<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Policy installation and verification question in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-installation-and-verification-question/m-p/17619#M99178</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Kenny,&lt;/P&gt;&lt;P&gt;It's from the CCSE R80.10 training.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I couldn't find anything on it either.&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is another SK that goes through the older version policy install steps but it's not as descriptive and I have asked for it to be reviewed and versions corrected.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am thinking that the answer may come from HQ where the info might have originated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Don&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 09 Dec 2017 19:34:35 GMT</pubDate>
    <dc:creator>Don_Paterson</dc:creator>
    <dc:date>2017-12-09T19:34:35Z</dc:date>
    <item>
      <title>Policy installation and verification question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-installation-and-verification-question/m-p/17617#M99176</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am hoping someone can give me more detailed or background information (or a link to an SK) to learn more about the steps below. Especially step 2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: 5.76pt; margin-bottom: 0pt;"&gt;&lt;STRONG style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;EM&gt;Verification &amp;amp; Compilation&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-top: 5.76pt; margin-bottom: 0pt;"&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt;The Verification &amp;amp; Compilation stage of policy installation occurs on the management side. It involves the following steps:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 5.76pt; margin-bottom: 0pt;"&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 5.76pt; margin-bottom: 0pt; margin-left: .38in; text-indent: -.38in;"&gt;&lt;SPAN style="font-size: 16.0pt;"&gt;1.&lt;/SPAN&gt;&lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt;Initiation&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt; — Policy installation is initiated either from &lt;/SPAN&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt;SmartConsole&lt;/SPAN&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt; or from the command line.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 5.76pt; margin-bottom: 0pt; margin-left: .38in; text-indent: -.38in;"&gt;&lt;SPAN style="font-size: 16.0pt;"&gt;2.&lt;/SPAN&gt;&lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt;Database Dump&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt; — A database dump from &lt;/SPAN&gt;&lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt;postgres&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt; to old file formats for &lt;/SPAN&gt;&lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt;cpmitable&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt; only if changes occurred. A dump from non &lt;/SPAN&gt;&lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt;cpmi&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt; will occur any time.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 5.76pt; margin-bottom: 0pt; margin-left: .38in; text-indent: -.38in;"&gt;&lt;SPAN style="font-size: 16.0pt;"&gt;3.&lt;/SPAN&gt;&lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt;Verification&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt; — Information in the database is verified to comply with a number of rules specific to the application and package for which policy installation is requested.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 5.76pt; margin-bottom: 0pt; margin-left: .38in; text-indent: -.38in;"&gt;&lt;SPAN style="font-size: 16.0pt;"&gt;4.&lt;/SPAN&gt;&lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt;Conversion&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt; — The information in the database is converted from its initial format to the format understandable by later participants in the flow, such as code generation and gateway.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 5.76pt; margin-bottom: 0pt; margin-left: .38in; text-indent: -.38in;"&gt;&lt;SPAN style="font-size: 16.0pt;"&gt;5.&lt;/SPAN&gt;&lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt;Fwm&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt;rexec&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt; — &lt;/SPAN&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt;Fwm&lt;/SPAN&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt; loader takes a lot of memory. To release memory after verification and conversion, &lt;/SPAN&gt;&lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt;fwm&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt; state&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt; is saved to a file located in the &lt;/SPAN&gt;&lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt;$FWDIR/&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt;tmp&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt;/&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt; directory. &lt;/SPAN&gt;&lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt;fwm&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt; is then re-executed as a &lt;/SPAN&gt;&lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt;fwm&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt; load&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt; command to push the files for code generation and compilation.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 5.76pt; margin-bottom: 0pt; margin-left: .38in; text-indent: -.38in;"&gt;&lt;SPAN style="font-size: 16.0pt;"&gt;6.&lt;/SPAN&gt;&lt;SPAN style="color: #4d4d4f; font-size: 16.0pt;"&gt;&lt;STRONG&gt;Code Generation and Compilation&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt; — Policy is translated to the INSPECT language and compiled with the INSPECT compiler.