- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Yesterday I had an incident with my IPSEC tunnels with branches (they are established by certificate) because the virtual firewall certificate expired.
Attached the image of the Gw, had to renew the certificate to restore the service
The question is: The Firewall can send a notification warning that a certificate is about to expire?, ¿What configuration is required for the Firewall could send the notification?
thanks for your help
...and sk31539 tells us that
The Security Management server generates a report, per Security Gateway, warning about those certificates that will expire within 60 days time from the current date. This functionality is always enabled and the 60 days is a fixed warning period.
...
You could check on CLI using sk104400:
# cpca_client lscert -stat Valid -kind IKE
Operation succeeded. rc=0.
1 certs found.
Subject = CN=cpmodule VPN Certificate,O=Example_Management_Server.checkpoint.com.d2hitj
Status = Valid Kind = IKE Serial = 91912 DP = 1
Not_Before: Wed Jan 14 14:19:02 2015 Not_After: Tue Jan 14 14:19:02 2020
Hi @raquinog , @Peter_Baumann , @Anthony_Vita
Nowadays the firewall is sending notification that a certificate is about to expire in two places
1. 'info' status as part of policy installation:
2. In VPN log:
As @G_W_Albrecht mentioned, You can also monitor VPN certificates of all Virtual systems / Security gateways from Security Management via single CLI command:
cpca_client search "VPN certificate"
We are about to Improve the alert during Policy installation – to Changing from ‘info’ to ‘warning‘
The improvement will be released in R81.20 and also be ported to all R8X.XX JHFs
We are looking for other ways to alert about VPN certificate expiry, such as red “X” for the Gateway object when the VPN certificate is expired / Yellow Warning sign when the certificate is about to expire soon (e.g 60 days or less)
Thanks,
Matan
I made this simple script for crontab. It may be usefull for you
#!/bin/sh
source /etc/profile.d/CP.sh
CERTIFICATE=`cpca_client lscert -stat Valid -dn <SubString>`
#get string with expiration date from certificate info
CERT_INFO=`cpca_client lscert -stat Valid -dn <SubString> | grep Not_After`
#make list with expiration date, month and year
EXPIRED=$(python -c "lst='$CERT_INFO'.split('Not_After:'); print(lst[1].split())")
#get expiration day
EXPIRED_DATE=$( python -c "print($EXPIRED[2])" )
#get expiration month
EXPIRED_MONTH=$( python -c "print($EXPIRED[1])" )
#get expiration year
EXPIRED_YEAR=$( python -c "print($EXPIRED[-1])" )
DIFF=$(python -c "from datetime import (date, datetime); print date(2023, datetime.strptime('$EXPIRED_MONTH','%b').month, 11).toordinal() - date.today().toordinal()")
if [ $DIFF -lt 30 ];
then
echo -e "Subject: CheckPoint VPN certificate expiration\r\n\r\nVPN certificate will be expired in $DIFF days.\r\n\n\n $CERTIFICATE.\r\n " | sendmail --domain=<domain name> -f <from_email> -v <to_email> --host=<smtp_server>
fi
Acording to SK102092, gateway does not alert about certificates expiration without installing a Security policy
...and sk31539 tells us that
The Security Management server generates a report, per Security Gateway, warning about those certificates that will expire within 60 days time from the current date. This functionality is always enabled and the 60 days is a fixed warning period.
...
You could check on CLI using sk104400:
# cpca_client lscert -stat Valid -kind IKE
Operation succeeded. rc=0.
1 certs found.
Subject = CN=cpmodule VPN Certificate,O=Example_Management_Server.checkpoint.com.d2hitj
Status = Valid Kind = IKE Serial = 91912 DP = 1
Not_Before: Wed Jan 14 14:19:02 2015 Not_After: Tue Jan 14 14:19:02 2020
There is an interesting topic on CheckMates with a lot of valuable information about this: Third Parties Certificate details
Hi @raquinog ,
A customer of us had the same problem, no indication when instaling the policy about the expired certificate.
The feature should be always activated but it seems that it is not working.
Nobody knows why, so we will open a case for it.
Thanks,
Peter
Just had the same issue. We're you able to figure out why the feature doesn't work?
Hi @Anthony_Vita ,
We opened a case and there was a lot of troubleshooting involved. Unfortunately it leads not to a solution and was closed by check point/customer.
Hi @raquinog , @Peter_Baumann , @Anthony_Vita
Nowadays the firewall is sending notification that a certificate is about to expire in two places
1. 'info' status as part of policy installation:
2. In VPN log:
As @G_W_Albrecht mentioned, You can also monitor VPN certificates of all Virtual systems / Security gateways from Security Management via single CLI command:
cpca_client search "VPN certificate"
We are about to Improve the alert during Policy installation – to Changing from ‘info’ to ‘warning‘
The improvement will be released in R81.20 and also be ported to all R8X.XX JHFs
We are looking for other ways to alert about VPN certificate expiry, such as red “X” for the Gateway object when the VPN certificate is expired / Yellow Warning sign when the certificate is about to expire soon (e.g 60 days or less)
Thanks,
Matan
Sorry to resurrect such an old post but we are running R81.10 mgmt/gateway, which I see in the screenshots, and I'm not seeing any of these expiring cert messages in my logs on the key installs. We should have some recently because we had a VPN cert expire this weekend which went un-noticed. I'd like to incorporate these logs into an alerting mechanism in our SIEM.
Do you know when this became available or did this get pushed to R81.20?
Hi @Heath
Sorry for the inconvenient.
By checking the code, it seems that the log exist at least since R80.30.
In case you can't find it, you may open a ticket to Check Point support.
I made this simple script for crontab. It may be usefull for you
#!/bin/sh
source /etc/profile.d/CP.sh
CERTIFICATE=`cpca_client lscert -stat Valid -dn <SubString>`
#get string with expiration date from certificate info
CERT_INFO=`cpca_client lscert -stat Valid -dn <SubString> | grep Not_After`
#make list with expiration date, month and year
EXPIRED=$(python -c "lst='$CERT_INFO'.split('Not_After:'); print(lst[1].split())")
#get expiration day
EXPIRED_DATE=$( python -c "print($EXPIRED[2])" )
#get expiration month
EXPIRED_MONTH=$( python -c "print($EXPIRED[1])" )
#get expiration year
EXPIRED_YEAR=$( python -c "print($EXPIRED[-1])" )
DIFF=$(python -c "from datetime import (date, datetime); print date(2023, datetime.strptime('$EXPIRED_MONTH','%b').month, 11).toordinal() - date.today().toordinal()")
if [ $DIFF -lt 30 ];
then
echo -e "Subject: CheckPoint VPN certificate expiration\r\n\r\nVPN certificate will be expired in $DIFF days.\r\n\n\n $CERTIFICATE.\r\n " | sendmail --domain=<domain name> -f <from_email> -v <to_email> --host=<smtp_server>
fi
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
9 | |
6 | |
5 | |
5 | |
4 | |
3 | |
3 | |
2 | |
2 |
Thu 04 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: External Risk Management for DummiesWed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksThu 04 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: External Risk Management for DummiesWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY