- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi dears,
I have two gateways working in ClusterXL mode running on R81.10. For internet interface i use three IP addresses: two for two gateways and one for cluster address as well. I am currently migrating services from Kerio and Pfsense and cannot find the clear answers by googling.
On external DNS there are bunch of subdomains (A records) that are pointed to one IP address like sub1.example.com -> IP1, sub2.example.com -> IP1 and etc. On kerio they are proxying using wildcard certificate.
For testing purpose I used one Host object published. But HTTPS inspection didnt work with Wildcard certificate uploaded via SmartDashboard. Also can't find information regarding publishing serveral services. Tried Domain object in NAT rule as Original Destination is Domain object (sub1.example.com) Translated destination (Host1) and got validation error.
So, I need help with importing *.example.com like certificate, and publishing several services on external cluster IP address that will do NAT like sub1.example.com -> Host1, sub2.example.com -> Host2.
Can someone provide clear instructions or link how can I perform it please?
When you import the certificate, it must include the private key plus any public keys of intermediate CAs as part of the CA bundle.
Otherwise, please post a screenshot (with sensitive details redacted) of the relevant log card.
Hi @PhoneBoy ,
Thank you so much for reply. I figured out how to publish services via Mobile Access Reverse Proxy settings. And Certificate works fine in reverse proxy. So I have another question. How to perform Acces Rules for services published via Reverse Proxy? Is there any clear information regarding that?
Mobile Access Reverse Proxy functionality is here: https://support.checkpoint.com/results/sk/sk110348
Note this is different from configuring applications within the MAB portal itself.
To do that (clientless applications), refer to: https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_MobileAccess_AdminGuide/Cont...
Hy there i have some suggestion
Here are some common issues and potential solutions related to HTTPS Inspection certificate problems:
Certificate Trust: Ensure that the certificate used for HTTPS Inspection is trusted by the client devices (e.g., browsers, applications). If the client does not trust the inspection certificate, it will raise security warnings or fail to establish a secure connection.
Certificate Validity: Check if the HTTPS Inspection certificate is still valid. Certificates have an expiration date, and if the certificate has expired, it needs to be renewed or replaced with a valid one.
Certificate Chain: Verify that the certificate chain is complete and correctly configured. The certificate chain should include all necessary intermediate and root certificates to establish trust with the client devices.
Certificate Installation: Ensure that Tell Happy Star the HTTPS Inspection certificate is correctly installed and configured on the security appliance or proxy server performing the SSL/TLS inspection.
Thanks and regards
Collette
100% all valid points @Collette 👍
Hi @Collette ,
Thank you so much for reply. Certificate is valid because it was used in Kerio Reverse Proxy and it was signing well. I recreated chain and p12 cert to be sure that it is fine. And it is working perfectly in reverse proxy of Checkpoint) Another question is how to restrict access to published services via CP Reverse proxy using Access Rules. How to use Access Rules correctly for reverse proxied services? I have played with rules and did not succeed. While analyzing logs, I noticed that rules not working for Mobile Access Reverse proxied services...
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 20 | |
| 19 | |
| 18 | |
| 8 | |
| 7 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 3 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY