<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Network Config Management backups question in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Network-Config-Management-backups-question/m-p/267549#M52897</link>
    <description>&lt;P&gt;I dont see Check Point listed in the first link you provided. If this is supported, I would give it full permissions.&lt;/P&gt;
&lt;P&gt;Sorry, my bad...I thought it was alphabetically listed, did not notice they had Cisco listed before Check Point.&lt;/P&gt;</description>
    <pubDate>Fri, 16 Jan 2026 00:12:40 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2026-01-16T00:12:40Z</dc:date>
    <item>
      <title>Network Config Management backups question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Network-Config-Management-backups-question/m-p/267548#M52896</link>
      <description>&lt;P&gt;We are starting a centralized config backups project, using a configuration management product called Unimus. They list Check Point appliances under their supported products list. The product works based on a discovery process using credentials and it sucks the configs off of the devices using sftp/ssh/scp.&lt;/P&gt;&lt;P&gt;I do not have any experience configuring "outside-in" backups like this. Anyone have any tips or documentation regarding this type of config? Specifically, what level of access to give to the "backup user" account?&lt;/P&gt;&lt;P&gt;&lt;A href="https://wiki.unimus.net/pages/viewpage.action?pageId=10092755" target="_blank"&gt;https://wiki.unimus.net/pages/viewpage.action?pageId=10092755&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://unimus.net" target="_blank"&gt;https://unimus.net&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 23:53:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Network-Config-Management-backups-question/m-p/267548#M52896</guid>
      <dc:creator>michaelhd</dc:creator>
      <dc:date>2026-01-15T23:53:10Z</dc:date>
    </item>
    <item>
      <title>Re: Network Config Management backups question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Network-Config-Management-backups-question/m-p/267549#M52897</link>
      <description>&lt;P&gt;I dont see Check Point listed in the first link you provided. If this is supported, I would give it full permissions.&lt;/P&gt;
&lt;P&gt;Sorry, my bad...I thought it was alphabetically listed, did not notice they had Cisco listed before Check Point.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2026 00:12:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Network-Config-Management-backups-question/m-p/267549#M52897</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-16T00:12:40Z</dc:date>
    </item>
    <item>
      <title>Re: Network Config Management backups question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Network-Config-Management-backups-question/m-p/267550#M52898</link>
      <description>&lt;P&gt;If their product runs a Gaia backup then I imagine their login will need to be a full bash login, but if they're just scraping the clish config out then it probably just needs a read only clish login. From a very quick poke around their wiki there it seems like it's more of a clish config thing than a full backup thing, so I guess keep that in mind if you do any config changes that aren't in clish.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2026 00:35:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Network-Config-Management-backups-question/m-p/267550#M52898</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2026-01-16T00:35:45Z</dc:date>
    </item>
    <item>
      <title>Re: Network Config Management backups question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Network-Config-Management-backups-question/m-p/267551#M52899</link>
      <description>&lt;P&gt;FWIW, I ran the exact question you had through fully licensed MS Copilot AI and below is what it came up with...&lt;/P&gt;
&lt;P&gt;**********************************&lt;/P&gt;
&lt;DIV&gt;
&lt;P&gt;Hi Michael — great question, and you’re right to think about &lt;STRONG&gt;least-privilege&lt;/STRONG&gt; up front.&lt;/P&gt;
