- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Short answer: the gateway has the private key, both have the public key.
This is consistent with how the RSA cryptosystem works, which is the basis for IPsec VPN, TLS, SIC, and others.
VPN Certificates come from the Internal Certificate Authority (ICA), which exists on the management and is based on the
Whether it's a device separate from the gateway or the same device (i.e. locally managed) doesn't matter.
When a Check Point gateway is first installed, it generates a unique private key, which is then signed by the ICA when SIC is established.
Much like when you issue a Certificate Signing Request for a certificate to a public CA for a website, the ICA does not need to know the gateway's private key in order to sign the certificate.
We do not provide a mechanism to export private keys from the gateway.
It is trivial (and more secure) to generate a new keypair signed by the same Certificate Authority as before.
I have read the document you sent. I am aware that:
- ICA is part of Check Point suite used to create SIC trusted connection between Security Gateways, admin authentication and third party servers. The ICA provides certificates for Internal Secure Gateways and remote access clients that negotiate VPN links.
- The ICA Management Tool runs on Security Management Server / Multi-Domain Security Management Server.
However:
- A certificate is automatically issued by the Internal Certificate Authority for all internally managed entities that are VPN-capable. That is, after the administrator enables the IPsec VPN Software Blade in a Security Gateway or Cluster object
- IPSec VPN Software Blade is a feature that belongs to the security gateway.
I am not a checkpoint vpn deployer. I am dealing with this for import and export. What I need to know is where is the vpn private key generated and stored? on the security gateway (such as SG6200) or on the management device (smart-1)?
Short answer: the gateway has the private key, both have the public key.
This is consistent with how the RSA cryptosystem works, which is the basis for IPsec VPN, TLS, SIC, and others.
VPN Certificates come from the Internal Certificate Authority (ICA), which exists on the management and is based on the
Whether it's a device separate from the gateway or the same device (i.e. locally managed) doesn't matter.
When a Check Point gateway is first installed, it generates a unique private key, which is then signed by the ICA when SIC is established.
Much like when you issue a Certificate Signing Request for a certificate to a public CA for a website, the ICA does not need to know the gateway's private key in order to sign the certificate.
We do not provide a mechanism to export private keys from the gateway.
It is trivial (and more secure) to generate a new keypair signed by the same Certificate Authority as before.
I understand your answer. But can we show the private key.
My colleague has read the documentation but asserts that smart-1 is the source of the private-public key pair.
Quote: "Instead of the Security Management Server generating both public and private keys and downloading them to the module during a policy installation, the management server instructs the module to create its own public and private keys and send (to the management server) only its public key." page 77/Site to Site VPN R81 Administration Guide
Is there any document that clearly states that: security gateway is where the private key is generated and stored, not smart-1?
The quote you provided from the documentation confirms the explanation:
The end result: only the gateway has the private encryption key.
We don't provide a mechanism to show the private key on the gateway.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 22 | |
| 15 | |
| 7 | |
| 6 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolFri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY