All Activity

4 updates since last visit
Trending
clement locricchio
Hi,   I have some difficulty to etablish a connection between a checkpoint 77 and AWS, I have followed the guide on checkpoint, but the tunnel is still down .     If anybody have some help thx
in Check Point CheckMates
Trending
Blason R
Hi Team,   I believe if emote agents needs to communicate with Management server I guess I need to use FQDN right? Or how agents will come to know the public IP address which is natted IP for EPM server over the internet? And which is best method to be used FQDN or Public IP?
in SandBlast
Trending
Moti Sagey
Hi, kudos for Valeri Loukine for driving this independent initiative session 1 talked about :   tech and marketing drivers behind R80, a historical view on Check Point releases what's new for both management and gateway why it takes over three years to release full version of the product? what are pros and cons of moving to R80 what to… (Show more)
in R80 General Topics
Trending
catherine gibson
Policy Install Shows Multiple Changes.   Hi All, Has anyone noticed when you go to push policy in R80 it shows multiple changes and for all policies? So say I add a host to one policy and then publish it and then go to push policy on the policy install page it shows like 50 changes. Even though all you have done is add an existing host to an… (Show more)
in Policy Management
Trending
Tomer Sole
Other than the new user interface, which features in R80 SmartConsole reduce the time required to decide activation of IPS protections?
in Policy Management
Matters Most
Valeri Loukine
CCMA's blog: CPET session 2, Stateful Inspection: the good, the bad, the ugly, the brilliant   The date and time will follow soon, stay tuned
in R80 General Topics
Matters Most
John Allen
Hello, Is it possible to query where an object is used via the API?   I looked through the table of API calls but didn't see much that fell under searches.
in Developer Forum
Matters Most
Daniel Fischler
I know that in R80.10 you can add multiple Layers in the Access Control Part of the Policy. My understanding is, that if there is an accept in the first layer, the next Layer is checked and so on. If I use the implicit accept setting in the all Layers (except the last one) all layers are allways checked. So only connections that are accepted… (Show more)
in Policy Management