<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disabling CRL checking for centrally managed VPNs in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disabling-CRL-checking-for-centrally-managed-VPNs/m-p/4883#M76</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't see why you couldn't apply the SK you referenced to solve the issue, even if you're using SmartProvisioning.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 02 Aug 2017 03:24:20 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2017-08-02T03:24:20Z</dc:date>
    <item>
      <title>Disabling CRL checking for centrally managed VPNs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disabling-CRL-checking-for-centrally-managed-VPNs/m-p/4882#M75</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have many 1100/1400 smart provisioned, centrally managed appliances which do CRL check with management server (fw1_ica_services port)&amp;nbsp;&amp;nbsp;and if check fails tunnel is dropped with default of 24h. Is there a way to disable this check i.e. sk21156 ? I don't need CRL check&amp;nbsp;because if I don't want appliance to have tunnel up I will terminate the provisioned object on mgmt server. Please advice&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Aug 2017 13:10:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disabling-CRL-checking-for-centrally-managed-VPNs/m-p/4882#M75</guid>
      <dc:creator>Irek_Romaniuk</dc:creator>
      <dc:date>2017-08-01T13:10:30Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling CRL checking for centrally managed VPNs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disabling-CRL-checking-for-centrally-managed-VPNs/m-p/4883#M76</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't see why you couldn't apply the SK you referenced to solve the issue, even if you're using SmartProvisioning.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Aug 2017 03:24:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disabling-CRL-checking-for-centrally-managed-VPNs/m-p/4883#M76</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-08-02T03:24:20Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling CRL checking for centrally managed VPNs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disabling-CRL-checking-for-centrally-managed-VPNs/m-p/4884#M77</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct. It's not really an issue, CRL check is default (by design) but I think it creates&amp;nbsp;Denial of Service risk because the port has to be opened on public IP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Aug 2017 11:56:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disabling-CRL-checking-for-centrally-managed-VPNs/m-p/4884#M77</guid>
      <dc:creator>Irek_Romaniuk</dc:creator>
      <dc:date>2017-08-03T11:56:07Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling CRL checking for centrally managed VPNs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disabling-CRL-checking-for-centrally-managed-VPNs/m-p/142341#M6459</link>
      <description>&lt;P&gt;Thanks, killing the CRL check solved my problem. My management server is nat'd behind a firewall on a large private secondary network.&amp;nbsp; &amp;nbsp;Support was sending me down the path of disabling all of my implied rules. That was not going to happen.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Feb 2022 19:31:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disabling-CRL-checking-for-centrally-managed-VPNs/m-p/142341#M6459</guid>
      <dc:creator>Mike922</dc:creator>
      <dc:date>2022-02-23T19:31:03Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling CRL checking for centrally managed VPNs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disabling-CRL-checking-for-centrally-managed-VPNs/m-p/193399#M9535</link>
      <description>&lt;P&gt;Is anyone aware of an emergency procedure to disable this check on the gateways only?&amp;nbsp; Say the primary and secondary management is down (assuming there is even a secondary).&amp;nbsp; It would be great to have a way to disable the check on the gateway itself without deploying policy.&amp;nbsp; This would allow the use of CRL check but just in case of that 1 big disaster that takes out&amp;nbsp; management and it isn't recovered in 24 hours, you can keep your other gateways communicating through their managed VPN (certificates only work for that).&lt;/P&gt;</description>
      <pubDate>Sat, 23 Sep 2023 02:29:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disabling-CRL-checking-for-centrally-managed-VPNs/m-p/193399#M9535</guid>
      <dc:creator>stat4299</dc:creator>
      <dc:date>2023-09-23T02:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling CRL checking for centrally managed VPNs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disabling-CRL-checking-for-centrally-managed-VPNs/m-p/193456#M9541</link>
      <description>&lt;P&gt;You can disable CRL verification for VPNs on the management side, but I do not think there is a way to do that on the GW side, let alone on SBM appliances.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Sep 2023 06:49:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disabling-CRL-checking-for-centrally-managed-VPNs/m-p/193456#M9541</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-09-25T06:49:55Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling CRL checking for centrally managed VPNs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disabling-CRL-checking-for-centrally-managed-VPNs/m-p/194701#M9589</link>
      <description>&lt;P&gt;I think the following will work on the gateway, see &lt;A href="https://community.checkpoint.com/t5/General-Topics/Failure-to-fetch-updates-from-CheckPoint-servers/m-p/87250#M17515" target="_self"&gt;here&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;CODE&gt;cpprod_util CPPROD_SetValue "CPshared//6.0//reserved//libCurl" crl_disable 1 1 1&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2023 17:34:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disabling-CRL-checking-for-centrally-managed-VPNs/m-p/194701#M9589</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-10-10T17:34:27Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling CRL checking for centrally managed VPNs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disabling-CRL-checking-for-centrally-managed-VPNs/m-p/264641#M13488</link>
      <description>&lt;P&gt;Hello Timothy&lt;BR /&gt;&lt;BR /&gt;I used the command you shared in order to d&lt;SPAN class=""&gt;isabling CRL checking with success.&lt;BR /&gt;The&amp;nbsp; CRL checking was preventing to work a VPN tunnel between to Check Point CAs (SMSs). The link to the issue bellow:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/R82-Site-to-site-VPN-authentication-issue-when-using/m-p/262264/thread-id/51492#M52035" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/R82-Site-to-site-VPN-authentication-issue-when-using/m-p/262264/thread-id/51492#M52035&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Thanks for your help&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Miguel&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Dec 2025 13:17:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disabling-CRL-checking-for-centrally-managed-VPNs/m-p/264641#M13488</guid>
      <dc:creator>patones1</dc:creator>
      <dc:date>2025-12-06T13:17:07Z</dc:date>
    </item>
  </channel>
</rss>