&lt;P&gt;A key first point (because it influences permissions): &lt;STRONG&gt;Unimus primarily backs devices up by logging in (SSH/Telnet) and running the vendor-appropriate “show/export config” CLI commands&lt;/STRONG&gt;, using the credentials discovered during its discovery phase. &lt;BR /&gt;So in many environments, Unimus &lt;STRONG&gt;does not actually need SCP/SFTP&lt;/STRONG&gt; to &lt;EM&gt;pull&lt;/EM&gt; configs (unless you build a custom flow that generates a file and then transfers it, or you’re using a product/driver that works that way). Unimus also supports overriding the built‑in driver behavior with &lt;STRONG&gt;Custom Backup Flows&lt;/STRONG&gt;, and you can enable debug logging to see exactly which commands it runs during backup. &lt;A href="https://wiki.unimus.net/display/UNPUB/Backup" target="_blank"&gt;[wiki.unimus.net]&lt;/A&gt; &lt;A href="https://wiki.unimus.net/display/UNPUB/Backup+Flows" target="_blank"&gt;[wiki.unimus.net]&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Below is a practical way to think about permissions for &lt;STRONG&gt;Check Point Gaia appliances&lt;/STRONG&gt;.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2&gt;1) Decide what you’re backing up (Gaia OS config vs. “real” Check Point policy/database)&lt;/H2&gt;
&lt;P&gt;Unimus will happily collect &lt;STRONG&gt;device configuration text&lt;/STRONG&gt;, which for Gaia commonly means the &lt;STRONG&gt;Gaia OS configuration&lt;/STRONG&gt; (interfaces, routing, etc.). &lt;BR /&gt;However, for &lt;STRONG&gt;Security Management Servers&lt;/STRONG&gt;, the “important backup” is often the &lt;STRONG&gt;management database/policy&lt;/STRONG&gt; export (e.g., migrate tools), which is a different workflow from “show configuration.” Check Point’s own upgrade/backup guidance distinguishes these (e.g., migrate exports for Management Server, snapshots/backups for gateways). &lt;A href="https://wiki.unimus.net/display/UNPUB/Backup" target="_blank"&gt;[wiki.unimus.net]&lt;/A&gt; &lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_Installation_and_Upgrade_Guide/Content/Topics-IUG/Backing-Up-and-Restoring.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why this matters:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;If you only need &lt;STRONG&gt;Gaia OS config text&lt;/STRONG&gt;, you can usually give a &lt;STRONG&gt;restricted Gaia RBA role&lt;/STRONG&gt;. &lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Gaia_AdminGuide/Topics-GAG/Roles.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;, &lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_Gaia_AdminGuide/Topics-GAG/Roles-Gaia-Clish.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;If you need &lt;STRONG&gt;management DB exports&lt;/STRONG&gt;, you’re typically in &lt;STRONG&gt;Expert mode tooling territory&lt;/STRONG&gt; and permissions expand (often to full admin-level features). (At minimum, some tooling explicitly requires Expert mode). &lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/CLI/migrate_server.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;, &lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_Gaia_AdminGuide/Topics-GAG/Expert-Mode.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H2&gt;2) Understand Check Point Gaia permissions (RBA) and what’s “sensitive”&lt;/H2&gt;
&lt;P&gt;Gaia has a &lt;STRONG&gt;Role Based Administration (RBA)&lt;/STRONG&gt; system with predefined roles:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;adminRole&lt;/STRONG&gt; = full read/write access to all features&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;monitorRole&lt;/STRONG&gt; = read-only access to all features &lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Gaia_AdminGuide/Topics-GAG/Roles.