- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Good evening, everyone,
I hope someone can help me in this issue :
A few weeks ago we updated the ssl certificate for both the gateway portal and the VPN client.
Currently the portal is exposed on port 4434 while 443 is used for VPN RA.
When I access the portal on port 4434 the certificate is displayed correctly and the expiration date is correct .
However, if I check on port 443 it tells me that the certificate has expired, showing me the date of the last certificate.
We cleared all the cache and there is no trace of the old certificate.
We have opened a case at TAC and it tells us that all the operations were done correctly.
However on any site that checks on the certificate (ssl shopper or Qualys) it tells us that the certificate has expired.
It is the quantum spark 1590 series.
Has anyone ever encountered such an issue ?
Has the gateway already been rebooted/updated and any other tests with TAC
Thank you all.
hi ted,
as already discussed the problem is related to DB corruption.
Although the new certificate is loaded, doing an ssl check still detects the old expiration date.
I solved it this way:
1. Delete $FWDIR/conf/fwauth.NDB.
2. Run 'sfwd_restart'
3. Run 'vpn_configload;fw reconf_sfwd'
4. Add a new local user (it might be a temporary user, just to apply the change),
5. Optional : re-add the 3rd party certificate.
I don't think it is possible as listed in: https://support.checkpoint.com/results/sk/sk110533
This is expected behavior.
Locally Managed Quantum Spark (SMB) appliances do not support internal certificate administration. These appliances always present their own VPN certificate, even if there are other certificates installed on the appliances.
Note - You can verify the internal certificate in the appliance WebUI: Device > Certificates (Internal Certificate). This page shows two certificates: Internal CA Certificate and Internal VPN Certificate.
They speak of local managed gateways, what about this gateway?
Hi lesley,
I don't know if I explained myself well , I try to clarify:
Until a few weeks ago we had a third-party certificate that worked for both the web portal (port 4434) and the RA VPN (port 443) .
When we renewed the certificate if we connect to example.com:4434 the expiration date is correct. If we connect to https://example.com it keeps giving us the old expiration date.
So it is central or local management what steps or guide you have followed?
I have seen this multiple time with renewal of third party certificates and was just about to open a ticket on this. The main portal on 4434 uses the new certificate successfully, but the SSL portal still used the old (expired) certificate. The only work around I have found is to undo the certificate, turn off the SSL, reboot the box, then re-install the new certificate and turn ssl portal back on.
I believe that this is a problem where the ssl portal is storing this certificate elsewhere and it is not being updated when the ssl certificate is updated.
Given the amount of time that we have all been using SSL certificates, you would think that these cert renewals would be straight forward by now and update correctly.
Just to clarify, you mean the SNX portal, correct?
Hi PhoneBoy,
thanks for the comment.
the problem was solved by the TAC after a long analysis.
We deleted some files and references of the old certificate via CLI. In these days I will try to publish the solution .
thank you all for your time .
technically yes, but not how it is displayed or labeled on a 1500 series box running R81.10.10 or later.
Would be “SSL VPN” in that screenshot.
Had the SNX Portal on my mind for a different thread 😉
Hi Ted ,
thanks for the comment.
the problem was solved by the TAC after a long analysis.
We deleted some files and references of the old certificate via CLI. In these days I will try to publish the solution .
thank you all for your time .
hi ted,
as already discussed the problem is related to DB corruption.
Although the new certificate is loaded, doing an ssl check still detects the old expiration date.
I solved it this way:
1. Delete $FWDIR/conf/fwauth.NDB.
2. Run 'sfwd_restart'
3. Run 'vpn_configload;fw reconf_sfwd'
4. Add a new local user (it might be a temporary user, just to apply the change),
5. Optional : re-add the 3rd party certificate.
You can replace step 4 with fw_configload which does a full policy recompile.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 28 | |
| 23 | |
| 18 | |
| 12 | |
| 10 | |
| 6 | |
| 6 | |
| 6 | |
| 5 | |
| 4 |
Tue 11 Nov 2025 @ 10:00 AM (CET)
Your First Response: Immediate Actions for Cyber Incident Containment- EMEATue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightTue 11 Nov 2025 @ 10:00 AM (CET)
Your First Response: Immediate Actions for Cyber Incident Containment- EMEAThu 13 Nov 2025 @ 10:00 AM (CET)
Cloud Architect Series - Guarding Generative AI: Next-Gen Application Security with CloudGuard WAFFri 14 Nov 2025 @ 10:00 AM (CET)
CheckMates Live Netherlands - Veriti, Threat Exposure ManagementWed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY