You want to do the whole cert replacement process during a maintenace Window to restart the pdp process the make sure, the other Brokers accept the new cert fingerprint.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;best regards&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 13:26:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Peer-certificate-verification-failed-after-certificate/m-p/255332#M42908</guid>
      <dc:creator>ProxyOps</dc:creator>
      <dc:date>2025-08-18T13:26:22Z</dc:date>
    </item>
    <item>
      <title>Re: Peer certificate verification failed after certificate replacement</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Peer-certificate-verification-failed-after-certificate/m-p/255341#M42916</link>
      <description>&lt;P&gt;i already this that &amp;gt; &lt;STRONG&gt;You need to fetch the CERT Fingerprint from the subscriber via&amp;nbsp;$FWDIR/bin/BrokerCertFetcher &amp;lt;&lt;EM&gt;IP Address of Subscriber&amp;gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/STRONG&gt;the issue was solved becuase in the &lt;SPAN&gt;&amp;nbsp;identity_broker.C the subject was wrong i dont know why?&lt;BR /&gt;&lt;/SPAN&gt;After fixed this one, now it's solved.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 14:26:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Peer-certificate-verification-failed-after-certificate/m-p/255341#M42916</guid>
      <dc:creator>RemoteUser</dc:creator>
      <dc:date>2025-08-18T14:26:11Z</dc:date>
    </item>
  </channel>
</rss>