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Check Point also explicitly calls out “power features” that effectively elevate privileges (even if assigned read-only). These include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Display Configuration (&lt;CODE&gt;configuration&lt;/CODE&gt;)&lt;/STRONG&gt; – show/save/load Gaia OS configuration&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Backup (&lt;CODE&gt;backup&lt;/CODE&gt;)&lt;/STRONG&gt; – create/restore backups&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Expert Mode (&lt;CODE&gt;expert&lt;/CODE&gt;)&lt;/STRONG&gt;, &lt;STRONG&gt;cron&lt;/STRONG&gt;, etc. &lt;A href="https://support.checkpoint.com/results/sk/sk94491" target="_blank"&gt;[support.ch...kpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;There’s even a documented warning that adding some of these features to a role can present as “equivalent to adminRole” (cosmetic warning, but still a strong hint to treat these as high-impact). &lt;A href="https://support.checkpoint.com/results/sk/sk110772" target="_blank"&gt;[support.ch...kpoint.com]&lt;/A&gt;, &lt;A href="https://support.checkpoint.com/results/sk/sk94491" target="_blank"&gt;[support.ch...kpoint.com]&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Bottom line:&lt;/STRONG&gt; if Unimus’ Check Point driver uses &lt;CODE&gt;show configuration&lt;/CODE&gt;, you will likely need the &lt;STRONG&gt;&lt;CODE&gt;configuration&lt;/CODE&gt; feature&lt;/STRONG&gt;, which Check Point considers sensitive. &lt;A href="https://support.checkpoint.com/results/sk/sk94491" target="_blank"&gt;[support.ch...kpoint.com]&lt;/A&gt;, &lt;A href="https://support.checkpoint.com/results/sk/sk110772" target="_blank"&gt;[support.ch...kpoint.com]&lt;/A&gt;&lt;/P&gt;
&lt;HR /&gt;
&lt;H2&gt;3) Recommended approach: a dedicated “Unimus backup” user with a tight RBA role (CLI-only)&lt;/H2&gt;
&lt;H3&gt;A. Create a custom RBA role with &lt;EM&gt;only what Unimus needs&lt;/EM&gt;&lt;/H3&gt;
&lt;P&gt;Check Point’s Gaia documentation shows the syntax pattern for roles like:&lt;/P&gt;
&lt;DIV class="___77lcry0 f10pi13n"&gt;
&lt;DIV class="___1hewfwb f10pi13n f7oukh6 f5p0z4x" tabindex="0" role="group" aria-label="Code Preview"&gt;
&lt;DIV class="fui-FluentProvider codeBlock-6824fui-FluentProviderr0 ___1jk74h0 fzk5nv6 f6n0el9 f7x6x6c f1a9mlr7 flj889f f13g0yyb ffzn0d2" dir="ltr" data-testid="ComponentFluentProviderId"&gt;
&lt;DIV class="scriptor-component-code-block ___zvnbuh0 fbwmw8f f1r24x2c fssjx5q f11d9hfk f1ox3k9x f133xw5t f1bt4cyl fbhtfgd fukujjm f1uhbleq f1j8h10f f1dcxf0u fhswmqe f1gsf85u fh8rik3 f1jl54mw f1w257bn f1c6ju7g fwfsotv f1ndaetk fe9qgns fu1i9vr fol4l6z f1xiw7p5 fdk4ulh" tabindex="-1"&gt;
&lt;DIV class="___4ll5qn0 fonrc96"&gt;
&lt;DIV class="r14iuplo fui-AriaLive__assertive" aria-live="assertive"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="r14iuplo fui-AriaLive__polite" aria-live="polite"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="___1x9q54e f1vxt3g6"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="___18t61o0 f1tmrb6z f1ux83ux f1lqlypd f16n82ws f5qgyap fxa5w0x f1r24x2c fvzhe1q f1d4ydo3 f1bt4cyl fbhtfgd f1g5dvvh f1u86z86 fh8rik3 f1b0he24"&gt;
&lt;DIV class="fui-Overflow ___cvoqnq0 f3x039c facid5 fssjx5q f13efqb7 ffmgqju f1npw1rw fiox0mu"&gt;
&lt;DIV class="___iln2i00 fssjx5q fye61jd f13efqb7 fjxvw1e" data-overflow-item=""&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="___iln2i00 fssjx5q fye61jd f13efqb7 fjxvw1e" data-overflow-item=""&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="___iln2i00 fssjx5q fye61jd f13efqb7 fjxvw1e" data-overflow-item=""&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="___iln2i00 fssjx5q fye61jd f13efqb7 fjxvw1e" data-overflow-item=""&gt;
&lt;DIV id="language-badge" class="fui-Badge r1p3wql8 ___mx1vz90 f1soahph fyk0x7v f17ad7pc f1evqen2 f70w86f fmfhf0j f1ar0y7c f1fzzbuc f176ju0o f3dgrwi" aria-label="Plain Text"&gt;&lt;SPAN class="___183uwmw fssjx5q fiox0mu fj6s5qm"&gt;&lt;SPAN class="___qrfgid0 f1ucikwr f19r7g80 f11kh8xn fahyp9a f7qna21"&gt;Plain Text&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="___iln2i00 fssjx5q fye61jd f13efqb7 fjxvw1e"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="___1iaeemo fssjx5q f11d9hfk fj2zk3l f1f4vkoj"&gt;
&lt;DIV class="___r6mbn30 fssjx5q f11d9hfk fj2zk3l fmyxm6j f1ldmben"&gt;
&lt;DIV class="___y5f1h20 fssjx5q f11d9hfk fj2zk3l f1ldmben f17c5mm f19k5jia fzv833z f1d4ydo3 fvzhe1q fbhtfgd f1bt4cyl f78jz3f f1687457 fe71wc6 f1rzione fhwtlc fsi997f f1agyh2g f5pqhoq f1n7qkvd f1b2nycv fmjbvv1 f152ghrs f29fz19 fynt0gl frbyvui fldiipk fkbrbz7 fdt8m4f f3bwauq f9ipwx0 fr4zddg fjde80l fev0vdy"&gt;
&lt;DIV class="___ysqij10 fonrc96 f1d3un5n fdk4ulh f1cijgmw fzb3wgo fssjx5q f11d9hfk fee5icb fr1uqzy" tabindex="0" role="textbox" aria-multiline="true" aria-label="Editor container"&gt;
&lt;DIV class="___sv9ola0 fj2zk3l f1f4vkoj scriptor-instance-0" data-fluid-id="E"&gt;
&lt;DIV class="scriptor-canvas scriptor-styled-scrollbar focus-container" contenteditable="false" translate="no"&gt;
&lt;DIV class="scriptor-pageContainer" tabindex="0" role="document" contenteditable="false" spellcheck="false" data-gramm_editor="false" aria-label="Code editor"&gt;
&lt;DIV class="scriptor-pageFrame scriptor-firstPage scriptor-simpleView" data-dbg-pageindex="0"&gt;
&lt;DIV class="scriptor-highlightWrapper" contenteditable="false"&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="scriptor-code-editor scriptor-code-wrap-on scriptor-pageBody scriptor-simpleViewPage"&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN class="scriptor-textRun scriptor-inline"&gt;add rba role &amp;lt;RoleName&amp;gt; domain-type System readonly-features &amp;lt;...&amp;gt; readwrite-features &amp;lt;...&amp;gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="scriptor-highlightWrapper" contenteditable="false"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="___jn2ezd0 fz3k5b7"&gt;&lt;BUTTON id="codeblock-footer" class="fui-Button r1tr5vfu ___tm4xna0 f6pnow2 fbeu1ei f1d8mkup f17138kp fcxlroo f1cj7as5 fiuy8n6 f16v3g6v f17in1y4 flpdnxy fh0jiei f1nud1fp f57w3t7 f1pg4sd1 fg1hzlg fbd4hf f1h3mfoh f117gnlz fno03go f1fgume8 f9sga78 f1v65m04 fls5b9n f3ii4ss frm87wt fqs7mlm fh8qanh fssjx5q fiox0mu fkbe04a f11kh8xn fukujjm f1uhbleq f1j8h10f f1dcxf0u fhswmqe f1gsf85u fh8rik3 f1jl54mw f13uhkmc fbwcluv f16zzzm5 f1liohda f1b124jc fohf6ad fajh7h8 f5qgyap fuscgut f16n82ws f1sb205n f1n50nqc fgf2yez" role="button" type="button" aria-label="Show more lines"&gt;Show more lines&lt;/BUTTON&gt;
&lt;DIV class="___8x8gd40 f1vxt3g6 fzy7qkc fmyxm6j" aria-live="polite" aria-atomic="true"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;Example from Check Point docs:&lt;BR /&gt;&lt;CODE&gt;add rba role NewRole domain-type System readonly-features vpn,ospf,rba readwrite-features snmp&lt;/CODE&gt; &lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_Gaia_AdminGuide/Topics-GAG/Roles-Gaia-Clish.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For Unimus, start with &lt;STRONG&gt;CLI-only + read-only&lt;/STRONG&gt;, and include only the minimum features required for config retrieval, typically:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;CODE&gt;configuration&lt;/CODE&gt; (only if your backup method requires &lt;CODE&gt;show configuration&lt;/CODE&gt;) &lt;A href="https://support.checkpoint.com/results/sk/sk94491" target="_blank"&gt;[support.ch...kpoint.com]&lt;/A&gt;, &lt;A href="https://support.checkpoint.com/results/sk/sk110772" target="_blank"&gt;[support.ch...kpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;optionally &lt;CODE&gt;version&lt;/CODE&gt; or &lt;CODE&gt;asset&lt;/CODE&gt; if discovery/driver needs those (you’ll confirm via Unimus debug logs) &lt;A href="https://wiki.unimus.net/display/UNPUB/Backup+Flows" target="_blank"&gt;[wiki.unimus.net]&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":warning:"&gt;⚠️&lt;/span&gt; Note: assigning &lt;CODE&gt;configuration&lt;/CODE&gt; is powerful in Gaia’s model. Treat this account as privileged and protect it accordingly. &lt;A href="https://support.checkpoint.com/results/sk/sk94491" target="_blank"&gt;[support.ch...kpoint.com]&lt;/A&gt;, &lt;A href="https://support.checkpoint.com/results/sk/sk110772" target="_blank"&gt;[support.ch...kpoint.com]&lt;/A&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H3&gt;B. Restrict access mechanisms to &lt;STRONG&gt;CLI only&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Gaia roles can restrict which access mechanisms a user can use (Gaia Portal vs Gaia Clish). &lt;BR /&gt;So make the Unimus user &lt;STRONG&gt;CLI-only&lt;/STRONG&gt; unless you have a specific reason for Web UI access. &lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Gaia_AdminGuide/Topics-GAG/Roles.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;, &lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_Gaia_AdminGuide/Topics-GAG/Roles-Gaia-Clish.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/P&gt;
