<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Replace Internal CA - SSL Inspection with own certificate. in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Replace-Internal-CA-SSL-Inspection-with-own-certificate/m-p/18932#M669</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;That sounds right to me.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 27 Apr 2018 19:51:12 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-04-27T19:51:12Z</dc:date>
    <item>
      <title>Replace Internal CA - SSL Inspection with own certificate.</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Replace-Internal-CA-SSL-Inspection-with-own-certificate/m-p/18928#M665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Checkmates,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm testing the SSL Inspection on Checkpoint 790 with R77.20.75 firmware. With the dafault&amp;nbsp;internal certificate it works as described in the instructions.&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to the&amp;nbsp;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;sk121214, I can use my own certificate&amp;nbsp;by replacing the internal CA.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I'm trying to use one issued by our Private PKI server.&amp;nbsp;I can preview the certificate, but when I apply, the&amp;nbsp;firewall appliance load it, but with error: Invalid certificate file.&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64853_pastedImage_2.png" style="width: 620px; height: 376px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a result also the VPN service is affected, and my only option to recover is to Reinitialize Certificates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are the specific requirements for the replacing certificate, in addition to that it should be .p12 or .pfx?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Apr 2018 14:07:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Replace-Internal-CA-SSL-Inspection-with-own-certificate/m-p/18928#M665</guid>
      <dc:creator>Georgi_Lyaskov</dc:creator>
      <dc:date>2018-04-26T14:07:56Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Internal CA - SSL Inspection with own certificate.</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Replace-Internal-CA-SSL-Inspection-with-own-certificate/m-p/18929#M666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you confirm your private PKI server is issuing a&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;certificate authority&lt;/EM&gt;&lt;/STRONG&gt; key?&lt;/P&gt;&lt;P&gt;If it's not a CA key, it will not be considered valid.&lt;/P&gt;&lt;P&gt;You may also need to provide the entire certificate chain to the root CA so the gateway can validated the certificate.&lt;/P&gt;&lt;P&gt;This is because HTTPS Inspection generates certificates on the fly based on the CA key (either the one you provide or the one internally generated).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Apr 2018 16:33:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Replace-Internal-CA-SSL-Inspection-with-own-certificate/m-p/18929#M666</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-04-26T16:33:11Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Internal CA - SSL Inspection with own certificate.</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Replace-Internal-CA-SSL-Inspection-with-own-certificate/m-p/18930#M667</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No it wasn't. I've missed that explanation &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;.&amp;nbsp;Now I understand that&amp;nbsp;the Checkpoint should act as a sub issuing CA in our enterprise PKI.&lt;/P&gt;&lt;P&gt;It would be easier, if t&lt;SPAN style="color: #2a2a2a; background-color: #ffffff;"&gt;he firewall can create a request file for a subordinate CA certificate, as it will contain the required attributes. I assume the subject field can be anything and should have the following key usages&amp;nbsp;&lt;SPAN&gt;KEY_CERT_SIGN_KEY_USAGE&amp;nbsp; CERT_DIGITAL_SIGNATURE_KEY_USAGE.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #2a2a2a; background-color: #ffffff;"&gt;Is the checkpoint also going to create a new certificate for the VPN, based on the uploaded valid sub CA cert?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #2a2a2a; background-color: #ffffff;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #2a2a2a; background-color: #ffffff;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Apr 2018 07:45:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Replace-Internal-CA-SSL-Inspection-with-own-certificate/m-p/18930#M667</guid>
      <dc:creator>Georgi_Lyaskov</dc:creator>
      <dc:date>2018-04-27T07:45:24Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Internal CA - SSL Inspection with own certificate.</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Replace-Internal-CA-SSL-Inspection-with-own-certificate/m-p/18931#M668</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, a&lt;SPAN style="color: #2a2a2a; background-color: #ffffff;"&gt; new certificate for the VPN&lt;/SPAN&gt; is only created if you trigger that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Apr 2018 09:05:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Replace-Internal-CA-SSL-Inspection-with-own-certificate/m-p/18931#M668</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-04-27T09:05:11Z</dc:date>
    </item>
    <item>
      <title>Re: Replace Internal CA - SSL Inspection with own certificate.</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Replace-Internal-CA-SSL-Inspection-with-own-certificate/m-p/18932#M669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;That sounds right to me.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Apr 2018 19:51:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Replace-Internal-CA-SSL-Inspection-with-own-certificate/m-p/18932#M669</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-04-27T19:51:12Z</dc:date>
    </item>
  </channel>
</rss>

