Skip navigation
All Places > Management (R80.10)

Policy Management

Log in to follow, share, and participate in this community.

Recent Activity

Gertjan Arling
R80.10 enables security administrators to work on the same policy at the same time. But what happens if a project needs to be finished and the security administrator is not available to do so? R80.10 Session Take Over feature allows for other security administrators to finish the work already started.
Video preview image▶︎
in Policy Management
Gertjan Arling
It is not uncommon for someone to not be able to come to work. This could hinder some projects that are due right at that time. With R80.10 Session Take Over, it is possible for you to take over the work of other security administrators when needed. Interested in how to do this? Watch the video below.     Please let us know if there are other… (Show more)
in Policy Management
Sammo  Li
Hi All Experts,      I would like to know if R80 support FQDN as the source/destination in the access rule?If yes, how is it working? Thanks   Sammo
in Policy Management
David Levine
Hi All,   We have just purchased a couple of smaller security gateways for remote offices (cool!). I have a 12400 series appliance on site at our main office here, along with a management server, etc.  I am starting to read up and plan for configuring these new gateways, and I am trying to find some information on managing multiple gateways from… (Show more)
in Policy Management
Gertjan Arling
R80.10 provides a whole slew of new tools and features that helps a security administrator in his/her job. One of those tools is known to the long time users called "Where Used". What is new is that you can now replace objects found through "Where Used" easily by using the "Replace" feature. Watch this video to find out how it all works.     We… (Show more)
in Policy Management
Gertjan Arling
When new services are introduced and your security policy needs to be adjusted accordingly, what tools will you be using? R80.10 makes it easier to implement changes. The “Where Used” and “Replace” tools will help security administrators manage these changes quickly and efficiently.
Video preview image▶︎
in Policy Management
Knud Mortensen
Hi I'm running a R80.10 eval management server where I have imported my 77.30 database, to train myself a bit before upgrading to r80.10, I currently have 16 firewalls around the world (including Azure and AWS) and one policy package with every thing. I'm planing to have a Policy/tab for each firewall and because there are common rules that has… (Show more)
in Policy Management
Dameon Welch Abernathy
Check Point SmartMove tool enables you to convert 3rd party database with firewall security policy and NAT to Check Point database. At the moment, the tool handles Cisco ASA (version 8.3 and above) configuration file and converts its objects, NAT and firewall policy to a Check Point R80.10 policy. The tool is planned to support additional vendors… (Show more)
in Policy Management
Albert Gavrielov
Install R80.10(standalone) on Vmware workstation 12 when add a new rule get error "An error occurred while performing rulebase operations"
in Policy Management
Load more items