Hi Tim,
this is the diagram if I understood correctly:
Symantec Cloud MTA <-> Check Point MTA <-> Internal Exchange
So if we take a look at the incoming mail flow:
Symantec Cloud MTA -> Check Point MTA -> Internal Exchange
The Symantec MTA wants to start a TLS encrpyted SMTP session with the Check Point MTA. So it requests the public certificate from the Check Point MTA to encrypt the emails with. The Check Point MTA will send his public key part from the .p12 certificate to the Symantec MTA.
The .p12 certificate you imported here includes a public key - for the sending mail server to encrypt mails TO the CP MTA - and a private key for the CP MTA to decrypt the emails.
So now the flow is as follows:
Symantec Cloud MTA (encrypts mails with public key of CP MTA) -> Check Point MTA (decrypts incoming mails from Symantec MTA with its private key) -> Internal Exchange
Last step if you want to also make the CP MTA to try to encrypt outgoing mails to your internal mailserver is this:
If you need outgoing email encryption add the following line to $FWDIR/conf/mta_postfix_options.cf and reinstall the TP policy on the gateway:
smtp_use_tls=yes
Don´t use other Postfix TLS parameters like smtp_tls_security_level=may because they may cause serious issues e.g. bypassing TE
Now your incoming mail flow is fully encrypted.
Regards Thomas