<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic R80.40 Policy install timeout, but new policy is active in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Policy-install-timeout-but-new-policy-is-active/m-p/101547#M7948</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;we recently updated from R80.10 to R80.40, Management Server and a Gateway Cluster of 5800 appliances.&lt;/P&gt;&lt;P&gt;We defined a new rule for HTTPS Inspection with Updatable Objects. Since then Policy Install fails with timeout. Deleting the new rule doesn't "repair" it.&lt;/P&gt;&lt;P&gt;- "fw stat" shows the new policy, and changes in the policy are effective.&lt;/P&gt;&lt;P&gt;- I don't think the install_policy_timeout value is the problem, the Management Server waits for a long time for the commit after "fw stat" already shows the new policy timestamp.&lt;/P&gt;&lt;P&gt;- Management Server $FWDIR/log/install_policy.elg:&lt;BR /&gt;...&lt;BR /&gt;Compiled OK.&amp;amp;CURRENTVERCMP&lt;BR /&gt;**##MSG_IDENTIFY##**3&amp;amp;0&amp;amp;Compilation was successful&amp;amp;50&amp;amp;&amp;lt;NULL&amp;gt;&amp;amp;1&amp;amp;CURRENTVERCMP&lt;BR /&gt;Installing Security Gateway policy on: gw-cluster ...&amp;amp;CURRENTVERCMP&lt;BR /&gt;**##MSG_IDENTIFY##**5&amp;amp;0&amp;amp;Transfer was successful.&amp;amp;gw2&amp;amp;&amp;lt;NULL&amp;gt;&amp;amp;1&amp;amp;CURRENTVERCMP&lt;BR /&gt;**##MSG_IDENTIFY##**5&amp;amp;0&amp;amp;Transfer was successful.&amp;amp;gw1&amp;amp;&amp;lt;NULL&amp;gt;&amp;amp;1&amp;amp;CURRENTVERCMP&lt;BR /&gt;Operation incomplete due to timeout.&amp;amp;CURRENTVERCMP&lt;BR /&gt;**##MSG_IDENTIFY##**8&amp;amp;2&amp;amp;Operation incomplete due to timeout.&amp;amp;&amp;lt;NULL&amp;gt;&amp;amp;&amp;lt;NULL&amp;gt;&amp;amp;1&amp;amp;CURRENTVERCMP&lt;BR /&gt;&lt;BR /&gt;So the problems seems to be on gateway side.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;- Gateway /opt/CPsuite-R80.40/fw1/state/__tmp/FW1/install_policy_report.txt&lt;BR /&gt;...&lt;BR /&gt;17:43:15 4000051 InternalMsg UPInstallPolicyApp INFO up_install_policy_app.cpp 364 postLoadCommit ====== UP install policy App post-load commit end ======&lt;BR /&gt;17:43:15 4000052 InternalMsg Install Policy MGR INFO install_policy_mgr.cpp 1133 postLoadCommit Usermode postLoadCommit of InstallPolicyApp: (UP) with appType: (1), appPosition: (2) succeeded&lt;/P&gt;&lt;P&gt;So just the last line with "====== Usermode post-load commit end =====" is missing.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;- According sk114733 "du -k $FWDIR/state/__tmp/FW1/" on both Gateways should be the same, but they differs. The file local.upDB.sqlite differs.&lt;BR /&gt;Regrettably the sk do not mention what to do if the size of the directory differs.&lt;/P&gt;&lt;P&gt;I cannot find any sk how to "reset" the directory $FWDIR/state/__tmp/FW1/. Can I just delete the files and get fresh copies from the management server with "fw fetch"?&lt;/P&gt;&lt;P&gt;(It's a production environment and I don't want to kill the Gateway with careless deleting files...)&lt;/P&gt;&lt;P&gt;Best regards&lt;BR /&gt;Claudia&lt;/P&gt;</description>
    <pubDate>Mon, 09 Nov 2020 18:24:23 GMT</pubDate>
    <dc:creator>ClaudiaPeter</dc:creator>
    <dc:date>2020-11-09T18:24:23Z</dc:date>
    <item>
      <title>R80.40 Policy install timeout, but new policy is active</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Policy-install-timeout-but-new-policy-is-active/m-p/101547#M7948</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;we recently updated from R80.10 to R80.40, Management Server and a Gateway Cluster of 5800 appliances.&lt;/P&gt;&lt;P&gt;We defined a new rule for HTTPS Inspection with Updatable Objects. Since then Policy Install fails with timeout. Deleting the new rule doesn't "repair" it.&lt;/P&gt;&lt;P&gt;- "fw stat" shows the new policy, and changes in the policy are effective.&lt;/P&gt;&lt;P&gt;- I don't think the install_policy_timeout value is the problem, the Management Server waits for a long time for the commit after "fw stat" already shows the new policy timestamp.&lt;/P&gt;&lt;P&gt;- Management Server $FWDIR/log/install_policy.elg:&lt;BR /&gt;...&lt;BR /&gt;Compiled OK.&amp;amp;CURRENTVERCMP&lt;BR /&gt;**##MSG_IDENTIFY##**3&amp;amp;0&amp;amp;Compilation was successful&amp;amp;50&amp;amp;&amp;lt;NULL&amp;gt;&amp;amp;1&amp;amp;CURRENTVERCMP&lt;BR /&gt;Installing Security Gateway policy on: gw-cluster ...&amp;amp;CURRENTVERCMP&lt;BR /&gt;**##MSG_IDENTIFY##**5&amp;amp;0&amp;amp;Transfer was successful.&amp;amp;gw2&amp;amp;&amp;lt;NULL&amp;gt;&amp;amp;1&amp;amp;CURRENTVERCMP&lt;BR /&gt;**##MSG_IDENTIFY##**5&amp;amp;0&amp;amp;Transfer was successful.&amp;amp;gw1&amp;amp;&amp;lt;NULL&amp;gt;&amp;amp;1&amp;amp;CURRENTVERCMP&lt;BR /&gt;Operation incomplete due to timeout.