&lt;H3&gt;C. Avoid Expert Mode&lt;/H3&gt;
&lt;P&gt;Expert mode exists because clish is intentionally restrictive; Check Point notes clish is a restrictive shell and Expert mode provides broader low-level command access. &lt;BR /&gt;Check Point also recommends that to block Expert mode, &lt;STRONG&gt;don’t include “power features” like &lt;CODE&gt;expert&lt;/CODE&gt; in the role&lt;/STRONG&gt;. &lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_Gaia_AdminGuide/Topics-GAG/Expert-Mode.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt; &lt;A href="https://support.checkpoint.com/results/sk/sk94491" target="_blank"&gt;[support.ch...kpoint.com]&lt;/A&gt;&lt;/P&gt;
&lt;HR /&gt;
&lt;H2&gt;4) If you really do need SCP/SFTP: use a separate, file-transfer-only account (and lock it down)&lt;/H2&gt;
&lt;P&gt;If your design is “generate a file on the appliance, then pull it via SCP/SFTP,” Check Point’s guidance for SCP connectivity includes:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The connecting user’s default shell must be &lt;STRONG&gt;&lt;CODE&gt;/bin/bash&lt;/CODE&gt;&lt;/STRONG&gt; for SCP clients in their documented approach &lt;A href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_Gaia_AdminGuide/Content/Topics-GAG/Advanced-Gaia-Configuration-SCP.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;On gateways/clusters, the Access Control policy must allow the SCP connection, and you should &lt;STRONG&gt;limit sources to known internal hosts&lt;/STRONG&gt; &lt;A href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_Gaia_AdminGuide/Content/Topics-GAG/Advanced-Gaia-Configuration-SCP.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;They recommend a &lt;STRONG&gt;dedicated SCP user&lt;/STRONG&gt; with permissions only to its home directory &lt;A href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_Gaia_AdminGuide/Content/Topics-GAG/Advanced-Gaia-Configuration-SCP.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;There’s also a community best-practice pattern to create a dedicated “scpuser” instead of changing the admin shell (example uses &lt;CODE&gt;/usr/bin/scponly&lt;/CODE&gt; for tighter file transfer posture). &lt;A href="https://community.checkpoint.com/t5/Security-Gateways/HowTo-Creating-an-scpuser-account-on-Gaia-Clish/td-p/5819" target="_blank"&gt;[community....kpoint.com]&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; &lt;STRONG&gt;Best practice here is two accounts&lt;/STRONG&gt;:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Unimus CLI backup user&lt;/STRONG&gt; (RBA-limited, no file transfer requirement)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SCP-only user&lt;/STRONG&gt; (home-dir only, source-restricted, used only if you must pull files)&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;This separation prevents your config-backup process from also becoming a general-purpose file transfer foothold.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2&gt;5) How to verify least privilege (don’t guess—observe)&lt;/H2&gt;
&lt;P&gt;Because Unimus’ exact behavior can vary by driver/version and by what it discovers, the fastest way to nail permissions is:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable Unimus device output logging / debug&lt;/STRONG&gt;, run discovery+backup once, and inspect what commands it tried. &lt;A href="https://wiki.unimus.net/display/UNPUB/Backup+Flows" target="_blank"&gt;[wiki.unimus.net]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Add only the missing Gaia “features” to the role until backup succeeds.&lt;/LI&gt;
&lt;LI&gt;Keep a record of the final role feature list as your standard.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;This avoids over-granting permissions “just in case.”&lt;/P&gt;
