<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.x - Policy Installation Flowchart in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/72635#M83000</link>
    <description>&lt;P&gt;&lt;SPAN&gt;This is a nice info:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;FONT color="#993366"&gt;user.def&lt;/FONT&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;fwui_head.def&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#993366"&gt;table.def&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt; auth.def&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt; base.def&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#993366"&gt;crypt.def&lt;/FONT&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is this valid for all def files?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 19 Jan 2020 15:46:11 GMT</pubDate>
    <dc:creator>rolf</dc:creator>
    <dc:date>2020-01-19T15:46:11Z</dc:date>
    <item>
      <title>R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67458#M82974</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Policy_Installation_Flowchart_Bild_1.0a.JPG" style="width: 900px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/3125i8B40A03EBCABA399/image-dimensions/900x1283?v=v2" width="900" height="1283" role="button" title="Policy_Installation_Flowchart_Bild_1.0a.JPG" alt="Policy_Installation_Flowchart_Bild_1.0a.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt; Policy Installation Flow &lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;BR /&gt;Policy installation process has several stages:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;1)&lt;/FONT&gt;&lt;/STRONG&gt;&amp;nbsp; Assuming the initiation was made by the SmartConsole the web service policy installation command is sent to&amp;nbsp;the Check Point management (CPM) on the management server.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2)&lt;/STRONG&gt;&amp;nbsp; The first stage is the process that CPM convert the objects with Java from new DB language/ files to the old set language and to files. Then the policy installation process is verifying compiling it to a "language" the security gateway can understand and implement. The verification and compilation stages are performed by the FWM and in the future by CPM process.&lt;BR /&gt;&lt;BR /&gt;Note: The translated policies of CPM for FWM can be found for the „Standard“ policy here:&lt;BR /&gt;$FWDIR/conf/Standard.W&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;3)&lt;/STRONG&gt;&amp;nbsp; FWM process is responsible for code generation and compilation. For example, the process reads the policy from „$FWDIR/conf/Standard.W“ and other files and use them for the policy verification and conversion. The FWM process performs verification and conversion of the files and database information for the installation targets for which policy installation is requested. &lt;BR /&gt;&lt;BR /&gt;For this the fw_loader of the &lt;STRONG&gt;corresponding&lt;/STRONG&gt; Check Point &lt;STRONG&gt;version&lt;/STRONG&gt; is started to verify and convert the policy.&lt;BR /&gt;&lt;BR /&gt;Note: &lt;BR /&gt;For the corresponding Check Point versions, the fw_loader and other tools can be found in the following path on a R80.30 management server:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;/opt/CPsuite-R80.30&lt;/STRONG&gt;/fw1/bin/fw_loader&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; R80.30&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;/opt/CPR7520CMP-R80.30&lt;/STRONG&gt;/bin/fw_loader&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; R75.20, R75.30 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;/opt/CPR7540CMP-R80.30&lt;/STRONG&gt;/bin/fw_loader&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; R75.40, R75.45, R75.46, R75.47&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;/opt/CPR76CMP-R80.30/&lt;/STRONG&gt;bin/fw_loader&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; R76, R76SP to R76SP.50&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;STRONG&gt; /opt/CPR77CMP-R80.30/&lt;/STRONG&gt;bin/fw_loader&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; R77, R77.10, R77.20, R77.30&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;STRONG&gt; /opt/CPR75CMP-R80.30/&lt;/STRONG&gt;bin/fw_loader&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; R75, R75.10&lt;BR /&gt;&lt;BR /&gt;One question that keeps coming up is. Which config files are used on the management server to compile policies with user specificlally INSPECT code?&lt;BR /&gt;For this purpose, different directorys are used for each Check Point gateway version according to the above scheme similar to fw_loader. &lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;/opt/CPsuite-R80.30&lt;/STRONG&gt;/fw1/lib &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; R80.30&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;/opt/CPR7520CMP-R80.30&lt;/STRONG&gt;/lib &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; R75.20, R75.30 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;/opt/CPR7540CMP-R80.30&lt;/STRONG&gt;/lib &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; R75.40, R75.45, R75.46, R75.47&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;/opt/CPR76CMP-R80.30/&lt;/STRONG&gt;lib &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; R76, R76SP to R76SP.50&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;STRONG&gt; /opt/CPR77CMP-R80.30/&lt;/STRONG&gt;lib &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; R77, R77.10, R77.20, R77.30&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;STRONG&gt; /opt/CPR75CMP-R80.30/&lt;/STRONG&gt;lib &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; R75, R75.10&lt;BR /&gt;&lt;BR /&gt;Here are the most important config files, which we can customize Check Point INSPECT code individually:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt; &lt;STRONG&gt;&lt;FONT color="#993366"&gt;user.def&lt;/FONT&gt;&lt;/STRONG&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;gt;&amp;nbsp; User-defined implied rules that can be added in Check Point INSPECT language &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98239&amp;amp;partition=Advanced&amp;amp;product=Security" target="_self"&gt;(sk98239)&lt;/A&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt; &lt;STRONG&gt;fwui_head.def&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt; &lt;FONT color="#993366"&gt;table.def&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/FONT&gt;&lt;/STRONG&gt;-&amp;gt; Definitions of various kernel tables for Check Point security gateway &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98339&amp;amp;partition=Advanced&amp;amp;product=Security" target="_self"&gt;(sk98339)&lt;/A&gt;&amp;nbsp;&lt;STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt; auth.def&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt; base.def&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt; &lt;FONT color="#993366"&gt;crypt.def&lt;/FONT&gt;&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;gt; VPN encryption macros &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98241&amp;amp;partition=Advanced&amp;amp;product=Security" target="_self"&gt;(sk98241)&lt;/A&gt;&lt;STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt; services.def&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt; proxy.def&lt;BR /&gt;&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt; &lt;STRONG&gt;crypt.def&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;4)&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;After code generation and compilation, the FWM process invokes the Check Point Policy Transfer Agent (CPTA) command that sends the policy to all applicable security gateways.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;5)&amp;nbsp; &lt;/STRONG&gt;The CPD process on the security gateway on port 18191 receives the policy files and save this in the following directory „$FWDIR/state/__tmp/FW1“ on the security gateway. The file integrity of the policy will checked now. &lt;BR /&gt;&lt;BR /&gt;Once complete, the cpd invokes“fw fetchlocal“ to load the new policy with the following command from the temporary policy directory: &lt;BR /&gt;&lt;BR /&gt;fw fetchlocal -d $FWDIR/state/__tmp/FW1&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;6)&lt;/STRONG&gt;&amp;nbsp; The FWD process on the security gateway updates all of the user-mode processes responsible for enforcement aspects. These include VPND process for VPN, FWSSD processes for security server issues and so on. All security server daemons running on the gateway are notified of the new policy by FWD and adjust their behavior accordingly, which could include restarting, stopping or starting if a new feature was enabled.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;7)&lt;/STRONG&gt;&amp;nbsp; The new policy is loaded into the INSPECT kernel instances while traffic is still being queued. This process happens very quickly.&amp;nbsp; Chain sequences are rebuilt, and may end up adding or removing chain modules from the sequences if blades were enabled or disabled since the last policy push. &lt;BR /&gt;The new policy is prepared, the Check Point kernel holds the current traffic and starts queuing all incoming traffic. The atomic load takes place. This process should take a fraction of a second. At this point if "Connection Persistence" is set to "Rematch connections" on the gateway object, a CPU-intensive rematch of all open connections against the new policy is performed to ensure that all current connections are still allowed by the new policy.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;Note SecureXL: &lt;BR /&gt;If enabled SecureXL is restarted as well and recalculates its various state tables based on the new policy.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;During policy load, SecureXL is disabled and re-enabled afterwards. Here I am not quite sure if this is the case with R80.20 as well.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;8).&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;The traffic queue on firewall kernel is released and all of the packets are handled by the new security policy.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;9)&lt;/STRONG&gt;&amp;nbsp; The CPD waits for fw_fetchlocal to complete the process and then informs the management server of the command's status installation succeeded or failed.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;10)&lt;/STRONG&gt;&amp;nbsp; The FWM process received the policy installation status from CPD process from security gateway and then presents them in SmartConsole.&lt;/P&gt;