&amp;amp;CURRENTVERCMP&lt;BR /&gt;**##MSG_IDENTIFY##**8&amp;amp;2&amp;amp;Operation incomplete due to timeout.&amp;amp;&amp;lt;NULL&amp;gt;&amp;amp;&amp;lt;NULL&amp;gt;&amp;amp;1&amp;amp;CURRENTVERCMP&lt;BR /&gt;&lt;BR /&gt;So the problems seems to be on gateway side.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;- Gateway /opt/CPsuite-R80.40/fw1/state/__tmp/FW1/install_policy_report.txt&lt;BR /&gt;...&lt;BR /&gt;17:43:15 4000051 InternalMsg UPInstallPolicyApp INFO up_install_policy_app.cpp 364 postLoadCommit ====== UP install policy App post-load commit end ======&lt;BR /&gt;17:43:15 4000052 InternalMsg Install Policy MGR INFO install_policy_mgr.cpp 1133 postLoadCommit Usermode postLoadCommit of InstallPolicyApp: (UP) with appType: (1), appPosition: (2) succeeded&lt;/P&gt;&lt;P&gt;So just the last line with "====== Usermode post-load commit end =====" is missing.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;- According sk114733 "du -k $FWDIR/state/__tmp/FW1/" on both Gateways should be the same, but they differs. The file local.upDB.sqlite differs.&lt;BR /&gt;Regrettably the sk do not mention what to do if the size of the directory differs.&lt;/P&gt;&lt;P&gt;I cannot find any sk how to "reset" the directory $FWDIR/state/__tmp/FW1/. Can I just delete the files and get fresh copies from the management server with "fw fetch"?&lt;/P&gt;&lt;P&gt;(It's a production environment and I don't want to kill the Gateway with careless deleting files...)&lt;/P&gt;&lt;P&gt;Best regards&lt;BR /&gt;Claudia&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 18:24:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Policy-install-timeout-but-new-policy-is-active/m-p/101547#M7948</guid>
      <dc:creator>ClaudiaPeter</dc:creator>
      <dc:date>2020-11-09T18:24:23Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 Policy install timeout, but new policy is active</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Policy-install-timeout-but-new-policy-is-active/m-p/101563#M7953</link>
      <description>&lt;P&gt;You can generally just delete the content of $FWDIR/state safely, though you can take a backup if you want to be on the safe side.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 21:29:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Policy-install-timeout-but-new-policy-is-active/m-p/101563#M7953</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-11-09T21:29:06Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 Policy install timeout, but new policy is active</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Policy-install-timeout-but-new-policy-is-active/m-p/101580#M7954</link>
      <description>&lt;P&gt;I suggest investigating this with TAC.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Can you show how your "New HTTPS Inspection rule with Updatable Objects" looks, though?&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2020 07:37:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Policy-install-timeout-but-new-policy-is-active/m-p/101580#M7954</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-11-10T07:37:12Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 Policy install timeout, but new policy is active</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Policy-install-timeout-but-new-policy-is-active/m-p/101591#M7956</link>
      <description>&lt;P&gt;Actual the rule looks like:&lt;/P&gt;&lt;P&gt;Source: Any&lt;/P&gt;&lt;P&gt;Destination: Office365 Worldwide Services, Intune Services, Microsoft - recommended HTTPS bypass, Power B I Services, Webex Services&lt;/P&gt;&lt;P&gt;Services: https&lt;/P&gt;&lt;P&gt;Category/..: Any&lt;/P&gt;&lt;P&gt;Action: Bypass&lt;/P&gt;&lt;P&gt;Track: Log&lt;/P&gt;&lt;P&gt;Blade: All&lt;/P&gt;&lt;P&gt;Install On: one Gateway Cluster&lt;/P&gt;&lt;P&gt;Certificate: Outbound Certificate&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2020 09:23:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Policy-install-timeout-but-new-policy-is-active/m-p/101591#M7956</guid>
      <dc:creator>ClaudiaPeter</dc:creator>
      <dc:date>2020-11-10T09:23:57Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 Policy install timeout, but new policy is active</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Policy-install-timeout-but-new-policy-is-active/m-p/101672#M7961</link>
      <description>&lt;P&gt;The solution was "standard": reboot.&lt;/P&gt;&lt;P&gt;It took only some longer discussions with the customer to be allowed to reboot the maschines....&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2020 16:40:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Policy-install-timeout-but-new-policy-is-active/m-p/101672#M7961</guid>
      <dc:creator>ClaudiaPeter</dc:creator>
      <dc:date>2020-11-10T16:40:33Z</dc:date>
    </item>
  </channel>
</rss>

