Jerry --
Sorry I took a little absence recently. I would love to help you out some more if you're still working on your certificate situation.
Here is a brief note I wrote up as I understand the certificate installation process:
There are basically 2 ways that Checkpoint serves web pages. The first is just a standard apache web instance, and the second is multi-portal – which is basically a reverse proxy to multiple apache instances.
Multi-Portal
Checkpoint enables multi-portal if there is more than one apache instance that needs to be served
Most blades have portals associated and will use the multi-portal daemon ->
UserCheck:
Application Control
URL Filtering
Data Loss Prevention
Anti-Virus
Anti-Bot
Threat Emulation
Threat Extraction
SSLVPN:
Mobile Access
NAC:
Identity Awareness
Standard Apache Instance
These blades don’t have extra portals associated with them ->
Firewall
IPSec VPN
IPS
Monitoring
QoS
So now with a brief understanding of Checkpoint’s web instance, this will influence how the certificate install should work.
1 – Multi-Portal is enabled because at least one of the blades listed above under “Multi-Portal” is enabled, or has ever been enabled.
Use the Checkpoint SmartDashboard Mechanism to install the certificate
2 – Multi-Portal isn’t enabled
Use the /web/conf/server.crt and /web/conf/server.key files to control the apache instance certificate