<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DigiCert TLS Certificate Lifetimes Will Officially Reduce to 47 Days in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263058#M44482</link>
    <description>&lt;P&gt;DigiCert themselves would have to confirm whether or not the change applies to TLS certificates only or whether it also applies to IPSec VPN certificates.&lt;/P&gt;</description>
    <pubDate>Mon, 17 Nov 2025 15:58:43 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2025-11-17T15:58:43Z</dc:date>
    <item>
      <title>DigiCert TLS Certificate Lifetimes Will Officially Reduce to 47 Days</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/262998#M44476</link>
      <description>&lt;P&gt;Hi There.&lt;/P&gt;&lt;P&gt;I have tried TAC, DigiCert administrators within the company, and not yet got a response from DigiCert themselves through the public "Contact Us" details.&lt;/P&gt;&lt;P&gt;Will the new Digicert TLS Certificate Lifetimes reduction to 47 Days affect IPSec VPNs. I personally don't think it will but nned confirmation.&lt;/P&gt;&lt;P&gt;I get Yes, No, and not sure responses.&lt;BR /&gt;Is there anyone that has a direct contact with DigiCert able to get a qualified answer from DigiCert?&lt;/P&gt;&lt;P&gt;If it does affect IPSEC PVNS it will be an administrative nightmare since I highly doubt you will be able to automate it.&lt;/P&gt;&lt;P&gt;I really need a 100% confident response and not a 'should' or 'probably'&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;TAC first response:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Yes, the DigiCert change in certificate validity can affect Check Point IPsec VPNs&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;if you use DigiCert-issued certificates for VPN authentication&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;(Site-to-Site or Remote Access VPN). The impact is that certificates will expire much more frequently, requiring more frequent renewal and management.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My Update to the TAC case, From CP Support AI:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Authentication Methods in Check Point IPSec VPN&lt;BR /&gt;Check Point IPSec VPN does&amp;nbsp;not&amp;nbsp;use TLS certificates for VPN tunnel authentication. Instead, it relies on the following standard authentication methods for IKE (Internet Key Exchange):&lt;BR /&gt;1.&amp;nbsp;PKI Certificates (Recommended)&lt;BR /&gt;Type:&amp;nbsp;X.509 certificates issued by a Certificate Authority (CA).&lt;BR /&gt;How Used:&amp;nbsp;Check Point strongly recommends using PKI-based authentication for IKE. This means each gateway or client uses a certificate to prove its identity.&lt;BR /&gt;Internal CA:&amp;nbsp;When gateways are managed by the same Check Point management server, the Internal Certificate Authority (ICA) automatically issues certificates for VPN authentication.&lt;BR /&gt;Benefits:&amp;nbsp;Strong security, scalable, and easier to manage in large environments.&lt;BR /&gt;Summary Table&lt;BR /&gt;&lt;STRONG&gt;Authentication Method:&amp;nbsp;&lt;/STRONG&gt;PKI (X.509)&amp;nbsp;Used for IPSec VPN:Yes&amp;nbsp;Certificate Type:&amp;nbsp;ICA or external&amp;nbsp;Typical Use Case:&amp;nbsp;Site-to-site, remote access&lt;BR /&gt;&lt;STRONG&gt;Authentication Method:&lt;/STRONG&gt;&amp;nbsp;TLS Certificate&amp;nbsp;Used for IPSec VPN:No&amp;nbsp;Certificate Type:N/A&amp;nbsp;Typical Use Case:&amp;nbsp;Not used for IPSec VPN tunnels&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;TAC Second Response:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;IPSEC VPN utilizes PKI (x.509) format certificates for authentication, which are distinct from TLS certificates. However, to ensure there are no issues related to certificate validity,&lt;/P&gt;&lt;P&gt;we recommend confirming with DigiCert whether the certificate you are using for IPSEC VPN is impacted by their recent changes to TLS certificate lifetimes&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;DigiCert Administrators from internal say yes it will but provide me with a exert cut from the DigiCert link:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If it’s a public facing cert from DigiCert or any other cert vendor, the following applies:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;As of March 15, 2026: The lifetime SHOULD not exceed 199 days and MUST not exceed 200 days.&lt;/LI&gt;&lt;LI&gt;As of March 15, 2027: The lifetime SHOULD not exceed 99 days and MUST not exceed 100 days.&lt;/LI&gt;&lt;LI&gt;As of March 15, 2029: The lifetime SHOULD not exceed 46 days and MUST not exceed 47 days.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.digicert.com/blog/tls-certificate-lifetimes-will-officially-reduce-to-47-days" target="_blank" rel="noopener"&gt;https://www.digicert.com/blog/tls-certificate-lifetimes-will-officially-reduce-to-47-days&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2025 02:00:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/262998#M44476</guid>
      <dc:creator>spottex</dc:creator>
      <dc:date>2025-11-17T02:00:39Z</dc:date>
    </item>
    <item>
      <title>Re: DigiCert TLS Certificate Lifetimes Will Officially Reduce to 47 Days</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263058#M44482</link>
