<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Quantum Spark 1570 Appliance R81.10.10 &amp;amp; Strongswan in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-1570-Appliance-R81-10-10-amp-Strongswan/m-p/227100#M11430</link>
    <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;thank you. I went to the location and grabbed the certificate. I tried to put it into swan, but it hasn't worked yet. Question though, when endpoint vpn connects to the server and returns the fingerprint for you to approve is there a way you can step me through how that communication/request works? If I can figure out that process I will be able to know where I should install the certificate. I believe stronswan is getting stuck on that part of verification.&lt;/P&gt;</description>
    <pubDate>Wed, 18 Sep 2024 15:04:15 GMT</pubDate>
    <dc:creator>actwon</dc:creator>
    <dc:date>2024-09-18T15:04:15Z</dc:date>
    <item>
      <title>Quantum Spark 1570 Appliance R81.10.10 &amp; Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-1570-Appliance-R81-10-10-amp-Strongswan/m-p/225471#M11343</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;As the title states I have an 1570 appliance that is locally managed. I am transitioning from MacOS to ParrotOS Linux. I have am having issues getting Strongswan configured for VPN. When you use Endpoint, the server sends the fingerprint from the VPN certificate installed onto the server for you to confirm. I do not receive that on Strongswan. I have attached an image of the configuration dialog. How do I fill this out? I am using EAP (Username/Password) in the client section.&lt;/P&gt;&lt;P&gt;I was able to export the internal device certificate, but it has both the internal certificate and the VPN certificate. I am unable to export the installed vpn certificate only (this is on the 1570). Any help is appreciated. I been trying to figure this out for several days now.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2024 13:31:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-1570-Appliance-R81-10-10-amp-Strongswan/m-p/225471#M11343</guid>
      <dc:creator>actwon</dc:creator>
      <dc:date>2024-09-03T13:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: Quantum Spark 1570 Appliance R81.10.10 &amp; Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-1570-Appliance-R81-10-10-amp-Strongswan/m-p/225803#M11364</link>
      <description>&lt;P&gt;How did you perform the export exactly?&lt;BR /&gt;My guess is that the export contains both the VPN certificate and the Internal CA key.&lt;BR /&gt;The Internal CA key would be necessary for Strongswan to validate the VPN certificate.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only mention I can find in the SMB-specific documentation is for Site-to-Site VPN.&lt;BR /&gt;I imagine the client configuration is similar to what it is on non-SMB devices:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/Content/Topics-VPNRG/strongSwan-Client-Support.htm#strongSwan_Client_Configuration" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/Content/Topics-VPNRG/strongSwan-Client-Support.htm#strongSwan_Client_Configuration&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 16:17:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-1570-Appliance-R81-10-10-amp-Strongswan/m-p/225803#M11364</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-09-05T16:17:09Z</dc:date>
    </item>
    <item>
      <title>Re: Quantum Spark 1570 Appliance R81.10.10 &amp; Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-1570-Appliance-R81-10-10-amp-Strongswan/m-p/225945#M11369</link>
      <description>&lt;P&gt;Hi Phoneboy, thank you for responding. I went to VPN -&amp;gt;Certificates -&amp;gt; Internal Certificates then clicked export. I saw that guide and it didn't work fro me. I only saw the site-to-site option. Is there a way I can export the VPN certificate only?&lt;/P&gt;</description>
      <pubDate>Sat, 07 Sep 2024 20:41:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-1570-Appliance-R81-10-10-amp-Strongswan/m-p/225945#M11369</guid>
      <dc:creator>actwon</dc:creator>
      <dc:date>2024-09-07T20:41:45Z</dc:date>
    </item>
    <item>
      <title>Re: Quantum Spark 1570 Appliance R81.10.10 &amp; Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-1570-Appliance-R81-10-10-amp-Strongswan/m-p/226046#M11375</link>
      <description>&lt;P&gt;How precisely did you verify it is actually exporting both certificates?&lt;BR /&gt;Because from that screen, it should only export the Internal CA certificate.&lt;BR /&gt;And when I dump the certificate I received from my own device...it's only the ICA (as expected):&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 741px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27544i1263F152F900535A/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;However, I was able to find where the VPN certificate is on the appliance:&amp;nbsp;$FWDIR/conf/my_vpn_cert.crt.&lt;/P&gt;
&lt;P&gt;If you can manage to get all this working, please share what you did.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2024 19:16:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-1570-Appliance-R81-10-10-amp-Strongswan/m-p/226046#M11375</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-09-09T19:16:12Z</dc:date>
    </item>
    <item>
      <title>Re: Quantum Spark 1570 Appliance R81.10.10 &amp; Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-1570-Appliance-R81-10-10-amp-Strongswan/m-p/227100#M11430</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;thank you. I went to the location and grabbed the certificate. I tried to put it into swan, but it hasn't worked yet. Question though, when endpoint vpn connects to the server and returns the fingerprint for you to approve is there a way you can step me through how that communication/request works? If I can figure out that process I will be able to know where I should install the certificate. I believe stronswan is getting stuck on that part of verification.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2024 15:04:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-1570-Appliance-R81-10-10-amp-Strongswan/m-p/227100#M11430</guid>
      <dc:creator>actwon</dc:creator>
      <dc:date>2024-09-18T15:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: Quantum Spark 1570 Appliance R81.10.10 &amp; Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-1570-Appliance-R81-10-10-amp-Strongswan/m-p/227119#M11433</link>
      <description>&lt;P&gt;Believe it occurs during the IKE negotiation when the certificate is presented as part of establishing the tunnel.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2024 17:47:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-1570-Appliance-R81-10-10-amp-Strongswan/m-p/227119#M11433</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-09-18T17:47:19Z</dc:date>
    </item>
  </channel>
</rss>

