<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SMB IPSec VPN Certs - Internal CA in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPSec-VPN-Certs-Internal-CA/m-p/211976#M10544</link>
    <description>&lt;P&gt;Yes - the ICA is used from the object on the SMS - I misspoke. My intention was to indicate there was no type of external/ 3rd party cert being utilized.&lt;/P&gt;&lt;P&gt;SK176527_31539 - this is the procedure used - it just takes a long time if you have you hundreds!&lt;/P&gt;&lt;P&gt;But I think we will be ok increasing the cert time in the SMS.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 22 Apr 2024 16:52:16 GMT</pubDate>
    <dc:creator>T_L</dc:creator>
    <dc:date>2024-04-22T16:52:16Z</dc:date>
    <item>
      <title>SMB IPSec VPN Certs - Internal CA</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPSec-VPN-Certs-Internal-CA/m-p/211770#M10533</link>
      <description>&lt;P&gt;Good Afternoon --&lt;/P&gt;&lt;P&gt;Does anyone have any scripts or scripting mojo that would allow the IPSec VPN certs to be renewed on a bunch of 1400/1500 centrally managed SMB gateways all at once?&lt;/P&gt;&lt;P&gt;We have a large number of SMBS (R77.20 - R81.x)&amp;nbsp; centrally managed by a physical 3150 SMS_r81.10.&amp;nbsp; All the gateways are configured in permanent tunnels utilizing the local CP internal CA on each. We have had to renew the certs manually/ individually on all of them.&lt;/P&gt;&lt;P&gt;The majority of the GWs are 1400 series on the R77.20 code so scripting from the SMS is a no go -- but something we could run from the local CLI - that we could could pipe to all our SSH sessions at once would work.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2024 17:47:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPSec-VPN-Certs-Internal-CA/m-p/211770#M10533</guid>
      <dc:creator>T_L</dc:creator>
      <dc:date>2024-04-18T17:47:52Z</dc:date>
    </item>
    <item>
      <title>Re: SMB IPSec VPN Certs - Internal CA</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPSec-VPN-Certs-Internal-CA/m-p/211966#M10542</link>
      <description>&lt;P&gt;How are you using the ICA of the SMB device if the devices are centrally managed?&lt;BR /&gt;The ICA, in this case, would be on your Smart-1.&lt;/P&gt;
&lt;P&gt;The good news is that we're about to release a script that will assist with this task.&lt;BR /&gt;It does require being on a specific R81.10/R81.20 JHF level at time of writing.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 14:13:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPSec-VPN-Certs-Internal-CA/m-p/211966#M10542</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-04-22T14:13:27Z</dc:date>
    </item>
    <item>
      <title>Re: SMB IPSec VPN Certs - Internal CA</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPSec-VPN-Certs-Internal-CA/m-p/211973#M10543</link>
      <description>&lt;P&gt;I am not aware of a script. But the renewal takes places on the mgmt. There you renew the cert and push it out via policy push.&lt;/P&gt;
&lt;P&gt;That is why I don't think you can run a script on the box itself.&lt;/P&gt;
&lt;P&gt;Now the steps are not to bad, if I assume you renew it on the fw object in Smart Console and press the renew button, correct?&lt;/P&gt;
&lt;P&gt;You can also think about to extend to cert time from 1 year to 3 year:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk176527" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk176527&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;This will save a bit of work until there is something new as PhoneBoy posted.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 15:46:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPSec-VPN-Certs-Internal-CA/m-p/211973#M10543</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-04-22T15:46:53Z</dc:date>
    </item>
    <item>
      <title>Re: SMB IPSec VPN Certs - Internal CA</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPSec-VPN-Certs-Internal-CA/m-p/211976#M10544</link>
      <description>&lt;P&gt;Yes - the ICA is used from the object on the SMS - I misspoke. My intention was to indicate there was no type of external/ 3rd party cert being utilized.&lt;/P&gt;&lt;P&gt;SK176527_31539 - this is the procedure used - it just takes a long time if you have you hundreds!&lt;/P&gt;&lt;P&gt;But I think we will be ok increasing the cert time in the SMS.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 16:52:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPSec-VPN-Certs-Internal-CA/m-p/211976#M10544</guid>
      <dc:creator>T_L</dc:creator>
      <dc:date>2024-04-22T16:52:16Z</dc:date>
    </item>
  </channel>
</rss>

