{"id":827,"date":"2011-09-12T17:04:56","date_gmt":"2011-09-12T10:04:56","guid":{"rendered":"http:\/\/www.jaringankita.com\/blog\/?p=827"},"modified":"2013-05-02T23:46:41","modified_gmt":"2013-05-02T16:46:41","slug":"how-to-integrate-thawte-certificate-into-checkpoint-ssl-vpn","status":"publish","type":"post","link":"https:\/\/www.jaringankita.com\/blog\/how-to-integrate-thawte-certificate-into-checkpoint-ssl-vpn","title":{"rendered":"How to integrate 3rd party Certificate into Checkpoint SSL VPN"},"content":{"rendered":"<p style=\"text-align: justify;\">\nIn the past few days, I have been confusing about how to integrate Thawte Certificate into Checkpoint SSL VPN in R75 (this guide is also for R65). I have been trying and trying , and today I got the solution. Below are the steps to install the Thawte Certificate. Before doing that, please make sure that you have done below prerequisites:<\/p>\n<p style=\"text-align: justify;\"><!--more--><\/p>\n<p style=\"text-align: justify;\">1. Download the Thawte Premium Root CA from thawte.com<\/p>\n<p style=\"text-align: justify;\">2. Download the Thawte Primary Intermediate CA &#8211; also known as the thawte Primary Root CA<\/p>\n<p style=\"text-align: justify;\">3. Download the Thawte Secondary Intermediate CA &#8211; also known as the thawte SSL CA<\/p>\n<p style=\"text-align: justify;\">After downloading all above requrired file , here are the steps:<\/p>\n<p style=\"text-align: justify;\">1. Go to the &#8220;Servers and OPSEC Applications&#8221;<\/p>\n<p style=\"text-align: justify;\">2. On the Trusted CAs, right click then choose &#8220;New CAs &#8211; Trusted CA&#8221;<\/p>\n<p style=\"text-align: justify;\">3. Enter the name of the CA<\/p>\n<p style=\"text-align: justify;\">4. Still on the same menu, click tab &#8220;OPSEC PKI&#8221; , only tick the &#8220;HTTP Servers&#8221;<\/p>\n<p style=\"text-align: justify;\">5. Click &#8220;Get&#8221; , then choose the file you already downloaded called &#8220;Thawte Premium CA&#8221;<\/p>\n<p style=\"text-align: justify;\">6. On the Trusted CAs again, right click then choose &#8220;New CAs &#8211; Subordinate CA&#8221;<\/p>\n<p style=\"text-align: justify;\">7. Import both Thawte Primary and Secondary CAs into the Subordinate. Then enter the name you like and click &#8220;Get&#8221; button on &#8220;OPSEC PKI&#8221; tab. After that choose the file of Thawte Primary CAs<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.jaringankita.com\/blog\/wp-content\/uploads\/2011\/09\/13.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"get\" alt=\"\" src=\"https:\/\/www.jaringankita.com\/blog\/wp-content\/uploads\/2011\/09\/13-246x300.jpg\" width=\"246\" height=\"300\" \/><\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.jaringankita.com\/blog\/wp-content\/uploads\/2011\/09\/13.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"get\" alt=\"\" src=\"https:\/\/www.jaringankita.com\/blog\/wp-content\/uploads\/2011\/09\/13-246x300.jpg\" width=\"246\" height=\"300\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">8.Double click your SSL VPN Gateway, go to IPSec VPN.<\/p>\n<p style=\"text-align: justify;\">9. Under &#8220;Repository of Certificates Available to the Gateway&#8221; . Click &#8220;Add&#8221;<\/p>\n<p style=\"text-align: justify;\">10.Enter the Certificate Nickname you like.<\/p>\n<p style=\"text-align: justify;\">11.Choose the &#8220;CA to enroll from&#8221;\u00a0 from <span style=\"color: #ff0000;\"><strong>Secondary CAs <\/strong><span style=\"color: #000000;\">not<\/span><span style=\"color: #000000;\"> the Primary one. <\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #ff0000;\"><span style=\"color: #000000;\">12. Then click &#8220;Generate&#8221; in order the device to generate keys.\u00a0 And also choose the option &#8220;Store keys on the Security Management Server&#8221;<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #ff0000;\"><span style=\"color: #000000;\">13. After that, save the CSR file into your local drive. <\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #ff0000;\"><span style=\"color: #000000;\">14.Send that CSR file to Thawte in order to get Signed.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #ff0000;\"><span style=\"color: #000000;\">15.After receiving the Signed CSR, then go to the same menu (IPSec VPN). The click &#8220;Complete&#8221; from above step. Choose the Signed CSR then click OK<\/span><\/span><\/p>\n<p>I also have the tutorial from Checkpoint regarding on how to install Verisign to Checkpoint SSL VPN. Please click the below link to download it:<\/p>\n<p><strong><a href=\"http:\/\/www.mediafire.com\/?o9xwiujyx4vbt8g\" target=\"_blank\">Verisign and Checkpoint Firewall<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the past few days, I have been confusing about how to integrate Thawte Certificate into Checkpoint SSL VPN in R75 (this guide is also for R65). I have been trying and trying , and today I got the solution. Below are the steps to install the Thawte Certificate. Before doing that, please make sure [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":829,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[600,29],"tags":[913,783,915,607,618,606,914,619,611,916,21,608,612,610,609,615],"class_list":["post-827","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-checkpoint-2","category-information-security","tag-ca","tag-certificate","tag-certificate-nickname","tag-checkpoint-3rd-cert","tag-checkpoint-firewall","tag-checkpoint-ssl-vpn","tag-csr","tag-how-to-configure-checkpoint-vpn-ssl-certificate","tag-ngx65","tag-ok","tag-r75","tag-thawte","tag-thawte-and-checkpoint","tag-thawte-certificate","tag-verisign","tag-verisign-and-checkpoint"],"_links":{"self":[{"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/posts\/827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/comments?post=827"}],"version-history":[{"count":43,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/posts\/827\/revisions"}],"predecessor-version":[{"id":833,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/posts\/827\/revisions\/833"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/media\/829"}],"wp:attachment":[{"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/media?parent=827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/categories?post=827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/tags?post=827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}