      <description>&lt;P&gt;DigiCert themselves would have to confirm whether or not the change applies to TLS certificates only or whether it also applies to IPSec VPN certificates.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2025 15:58:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263058#M44482</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-11-17T15:58:43Z</dc:date>
    </item>
    <item>
      <title>Re: DigiCert TLS Certificate Lifetimes Will Officially Reduce to 47 Days</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263059#M44483</link>
      <description>&lt;P&gt;Honestly, I would have given you EXACT same response TAC did. Thats something Digicert needs to confirm.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2025 16:39:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263059#M44483</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-17T16:39:49Z</dc:date>
    </item>
    <item>
      <title>Re: DigiCert TLS Certificate Lifetimes Will Officially Reduce to 47 Days</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263071#M44485</link>
      <description>&lt;P&gt;Yes but TAC contradicted itself, First response Yes, which they would have asked to close the case at that point until I provided the AI output. Then the second response was NO.&lt;BR /&gt;I have not got a response yet from DigiCert for approx 2 weeks&lt;/P&gt;&lt;P&gt;I was hoping someone on here could get a response from DigiCert, like they did with the previous DigiCert change.&lt;BR /&gt;The previous DigiCert change was announced on this forum. i.e.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;IMPORTANT - Action Required For VPN/Remote Access Security Gateways Using DigiCert - by Sep 8, 2025&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2025 20:43:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263071#M44485</guid>
      <dc:creator>spottex</dc:creator>
      <dc:date>2025-11-17T20:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: DigiCert TLS Certificate Lifetimes Will Officially Reduce to 47 Days</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263072#M44486</link>
      <description>&lt;P&gt;The change applies to all TLS certificates issued by any public certificate authority. There are four stages.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;From today until 2026-03-15, the maximum lifetime for a TLS certificate is 398 days (365 plus buffer)&lt;/LI&gt;
&lt;LI&gt;From 2026-03-15 through 2027-03-15, the maximum lifetime is 200 days (180 plus buffer)&lt;/LI&gt;
&lt;LI&gt;From 2027-03-15 through 2029-03-15, the maximum lifetime is 100 days (90 plus buffer)&lt;/LI&gt;
&lt;LI&gt;After 2029-03-15, the maximum lifetime for TLS certificates will be limited to 47 days (45 plus buffer)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;On top of this, the maximum validity period of domain ownership validation will drop to ten days on 2029-03-15.&lt;/P&gt;
&lt;P&gt;This schedule has been set by the CA/Browser Forum, and was originally proposed by Apple with Google and Mozilla quickly concurring. Longer certificates are still technically possible, they just won't be trusted by browsers. If you're already using certificate pinning or you're already clicking through a "This certificate is expired/self-signed/whatever!" warning, nothing changes for you.&lt;/P&gt;
&lt;P&gt;If you use certificates issued by a public CA for IPSec VPNs, &lt;STRONG&gt;these certificates will be affected&lt;/STRONG&gt;. For site-to-site VPNs, this is an extremely rare configuration. After years handling VPN issues in the TAC, I'm pretty sure I can count the number of times I've seen it on one finger. It's fairly common for remote access, though (Mobile Access, SNX, etc.).&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2025 20:52:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263072#M44486</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2025-11-17T20:52:07Z</dc:date>
    </item>
    <item>
      <title>Re: DigiCert TLS Certificate Lifetimes Will Officially Reduce to 47 Days</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263073#M44487</link>
      <description>&lt;P&gt;If I were you, I would check with your local SE about it and see if they can get an absolute confirmation, so there is no ambiguity.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2025 20:54:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263073#M44487</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-17T20:54:17Z</dc:date>
    </item>
    <item>
      <title>Re: DigiCert TLS Certificate Lifetimes Will Officially Reduce to 47 Days</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263076#M44488</link>