&lt;P&gt;Note:&lt;BR /&gt;Here I am not 100% sure whether the FWM or the CPM distributes the policy installation information to the SmartConsole. According to sk115557, this should be the FWM.&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Firewall Processes&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;CPM Process &lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;CPM process is responsible for writing all information to the PostgreSQL and SOLR databases.&lt;/P&gt;
&lt;P&gt;All the communications between the different GUI clients are done through web services. Is a component within CPM. Whenever we connect to the SmartCenter server with SmartConsole we are basically opening a connection from the GUI machine to the CPM process „java à solr-solrj-v4_X_X.jar“ on the SmartCenter server over port 19009 via web service.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;web_services&lt;/STRONG&gt; is a component within CPM process that serves GUI and remote client (like remote API) and responsible to transfer the request to the &lt;EM&gt;dleserver&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;DLE server (dleserver)&lt;/STRONG&gt; is a component within the CPM server that contains all the logic of the server to writing the info to the database and SOLR&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;object_store&lt;/STRONG&gt; is a component within the CPM server, responsible to write the information to SOLR search engine and to the PostgreSQL database&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;PostgreSQL DB&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;The CPM process is also responsible to perform all database tasks, such as:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;creating objects&lt;/LI&gt;
&lt;LI&gt;removing objects&lt;/LI&gt;
&lt;LI&gt;modifying objects&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Whenever we create an object via SmartConsole we are basically sending a command to the CPM process on the SmartCenter server requesting it to create the object or changing it.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;SOLR &lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;SOLR is the Full Text Search engine that contains full clone of all data from PostgreSQL database.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;FWM Process&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;The FWM process is used for installing security policy to the backward compatibly R7x.x security gateways after the CPM process converts the objects from Java to old policy file format. It runs only on management products such as security management server, log server, SmartEvent, etc.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Serving the embedded GUI clients and authentication requests&lt;/LI&gt;
&lt;LI&gt;Collecting statuses&lt;/LI&gt;
&lt;LI&gt;Policy compilation for backward compatibly R77.X security gateways&lt;/LI&gt;
&lt;LI&gt;VSX database operation&lt;/LI&gt;
&lt;LI&gt;SIC operations via SmartConsole&lt;/LI&gt;
&lt;LI&gt;Database install&lt;/LI&gt;
&lt;LI&gt;License attach and detach from SmartUpdate&lt;/LI&gt;
&lt;LI&gt;Some of management HA functionality&lt;/LI&gt;
&lt;LI&gt;Performs legacy operations&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;CPD Process&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;The CPD process runs on all Check Point products (security management server products as well as security gateways). There are 3 major responsibilities:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;SIC&lt;/STRONG&gt; - we contact CPD process during SIC negotiation to validate and/or push the certificate. &lt;BR /&gt;If the CPD process on a certain security gateway is down, policy installation on that security gateway will fail due to a SIC issue. &amp;nbsp;After SIC was established, the rest of the communication to the security gateway will be via port 18191.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Status collection&lt;/STRONG&gt; - the FWM process requests the CPD process for the statuses from security gateways and security management server and then presents them in SmartView monitor. If the CPD process is down, we will not be able to receive the gateways and security management statuses in SmartView Monitor.&lt;/LI&gt;
&lt;LI&gt;Installing security policy on the security gateway.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;FWD Process&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;The FWD process is responsible for sending and receiving the logs from the different Check Point entities to the security management\log server (sometimes they are on the same machine).&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;On Security Management server side&lt;/STRONG&gt;: FWD process listens on port 257, waiting for logs to be sent from various security gateways that are connected to it.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;On the security gateway side&lt;/STRONG&gt;: FWD process opens a connection to the FWD on the log\security management server on port 257.&lt;/LI&gt;
