Background:
IKE certificate (or VPN default certificate) is a certificate that the Security Gateway / Cluster Members can use for:
Description of Changes on Security Gateways / Cluster Members:
- The IKE certificate standard validity period decreased from 5 years to 1 year by default.
This means that a certificate is valid for 1 year - in creation and renewal.
- The IKE certificate maximum validity period decreased from 20 years to 3 years.
Important - This change applies
only to the IKE certificate (Security Gateway default certificate created by Check Point Internal CA).
This change is implemented starting from:
This change aligns Check Point products with the top security standards in the Certificate Authority industry, and provides security recommendations for the certificate validity period. A shorter validity period mitigates security risks when a private key is compromised.
To Extend the IKE Certificate Standard Validity Period to 3 Years:
Important: Perform this procedure during a maintenance window because an outage of VPN tunnels may occur.
-
Connect to the command line on the Management Server.
-
Log in to the Expert mode.
-
On the Multi-Domain Security Management Server, go to the content of the Domain Management Server that manages the Security Gateway / Cluster:
mdsenv <IP Address of Name of Domain Management Server>
-
Configure the IKE certificate standard validity period to 3 years:
cpca_client set_cert_validity -k IKE -y 3
-
Renew the IKE certificate (for more information, see sk31539):
-
Connect with SmartConsole to the Security Management Server / Domain Management Server that manages the Security Gateway / Cluster.
-
From the left navigation panel, click Gateways & Servers.
-
Open the Security Gateway / Cluster object.
-
From the left tree, click the IPSec VPN pane.
-
Examine the current expiration date:
-
In the section Repository of Certificates Available on the Gateway, select the certificate.
-
Click the "View" button.
-
In the line "Not Valid After", examine the date.
-
Click the "OK" button.
-
In the section Repository of Certificates Available on the Gateway, select the certificate.
-
Click the "Renew" button.
-
Click the "Yes" button to confirm.
-
In the "Generate Keys and Get Internal CA Certificate" window, click "OK".
-
Click "OK" to close the Security Gateway / Cluster object.
-
Install the Access Control Policy on the Security Gateway / Cluster object.
-
Open the Security Gateway / Cluster object.
-
From the left tree, click the IPSec VPN pane.
-
Examine the current expiration date:
-
In the section Repository of Certificates Available on the Gateway, select the certificate.
-
Click the "View" button.
-
In the line "Not Valid After", examine the date.
-
Click the "OK" button.
-
Click "OK" to close the Security Gateway / Cluster object.