<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SMB certificate for Remote Access in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-certificate-for-Remote-Access/m-p/85720#M3594</link>
    <description>The cert for Remote Access is pushed from central management.&lt;BR /&gt;It should not be impacted by this.</description>
    <pubDate>Tue, 19 May 2020 00:33:48 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2020-05-19T00:33:48Z</dc:date>
    <item>
      <title>SMB certificate for Remote Access</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-certificate-for-Remote-Access/m-p/85588#M3570</link>
      <description>&lt;P&gt;Hello SMB Admins,&lt;/P&gt;
&lt;P&gt;First to mention this is centrally managed 1470 unit.&lt;/P&gt;
&lt;P&gt;Long time ago, when I was configuring remote access I noticed that when you connect to SMB from Internet, the SNX web page is using the certificate I imported for UserCheck. In "VPN Clients" certificate is defaultCert.&lt;/P&gt;
&lt;P&gt;The problem is that now I want to disable UserCheck (and all APPCL/URLF blade&amp;nbsp; for that matter) and I am afraid this may brake remote access. I could probably try to disable it to see what happens but I am afraid it may revert to defaultCert that will of course be rejected from remote access clients. I cannot import that certificate in "IPSec VPN" page because it is a third-party one and CSR was not generated from SmartConsole.&lt;/P&gt;
&lt;P&gt;Overall, I am not sure how to handle this and I do not have the luxury to brake the remote access for a long time.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any suggestions are welcome.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 04:01:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-certificate-for-Remote-Access/m-p/85588#M3570</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-05-18T04:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: SMB certificate for Remote Access</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-certificate-for-Remote-Access/m-p/85720#M3594</link>
      <description>The cert for Remote Access is pushed from central management.&lt;BR /&gt;It should not be impacted by this.</description>
      <pubDate>Tue, 19 May 2020 00:33:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-certificate-for-Remote-Access/m-p/85720#M3594</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-05-19T00:33:48Z</dc:date>
    </item>
  </channel>
</rss>