&lt;/UL&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;SK’s&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk33208" target="_self"&gt;sk33208 - How to debug FWM daemon on Multi-Domain Management / Provider-1&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk86320" target="_self"&gt;sk86320 - How to debug the CPD daemon &lt;/A&gt;&lt;BR /&gt;&lt;FONT color="#339966"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk86321" target="_self"&gt;sk86321 - How to debug FWD daemon &lt;/A&gt;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112334" target="_self"&gt;sk112334 - How to debug SmartConsole / SmartDashboard&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115557&amp;amp;partition=Advanced&amp;amp;product=Security" target="_self"&gt;sk115557 - R80.x Security Management server main processes debugging &lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103918&amp;amp;partition=Advanced&amp;amp;product=Security#Reserved%20words" target="_self"&gt;sk103918 - Policy installation fails with the error "Operation failed, install/uninstall has been improperly terminated"&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2019 14:18:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67458#M82974</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-11-19T14:18:46Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67477#M82975</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;Is this relevant for the CCSA/CCSE examination&lt;/SPAN&gt;&lt;/EM&gt;?&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 20:23:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67477#M82975</guid>
      <dc:creator>R2D2</dc:creator>
      <dc:date>2019-11-14T20:23:45Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67493#M82976</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I think so!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2019 06:20:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67493#M82976</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-11-15T06:20:09Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67516#M82977</link>
      <description>CCSE =&amp;gt; definitely</description>
      <pubDate>Fri, 15 Nov 2019 10:35:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67516#M82977</guid>
      <dc:creator>Maik</dc:creator>
      <dc:date>2019-11-15T10:35:04Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67517#M82978</link>
      <description>&lt;P&gt;Thanks for the effort!&lt;/P&gt;&lt;P&gt;Awesome overview for troubleshooting and the general understanding what happens behind the scenes. Quite useful for all the people who prepare for the CCSE as well. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2019 10:43:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67517#M82978</guid>
      <dc:creator>Maik</dc:creator>
      <dc:date>2019-11-15T10:43:55Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67518#M82979</link>
      <description>&lt;P&gt;Nice! A relevant discussion with&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;can be found here :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Policy-Management/Troubleshooting-policy-installation/m-p/27665" target="_blank"&gt;https://community.checkpoint.com/t5/Policy-Management/Troubleshooting-policy-installation/m-p/27665&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2019 12:13:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67518#M82979</guid>
      <dc:creator>Nick_Doropoulos</dc:creator>
      <dc:date>2019-11-15T12:13:31Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67620#M82980</link>
      <description>&lt;P&gt;It is relevant for CCSE.&lt;/P&gt;</description>
      <pubDate>Sat, 16 Nov 2019 08:55:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67620#M82980</guid>
      <dc:creator>tniop_kcehc</dc:creator>
      <dc:date>2019-11-16T08:55:49Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67660#M82981</link>
      <description>&lt;P&gt;Nicely written! Thank you Heiko!&lt;/P&gt;</description>
      <pubDate>Sun, 17 Nov 2019 13:34:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67660#M82981</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-11-17T13:34:32Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67673#M82982</link>
      <description>very comprehensive and well done Heiko ! kudos buddy &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;BR /&gt;ps. this should be the main path topic on ccse r80.x I believe!&lt;BR /&gt;&lt;BR /&gt;cheers</description>
      <pubDate>Sun, 17 Nov 2019 18:36:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67673#M82982</guid>
      <dc:creator>Jerry</dc:creator>
      <dc:date>2019-11-17T18:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67698#M82983</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21670"&gt;@HeikoAnkenbrand&lt;/a&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Nicely flowchart! Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Small issue:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;.../fw_loader is not a directory!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Nov 2019 08:32:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67698#M82983</guid>
