- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi,
While reviewing the SIC certificates on my SMS (cp_mgmt), I noticed there are multiple duplicates. Currently I can see 4 certificates:
CN=cp_mgmt (3 times)
CN=cp_mgmt_mysms
My goal is to clean this up and leave only one certificate with CN=cp_mgmt.
The doubt I have is:
👉 If I revoke these certificates and then create a new one (with CN cp_mgmt), will this impact Site-to-Site VPNs, SIC communication with existing gateways registered in SmartConsole, or any other component that depends on this certificate?
Specifically, I’d like to understand how this SMS SIC certificate interacts with other firewalls/gateways, and whether it is associated with anything else that could be affected by revocation.
These are the steps I plan to follow:
------------------------------------------------------------------------------------------
# Validate current certificates, should show 4:
cpca_client lscert -kind SIC -stat Valid | grep -iE "CN=cp_mgmt*"
# Backup of sic_cert:
cp $CPDIR/conf/sic_cert.p12{,_BACKUP}
# Revoke certificates with CN "CN=cp_mgmt":
cpca_client revoke_cert -n "CN=cp_mgmt"
# Revoke current certificate with CN "CN=cp_mgmt_mysms":
cpca_client revoke_cert -n "CN=cp_mgmt_mysms"
# Create new certificate with CN "CN=cp_mgmt":
cpca_client create_cert -n "CN=cp_mgmt" -f $CPDIR/conf/sic_cert.p12
# Restart services:
cprestart
# Validate CPM process:
watch -d api status
---------------------------------------------------------------------------------
Has anyone gone through this process before? Does revoking/recreating the SMS SIC certificate have any risk on gateway communication or S2S VPNs?
Any insights or recommendations would be highly appreciated 🙌
Thanks in advance!
I did this before and tunnels are fine, BUT, make sure to backup all those files and do it in maintenance window. Btw, you can open all gateways objects and see whats listed there under vpn, so you dont delete wrong thing. If you can, I would take backup and/or mgmt snapshot too.
Andy
@the_rock
I performed the activity following the steps described at the beginning of this post, and so far, we have had no reports of failures.
I did this before and tunnels are fine, BUT, make sure to backup all those files and do it in maintenance window. Btw, you can open all gateways objects and see whats listed there under vpn, so you dont delete wrong thing. If you can, I would take backup and/or mgmt snapshot too.
Andy
While reviewing SIC certificates on my gateways using:
cat /pfrm2.0/config1/fw1/registry/HKLM_registry.data | grep SIC
I noticed:
In MySICName, CN corresponds to the gateway name (SMB/branch firewall).
O is the same as the O value on the duplicate SMS SIC certificates (cp_mgmt and cp_mgmt_mysms).
Additionally, I checked the VPN certificates and noticed that the O field there is identical to the O on the SMS SIC duplicates, while the CN reflects the respective gateway.
From what I understand:
All gateways and SMS share the same ICA (O).
The CN is unique per gateway, but the authority (O) is the same.
VPN certificates seem to trust the same ICA, which may explain why revoking SMS SIC duplicates might not impact VPN tunnels.
My question is:
If I revoke the duplicate cp_mgmt certificates in the SMS and generate a new single CN=cp_mgmt, can I assume that:
SIC trust with gateways will remain intact
S2S VPNs will not be affected
…since the ICA (O) does not change?
I understand that the real risk would be losing the SMS private key associated with the active SIC certificate. Losing it would break the SMS’s ability to authenticate with gateways, but as long as I have a backup of sic_cert.p12 and/or a snapshot of the SMS, this risk should be mitigated.
Any clarification or confirmation from those who have done this safely would be greatly appreciated!
Technically, your assumption is right. Also, you would never see CN in server list for mgmt cert in smart console and O would ALWAYS show the same for that cert, as well as vpn ones for gateways managed by it.
Andy
From my lab and dont worry about ones that say john smith and ica mgmt, that was when I was testing ICA tool access, there is separate SE server, 1 cluster and 1 single gw.
Andy
[Expert@CP-MANAGEMENT:0]# cpca_client lscert -kind SIC -stat Valid
Operation succeeded. rc=0.
10 certs found.
