Recently, I have deployed Remote Access VPN with "Endpoint Security Client" - Windows. It is working fine as it should be by following the Remote Access VPN User guide and with TAC's help.
The deployment model is "Personal Certificate" and Username Password".
1 - First Certificate get Authenticated and then
2 - AD Username and Password.
But I still don't understand how PKI is working with my Internal MS CA, Checkpoint Gateway and Endpoint Security Client where it looks into CAPI Storage.
Please anyone could give insight between Certificate handling of HOW and WHERE key get installed?
In the log, I could see that Key Install and Cookies been Created.
How can I verify that I'm using the correct certificate that I exclusively created for this purpose from Internal MS CA and then imported into Checkpoint Gateway? I used "cpopenssl" utility to create initial .csr and my_key.key