Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
nilanjan_lahiri
Explorer
Jump to solution

Query regarding Checkpoint Capsule VPN and Gen2 SSL Certificate issue

Hello All,

I have two queries please :-

1) Our SSL certificate for connecting to VPN is due to expire in November. We tried to renew with a new Gen2 certificate, But colleagues using Capsule VPN to connect were not able to go through. However, those using Checkpoint VPN Client didn't face any challenge. We reverted to a new Gen1 certificate which resolved the issue but the challenge is, from April 2026, Gen1 certificates will no longer be available. So we will need to migrate to Gen2 certificates down the line. Any idea, if anything needs to be done on the end user system end for the Capsule VPN to work with Gen2 certificate. 

2) My second query is, can someone please give me the proper contact for purchasing TAC support. We have Checkpoint 6400 with R80.40. Conscious that it already has reached End of Support, still will be worth to know the best approach forward to upgrade to Gen2 certificate from the Checkpoint TAC team (I am not sure if Checkpoint offers TAC support for EoS software). 

 

Thank You,

Nilanjan

0 Kudos
2 Solutions

Accepted Solutions
the_rock
MVP Gold
MVP Gold

 

  • Yes, user-systems (especially those using Capsule VPN) likely will need changes: trust chain, client update, certificate import/enrolment, possibly name/SAN alignment. Don’t assume the gateway change alone will suffice.

  • For TAC/support: because your R80.40 is end of support, you will need to work with Check Point (or partner) to either renew extended support (if possible) or upgrade your gateway/software to a supported version. Contact your Check Point partner or local region check-point office to get a quote for Support & Maintenance or upgrade.

 

Best,
Andy

View solution in original post

0 Kudos
PhoneBoy
Admin
Admin

Capsule VPN (whether on Windows, Android, or iOS) is a supplicant for VPN functionality built into the OS, the version of which wasn't stated in your message.
I imagine this will have an impact on supported certificate types, though I'm not sure what Gen1/Gen2 is, exactly.

As far as purchasing support goes, it must be done through a partner.
We have a complete list of partners (searchable by region/location) here: https://partnerlocator.checkpoint.com/#/ 
We do offer post-EoS support in some circumstances, though I don't know all the specifics. 

View solution in original post

6 Replies
the_rock
MVP Gold
MVP Gold

 

  • Yes, user-systems (especially those using Capsule VPN) likely will need changes: trust chain, client update, certificate import/enrolment, possibly name/SAN alignment. Don’t assume the gateway change alone will suffice.

  • For TAC/support: because your R80.40 is end of support, you will need to work with Check Point (or partner) to either renew extended support (if possible) or upgrade your gateway/software to a supported version. Contact your Check Point partner or local region check-point office to get a quote for Support & Maintenance or upgrade.

 

Best,
Andy
0 Kudos
nilanjan_lahiri
Explorer

Hello @the_rock,

Please could you let me know the steps required to be followed at the end user system (Windows 11) for the Capsule VPN to work with Gen2 SSL certificates.

Thank You

0 Kudos
the_rock
MVP Gold
MVP Gold

Maybe best to get an official TAC answer, but this is what AI gives.

***************************

Before I outline the steps, a caveat: “Gen2 SSL certificates” is somewhat ambiguous (could refer to a newer generation / version of certs, or a specific vendor’s “Gen2” type). The instructions below assume “Gen2 SSL certificate” behaves like a standard X.509 user certificate / CA‐issued certificate chain, usable for VPN / client authentication. Adjust as needed to your specific “Gen2” setup.

Here’s a general outline of what the user must do on a Windows 11 client (end user system) so that the Check Point / Capsule VPN can use the SSL / certificate-based authentication. (These steps assume the server / gateway side is already configured properly to accept certificate auth.)


High-level prerequisites (on server / PKI / policy side)

Before the end user actions, the following must already be in place (by the VPN / network / security team):

  1. A CA issues “Gen2 SSL certificates” (or the appropriate user certificates) that are trusted by the VPN server / gateway.

  2. The VPN gateway / Check Point appliance has the root / intermediate CA certificates in its trusted store so it can validate user certificates.

  3. The VPN gateway’s configuration (in SmartConsole / SmartDashboard or equivalent) is set to allow certificate authentication (or EAP-TLS / client certificate mode) for the VPN (Capsule / mobile VPN) service.

  4. The server/gateway has generated a CSR (if needed) and installed its server certificate (so the client can trust the server certificate). (knowledge.digicert.com)

  5. The server policy is pushed, and the gateway is ready to validate connecting clients’ certificates.

Once that infrastructure is ready, the user steps on Windows 11 are as follows.


