<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall upgrade issues in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169451#M30682</link>
    <description>&lt;P&gt;I agree with both&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/27871"&gt;@Bob_Zimmerman&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 27 Jan 2023 18:13:59 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2023-01-27T18:13:59Z</dc:date>
    <item>
      <title>Firewall upgrade issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169431#M30669</link>
      <description>&lt;P&gt;So want to upgrade from a Checkpoint 4200 to a Checkpoint 6200.&lt;/P&gt;&lt;P&gt;I got a copy of the configuration off the 4200 via CLI, applied it to the 6200, added the new firewall to smart console and pushed the policy, but the devices do not work on the new firewall. Looking at the logs I see traffic getting dropped. I’ve tried to set the policy to any, any, set the interfaces to external, Disabled anti-spoofing on the interfaces, but it still drops the traffic before any of my settings are applied. So the question is what causes this? The vendor says the deep packet inspection must be disabled, is there a way to verify if this is on or off? If I swap the device connections back to the 4200, everything works fine. &amp;nbsp; Both interfaces are external networks, only my Management interface in internal to the network. The basic topology is the phones use the corporate network to make calls, if the local network goes down for some reason, it fails over to satellite and the phone work via the satellite.&amp;nbsp;&lt;/P&gt;&lt;P&gt;set interface eth1 comments "phones"&lt;/P&gt;&lt;P&gt;set interface eth1 link-speed 100M/full&lt;/P&gt;&lt;P&gt;set interface eth1 state on&lt;/P&gt;&lt;P&gt;set interface eth1 ipv4-address 192.168.210.1 mask-length 28&lt;/P&gt;&lt;P&gt;set interface eth2 comments "Satellite"&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Packet Dropped in log" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19338i9316E281A91E70C5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Dropped_packet.jpg" alt="Dropped_packet.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;set interface eth2 state on&lt;/P&gt;&lt;P&gt;set interface eth2 auto-negotiation on&lt;/P&gt;&lt;P&gt;set interface eth2 mtu 1500&lt;/P&gt;&lt;P&gt;set interface eth2 ipv4-address 10.212.35.70 mask-length 28&lt;/P&gt;&lt;P&gt;Another question I have, If I make changes on the interfaces via smart console, are the changes applied immediately, or do I have to install policy before any changes take affect?&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 15:10:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169431#M30669</guid>
      <dc:creator>FireGromit</dc:creator>
      <dc:date>2023-01-27T15:10:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall upgrade issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169439#M30672</link>
      <description>&lt;P&gt;I am not sure the interface names are the same in 4k and 6k series. After replacing the FW, did you pull interfaces with topology? The log says "antispoofing", meaning the topology is not okay.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 17:12:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169439#M30672</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-01-27T17:12:55Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall upgrade issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169443#M30674</link>
      <description>&lt;P&gt;I'll answer your last question first, since it's easy and it helps point to where the issue is.&lt;/P&gt;
&lt;P&gt;Check Point firewalls have OS-level configuration and application-level configuration. The OS-level configuration is done through the command line. All your 'set interface' stuff is OS-level. The firewall application isn't aware of any of that directly. Application-level configuration is done through SmartConsole. Changes to OS-level configuration are immediate. Changes to application-level configuration take a policy push to apply.&lt;/P&gt;
&lt;P&gt;The drop message says the traffic is dropped due to address spoofing. That means one of two things: either your OS-level routing isn't set up correctly, or your application-level antispoofing topology isn't set up correctly. You should check the routing to make sure some CLI command didn't get dropped when you brought over your config, but the problem is likely to be the antispoofing config.&lt;/P&gt;
&lt;P&gt;In SmartConsole, look at each firewall's topology table. My bet is the old firewall has some antispoofing groups and the new one doesn't.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 17:22:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169443#M30674</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-01-27T17:22:38Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall upgrade issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169451#M30682</link>
      <description>&lt;P&gt;I agree with both&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/27871"&gt;@Bob_Zimmerman&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 18:13:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169451#M30682</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-01-27T18:13:59Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall upgrade issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169453#M30683</link>