      <dc:creator>Georg_Polder</dc:creator>
      <dc:date>2019-11-18T08:32:26Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67729#M82984</link>
      <description>&lt;P&gt;Yes, very comprehensive and well done &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21670"&gt;@HeikoAnkenbrand&lt;/a&gt; .&lt;/P&gt;&lt;P&gt;You also get a kudo from me.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Nov 2019 15:13:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67729#M82984</guid>
      <dc:creator>Ali_Yaymaci</dc:creator>
      <dc:date>2019-11-18T15:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67773#M82985</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Should be the main path topic on CCSE R80.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2019 06:41:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67773#M82985</guid>
      <dc:creator>Morris_Nelka</dc:creator>
      <dc:date>2019-11-19T06:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67791#M82986</link>
      <description>&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍🏻&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2019 10:20:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67791#M82986</guid>
      <dc:creator>Niroyec_Yerusha</dc:creator>
      <dc:date>2019-11-19T10:20:06Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67910#M82987</link>
      <description>&lt;P&gt;Is the CPM really a java applat?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2019 14:03:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/67910#M82987</guid>
      <dc:creator>Laurent_Koop</dc:creator>
      <dc:date>2019-11-20T14:03:59Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/68075#M82988</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Informations added:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt; &lt;/SPAN&gt;&lt;STRONG&gt;&lt;FONT color="#993366"&gt;user.def&lt;/FONT&gt;&lt;/STRONG&gt;&lt;SPAN&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;gt;&amp;nbsp; User-defined implied rules that can be added in Check Point INSPECT language &lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98239&amp;amp;partition=Advanced&amp;amp;product=Security" target="_self" rel="nofollow noopener noreferrer"&gt;(sk98239)&lt;/A&gt; &lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt; &lt;/SPAN&gt;&lt;STRONG&gt;fwui_head.def&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt; &lt;FONT color="#993366"&gt;table.def&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/FONT&gt;&lt;/STRONG&gt;&lt;SPAN&gt;-&amp;gt; Definitions of various kernel tables for Check Point security gateway &lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98339&amp;amp;partition=Advanced&amp;amp;product=Security" target="_self" rel="nofollow noopener noreferrer"&gt;(sk98339)&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt; auth.def&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt; base.def&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-&amp;gt; &lt;FONT color="#993366"&gt;crypt.def&lt;/FONT&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Nov 2019 06:22:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/68075#M82988</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-11-22T06:22:07Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/68483#M82989</link>
      <description>&lt;P&gt;Flow updated.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2019 07:30:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/68483#M82989</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-11-26T07:30:14Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/68552#M82990</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Yes it is nice for CCSE learning.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2019 20:48:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/68552#M82990</guid>
      <dc:creator>James_T_Kirk</dc:creator>
      <dc:date>2019-11-26T20:48:10Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/68589#M82991</link>
      <description>&lt;P&gt;SK list update:-)&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 07:39:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/68589#M82991</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-11-27T07:39:45Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/68829#M82992</link>
      <description>&lt;P&gt;I just got my CCSE certification. There were questions about installing the policy in the exam. The diagram was very helpful for learning.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Uror&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 15:04:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/68829#M82992</guid>
      <dc:creator>uror</dc:creator>
      <dc:date>2019-11-28T15:04:11Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x - Policy Installation Flowchart</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/69172#M82993</link>
      <description>&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2019 14:43:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-x-Policy-Installation-Flowchart/m-p/69172#M82993</guid>
      <dc:creator>sabil</dc:creator>
      <dc:date>2019-12-03T14:43:57Z</dc:date>
    </item>
  </channel>
</rss>

