- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
How can I create a new CSR (Certificate Signing Request) for outbound certificate for external CA ? The CA is a windows CA server.
We have it documented here: https://support.checkpoint.com/results/sk/sk165856
Not sure if below steps make 100% sense, but looks okay to me.
Andy
******************
You can generate the CSR either:
On the Check Point Security Gateway / Management Server (Gaia CLI or SmartConsole)
Externally (Windows/Linux) and then import the signed certificate + private key
Best practice: generate the CSR directly on the Check Point box where the private key will be used, so the key never leaves the device.
Log into the Gaia Portal (https://<mgmt_or_gateway_IP>).
Go to:
Device > Certificates > Outgoing Certificates
Click Add > Create Certificate Signing Request (CSR).
Fill in the fields:
CN (Common Name): typically the FQDN used for outbound TLS (e.g., proxy.company.com)
O (Organization), OU, L, ST, C as required by your CA policy
Key length: 2048 or 3072 bits (depending on your CA requirements)
Save/Generate → This will create a .csr
file.
Download the CSR file.
On your Windows CA server:
Open Certification Authority MMC.
Right-click the CA → All Tasks → Submit new request.
Or, if using web enrollment, open:http://<CAserver>/certsrv
→ Request a certificate → Advanced certificate request → Submit CSR.
Choose the correct certificate template (e.g., Web Server, Subordinate CA, etc., depending on usage).
Submit and download the signed certificate (usually .cer
or .p7b
).
Go back to Gaia Portal → Device → Certificates → Outgoing Certificates.
Select your pending CSR request.
Click Import Certificate and upload the .cer
(or export from CA as Base64 if needed).
Once imported, the status will change to Valid.
If you prefer CLI:
# Create a new private key and CSR
openssl req -new -newkey rsa:2048 -nodes -keyout outbound.key -out outbound.csr
Transfer the .csr
to your Windows CA, sign it, then bring the .cer
back.
Import both .key
and .cer
into Check Point with cpca_client
or via Gaia Portal.
Hi
There is no such menu in Gaia GUI: Device > Certificates > Outgoing Certificates
I will try what emmap suggested
Fair enough, its an official CP documentation anyway.
Andy
We have it documented here: https://support.checkpoint.com/results/sk/sk165856
Perfect, even better!
Andy
I followed sk165856, But instead of step 6 i used the method below (since step 6 failed and generated this error: unable to load certificates
-Run "cpopenssl pkcs12 -export -in inspection-ca.cer -inkey inspection-key.pem -out inspection.pfx"
-After got the certificate in .pfx format, rename it to .p12 format
-Import to smart console.
OK, you haven't included the rootCA in there, so if you have trust issues from endpoints that are trusting that root CA that might be why. Let us know how you go anyway.
Thx! I'll let you know.
The root-ca is the internal organizational ca, so to the best of my knowledge, every domain member should trust it.
Maybe it was wrong cert extension?
I'm not sure. I don't believe file extensions really matter when using openssl
I am fairly sure to import it into smart console, it would have to be .p12 extension, but I could be mistaken.
Andy
You are correct. Smart console only looking for p12 file. That's why there is a rename extension step in the workaround I guess.
So, on step 6, since you said thats where it faisl it only gives that error unable to load certificate?
Andy
Correct. And seems like I'm not the only one. But with the workaround everything seems to be working. I already made some test and the endpoint can see the certificate that the firewall issues and it is trusted as the root-ca is a trusted CA of the endpoint
Well, as long as all the relevant certs are included in truster root store on user's PC, then you are good.
I made post about this as well.
Andy
https://community.checkpoint.com/t5/Security-Gateways/Https-inspection-tip/m-p/219139
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
12 | |
10 | |
7 | |
6 | |
6 | |
5 | |
5 | |
5 | |
5 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY