<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 1490 certifcate valid from date CLI fetch in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26565#M1115</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;wondering if you can help provide a way to do the below.&lt;/P&gt;&lt;P&gt;I am trying to get information from a 1490 device running R77.20 latest version for 1490.&lt;/P&gt;&lt;P&gt;We normally would use cpca_client but that has been removed from embedded appliance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried this&lt;/P&gt;&lt;P&gt;cpca_dbutil print $FWDIR/conf/InternalCA.db&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but that only prints the information out and does not provide information on valid from and to date.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also tried&lt;/P&gt;&lt;P&gt;ls -lht /opt/fw1/state/InternalCA_site.p12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this only provide me a date the file was created does anyone know how to get this information from a 1490 via command line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 31 Jan 2018 15:03:19 GMT</pubDate>
    <dc:creator>Franco_Carched1</dc:creator>
    <dc:date>2018-01-31T15:03:19Z</dc:date>
    <item>
      <title>1490 certifcate valid from date CLI fetch</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26565#M1115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;wondering if you can help provide a way to do the below.&lt;/P&gt;&lt;P&gt;I am trying to get information from a 1490 device running R77.20 latest version for 1490.&lt;/P&gt;&lt;P&gt;We normally would use cpca_client but that has been removed from embedded appliance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried this&lt;/P&gt;&lt;P&gt;cpca_dbutil print $FWDIR/conf/InternalCA.db&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but that only prints the information out and does not provide information on valid from and to date.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also tried&lt;/P&gt;&lt;P&gt;ls -lht /opt/fw1/state/InternalCA_site.p12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this only provide me a date the file was created does anyone know how to get this information from a 1490 via command line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 15:03:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26565#M1115</guid>
      <dc:creator>Franco_Carched1</dc:creator>
      <dc:date>2018-01-31T15:03:19Z</dc:date>
    </item>
    <item>
      <title>Re: 1490 certifcate valid from date CLI fetch</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26566#M1116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If it's a question about the 1490 it should be in the &lt;A href="https://community.checkpoint.com/community/infinity-general/smb-smp?sr=search&amp;amp;searchId=6ce11c64-4608-4a34-8a11-f29a93effc51&amp;amp;searchIndex=0" target="_blank"&gt;https://community.checkpoint.com/community/infinity-general/smb-smp?sr=search&amp;amp;searchId=6ce11c64-4608-4a34-8a11-f29a93effc51&amp;amp;searchIndex=0&lt;/A&gt;‌ space.&lt;/P&gt;&lt;P&gt;And maybe we should tag &lt;A href="https://community.checkpoint.com/migrated-users/48508" target="_blank"&gt;https://community.checkpoint.com/people/mirio5da802f4-2304-47d4-915d-e09d560ea3cc&lt;/A&gt;‌&lt;/P&gt;&lt;P&gt;But just to clarify: you're looking for the dates of validity for the internal CA certificate?&lt;/P&gt;&lt;P&gt;Is this 1490 self-managed or are you managing it with a SmartCenter/MDM setup?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jun 2019 09:14:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26566#M1116</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-21T09:14:21Z</dc:date>
    </item>
    <item>
      <title>Re: 1490 certifcate valid from date CLI fetch</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26567#M1117</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dameon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the response, happy for it to be moved to the correct location also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But just to clarify: you're looking for the dates of validity for the internal CA certificate? Correct &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this 1490 self-managed or are you managing it with a SmartCenter/MDM setup? SmartCenter managed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 16:03:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26567#M1117</guid>
      <dc:creator>Franco_Carched1</dc:creator>
      <dc:date>2018-01-31T16:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: 1490 certifcate valid from date CLI fetch</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26568#M1118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm questioning if this is the right command for the job in the first place on a gateway.&lt;/P&gt;&lt;P&gt;When I try to execute this command on a regular (non-SMB) R77.30 or R80.10 gateway, I get an "operation failed" message.&lt;/P&gt;&lt;P&gt;When I execute it on a management, I get&amp;nbsp;what you describe, a bunch of lines that look like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;Subject = CN=animal,O=bunsen..9zzzzz&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;Status = Valid &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;Kind = SIC &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;Serial =&amp;nbsp;11111&amp;nbsp;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;DP = 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;Not_Before: Thu Aug 17 09:19:53 2017 &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;Not_After: Wed Aug 17 09:19:53 2022&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which makes sense since the internal certificate authority only exists on the management.&lt;/P&gt;&lt;P&gt;It should have all the certificates for all managed gateways.&lt;/P&gt;&lt;P&gt;The above example is the certificate for a gateway managed by this SmartCenter.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 16:25:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26568#M1118</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-31T16:25:28Z</dc:date>
    </item>
    <item>
      <title>Re: 1490 certifcate valid from date CLI fetch</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26569#M1119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perfect my Friend, sorry to waste your time on this questions.&lt;/P&gt;&lt;P&gt;I did think about management, but our developers wanted this to come from the Appliance.&lt;/P&gt;&lt;P&gt;I will go with your suggestion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Frank&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 16:28:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26569#M1119</guid>
      <dc:creator>Franco_Carched1</dc:creator>
      <dc:date>2018-01-31T16:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: 1490 certifcate valid from date CLI fetch</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26570#M1120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No worries, it was a good opportunity to refresh my knowledge &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 17:04:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26570#M1120</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-31T17:04:31Z</dc:date>
    </item>
    <item>
      <title>Re: 1490 certifcate valid from date CLI fetch</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26571#M1121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dameon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sorry to bring this back up, but I gather there is no way of getting this from the GW ? I guess we can do a check first to see if ICA_Services are allowed from Gateway to Management then check the cert on the Manager ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cpca_client lscert seems to be missing completely from the 1490 code.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2018 09:18:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26571#M1121</guid>
      <dc:creator>Franco_Carched1</dc:creator>
      <dc:date>2018-02-01T09:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: 1490 certifcate valid from date CLI fetch</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26572#M1122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;I don’t see why cpca_client should exist on the SMB appliance since it does not perform central management functions, being either managed by something else or self-managed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2018 14:50:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26572#M1122</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-01T14:50:09Z</dc:date>
    </item>
    <item>
      <title>Re: 1490 certifcate valid from date CLI fetch</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26573#M1123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, but if the device was managed locally then no way to retrive this info.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;plus based on that if FW_ICA_services is not allowed by control connections, what if you do a check on the management it reports cert is valid but on GW it has not pushed/pulled the new cert becuase of the control connection being allowed and explict rule for the service to be allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;strange how a GW GAIA and not management still has cpca_client there even if it is a GW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers for the info either way but gathering from what said no way to get this out of the device itself.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2018 15:03:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26573#M1123</guid>
      <dc:creator>Franco_Carched1</dc:creator>
      <dc:date>2018-02-01T15:03:11Z</dc:date>
    </item>
    <item>
      <title>Re: 1490 certifcate valid from date CLI fetch</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26574#M1124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Embedded Gaia appliances have less storage space to work with than regular appliances.&lt;/P&gt;&lt;P&gt;As such, items that are not required are removed from the OS image.&lt;/P&gt;&lt;P&gt;Like I mentioned before, you can't use cpca_client lscert on a regular&amp;nbsp;gateway either as it's only meant for management.&lt;/P&gt;&lt;P&gt;This is documented in the following sk:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk62873" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk62873"&gt;How to determine SIC Certificate expiration date&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll&amp;nbsp;see if there's a way to determine this from a gateway.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2018 17:24:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26574#M1124</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-01T17:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: 1490 certifcate valid from date CLI fetch</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26575#M1125</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Franco,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would it be related to the&amp;nbsp;&lt;SPAN&gt;InternalCA.crt? If it is, you can try:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cpopenssl x509 -noout -inform DER -in /opt/fw1/conf/InternalCA.crt -enddate -startdate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use this for other certificates in the gateway or -text option to see complete certificate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2018 18:24:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26575#M1125</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2018-02-01T18:24:08Z</dc:date>
    </item>
    <item>
      <title>Re: 1490 certifcate valid from date CLI fetch</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26576#M1126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maybe&amp;nbsp;for locally managed SMB cluster deployments.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2018 18:25:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26576#M1126</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2018-02-01T18:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: 1490 certifcate valid from date CLI fetch</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26577#M1127</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That would be for the internal CA on the appliance itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's not the SIC key used by the appliance when communicating with central management.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on some SKs, it's&amp;nbsp;going to be:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;STRONG&gt;&lt;CODE&gt;$CPDIR/conf/sic_cert.p12&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I confirmed by resetting SIC on an 1100 device that the sic_cert.p12 file changes when SIC is re-established.&lt;/P&gt;&lt;P&gt;That means, you should be able to do something like the following to dump the key:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="color: #333333; background-color: #f5f5f5; border: 1px solid #cccccc; margin: 0px 0px 9px; padding: 8.5px;"&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;cpopenssl pkcs12 -info -in /opt/fw1/conf/sic_cert.p12&lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Except that won't work as the certificate is protected by a password, which I am going to guess we're not giving out.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2018 19:53:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26577#M1127</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-01T19:53:00Z</dc:date>
    </item>
    <item>
      <title>Re: 1490 certifcate valid from date CLI fetch</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26578#M1128</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&amp;nbsp;&lt;A _jive_internal="true" data-userid="54170" data-username="Franc9e0ce109-a4ec-485f-a07e-c722a73cbe42" href="https://community.checkpoint.com/people/Franc9e0ce109-a4ec-485f-a07e-c722a73cbe42" style="color: #2989c5; text-decoration: none;"&gt;Franco Carchedi&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you wish to know the details regarding the GW's internal CA you can do it in the WEB-UI ('Internal Certificate' page under VPN in locally managed mode) or in expert mode (both in locally and centrally managed modes) by the command `#cat $FWDIR/conf/InternalCA.fwset`.&lt;/P&gt;&lt;P&gt;the&amp;nbsp;&lt;SPAN&gt;InternalCA.fwset is eventually a print of the internal CA that we take into a text file during it's creation using&amp;nbsp;cpca.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;BTW, the&amp;nbsp;&lt;SPAN&gt;Internal CA is not relevant in centrally managed mode since the MGMT server is handling all the signing requests...is there any particular reason&amp;nbsp;you need the info regarding the GW's internal CA in centrally managed mode as well?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Feb 2018 05:06:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26578#M1128</guid>
      <dc:creator>David_Gambrin</dc:creator>
      <dc:date>2018-02-04T05:06:08Z</dc:date>
    </item>
    <item>
      <title>Re: 1490 certifcate valid from date CLI fetch</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26579#M1129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks David Gambrin, and all for the responses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;that command worked a treat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cat $FWDIR/conf/InternalCA.fwset&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Feb 2018 08:28:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26579#M1129</guid>
      <dc:creator>Franco_Carched1</dc:creator>
      <dc:date>2018-02-05T08:28:14Z</dc:date>
    </item>
    <item>
      <title>Re: 1490 certifcate valid from date CLI fetch</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26580#M1130</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to be clear, that only shows the dates associated with the Internal CA &lt;STRONG&gt;on that specific device&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;It does NOT reflect the SIC certificate used by the device issued by your central management.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Feb 2018 14:45:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1490-certifcate-valid-from-date-CLI-fetch/m-p/26580#M1130</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-05T14:45:53Z</dc:date>
    </item>
  </channel>
</rss>

