<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Data and Management Plane separation on 6200P NGTX standalone appliance in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Data-and-Management-Plane-separation-on-6200P-NGTX-standalone/m-p/129812#M19047</link>
    <description>&lt;P&gt;MDPS is meant to be configured on a gateway talking to a management server on a different system.&lt;BR /&gt;This is why processes that are obviously only on a management server (specifically cpm and fwm) are not part of MDPS.&lt;BR /&gt;Whether they can be included is, perhaps, a separate question.&lt;/P&gt;</description>
    <pubDate>Mon, 20 Sep 2021 21:23:25 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-09-20T21:23:25Z</dc:date>
    <item>
      <title>Data and Management Plane separation on 6200P NGTX standalone appliance</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Data-and-Management-Plane-separation-on-6200P-NGTX-standalone/m-p/129803#M19037</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am deploying a 6200P NGTX standalone appliance (management + gateway, no HA). Does anyone know if this supports the Management Data Plane Separation configuration that is outlined in sk138672?&lt;/P&gt;&lt;P&gt;I have a ticket with support regarding this question but they haven't been able to provide an answer.&lt;/P&gt;&lt;P&gt;I deployed the appliance and enabled the configuration but I was unable to connect via Smart Console (the web interface and SSH access worked as expected). The management plane task list didn't show the fwm and cpm/java TCP ports 18190 and 19009, which didn't seem right.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 20 Sep 2021 17:18:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Data-and-Management-Plane-separation-on-6200P-NGTX-standalone/m-p/129803#M19037</guid>
      <dc:creator>quatloo</dc:creator>
      <dc:date>2021-09-20T17:18:15Z</dc:date>
    </item>
    <item>
      <title>Re: Data and Management Plane separation on 6200P NGTX standalone appliance</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Data-and-Management-Plane-separation-on-6200P-NGTX-standalone/m-p/129812#M19047</link>
      <description>&lt;P&gt;MDPS is meant to be configured on a gateway talking to a management server on a different system.&lt;BR /&gt;This is why processes that are obviously only on a management server (specifically cpm and fwm) are not part of MDPS.&lt;BR /&gt;Whether they can be included is, perhaps, a separate question.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Sep 2021 21:23:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Data-and-Management-Plane-separation-on-6200P-NGTX-standalone/m-p/129812#M19047</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-09-20T21:23:25Z</dc:date>
    </item>
    <item>
      <title>Re: Data and Management Plane separation on 6200P NGTX standalone appliance</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Data-and-Management-Plane-separation-on-6200P-NGTX-standalone/m-p/129815#M19048</link>
      <description>&lt;P&gt;Thanks for your reply.&amp;nbsp; Yes, that makes sense.&amp;nbsp; I think I have strayed from a typical deployment scenario which is why tech support can't say whether it is a supported configuration.&amp;nbsp; In any case, the take home message is to refrain from enabling MDPS if you are running a stand-alone appliance as it will break the ability to manage the system with Smart Console (at least in my hands).&lt;/P&gt;</description>
      <pubDate>Mon, 20 Sep 2021 23:25:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Data-and-Management-Plane-separation-on-6200P-NGTX-standalone/m-p/129815#M19048</guid>
      <dc:creator>quatloo</dc:creator>
      <dc:date>2021-09-20T23:25:53Z</dc:date>
    </item>
    <item>
      <title>Re: Data and Management Plane separation on 6200P NGTX standalone appliance</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Data-and-Management-Plane-separation-on-6200P-NGTX-standalone/m-p/129816#M19049</link>
      <description>&lt;P&gt;There's certainly no clear statement saying it is or it isn't, thus why TAC can't say for certain.&lt;BR /&gt;However, based on what things the feature enables by default, I feel pretty confident in saying a standalone gateway was not the intended use case for MDPS.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Sep 2021 23:35:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Data-and-Management-Plane-separation-on-6200P-NGTX-standalone/m-p/129816#M19049</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-09-20T23:35:51Z</dc:date>
    </item>
  </channel>
</rss>

