Obtaining, Installing, and Viewing a Trusted Server Certificate
To be accepted by an endpoint computer without a warning, gateways must have a server certificate signed by a known certificate authority (such as Entrust, VeriSign or Thawte). This certificate can be issued directly to the gateway, or be a chained certificate that has a certification path to a trusted root certificate authority (CA).
The next sections describe how to get a certificate for a gateway that is signed by a known Certificate Authority (CA).
Generating the Certificate Signing Request
First, generate a Certificate Signing Request (CSR). The CSR is for a server certificate, because the gateway acts as a server to the clients.
|
Note - This procedure creates private key files. If private key files with the same names already exist on the computer, they are overwritten without warning. |
-
From the gateway command line, log in to the Expert mode.
-
Run:
cpopenssl req -new -out <Name of CSR file> -keyout <Name of Private Key file> -config $CPDIR/conf/openssl.cnf
This command generates a private key. You see this output:
Generating a 2048 bit RSA private key
.+++
...+++
writing new private key to 'server1.key'
Enter PEM pass phrase:
-
Enter a password and confirm.
Fill in the data.
-
The Common Name field is mandatory. This field must have the Fully Qualified Domain Name (FQDN). This is the site that users access. For example:
portal.example.com
. -
All other fields are optional.
-
-
Send the CSR file to a trusted certificate authority. Make sure to request a Signed Certificate in PEM format. Keep the
.key
private key file.
Generating the P12 File
After you get the Signed Certificate for the gateway from the CA, generate a P12 file that has the Signed Certificate and the private key.
-
Get the Signed Certificate for the gateway from the CA.
If the signed certificate is in P12 or P7B format, convert these files to a PEM (Base64 encoded) formatted file with a CRT extension.
-
Make sure that the CRT file has the full certificate chain up to a trusted root CA.
Usually you get the certificate chain from the signing CA. Sometimes it split into separate files. If the signed certificate and the trust chain are in separate files, use a text editor to combine them into one file. Make sure the server certificate is at the top of the CRT file.
-
From the gateway command line, log in to the Expert mode.
-
Use the
*.crt
file to install the certificate with the*.key
file that you generated.-
Run:
cpopenssl pkcs12 -export -out <Name of output file> -in <Name of signed certificate chain file> -inkey <Name of Private Key file>
For example:
cpopenssl pkcs12 -export -out server1.p12 -in server1.crt -inkey server1.key
-
Enter the certificate password when prompted.
-
Installing the Signed Certificate
-
From the left Navigation Toolbar, click Gateways & Servers.
-
Open the Identity Awareness
Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. Gateway object.
-
In the navigation tree, click the appropriate Software Blade
Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. page:
-
Mobile Access
Check Point Software Blade on a Security Gateway that provides a Remote Access VPN access for managed and unmanaged clients. Acronym: MAB. > Portal Settings
-
Platform Portal
-
Identity Awareness > Captive Portal > Settings > Access Settings
-
-
Install the Access Control Policy on the gateway.
Note - The Repository of Certificates on the IPsec VPN
Check Point Software Blade on a Security Gateway that provides a Site to Site VPN and Remote Access VPN access. page of the gateway object is only for self-signed certificates. It does not affect the certificate installed manually using this procedure.
Viewing the Certificate
-
In SmartConsole, click Gateways & Servers and double-click the Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources..
The gateway window opens and shows the General Properties page.
-
From the navigation tree, click Data Loss Prevention.
-
In the Certificate section, click View.