&lt;HR /&gt;
&lt;H2&gt;6) Quick checklist (security hardening for “outside-in” backups)&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Use a dedicated account&lt;/STRONG&gt; (never shared admin). Gaia explicitly supports granular RBA roles per user. &lt;A href="https://support.checkpoint.com/results/sk/sk94491" target="_blank"&gt;[support.ch...kpoint.com]&lt;/A&gt;, &lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Gaia_AdminGuide/Topics-GAG/Roles.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;CLI-only access&lt;/STRONG&gt; for the Unimus account unless there’s a real need for Portal. &lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Gaia_AdminGuide/Topics-GAG/Roles.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;, &lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_Gaia_AdminGuide/Topics-GAG/Roles-Gaia-Clish.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Do not grant Expert Mode&lt;/STRONG&gt; (&lt;CODE&gt;expert&lt;/CODE&gt;) to the backup user. &lt;A href="https://support.checkpoint.com/results/sk/sk94491" target="_blank"&gt;[support.ch...kpoint.com]&lt;/A&gt;, &lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_Gaia_AdminGuide/Topics-GAG/Expert-Mode.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;If SCP is used, &lt;STRONG&gt;source-restrict it in policy&lt;/STRONG&gt; and prefer a &lt;STRONG&gt;dedicated SCP user&lt;/STRONG&gt;. &lt;A href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_Gaia_AdminGuide/Content/Topics-GAG/Advanced-Gaia-Configuration-SCP.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Remember that &lt;CODE&gt;configuration&lt;/CODE&gt; / &lt;CODE&gt;backup&lt;/CODE&gt; are considered “power features” in Gaia—treat credentials like privileged secrets. &lt;A href="https://support.checkpoint.com/results/sk/sk94491" target="_blank"&gt;[support.ch...kpoint.com]&lt;/A&gt;, &lt;A href="https://support.checkpoint.com/results/sk/sk110772" target="_blank"&gt;[support.ch...kpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 16 Jan 2026 00:37:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Network-Config-Management-backups-question/m-p/267551#M52899</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-16T00:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: Network Config Management backups question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Network-Config-Management-backups-question/m-p/267558#M52902</link>
      <description>&lt;P&gt;If you have test devices or a lab of some kind, the easiest way to find out is to just test it! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://unimus.net/download.html" target="_blank"&gt;Downloads | Unimus by NetCore j.s.a.&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2026 07:23:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Network-Config-Management-backups-question/m-p/267558#M52902</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-16T07:23:41Z</dc:date>
    </item>
    <item>
      <title>Re: Network Config Management backups question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Network-Config-Management-backups-question/m-p/268666#M53171</link>
      <description>&lt;P&gt;Thanks all. Much appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jan 2026 19:50:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Network-Config-Management-backups-question/m-p/268666#M53171</guid>
      <dc:creator>michaelhd</dc:creator>
      <dc:date>2026-01-26T19:50:44Z</dc:date>
    </item>
    <item>
      <title>Re: Network Config Management backups question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Network-Config-Management-backups-question/m-p/268667#M53172</link>
      <description>&lt;P&gt;Glad we can help.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jan 2026 20:22:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Network-Config-Management-backups-question/m-p/268667#M53172</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-26T20:22:06Z</dc:date>
    </item>
  </channel>
</rss>