      <description>&lt;P&gt;Surprisingly (as I did not think I would get one) I did get a response from DigiCert today.&lt;/P&gt;&lt;P&gt;"Kindly note that the reduction of the certificate lifecycle to &lt;STRONG&gt;47 days&lt;/STRONG&gt; affects all environments with no exceptions. This change was mandated by the CA/Browser Forum."&lt;BR /&gt;&lt;BR /&gt;My thoughts now, that obviously can't be answered yet...&lt;BR /&gt;Will there be an exception announced in the future, will other Certificate Authorities follow suit.&lt;BR /&gt;More importantly will Check Point and other FW vendors respond with software changes. I don't see it being anytime soon, but they do have time.&lt;/P&gt;&lt;P&gt;As I mentioned the administrative overhead for cert updates can be extensive if the VPN connections are high priority. Especially if the single cert is used on multiple VPNs. We have to organize, the admins for the peer(s), Apps testers, and business outages just in case. This can take weeks to sync schedules.&lt;BR /&gt;&lt;BR /&gt;Cisco have announced they will be removing pre-shared key from being used in IPSec VPN's forcing certificates. Which also could spread to other vendors.&lt;BR /&gt;&lt;BR /&gt;retirement date calculator - sorry that was meant for google search.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2025 22:11:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263076#M44488</guid>
      <dc:creator>spottex</dc:creator>
      <dc:date>2025-11-17T22:11:01Z</dc:date>
    </item>
    <item>
      <title>Re: DigiCert TLS Certificate Lifetimes Will Officially Reduce to 47 Days</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263077#M44489</link>
      <description>&lt;P&gt;I had not see any announcement from any other fw vendor for PSK, but lets see.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2025 22:13:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263077#M44489</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-17T22:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: DigiCert TLS Certificate Lifetimes Will Officially Reduce to 47 Days</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263079#M44490</link>
      <description>&lt;P&gt;FWIW, this is AI answer.&lt;/P&gt;
&lt;P&gt;*********************************&lt;/P&gt;
&lt;P&gt;Below is the most accurate &lt;EM&gt;industry-reality check&lt;/EM&gt; I can give you right now, based on how PKI, browsers, and VPN vendors actually work, and what the 47-day change really affects.&lt;/P&gt;
&lt;HR /&gt;
&lt;H1&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; &lt;STRONG&gt;1. The 47-day Limit Does &lt;EM&gt;NOT&lt;/EM&gt; Apply to IPSec VPN Certificates (Today)&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P&gt;Even though DigiCert said &lt;EM&gt;“no exceptions, applies to all environments”&lt;/EM&gt;, that answer is technically correct only &lt;STRONG&gt;for certificates issued under the CA/Browser Forum rules&lt;/STRONG&gt; (i.e., public TLS server certificates).&lt;/P&gt;
&lt;H3&gt;✔ CA/B Forum rules apply to &lt;EM&gt;public&lt;/EM&gt;, browser-trusted certificates.&lt;/H3&gt;
&lt;H3&gt;✘ They do &lt;EM&gt;not&lt;/EM&gt; apply to:&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;IPSec / IKE certificates&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Internal PKI&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Machine identity certificates&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;S/MIME certs&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Private trust roots&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Most non-HTTP certificate use cases&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;IPSec VPN certificates are not governed by CA/B Forum rules&lt;/STRONG&gt; unless you are doing something very unusual—like using a &lt;EM&gt;publicly-trusted&lt;/EM&gt; certificate from DigiCert for IKE authentication, which almost no enterprises do.&lt;/P&gt;
&lt;P&gt;This is why you’re hearing contradictory answers:&lt;BR /&gt;&lt;STRONG&gt;Support reps answer literally (“all environments”), but the CA rules do not apply to non-browser use cases.&lt;/STRONG&gt;&lt;/P&gt;
&lt;HR /&gt;
&lt;H1&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; &lt;STRONG&gt;2. Will there be exceptions in the future?&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P&gt;Most likely &lt;STRONG&gt;no&lt;/STRONG&gt;, because IPSec VPNs are not in scope to begin with.&lt;/P&gt;
&lt;P&gt;Vendors like DigiCert follow:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;CA/B Forum Baseline Requirements&lt;/STRONG&gt; → for public TLS&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Their own PKI policies&lt;/STRONG&gt; → for private PKI, code signing, device identity, VPN usage&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The 47-day limit is &lt;STRONG&gt;only for public TLS certificates&lt;/STRONG&gt;.&lt;BR /&gt;VPN certs generally come from:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Your &lt;EM&gt;internal CA&lt;/EM&gt;, or&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;A &lt;EM&gt;private intermediate&lt;/EM&gt; issued by DigiCert, Sectigo, Entrust (private hierarchies are not subject to the 47-day rule)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Those can still have:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;1-year,&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;2-year,&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;or even &lt;STRONG&gt;5-10 year&lt;/STRONG&gt; validity depending on your policy.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H1&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; &lt;STRONG&gt;3. Will other certificate authorities follow the 47-day rule?&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P&gt;For publicly-trusted TLS?&lt;BR /&gt;&lt;STRONG&gt;Yes, 100%—they have no choice. The CA/B Forum mandated it.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;For IPSec VPN certificates?&lt;BR /&gt;&lt;STRONG&gt;No. They are outside the scope.&lt;/STRONG&gt;&lt;/P&gt;
&lt;HR /&gt;
&lt;H1&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; &lt;STRONG&gt;4. Will Check Point, Cisco, Palo Alto, Fortinet etc. need to modify IPSec VPN certificate handling?&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P&gt;Not for this rule.&lt;/P&gt;
&lt;P&gt;Why? Because none of them require or expect:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;47-day public certs&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;public CA-issued certs for IKE&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;They all expect:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Internal CA or&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Private PKI hierarchy with long validity certificates&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Check Point specifically:&lt;/H3&gt;
&lt;P&gt;Check Point’s documentation explicitly says:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Use internal CA or private CA for VPN certificate enrollment.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Public CAs are barely mentioned outside HTTPS inspection.&lt;/P&gt;
&lt;HR /&gt;
&lt;H1&gt;&lt;span class="lia-unicode-emoji" title=":exclamation_mark:"&gt;❗&lt;/span&gt; &lt;STRONG&gt;5. What &lt;EM&gt;will&lt;/EM&gt; require major vendor changes?&lt;/STRONG&gt;&lt;/H1&gt;
&lt;H3&gt;✔ Cisco’s announcement about removing pre-shared keys&lt;/H3&gt;
&lt;P&gt;This is a completely separate initiative (cryptographic hardening).&lt;/P&gt;
&lt;P&gt;Cisco is pushing:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;IKEv2 only&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Certificate-based authentication only&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;No PSK (eventually)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If others follow—and they likely will over the long term—this increases:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;certificate management effort&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;PKI dependencies&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;automation requirements&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;But &lt;STRONG&gt;this still does NOT require short-lived certificates&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Vendors expect:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;1–3 year certificates&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;automated enrollment via SCEP / EST / CMP&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;internal CA&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H1&gt;&lt;span class="lia-unicode-emoji" title=":exclamation_mark:"&gt;❗&lt;/span&gt; &lt;STRONG&gt;6. Why DigiCert told you “47 days affects all environments”&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P&gt;Because:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;Their support reps answer according to the &lt;STRONG&gt;public TLS policies&lt;/STRONG&gt;, not the technical PKI context.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Many customers mistakenly use public TLS certs for non-browser purposes, so support gives a safe universal answer.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;The internal/private CA products &lt;EM&gt;are not&lt;/EM&gt; being forced to 47-day validity.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;HR /&gt;
&lt;H1&gt;&lt;span class="lia-unicode-emoji" title=":light_bulb:"&gt;💡&lt;/span&gt; &lt;STRONG&gt;7. Your concern about operational overhead is valid&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P&gt;You wrote:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;"If the single cert is used on multiple VPNs… admins, peer admins, testers, business outages… takes weeks"&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Yes—&lt;STRONG&gt;certificate-based IKE authentication is operationally painful&lt;/STRONG&gt; unless you automate it.&lt;/P&gt;
&lt;H3&gt;The only realistic long-term solution is:&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Automated enrollment (SCEP, EST, CMPv2)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Automated push to both VPN peers&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Automated rekeying&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Avoiding public CAs entirely for IKE&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Check Point already supports:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;SCEP (somewhat clunky)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;LetsEncrypt via CPAC is for HTTP only, not IKE&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Internal CA with long validity&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;They do NOT expect you to rotate IKE certs every 47 days.&lt;/P&gt;
&lt;HR /&gt;
&lt;H1&gt;&lt;span class="lia-unicode-emoji" title=":star:"&gt;⭐&lt;/span&gt; &lt;STRONG&gt;Bottom Line&lt;/STRONG&gt;&lt;/H1&gt;
