- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello all,
Thank you for taking time to read this. I performed the following on an R80.40 install:
However, HTTPS Inspection failed because I used a server certificate, instead of a CA certificate. So now, I want to revert back to using the self-signed certificate which does generate a CA certificate, but this option is no longer available. From the SmartConsole -> Gateways & Servers -> Gateway Object -> HTTPS Inspection window, I can only view or export the existing certificate:
From Security Policies ->HTTPS Inspection -> HTTPS Tools -> Additional Settings (SmartDashboard) -> HTTPS Inspection -> Gateways , the only option is to Renew or Import:
I've tried disabling HTTPS Inspection, but that did not help either. I've also opened a ticket with CheckPoint and they recommended restoring from backup which unfortunately I do not have or performing a fresh install. They also recommended engaging Professional services.
Before I go this route has anybody encountered this issue or have a recommendation on how to generate the self-signed CA certificate?
TAC has not responded whether the above solution is appropriate or not, but I found the "easier" solution. The renew certificate button in the SmartDashboard is meant for the self-signed certificate that was initially created when HTTPS Inspection was activated.
Once you renew the certificate, you can immediately export this certificate from the SmartDashboard, even without pushing a policy.
After you push the policy, do not export the certificate from the SmartConsole. The SmartConsole will export the old certificate. What you have to do is close the SmartConsole and relaunch it. After relaunch, the export from the SmartConsole is the correct, current certificate.
This may be a bug or maybe it's by design -- I'm not sure, but that's how you revert back to the self-signed certificate from a third party certificate.
I’d have to check this one out in my lab to see if there is a way to clear out the external certificate.
Do you have a private CA in your environment? The self-signed cert doesn’t have to be the one you generated on the gateway.
I’ve seen a number of deployments where customers who use ADCS will use the same root CA that was used for 802.1x etc. since it is already deployed to their endpoints.
Hi mcatanzaro,
Thanks for responding.
No, we don't have a private CA in our environment. If I understand correctly
That sounds doable and I actually tried something similar on the gateway, but I am not sure how to set up the CA:
cpopenssl ca -startdate 2109100000000 -enddate 2909090000000 -in fw_cert.csr -out fw_cert.crt -config $CPDIR/conf/openssl.cnf
Using configuration from /opt/CPshrd-R80.30/conf/openssl.cnf
Error opening CA private key ./demoCA/private/cakey.pem
4158678668:error:02001002:system library:fopen:No such file or directory:bss_file.c:413:fopen('./demoCA/private/cakey.pem','r')
4158678668:error:20074002:BIO routines:FILE_CTRL:system lib:bss_file.c:415:
unable to load CA private key
I'm actually reading up on how to set up the CA. Would it be okay to do this on the gateway?
Sounds like you have done your research.
Regarding the question of using cpopenssl to accomplish this, in my mind I don’t see why it wouldn’t work since it is a port of openssl.
However, I would pose this solution in your TAC case so we can verify the proper syntax and level of support from the appropriate internal resources.
Hi mcatanzaro,
This is what worked for me:
Import .p12 certificate in SmartDashboard -> HTTPS Inspection -> CA Certificate
More detailed:
# Create CA directories and files. With Trail and Error and looking at the openssl.cnf file, these are the directories/files needed
mkdir ca_certificate
cd ca_certificate
mkdir demoCA
cd demoCA
mkdir {certs,crl,newcerts,private,crl,conf}
touch {index.txt,serial}
# Serial numbers are in hex and here we are starting with 1
echo "01" > serial
# Create private key for CA
cpopenssl genrsa -aes256 -out private/cakey.pem 4096
# Copy CheckPoint openssl configuration file to local configuration directory
cp $CPDIR/conf/openssl.cnf conf/
# Modify openssl.cnf
- In the [ req_distinguished_name ] section, change the default values to your appropriate environment
- In the [ usr_cert ] section, change the value for basicConstraint from FALSE to TRUE
# Create a certificate for this local CA
cpopenssl req -new -x509 -days 3650 -key private/cakey.pem -out cacert.pem -config config/openssl.cnf
# Generate a CSR on active gateway
cpopenssl req -new -newkey rsa:4096 -sha256 -out gw.csr -keyout gw.key -config <user generated config file including CN name and other data>
# Sign the CSR
cpopenssl ca -startdate 210910000000Z -enddate 290909000000Z -in gw.csr -out gw.crt -config conf/openssl.cnf
# Deploy certificate to end host
# Export the signed certificate in .p12 format
cpopenssl pkcs12 -export -out gw.p12 -in gw.crt -inkey gw.key
# Import the .p12 certificate from the SmartDashboard -> HTTPS Inspection -> CA certificate
# Push the policy
I submitted the above steps to the TAC. I probably won't here back until Monday, but it seems to work so far. Still testing...
Great to hear and good job.
Report back TAC’s findings from the case here or message me with them.
Would be nice to have this process documented if the product owners say it is supported.
TAC has not responded whether the above solution is appropriate or not, but I found the "easier" solution. The renew certificate button in the SmartDashboard is meant for the self-signed certificate that was initially created when HTTPS Inspection was activated.
Once you renew the certificate, you can immediately export this certificate from the SmartDashboard, even without pushing a policy.
After you push the policy, do not export the certificate from the SmartConsole. The SmartConsole will export the old certificate. What you have to do is close the SmartConsole and relaunch it. After relaunch, the export from the SmartConsole is the correct, current certificate.
This may be a bug or maybe it's by design -- I'm not sure, but that's how you revert back to the self-signed certificate from a third party certificate.
Most probably SmartConsole cache issue.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 40 | |
| 21 | |
| 9 | |
| 7 | |
| 7 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY