<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Centrally managed Spark appliance and VPN certificates in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Centrally-managed-Spark-appliance-and-VPN-certificates/m-p/240604#M12047</link>
    <description>&lt;P&gt;The local WebUI will only show you local certificates, I believe.&lt;BR /&gt;Might need to use&amp;nbsp;&lt;STRONG&gt;cpca_client lscert&amp;nbsp;&lt;/STRONG&gt;from Expert Mode.&lt;/P&gt;</description>
    <pubDate>Thu, 06 Feb 2025 14:39:41 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2025-02-06T14:39:41Z</dc:date>
    <item>
      <title>Centrally managed Spark appliance and VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Centrally-managed-Spark-appliance-and-VPN-certificates/m-p/240477#M12030</link>
      <description>&lt;P&gt;We use SmartProvisioning to manage 25 or so Spark appliances. These appliances are used as satellite gateways in a VPN community, with the center gateways managed by the same SMS. I cannot find a way to determine the age/expiration date of the VPN certificate generated by the SMS (in SmartProvisioning). Here is a screenshot of the VPN tab where the cert is generated:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VPN cert SmartProvisioning.jpg" style="width: 497px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29533i1C6D03A9D6B502FA/image-dimensions/497x345?v=v2" width="497" height="345" role="button" title="VPN cert SmartProvisioning.jpg" alt="VPN cert SmartProvisioning.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;As you can see, no details available. The webUI of the Spark appliance does show installed certificates, but the certs shown here are the locally generated certificates.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Spark cert1.jpg" style="width: 653px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29534i7487C099E093FA61/image-dimensions/653x179?v=v2" width="653" height="179" role="button" title="Spark cert1.jpg" alt="Spark cert1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Spark cert2.jpg" style="width: 473px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29536iEDBCDA0124F4B2DF/image-dimensions/473x471?v=v2" width="473" height="471" role="button" title="Spark cert2.jpg" alt="Spark cert2.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a way to see the details of the certificate generated in SmartProvisioning, which is actually used for the VPN authentication?&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;David&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 13:54:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Centrally-managed-Spark-appliance-and-VPN-certificates/m-p/240477#M12030</guid>
      <dc:creator>David_C1</dc:creator>
      <dc:date>2025-02-05T13:54:04Z</dc:date>
    </item>
    <item>
      <title>Re: Centrally managed Spark appliance and VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Centrally-managed-Spark-appliance-and-VPN-certificates/m-p/240604#M12047</link>
      <description>&lt;P&gt;The local WebUI will only show you local certificates, I believe.&lt;BR /&gt;Might need to use&amp;nbsp;&lt;STRONG&gt;cpca_client lscert&amp;nbsp;&lt;/STRONG&gt;from Expert Mode.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2025 14:39:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Centrally-managed-Spark-appliance-and-VPN-certificates/m-p/240604#M12047</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-02-06T14:39:41Z</dc:date>
    </item>
    <item>
      <title>Re: Centrally managed Spark appliance and VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Centrally-managed-Spark-appliance-and-VPN-certificates/m-p/240611#M12048</link>
      <description>&lt;P&gt;Phoneboy - you are correct, local WebUI only shows local certificates (something not very helpful with centrally managed gateways) and the command you provided does show me what I need to see - thank you for that.&lt;/P&gt;
&lt;P&gt;That being said, it would be nice if the certificate view in SmartProvisioning had same features as in SmartConsole, where you can actually see details of the cert.&lt;/P&gt;
&lt;P&gt;Dave&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2025 15:15:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Centrally-managed-Spark-appliance-and-VPN-certificates/m-p/240611#M12048</guid>
      <dc:creator>David_C1</dc:creator>
      <dc:date>2025-02-06T15:15:01Z</dc:date>
    </item>
    <item>
      <title>Re: Centrally managed Spark appliance and VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Centrally-managed-Spark-appliance-and-VPN-certificates/m-p/240616#M12049</link>
      <description>&lt;P&gt;Bad form I know to reply to my own post, but follow up question:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;cpca_client lscert&amp;nbsp;&lt;/STRONG&gt;shows me the certs that the CA has issued (including expired, revoked certs).&amp;nbsp; There are many examples of numerous certs issued for the same gateway, same function. How do I&amp;nbsp;&lt;STRONG&gt;know&lt;/STRONG&gt; which cert the client is actually using? If one cert is expired, one is valid, I can&amp;nbsp;&lt;STRONG&gt;assume&lt;/STRONG&gt; that the gateway is using the valid cert? Or is there some way on the client side I can verify?&lt;/P&gt;
&lt;P&gt;Dave&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2025 15:29:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Centrally-managed-Spark-appliance-and-VPN-certificates/m-p/240616#M12049</guid>
      <dc:creator>David_C1</dc:creator>
      <dc:date>2025-02-06T15:29:10Z</dc:date>
    </item>
    <item>
      <title>Re: Centrally managed Spark appliance and VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Centrally-managed-Spark-appliance-and-VPN-certificates/m-p/240629#M12050</link>
      <description>&lt;P&gt;Only valid certs should be used.&lt;BR /&gt;To see which one is actually used, a debug might be required.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2025 15:49:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Centrally-managed-Spark-appliance-and-VPN-certificates/m-p/240629#M12050</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-02-06T15:49:24Z</dc:date>
    </item>
  </channel>
</rss>

