- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Good evening, everyone,
I hope someone can help me in this issue :
A few weeks ago we updated the ssl certificate for both the gateway portal and the VPN client.
Currently the portal is exposed on port 4434 while 443 is used for VPN RA.
When I access the portal on port 4434 the certificate is displayed correctly and the expiration date is correct .
However, if I check on port 443 it tells me that the certificate has expired, showing me the date of the last certificate.
We cleared all the cache and there is no trace of the old certificate.
We have opened a case at TAC and it tells us that all the operations were done correctly.
However on any site that checks on the certificate (ssl shopper or Qualys) it tells us that the certificate has expired.
It is the quantum spark 1590 series.
Has anyone ever encountered such an issue ?
Has the gateway already been rebooted/updated and any other tests with TAC
Thank you all.
hi ted,
as already discussed the problem is related to DB corruption.
Although the new certificate is loaded, doing an ssl check still detects the old expiration date.
I solved it this way:
1. Delete $FWDIR/conf/fwauth.NDB.
2. Run 'sfwd_restart'
3. Run 'vpn_configload;fw reconf_sfwd'
4. Add a new local user (it might be a temporary user, just to apply the change),
5. Optional : re-add the 3rd party certificate.
I don't think it is possible as listed in: https://support.checkpoint.com/results/sk/sk110533
This is expected behavior.
Locally Managed Quantum Spark (SMB) appliances do not support internal certificate administration. These appliances always present their own VPN certificate, even if there are other certificates installed on the appliances.
Note - You can verify the internal certificate in the appliance WebUI: Device > Certificates (Internal Certificate). This page shows two certificates: Internal CA Certificate and Internal VPN Certificate.
They speak of local managed gateways, what about this gateway?
Hi lesley,
I don't know if I explained myself well , I try to clarify:
Until a few weeks ago we had a third-party certificate that worked for both the web portal (port 4434) and the RA VPN (port 443) .
When we renewed the certificate if we connect to example.com:4434 the expiration date is correct. If we connect to https://example.com it keeps giving us the old expiration date.
So it is central or local management what steps or guide you have followed?
I have seen this multiple time with renewal of third party certificates and was just about to open a ticket on this. The main portal on 4434 uses the new certificate successfully, but the SSL portal still used the old (expired) certificate. The only work around I have found is to undo the certificate, turn off the SSL, reboot the box, then re-install the new certificate and turn ssl portal back on.
I believe that this is a problem where the ssl portal is storing this certificate elsewhere and it is not being updated when the ssl certificate is updated.
Given the amount of time that we have all been using SSL certificates, you would think that these cert renewals would be straight forward by now and update correctly.
Just to clarify, you mean the SNX portal, correct?
Hi PhoneBoy,
thanks for the comment.
the problem was solved by the TAC after a long analysis.
We deleted some files and references of the old certificate via CLI. In these days I will try to publish the solution .
thank you all for your time .
technically yes, but not how it is displayed or labeled on a 1500 series box running R81.10.10 or later.
Would be “SSL VPN” in that screenshot.
Had the SNX Portal on my mind for a different thread 😉
Hi Ted ,
thanks for the comment.
the problem was solved by the TAC after a long analysis.
We deleted some files and references of the old certificate via CLI. In these days I will try to publish the solution .
thank you all for your time .
hi ted,
as already discussed the problem is related to DB corruption.
Although the new certificate is loaded, doing an ssl check still detects the old expiration date.
I solved it this way:
1. Delete $FWDIR/conf/fwauth.NDB.
2. Run 'sfwd_restart'
3. Run 'vpn_configload;fw reconf_sfwd'
4. Add a new local user (it might be a temporary user, just to apply the change),
5. Optional : re-add the 3rd party certificate.
You can replace step 4 with fw_configload which does a full policy recompile.
I'm not sure this classes as the same issue, but I've uploaded some external certificates (device and cluster) to spark devices I have in order to replace the default device cert presented for administration over port 4434.
In the WEBUI its applied. I raised a TAC case, and was a little surprised what they told me, I need to also install the certificate on the client! (I hoping this is just a communication issue).
We are not running any VPNs on these device, and the objective is for the valid certificate to be presented to the client when we attempt to access the WEBUI.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 76 | |
| 30 | |
| 14 | |
| 13 | |
| 13 | |
| 12 | |
| 10 | |
| 9 | |
| 8 | |
| 8 |
Tue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY