- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Dear Mates,
After replacing the certificate on one Identity Broker cluster and checking the status on the others, all peers show as Connected except for one specific site.
On that site, after the certificate replacement, the command
pdp broker status -e
shows Peer certificate verification failed.
i already this that > You need to fetch the CERT Fingerprint from the subscriber via $FWDIR/bin/BrokerCertFetcher <IP Address of Subscriber>
the issue was solved becuase in the identity_broker.C the subject was wrong i dont know why?
After fixed this one, now it's solved.
Hey bro,
I ran this through chatgpt (for what is worth) and it gave some things that to me, at least, make sense.
Andy
*************
Mismatched trust chain
The certificate presented by the peer is not signed by a CA trusted by the PDP.
Intermediate CA certs missing in the chain.
Expired certificate
The peer’s certificate has expired.
Wrong CN/SAN
The peer certificate’s Common Name (CN) or Subject Alternative Name (SAN) does not match the expected hostname/FQDN.
Certificate not yet valid
Time/date mismatch on one of the machines.
Not installed in proper trust store
The CA or peer certificate isn’t properly imported into the PDP’s trust store (e.g., $FWDIR/conf/pdp/).
Check the certificate directly
pdp broker status -v
(verbose output should show more details about which certificate it is failing to validate)
Verify date/time
date
Ensure both machines (PEP/PDP) have correct NTP sync.
List trusted CAs
pdp broker trust list
Make sure the issuing CA is present.
Reimport the CA certificate
If missing, import the peer’s CA certificate with:
pdp broker trust add <CA_cert_file>
Then re-check with:
pdp broker status -e
Check hostname vs CN
The CN or SAN in the peer certificate must match the hostname you use in pdp broker connect.
You need to fetch the CERT Fingerprint from the subscriber via $FWDIR/bin/BrokerCertFetcher <IP Address of Subscriber>
it is all described here: https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/Topic...
you probably will face the Problem on your other PDP Broker as well, when they will check the cert again. Before you fetch the new cert via the mentioned command delete the old .pem
You want to do the whole cert replacement process during a maintenace Window to restart the pdp process the make sure, the other Brokers accept the new cert fingerprint.
best regards
i already this that > You need to fetch the CERT Fingerprint from the subscriber via $FWDIR/bin/BrokerCertFetcher <IP Address of Subscriber>
the issue was solved becuase in the identity_broker.C the subject was wrong i dont know why?
After fixed this one, now it's solved.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 12 | |
| 10 | |
| 9 | |
| 8 | |
| 6 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 1 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY