<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Avoid fingerprint warning after certificate renewal in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Avoid-fingerprint-warning-after-certificate-renewal/m-p/262254#M1511</link>
    <description>&lt;P&gt;Excellent points&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/73547"&gt;@Lesley&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 08 Nov 2025 20:19:26 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-11-08T20:19:26Z</dc:date>
    <item>
      <title>Avoid fingerprint warning after certificate renewal</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Avoid-fingerprint-warning-after-certificate-renewal/m-p/262246#M1508</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;If you don’t want VPN clients to receive warnings every time the server certificate changes, don’t import only the server certificate. Instead, include the root and intermediate certificates within the server certificate itself. You can do this using the command below.&lt;/P&gt;&lt;P&gt;Assume you have one SubCA:&amp;nbsp;&lt;/P&gt;&lt;P&gt;cat SubCA.crt rootCA.crt &amp;gt;&amp;gt; fullchain.crt&amp;nbsp;&lt;/P&gt;&lt;P&gt;cpopenssl pkcs12 -export&amp;nbsp;-inkey private.key&amp;nbsp; -in cert.crt&amp;nbsp; &amp;nbsp;-certfile fullchain.crt&amp;nbsp; &amp;nbsp;-name "myCert"&amp;nbsp; &amp;nbsp;-out mycert.p12&lt;/P&gt;&lt;P&gt;Import this file into the Mobile Portal. The fingerprint shown will correspond to the Root CA.&lt;/P&gt;&lt;P&gt;After this, you won’t see any warnings as long as the Root CA remains the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 08 Nov 2025 14:22:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Avoid-fingerprint-warning-after-certificate-renewal/m-p/262246#M1508</guid>
      <dc:creator>Cihat_Bulut</dc:creator>
      <dc:date>2025-11-08T14:22:49Z</dc:date>
    </item>
    <item>
      <title>Re: Avoid fingerprint warning after certificate renewal</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Avoid-fingerprint-warning-after-certificate-renewal/m-p/262252#M1509</link>
      <description>&lt;P&gt;Excellent, thank you for that&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/13382"&gt;@Cihat_Bulut&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 08 Nov 2025 18:55:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Avoid-fingerprint-warning-after-certificate-renewal/m-p/262252#M1509</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-08T18:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: Avoid fingerprint warning after certificate renewal</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Avoid-fingerprint-warning-after-certificate-renewal/m-p/262253#M1510</link>
      <description>&lt;P&gt;Thanks for the tip first of all.&lt;/P&gt;
&lt;P&gt;Only thing I would like to add if you use a fail chain will give an anchor warning in SSL labs.&amp;nbsp;&lt;/P&gt;
&lt;DIV class="test-id__field-label-container slds-form-element__label" data-aura-rendered-by="81:181;a"&gt;&lt;SPAN class="test-id__field-label" data-aura-rendered-by="82:181;a"&gt;Instructions&lt;/SPAN&gt;
&lt;DIV class="slds-form-element__icon"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="slds-form-element__control slds-grid itemBody" data-aura-rendered-by="84:181;a"&gt;
&lt;DIV class="slds-rich-text-editor__output uiOutputRichText forceOutputRichText selfServiceOutputRichTextWithSmartLinks" dir="ltr" data-aura-rendered-by="76:181;a" data-aura-class="uiOutputRichText forceOutputRichText selfServiceOutputRichTextWithSmartLinks"&gt;
&lt;P data-aura-rendered-by="77:181;a"&gt;When scanning through&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.ssllabs.com/ssltest/" target="_blank" rel="noopener" data-aura-rendered-by="77:181;a"&gt;SSL Labs&lt;/A&gt;, it shows "Chain issues&amp;nbsp; Contains anchor"&lt;BR data-aura-rendered-by="77:181;a" /&gt;&lt;BR data-aura-rendered-by="77:181;a" /&gt;It means that you have added Intermediate as well as Root CA, when you only need the Intermediate as the client will already have Root CA (will be already trusted by browser in browser certificate store).&lt;/P&gt;
It's not an issue in the sense that the anchor is not allowed, but that the extra certificate (which serves no purpose) is increasing the handshake latency.&amp;nbsp;
&lt;P data-aura-rendered-by="77:181;a"&gt;Because of TCP slow start, the first bytes on a connection are the&amp;nbsp;slowest. Hence, you can&amp;nbsp;minimize the size of the handshake&amp;nbsp;so that HTTP bytes can start flowing as soon as possible. So the issue is not so much "can the extra certificate fit into the initial window" (it most likely can, even with the old setting of 3 network segments), but "what other, more useful, data could we be sending instead".&lt;/P&gt;
&lt;P data-aura-rendered-by="77:181;a"&gt;Also this sk is relevant for fingerprints:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk66263" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk66263&lt;/A&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Sat, 08 Nov 2025 20:04:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Avoid-fingerprint-warning-after-certificate-renewal/m-p/262253#M1510</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-11-08T20:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: Avoid fingerprint warning after certificate renewal</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Avoid-fingerprint-warning-after-certificate-renewal/m-p/262254#M1511</link>
      <description>&lt;P&gt;Excellent points&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/73547"&gt;@Lesley&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 08 Nov 2025 20:19:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Avoid-fingerprint-warning-after-certificate-renewal/m-p/262254#M1511</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-08T20:19:26Z</dc:date>
    </item>
  </channel>
</rss>