&lt;H3&gt;&lt;STRONG&gt;The 47-day certificate lifetime does &lt;EM&gt;not&lt;/EM&gt; apply to IPSec VPN certificates.&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;You can safely use:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Internal CA&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Private DigiCert CA&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;1–3 year validity certs&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;No firewall vendor currently intends to enforce 47-day IPSec certificate renewals.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2025 23:05:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263079#M44490</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-17T23:05:36Z</dc:date>
    </item>
    <item>
      <title>Re: DigiCert TLS Certificate Lifetimes Will Officially Reduce to 47 Days</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263081#M44491</link>
      <description>&lt;P&gt;The more I read the less likely we will be able to avoid this change as a Check Point administrator.&lt;BR /&gt;This is going to be industry wide. If you have a policy to use Public PKI's.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your environment supports private PKI's and policy allows these to be used in VPNs then you will have an alternative.,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Extra info:&amp;nbsp;This is an extract from a Digicert PDF:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Q: How are non-browser clients&lt;BR /&gt;(like network devices) affected?&lt;BR /&gt;The public TLS certificate market overwhelmingly supports&lt;BR /&gt;browser-facing certificates installed on a web server of some&lt;BR /&gt;kind, but there are others. VPN gateways and some IoT&lt;BR /&gt;devices are good examples of these.&lt;BR /&gt;These devices will also have to increase their CLM cadence.&lt;BR /&gt;Many of them support ACME or some other automation&lt;BR /&gt;protocol directly, so changing parameters may not be a major&lt;BR /&gt;task. In other cases, there may be support for an alternative&lt;BR /&gt;automation mechanism or none at all, &lt;STRONG&gt;in which case the user &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;has some programming to do in order to automate.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 01:06:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263081#M44491</guid>
      <dc:creator>spottex</dc:creator>
      <dc:date>2025-11-18T01:06:19Z</dc:date>
    </item>
    <item>
      <title>Re: DigiCert TLS Certificate Lifetimes Will Officially Reduce to 47 Days</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263082#M44492</link>
      <description>&lt;P&gt;Lets see...there might be another official statement about it.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 01:15:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263082#M44492</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-18T01:15:06Z</dc:date>
    </item>
    <item>
      <title>Re: DigiCert TLS Certificate Lifetimes Will Officially Reduce to 47 Days</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263160#M44504</link>
      <description>&lt;P&gt;Check Point has restricted the use of PSKs to static IP endpoints for as long as I can remember, FWIW.&lt;/P&gt;
&lt;P&gt;As the deadline approaches, I suspect we will make changes to make this process easier.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2025 00:44:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263160#M44504</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-11-19T00:44:06Z</dc:date>
    </item>
    <item>
      <title>Re: DigiCert TLS Certificate Lifetimes Will Officially Reduce to 47 Days</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263254#M44508</link>
      <description>&lt;P&gt;This &lt;STRONG&gt;will&lt;/STRONG&gt; definitely affect inbound (WAF-style) HTTPS Inspection.&lt;/P&gt;
&lt;P&gt;It &lt;STRONG&gt;will&lt;/STRONG&gt; affect certificates presented by Mobile Access, SNX, and so on.&lt;/P&gt;
&lt;P&gt;It &lt;STRONG&gt;might&lt;/STRONG&gt; affect the certificates used for access to the web UI of the firewalls, web SmartConsole, SmartView, and so on. These are often self-signed, which would not be affected at all. Certificates signed by a CA would need to have shorter lifespans to be trusted by browsers.&lt;/P&gt;
&lt;P&gt;It &lt;STRONG&gt;will not&lt;/STRONG&gt;&amp;nbsp;affect the certificate authority used for client-to-random-website HTTPS Inspection. The internal certificates generated by the feature will need shorter lifespans, otherwise client browsers won't trust them, but those are generated automatically anyway.&lt;/P&gt;
&lt;P&gt;It &lt;STRONG&gt;will not&lt;/STRONG&gt; affect site-to-site VPNs using shared secrets.&lt;/P&gt;
&lt;P&gt;It &lt;STRONG&gt;will not&lt;/STRONG&gt; affect site-to-site VPNs using certificates signed by the ICA.&lt;/P&gt;
&lt;P&gt;It &lt;STRONG&gt;will not&lt;/STRONG&gt; affect SIC certificates.&lt;/P&gt;
&lt;P&gt;If you're doing site-to-site VPNs with certificates signed by a public CA, I'd love to hear more about it.&lt;/P&gt;
&lt;P&gt;Those are the only things I can think of offhand which can interact with certificates, public CAs, or browsers (which is where the change is actually being made).&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2025 23:09:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DigiCert-TLS-Certificate-Lifetimes-Will-Officially-Reduce-to-47/m-p/263254#M44508</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2025-11-19T23:09:29Z</dc:date>
    </item>
  </channel>
</rss>