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 5.76pt; margin-bottom: 0pt; margin-left: .38in; text-indent: -.38in;"&gt;&lt;/P&gt;&lt;P style="margin-top: 5.76pt; margin-bottom: 0pt; margin-left: .38in; text-indent: -.38in;"&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 5.76pt; margin-bottom: 0pt; margin-left: .38in; text-indent: -.38in;"&gt;&lt;SPAN style="font-size: 16.0pt; color: #4d4d4f;"&gt;Don&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Dec 2017 17:10:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-installation-and-verification-question/m-p/17617#M99176</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2017-12-09T17:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: Policy installation and verification question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-installation-and-verification-question/m-p/17618#M99177</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Don,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was trying to find the documentation mentioned on your request, but i wasnt able to do it. Do you have the source of this information?&lt;/P&gt;&lt;P&gt;However, you can verify the following SK solution for policy install:&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk60347" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk60347"&gt;sk60347: How To Troubleshoot Policy Installation Issues&lt;/A&gt; (for R75 - R77)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Dec 2017 19:13:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-installation-and-verification-question/m-p/17618#M99177</guid>
      <dc:creator>KennyManrique</dc:creator>
      <dc:date>2017-12-09T19:13:33Z</dc:date>
    </item>
    <item>
      <title>Re: Policy installation and verification question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-installation-and-verification-question/m-p/17619#M99178</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Kenny,&lt;/P&gt;&lt;P&gt;It's from the CCSE R80.10 training.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I couldn't find anything on it either.&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is another SK that goes through the older version policy install steps but it's not as descriptive and I have asked for it to be reviewed and versions corrected.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am thinking that the answer may come from HQ where the info might have originated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Don&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Dec 2017 19:34:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-installation-and-verification-question/m-p/17619#M99178</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2017-12-09T19:34:35Z</dc:date>
    </item>
    <item>
      <title>Re: Policy installation and verification question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-installation-and-verification-question/m-p/17620#M99179</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the clarification Don.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think we have to wait some time for Secure Knowledge updates on R80 internal processes flow (in adition to already existent &lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115557" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115557"&gt;R80.x Security Management server main processes debugging&lt;/A&gt;) and new functionalities in the architecture (like inspection points "e" and "E" for encrypt mentionen in another post, UnifiedPolicy chain, etc.).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Dec 2017 20:31:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-installation-and-verification-question/m-p/17620#M99179</guid>
      <dc:creator>KennyManrique</dc:creator>
      <dc:date>2017-12-09T20:31:22Z</dc:date>
    </item>
    <item>
      <title>Re: Policy installation and verification question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-installation-and-verification-question/m-p/17621#M99180</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Don.&lt;/P&gt;&lt;P&gt;Regarding Database dump,&lt;/P&gt;&lt;P&gt;The fwm loader&amp;nbsp;expects the get&amp;nbsp;its input&amp;nbsp;as files.&lt;/P&gt;&lt;P&gt;the database may have change since the last install policy.&lt;/P&gt;&lt;P&gt;Therefore, we dump the postgres database to a temporary file structure, for every install policy, or install database command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Dec 2017 07:00:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-installation-and-verification-question/m-p/17621#M99180</guid>
      <dc:creator>Dan_Zaidman</dc:creator>
      <dc:date>2017-12-10T07:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: Policy installation and verification question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-installation-and-verification-question/m-p/17622#M99181</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Dan. Can you share any information on the term cpmi table?&lt;/P&gt;&lt;P&gt;I would also be interested to know the key differences or responsibilities of fw_loader and fwm_loader?&lt;/P&gt;&lt;P&gt;I will do an analysis to understand the processes and files involved but their tasks may not be so easy for me to&amp;nbsp; understand&amp;nbsp;(debug).&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Don&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Dec 2017 13:36:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-installation-and-verification-question/m-p/17622#M99181</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2017-12-10T13:36:09Z</dc:date>
    </item>
    <item>
      <title>Re: Policy installation and verification question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-installation-and-verification-question/m-p/17623#M99182</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Don.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CPMI tables are related to the old database (not Java) such as in R77.&lt;/P&gt;&lt;P&gt;when running fwm with the argument&amp;nbsp; "load",&lt;/P&gt;&lt;P&gt;the fwm does not act as a server, it is running as a command.&lt;/P&gt;&lt;P&gt;fw_loader is the binary spawned from the fwm load command.&lt;/P&gt;&lt;P&gt;fwm load is running the conversion and verification.&lt;/P&gt;&lt;P&gt;fw_loader is running the the code generation and compilation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Dec 2017 14:51:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-installation-and-verification-question/m-p/17623#M99182</guid>
      <dc:creator>Dan_Zaidman</dc:creator>
      <dc:date>2017-12-10T14:51:04Z</dc:date>
    </item>
  </channel>
</rss>