Steps on Windows 11 (end user side)

Below is a recommended sequence. Depending on your environment (e.g. via Intune, group policy, manual install, or certificate auto-enrollment), some steps may be automated or differ slightly.

Step Description Notes / Tips
1 Obtain the client certificate (and key) The user (or device) needs a certificate & private key. This might be delivered via: • A PFX / PKCS#12 file (.p12 / .pfx) • Auto-enrollment via your organization’s PKI (SCEP, AD CS, Intune, etc.) • Certificate enrollment portal • Smartcard / hardware token • An MDM/endpoint management push
2 Import the certificate into the Windows certificate store Use Microsoft Management Console (mmc) or certmgr to import the PFX / certificate + key into the “Personal” / “My” certificate store (Current User). Ensure private key has the correct permissions for usage.
3 Ensure the root / intermediate CA certs are trusted The root and intermediate CAs that issued the user’s certificate must be in the Trusted Root Certification Authorities and Intermediate Certification Authorities stores (Current User or Local Computer) so Windows and the VPN client trust it.
4 Install / configure the Capsule VPN client (if not already installed) Download and install the Check Point / Capsule VPN / Mobile VPN client for Windows (as provided by your IT / service desk). For Windows 11, the client must support certificate authentication.
5 Configure a VPN site / profile with certificate authentication In the VPN client setup: • Specify the VPN gateway hostname / address • Choose Certificate (or “Client Certificate / Certificate-based auth”) as the authentication method instead of username/password • Select which certificate (from store) to use (if the client prompts) • Optionally specify if “Always On” or “automatic connect” behavior is desired • (Optional) specify whether all traffic goes through the VPN or only selected subnets
6 Validate / accept the server’s SSL certificate / fingerprint On first connection, the client may present the server’s certificate or fingerprint and ask the user to accept/trust it. The user should verify that the certificate / fingerprint matches what IT has provided. (This step prevents a man-in-the-middle or untrusted server.)
7 Initiate the VPN connection Use the client’s “Connect” operation. The client will present the user certificate to the server, the server will validate it (checking certificate chain, revocation, allowed users) and allow connection if valid.
8 Troubleshoot / validate If connection fails, check: • Certificate validity (expiration, revoked, correct usage) • Certificate chain / trust chain • Private key presence and permissions • That the gateway is configured to accept your certificate • Logs on the client / server for authentication failures • That the certificate has the required key usage / extended key usage (EKU) for client auth (e.g. Client Authentication usage) • That the certificate supports signing / digital signature (if required) (RSA Community)

Example / Extra Context: Using Capsule with certificate auth via Intune (or managed deployment)

To streamline the above, many organizations push the VPN configuration via Intune or MDM and also auto-enroll the certificate. For example:

  • Use a SCEP profile or PKCS certificate profile in Intune to auto-enroll the user or device certificate.

  • Use a VPN configuration profile (of type “Check Point / Capsule”) in Intune, specifying certificate authentication (and specifying which certificate / certificate store to use).

  • The client then gets the VPN configuration and the certificate without manual steps for the end user.

  • One user on Reddit reported that in their environment, the first connection still prompted the certificate selection manually unless special configuration or PowerShell scripts are used. (Reddit)

  • Also, Check Point documentation suggests there are specialized support articles / PowerShell commands for automating the certificate selection in Capsule for Windows. (E.g. see Support SK107535) (Reddit)


 

Best,
Andy
0 Kudos
PhoneBoy
Admin
Admin

Capsule VPN (whether on Windows, Android, or iOS) is a supplicant for VPN functionality built into the OS, the version of which wasn't stated in your message.
I imagine this will have an impact on supported certificate types, though I'm not sure what Gen1/Gen2 is, exactly.

As far as purchasing support goes, it must be done through a partner.
We have a complete list of partners (searchable by region/location) here: https://partnerlocator.checkpoint.com/#/ 
We do offer post-EoS support in some circumstances, though I don't know all the specifics. 

nilanjan_lahiri
Explorer

Thank you very much for your assistance to find out the partner.


Coming to the end user accessing via Capsule VPN, they are Windows 11 laptops (with a few Win 10 to be migrated to Win 11 by the next one month or so)

0 Kudos
PhoneBoy
Admin
Admin

It would make sense that Windows 11 might require "newer" certificates (no idea what this means on a technical level).
It will certainly require upgrading to a supported release on the gateway side, possibly even to R82.10 which will update the underlying OpenSSL to a more recent version (3.5 versus 1.1.1w in R82).

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events