      <description>&lt;P&gt;&amp;gt; In SmartConsole, look at each firewall's topology table. My bet is the old firewall has some antispoofing groups and the new one doesn't.&lt;/P&gt;&lt;P&gt;Since the old firewall and new firewall share the same IP address, I replaced one with the other in smart console, so I no longer have access to the exact setting that were in smart console. I guess i could add it back on, replacing the new one, but I doubt smart console would remember what those settings were.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The answer to the second part helps. looking at another similar firewall, performing the same functions, there is one interface set as an internal and the other external, I copied that configuration, but didn't do an install. So all the changes I did to the interfaces via smart console to troubleshoot the issue didn't apply in the first.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 19:26:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169453#M30683</guid>
      <dc:creator>FireGromit</dc:creator>
      <dc:date>2023-01-27T19:26:16Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall upgrade issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169928#M30815</link>
      <description>&lt;P&gt;Ok the good news is this worked, Setting the one interface external and the other interface internal, and installing the settings, everything worked fine, even with anti-spoofing enabled again.&amp;nbsp; But I really don't understand why. I had previously had both interfaces set for external and anti-spoofing disabled, (and Installed) but was still getting packets dropped due to spoofing.&amp;nbsp; I read somewhere that disabling anti-spoofing can only be applied globally, if this is true, then what is the point of having the option on interfaces to disable anti-spoofing if it does nothing. If anti-spoofing can be disabled on the interfaces, then no packets should have been dropped. While I understand that disabling anti-spoofing isn't exact the correct way to set up a firewall, I was just trying to get it to work and narrow down the the problem was from there.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 13:55:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169928#M30815</guid>
      <dc:creator>TechGromit</dc:creator>
      <dc:date>2023-02-01T13:55:09Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall upgrade issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169960#M30822</link>
      <description>&lt;P&gt;Anytime you make a change in SmartConsole, for it to take effect on the gateways, the session must be published and the policy must be installed to the gateway.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 17:38:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169960#M30822</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-02-01T17:38:15Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall upgrade issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169988#M30826</link>
      <description>&lt;P&gt;Deleting the old object before the new firewall is functional is a really bad idea. You shouldn't do that in the future. You generally shouldn't even make a new firewall object. Just use the same object, reset SIC, establish it with the replacement firewall, and push policy.&lt;/P&gt;
&lt;P&gt;You can view old management database states. Manage &amp;amp; Settings &amp;gt; Sessions &amp;gt; Revisions &amp;gt; pick a revision, then hit View.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 20:52:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169988#M30826</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-02-01T20:52:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall upgrade issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169989#M30827</link>
      <description>&lt;P&gt;Not according to TAC and I agree with them, sorry. I think its actually better to delete the old object, because it makes database cleaner.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 20:56:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/169989#M30827</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-02-01T20:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall upgrade issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/170001#M30828</link>
      <description>&lt;P&gt;Who suggested that? It's a waste of time, and leads to issues like this when some config from the old object isn't brought over. The whole point of firewall objects in a management database is to give the management server a standardized view of the hardware so it doesn't need to care about the implementation details like what server it's on.&lt;/P&gt;
&lt;P&gt;When a cluster member fails, do you build a whole new object for the replacement one?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 23:51:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/170001#M30828</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-02-01T23:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall upgrade issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/170015#M30830</link>
      <description>&lt;P&gt;Who told me that? At least 5 TAC engineers and I agree with all of them. I had been doing it that way for ages and never had a single problem. Thats your opinion its waste of time, to each their own : - )&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2023 02:28:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/170015#M30830</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-02-02T02:28:01Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall upgrade issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/170120#M30835</link>
      <description>&lt;P&gt;I agree, by not wiping all the settings, I was able to utilize the old firewall while the new firewall was getting set up, so there was no user outage. I had the rack space and power to run both, so why not run both. After I had issues, I was able to troubleshoot using the management interface on the new firewall and leave the interfaces on the old firewall, only occasional moving them over to test.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2023 14:17:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-upgrade-issues/m-p/170120#M30835</guid>
      <dc:creator>TechGromit</dc:creator>
      <dc:date>2023-02-02T14:17:52Z</dc:date>
    </item>
  </channel>
</rss>

