Hi everyone,
I’m managing a centrally managed SMB appliance that does not use the IPSec VPN blade (no site-to-site or remote access VPNs configured).
Recently, I noticed that the IPSec certificate was about to expire, so I temporarily enabled the IPSec VPN blade and clicked Renew, but I did not publish the changes.
After that, I disabled the blade again and then published the changes.
Since then, whenever I try to view the certificate in SmartConsole → IPSec VPN → Certificate, I get the message:
Failed to read certificate from database
And when I try to renew it again:
Generated keys was not found in database
The gateway is fully operational, SIC communication works fine, and there are no VPNs or blades relying on IPSec.
My main questions are:
Could this inconsistent VPN certificate state affect anything operationally (e.g., SIC trust, policy installation, etc.)?
Is there a recommended way to “clean up” or reinitialize the missing certificate reference without re-enabling the VPN blade?
Has anyone seen this behavior before when enabling/disabling the VPN blade without publishing in between?
Environment details:
Thanks in advance for any insights or similar experiences!