- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello,
When testing the R82 version for VPN site to site between two different Check Point sites (Externally Managed VPN Gateway), I found an authentication issue when using certificates exchange as authentication method. The traffic was rejected. There was no issue when using pre-shared secret .
Then I updated Gaia in both SMSs with the "Jumbo Hotfix take 44". I thought that it was going to solve the issue. But result was the same: "Authentication failed".
I rebuilt all again in my LAB, reinstalling and configuring everything from scratch ...... with the same results.
Finally I did the same with the R81.20 version (just in case...). Everything was working OK when using the R81.20
So i think there is a really issue when using certificates to authenticate the site to site VPN between two different sites (domains)
If somebody could confirm that it is not an isolated issue but a general one ?
Thanks for your feedback
Best regards
Miguel
Hello RS_Daniel
I found a way to disabling CRL checking from Timothy Hall in another issue:
I entered the command in both gateways,
And now it works. So it was an issue of the receiving side not being able to retrieve the CRL on the R82 version.
Until Check Point resolves the issue on the R82 version, the only way to make work the VPN tunnel with 2 Check Point CAs (SMSs), is disabling CRL checking by using the command above.
I hope this will help
Cheers
Miguel
Have you raised a case with TAC? If it is an issue with R82 then will need to be engaged.
It is not a production case. I was just testing in my LAB.
That's why I am using this way to inform people about this issue. Somebody should test it to confirm
Hey Miguel,
I know this is smb related post,but see if it helps. Its clear based on the message it does not like something about the cert.
I have been using certificates for VPN authentication since R80 version. I have always worked using the same method. Even with the R77.30, the method is quite the same (with some differences in language and interfaces.)
This time, to be sure my platform was working OK, I made the test using certificates with the R81.20 version. A successful test.
Unless the way of exchanging certificates has changed since R82 version, there is a problem when exchanging certificates for creating new VPN tunnels.
It is hard to believe nobody has already test it.
I really cant confirm that, sorry...lets see if anyone else might know.
Just to show how simple is the authentication by certificates. It should work this way, and it is not working in R82 version:
By clicking on "Get" on the "External Check Point CA" tab, you will select the distant site certificate that have been shared by your partner.
And that's it. Don't forget to uncheck "Use only share Secret for all External members" in the community and if there is already a tunnel built on the community (same tunnel), use vpn tu in order to delete the previous tunnels (IPsec + IKE SAs)
For me it is a mystery that authentication by sharing certificates is not working anymore since the R82 version.
I haven't tested what happen when a tunnel is already built with certificates before upgrading from R81.20 to R82.
Best regards
Miguel
Let me see if I can test this in the lab. I had this working before and when I upgraded to R82, it still worked fine.
Is your CRL reachable/resolvable? Have you tried turning it off to see if it makes a difference?
I am not sure it is about a CRL issue. But I will test it next week. This week I am too busy
Thank you Alex
Hello,
I must say i have not tried with R82, but the steps i usually follow are quit different.
Hope this helps.
Regards
Hello,
The first log with error regarding CRL makes me think it is going in the rigth direction. On the trusted CA object go to OPSEC PKI tab and uncheck both options under Rretrieve CRL From section. Does it change anything? You can check sk109139 for reference, it is the same logic but in the sk the certificates are signed by internal CA (management server) instead of the external CA, it should work no matter wich option you use.
Regards
Hello RS_Daniel
I found a way to disabling CRL checking from Timothy Hall in another issue:
I entered the command in both gateways,
And now it works. So it was an issue of the receiving side not being able to retrieve the CRL on the R82 version.
Until Check Point resolves the issue on the R82 version, the only way to make work the VPN tunnel with 2 Check Point CAs (SMSs), is disabling CRL checking by using the command above.
I hope this will help
Cheers
Miguel
Excellent Miguel, thanks for letting us know.
Hello RS_Daniel,
That is for a third part CA.
My VPN tunnel is between to gateways managed by their own Check Point CA each one (managed by their own SMS).
The way of exchanging certificates is strait (no need to go to the repository)
It is about the R82 version issue rather than a configuration or procedure issue.
I tried disabling CRL checking. One log was like this: "Auth exchange: Could not retrieve CRL.CN=sg1 VPN Certificate,O=sms1..b6gyro"...... without success
Best regards
Miguel
I thought it was just me who couldn't do it 🙂 I have two R82 gateways with separate managements on the office and DataCenter sides. I'm having the same problem.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 19 | |
| 17 | |
| 13 | |
| 8 | |
| 7 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY