- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi,
we have our Checkpoint manager behind another device doing HTTPS inspection, what we need is to import its cert as a trusted root ca to the operating system so its trusted, like you would need to do for all Windows/Linux clients behind a checkpoint gateway doing inspection.
Is this possible? I have tried adding it to the https inspection blade trusted CA list but it still shows an untrusted error when connecting.
Can we access the cert store on a checkpoint box?
cheers
Here is the note I made:
How to get updates working when there is an upstream Proxy doing Deep SSL Inspection:
You will need to export the CA file from the upstream device and then add this to the ca-bundle.crt file in two locations on the Checkpoint Manager (assuming that this is where the issue is).
$CPDIR/conf/ca-bundle.crt <-- This is so that Application level updates can work.
$FWDIR/bin/ca-bundle.crt <-- This is so that GAIA level updates work.
Note this has been tested from a R80.40 SMS. However important to note that the file could change as part of upgrade or jumbo installation.
Additionally the above solution is not supported by TAC.
Did you follow sk108202: Best Practices - HTTPS Inspection and use "Update certificate list" option ?
Hi yes I have read that, however it's not really my case, my checkpoint manager is not doing https inspection and should have no configuration relating to that, its behind another device doing https inspection (for arguments sakes lets say its not a checkpoint nor a device we have management of and bypassing is not possible), how can I make the manager trust it as a root CA?
Is there access to the gaia system cert store I can drop the certificate in? normal linux systems you can copy and paste the cert to ca-certificates folder but I dont see any such folder on checkpoint
I've done something similar, but sure if its applicable in this case.
My requirement was to allow the CP Mgr access to the internet via a Fortigate which was doing https inspection. Therefore the only way to achieve this was to ensure the Fortigates certificate was trusted by the Mgr.
We had to add the cert in two places, the reason for this was to firstly ensure the Application level could get updates ie. IPS etc, and secondly so that the OS could get updates, ie. Jumbos etc.
The way I got it working was never confirmed as a supported solution by TAC, but at the same time they never really gave me a solution either.
Is this what you want to do?
yes 100% what i need!
Could you please share how to do it? thanks!
Here is the note I made:
How to get updates working when there is an upstream Proxy doing Deep SSL Inspection:
You will need to export the CA file from the upstream device and then add this to the ca-bundle.crt file in two locations on the Checkpoint Manager (assuming that this is where the issue is).
$CPDIR/conf/ca-bundle.crt <-- This is so that Application level updates can work.
$FWDIR/bin/ca-bundle.crt <-- This is so that GAIA level updates work.
Note this has been tested from a R80.40 SMS. However important to note that the file could change as part of upgrade or jumbo installation.
Additionally the above solution is not supported by TAC.
thank you!! that did the trick.
Hey,
On which machine should you edit the CA-Bundle file mgmt or gateways?
Do I need to run an update command? for example "rehash_ca_bundle?
Thank You
- mgmt
- no, you add it manually
My purpose is to add our local root Certificate as we're having some issues, wondering if this will solve the inspection issue.
Do we just add the root certificate as text to this bundle-ca.crt file and nothing else?
Root CA and any intermediate CAs needed to validate the relevant certificates.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
12 | |
9 | |
7 | |
6 | |
6 | |
5 | |
5 | |
5 | |
5 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY