


Output: F9:02:BC:09:9A:9E:58:DC:28:6F:F6:4C:54:DD:71:E0īack in R77 days, I remember it was possible to import the new certificate in SmartDashboard, NOT clicking ok or save, than copy the new fingerprint it shows to you, and than click cancel. rfc_1751.exe "WEAN GAM ANT PRY SURF CURL MEW FEUD HALO LAIR SAUL TUBA"

Output: WEAN GAM ANT PRY SURF CURL MEW FEUD HALO LAIR SAUL TUBA Not the fingerprint from the actual server certificate or any of the intermediate ones. Please take care to use the SHA-1 fingerprint of the root certificate of your VPN GW SSL certificate chain. So I used the C code from that RfC, compiled it and used it for converting in both directions. Regarding "Also, I know that CP uses the RFC 1751 to create the fingerprint in human text, but do they have a tool to determine the fingerprint without installing/replacing the current certificate on a gateway?": Is there something? Because even the SK above in the text says " From test host with VPN client installed and existing site created, export the following registry key value data:"Īnd this is quite hard in a live environment. Question: I did not find the SK where it is cleary mentioned which fingerprint of which certificate checkpoint will present its clients. is not a viable option will I be forced to create a new DNS Entry (for example ) to prepare the registry? And also reflect this in the new certificate ?ģ. "-Fingerprint-"=" YYYY YYY YYY YYY YYYY YYY YYYY YYYY YYY YYYY YYY YYYY"Ģ. Can I enter the second (new one) to and it will work? Is there an SK for this? Question: Can I assign more then one Fingerprint in the Registry ? So we have an entry for our "" and there is currently one Fingerprint. "-Fingerprint-"=" XXXX XXX XXX XXX XXXX XXX XXXX XXXX XXX XXXX XXX XXXX"ġ. So I digged already into the registry of my clients and there as mentioned a respective fingerprint for my VPN Infrastructure. Also not in SK: Avoiding VPN / SNX client fingerprint message when changing certificate or connecting to a backup si. Unfortunately we are moving from one CA to another and this is not clearly for me.

I'm in need to change the Certificate which is represented to the Clients for Remote Access.Īs far as I Understand, Checkpoint presents the Fingerprint of the Root CA of the VPN Certificate so the client dont have issues when Certificates are exchanged if they come from the same CA.