Subject = CN=cp_mgmt,O=CP-MANAGEMENT..pi6w5j
Status = Valid Kind = SIC Serial = 24352 DP = 0
Not_Before: Wed Jul 3 19:39:19 2024 Not_After: Tue Jul 3 19:39:19 2029
Subject = CN=cp_mgmt,O=CP-MANAGEMENT..pi6w5j
Status = Valid Kind = SIC Serial = 32626 DP = 0
Not_Before: Wed Jul 3 19:39:26 2024 Not_After: Tue Jul 3 19:39:26 2029
Subject = CN=CP-FW-01,O=CP-MANAGEMENT..pi6w5j
Status = Valid Kind = SIC Serial = 32914 DP = 0
Not_Before: Wed Jul 3 21:17:44 2024 Not_After: Tue Jul 3 21:17:44 2029
Subject = CN=CP-SMARTEVENT,O=CP-MANAGEMENT..pi6w5j
Status = Valid Kind = SIC Serial = 40243 DP = 0
Not_Before: Wed Apr 9 10:04:56 2025 Not_After: Wed Apr 10 10:04:56 2030
Subject = CN=CP-GW,O=CP-MANAGEMENT..pi6w5j
Status = Valid Kind = SIC Serial = 44546 DP = 0
Not_Before: Tue Apr 8 15:39:36 2025 Not_After: Tue Apr 9 15:39:36 2030
Subject = CN=CP-FW-02,O=CP-MANAGEMENT..pi6w5j
Status = Valid Kind = SIC Serial = 50320 DP = 0
Not_Before: Wed Jul 3 21:18:24 2024 Not_After: Tue Jul 3 21:18:24 2029
Subject = CN=cp_mgmt,O=CP-MANAGEMENT..pi6w5j
Status = Valid Kind = SIC Serial = 64032 DP = 0
Not_Before: Wed Jul 3 19:39:10 2024 Not_After: Tue Jul 3 19:39:10 2029
Subject = CN=john_smith,OU=users,O=CP-MANAGEMENT..pi6w5j
Status = Valid Kind = SIC Serial = 71761 DP = 0
Not_Before: Sun Jun 29 13:56:17 2025 Not_After: Sun Jun 30 13:56:17 2030
Subject = CN=CP-MANAGEMENT,O=CP-MANAGEMENT..pi6w5j
Status = Valid Kind = SIC Serial = 79791 DP = 0
Not_Before: Wed Aug 14 15:10:32 2024 Not_After: Tue Aug 14 15:10:32 2029
Subject = CN=mgmt-ica,OU=users,O=CP-MANAGEMENT..pi6w5j
Status = Valid Kind = SIC Serial = 96322 DP = 0
Not_Before: Tue Sep 3 14:38:33 2024 Not_After: Mon Sep 3 14:38:33 2029
[Expert@CP-MANAGEMENT:0]#
Thanks again for your previous feedback—it was really helpful. I have another question regarding the SIC certificates on my SMS.
When I inspect the certificates, I notice that in the Issuer field, under O, it does not show the name of my current SMS.
A bit of history: this SMS console was originally attempted to be set up in HA, and I’m not sure if that could be the reason why there are currently duplicate SIC certificates (cp_mgmt and cp_mgmt_mysms).
I also noticed that in your lab screenshots, the O field matches the SMS name (CP-MANAGEMENT), which is different from what I see in my environment.
My questions are:
Normally, should the Issuer O field show the current SMS name, or is it expected to have another value (like the original SMS from the HA attempt)?
Could these duplicates be a leftover from the previous HA setup, or is this behavior normal?
I just want to understand if it’s expected that O doesn’t match the current SMS name, so I can proceed confidently with cleanup.
Thanks in advance for any clarification!
All good, questions are free lol
Can you give an example, I can check the lab? Gotta jump on harmony sase call shortly...fun times haha
Andy
Here’s an example from my environment for reference:
SMS certificate:
CN = cp_mgmt
O = ExampleName...abedfas (even though my SMS is called MySMS)
Gateway certificate:
CN = <gateway_name>
O = ExampleName...abedfas
Does O match in both cases?
Andy
Yes
Gateway AND mgmt?
Yes, in both
Then it would be fine. But again, in all honesty, and this is just my HONEST suggestion, apart from all you suggested and what we discussed, I would 100% get backup AND snapshot (if possible, of mgmt server) and definitely do open proactive case for this. I get every TAC is break-fix, but in cse something did happen (hopefully not), you have the case to rely on, without having to spend time having one created.
If you need me to test anything in ICA tool, let me know.
Best,
Andy
Not sure if you followed below, but if not, I would enable ICA mgmt tool, much easier.
Andy
@jennyado Sorry...I read your post CAREFULLY again and those steps make perfect sense to me. Honestly though, just to be on the safe side, I would open proactive TAC case myself, in case anything happens. I also attached some screenshots from my lab.
Andy
Also Jenn, if you are ever in doubt, just see what this line says on your side...this HAS TO MATCH for all gateways (or entities if you will) managed by that mgmt server.
Andy
Issuer: O=CP-MANAGEMENT..pi6w5j (my lab example)
What I recall from having to recreate MultiDomain SIC as the renewal didn't work at the point where whe did change the SIC for the Domain with a lot of VPN's we created an outage.
It was a short one as we had a team doing SIC reset like crazy and it was announced.
But if this was the issue with Domain SIC that was based on a new certificate.
Think of if like build a new CA and issueing certificates from it.
So I would schedulke an outage.
I agree with you Hugo 100%. In my opinion, this would be way too risky to do during regular hours.
Andy
@the_rock
I performed the activity following the steps described at the beginning of this post, and so far, we have had no reports of failures.
Excellent job, glad you got it working.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
31 | |
17 | |
5 | |
4 | |
3 | |
3 | |
3 | |
3 | |
2 | |
2 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY