- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello Guys, I need your help regarding https.
We have a checkpoint deployment and want to enable https inspection but need a trusted certificate.
Please do advice on how/where to get this trusted certificates and types with details on how to make filtering sub https pages.
Thanks
Regards
Ewane,
In order to implement HTTPS inspection, you need to either use Root or sub-CA.
The easiest way to get this to work is to issue a self-signed certificate on your Check Point gateway and distribute it to PCs and servers in your organization via GPO, (or installed manually or scripted).
Alternatively, if you have an established PKI in your organization, you can create certificate in there and import it in Check Point gateways.
If you were thinking about using host certificate purchased from one of the vendors such as Comodo, GoDaddy, etc, this will not work.
I strongly suggest reading HTTPS Inspection FAQ and HTTPS inspection with 3rd party certificate shows browser error .
If you were thinking about using host certificate purchased from one of the vendors such as Comodo, GoDaddy, etc, this will not work.
Using such sub-CA keys for HTTPS Inspection purposes is explicitly against the Terms of Service of public CAs.
You can watch this short video that illustrates the process using manual root CA certificate installation process:
I found that when using https inspection that if an sub-https page is called for certificate exchange - in the client hello SNI field that the exchange will fail as the firewall detects the first packet is not a syn. The way I have bypassed this is downloading the "Application Control Signature Tool" from Checkpoint. You build your own app from the contents of the SNI field as if it were a Checkpoint built app. (Unfortunately you cannot add custom categories so I just use Government.) In my https inspection policies I bypass Government. It not perfect but it is allowing https inspection to run for all applications. Of course I have to build an app any time something fails.
Hello John,
It is possible to create a custom category and include all your self-signed build app instead of using Checkpoint already assigned category.
How?
Go to the application tab
click on application/sites
click on new and select category
add a name and click finish
Now when you are creating your application use that category new.

However, the custom categories do not appear in the list using the ACST.exe tool. Only Checkpoints standard categories. I am using ACST_v1.3.1.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 16 | |
| 13 | |
| 8 | |
| 7 | |
| 6 | |
| 4 | |
| 3 | |
| 3 | |
| 2 | |
| 2 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolFri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY