- CheckMates
- :
- Products
- :
- Quantum
- :
- Security Gateways
- :
- Re: sk97691 - Certificate Renewal "At the 75% thre...
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
sk97691 - Certificate Renewal "At the 75% threshold, it should be renewed automatically."
The sk listed above in Scenario 4 says the cert should renew at 75% threshold but we've never had this occur. We have to manually track and manually renew all VPN certs for SIC and VPN (same cert). Why does this SK say the certificates auto renew when they don't.
Has anyone else had this problem or are we alone?
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You are mixing different types of certificates. VPN and SIC certs are NOT the same.
VPN default certificates (IKE certificates) were valid for 5 years. Starting from R81.10, validity of VPN default certificates (IKE certs) was changed from 5 years to 1 year by default. VPN default certificates (IKE certificates) were needed to be manually renewed. There is a way how to renew VPN certificates automatically.
SIC certificates are by default valid for 5 years and are automatically renewed once 75% threshold is reached. In some cases, SIC certificate is not renewed and it has to be renewed manually. Scenario 4 in sk97691 is one example why SIC needs to be renewed by hand. Another situation where SIC is needed to be renewed manually is mentioned in sk103356.
Jozko Mrkvicka
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I gave a feedback for it, its 100% wrong. Used to be 5 years for a long time, it has been 1 year since I believe 2021 or 2022. You can extend it to 3 years with command on mgmt server, then you have to renew it on gw object to to show 3 years validity. Also, I have no clue in the world where 75% threshold comes from, as in all my years dealing with CP, that has never happened, neither have I ever had any customers either who told me they had that cert be renewed automatically.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You are mixing different types of certificates. VPN and SIC certs are NOT the same.
VPN default certificates (IKE certificates) were valid for 5 years. Starting from R81.10, validity of VPN default certificates (IKE certs) was changed from 5 years to 1 year by default. VPN default certificates (IKE certificates) were needed to be manually renewed. There is a way how to renew VPN certificates automatically.
SIC certificates are by default valid for 5 years and are automatically renewed once 75% threshold is reached. In some cases, SIC certificate is not renewed and it has to be renewed manually. Scenario 4 in sk97691 is one example why SIC needs to be renewed by hand. Another situation where SIC is needed to be renewed manually is mentioned in sk103356.
Jozko Mrkvicka
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I see what you mean, will check in the lab shortly.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I was actually mistaken and I admit when Im wrong. @JozkoMrkvicka is absolutely correct. I ran below command on my R82 standalone lab and it confirms what sk says. I still cant say for sure the fact about 75% threshold (personally never heard of it myself), but logically, it would make sense, because you never need to reset sic, unless there is a communication issue.
Andy
[Expert@R82:0]# cpca_client lscert
Operation succeeded. rc=0.
5 certs found.
Subject = CN=R82,O=R82..b47sbr
Status = Valid Kind = SIC Serial = 22352 DP = 0
Not_Before: Sun Oct 20 17:56:05 2024 Not_After: Sat Oct 20 17:56:05 2029
Subject = CN=cp_mgmt,O=R82..b47sbr
Status = Valid Kind = SIC Serial = 24961 DP = 0
Not_Before: Sun Oct 20 17:56:05 2024 Not_After: Sat Oct 20 17:56:05 2029
Subject = CN=cp_mgmt,O=R82..b47sbr
Status = Valid Kind = SIC Serial = 65129 DP = 0
Not_Before: Sun Oct 20 17:55:59 2024 Not_After: Sat Oct 20 17:55:59 2029
Subject = CN=R82 VPN Certificate,O=R82..b47sbr
Status = Valid Kind = IKE Serial = 87030 DP = 1
Not_Before: Sun Oct 20 18:30:48 2024 Not_After: Tue Oct 21 18:30:48 2025
Subject = CN=cp_mgmt,O=R82..b47sbr
Status = Valid Kind = SIC Serial = 94884 DP = 0
Not_Before: Sun Oct 20 17:56:12 2024 Not_After: Sat Oct 20 17:56:12 2029
[Expert@R82:0]#
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Another example from my R81.20 lab.
Andy
[Expert@CP-MANAGEMENT:0]# cpca_client lscert | grep CN=CP-GW,O=CP-MANAGEMENT..pi6w5j
Subject = CN=CP-GW,O=CP-MANAGEMENT..pi6w5j
Subject = CN=CP-GW,O=CP-MANAGEMENT..pi6w5j
Subject = CN=CP-GW,O=CP-MANAGEMENT..pi6w5j
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It was the SIC cert that dropped from our R81.20 management to a lot of 1200Rs in the field this past week. We noticed these stopped backing up each night and when troubleshooting noticed the SIC cert had expired. What's odd is that we have HA at most sites but we had some locations where one firewall lost SIC and the other didn't in the HA pair. I guess that could be caused by RMA's and such during the time we've had these deployed contributing to why we notice that on some sites.
So it looks like we were in the group that it didn't occur automatically like it should. Is there an alert or anything that pops in the logs showing a SIC Cert didn't automatically renew or something we can trigger off of other than losing SIC or manually checking?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Not sure about alert, but maybe check if any logs for port 18191?
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I checked a few that dropped SIC and didn't see anything but accepts on port 18191. It's pretty constant traffic at about 1-4 hits per minute from the gateways to the management server(s).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
In that case, I got nothing else to suggest, sorry. I would open TAC case to investigate further.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks for the responses!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
If I think of anything else, will let you know, for sure.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Looks like good idea for RFE.
If SIC is for whatever reason going to be expired, you will not get any error/warning. You will notice it just after expiration (too late). For example, you wont be able to push the policy.
You can create your own script running on management to see what is actual expiration date of all valid certs using command "cpca_client lscert". Once the expiration date of any cert is too close to some date, fire some alarm (send mail).
Jozko Mrkvicka
