<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Sam Rule and &amp;quot;sam: Failed to enforce inhibit rules&amp;quot; in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Sam-Rule-and-quot-sam-Failed-to-enforce-inhibit-rules-quot/m-p/35738#M2206</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As you may know, Check Point has many ways to block malicious addresses. One of my favorites is the new &lt;A href="https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/add-threat-indicator~v1.2%20"&gt;IOC API&lt;/A&gt; for &lt;A href="https://sc1.checkpoint.com/documents/SmartConsole/WhatsNew.html"&gt;R80.20.M1&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;mgmt_cli add threat-indicator name "BadHost" observables.1.name "BadHostObservable" observables.1.ip-address 11.11.11.11&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this way you can provision this to multiple gateways.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 02 Jul 2018 18:01:57 GMT</pubDate>
    <dc:creator>Tomer_Sole</dc:creator>
    <dc:date>2018-07-02T18:01:57Z</dc:date>
    <item>
      <title>Sam Rule and "sam: Failed to enforce inhibit rules"</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Sam-Rule-and-quot-sam-Failed-to-enforce-inhibit-rules-quot/m-p/35735#M2203</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to block an ip via sam as documentation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/thread/6640"&gt;how to use the web api to run the run-script&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="color: #172b4d; background: #f4f5f7; padding: 4px 8px;"&gt;https://sc1.checkpoint.com/documents/R77/CP_R77_Gaia_AdminWebAdminGuide/html_frameset.htm?topic=documents/R77/CP_R77_Gaia_AdminWebAdminGuide/80898&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when I try to run this command in management, I have this error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="color: #172b4d; background: #f4f5f7; padding: 4px 8px;"&gt;fw sam -t 600 -i src 11.11.11.11 sam: Could not resolve firewalled object name in 'Inhibit src ip 11.11.11.11 on All'. The entire SAM request was not enforced. sam: Failed to enforce inhibit rules&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;any advice about this issue would be appreciated&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2018 08:36:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Sam-Rule-and-quot-sam-Failed-to-enforce-inhibit-rules-quot/m-p/35735#M2203</guid>
      <dc:creator>yasemen_karakoc</dc:creator>
      <dc:date>2018-07-02T08:36:31Z</dc:date>
    </item>
    <item>
      <title>Re: Sam Rule and "sam: Failed to enforce inhibit rules"</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Sam-Rule-and-quot-sam-Failed-to-enforce-inhibit-rules-quot/m-p/35736#M2204</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By default fw sam will push the rule to all defined gateways if executed from the management.&lt;/P&gt;&lt;P&gt;The fact you're getting that error suggests no gateways are defined at all (which means fw sam won't work).&lt;/P&gt;&lt;P&gt;Curious, what happens when you try it with&amp;nbsp;an actual firewall object name (e.g. -f gw-name).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2018 13:24:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Sam-Rule-and-quot-sam-Failed-to-enforce-inhibit-rules-quot/m-p/35736#M2204</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-07-02T13:24:57Z</dc:date>
    </item>
    <item>
      <title>Re: Sam Rule and "sam: Failed to enforce inhibit rules"</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Sam-Rule-and-quot-sam-Failed-to-enforce-inhibit-rules-quot/m-p/35737#M2205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is a working example of using fw sam inside a run-script command written in bash using curl. Note the variables and the fw sam syntax may be different for your environment.The run-script api call has an argument for "targets". The target is the Check Point device the script/command will be executed on. In this example the fw sam command is executed on my Management server ("HomeMgr"), and the management server is telling all my gateways ("-f All") to enforce this sam rule. If you wish to use a different method you can simply translate the same parameters in the "POST -d" line below to another scripting language like mgmt_cli/python etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Run Script Call&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="66878" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/66878_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2018 16:42:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Sam-Rule-and-quot-sam-Failed-to-enforce-inhibit-rules-quot/m-p/35737#M2205</guid>
      <dc:creator>Joe_Dillig</dc:creator>
      <dc:date>2018-07-02T16:42:06Z</dc:date>
    </item>
    <item>
      <title>Re: Sam Rule and "sam: Failed to enforce inhibit rules"</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Sam-Rule-and-quot-sam-Failed-to-enforce-inhibit-rules-quot/m-p/35738#M2206</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As you may know, Check Point has many ways to block malicious addresses. One of my favorites is the new &lt;A href="https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/add-threat-indicator~v1.2%20"&gt;IOC API&lt;/A&gt; for &lt;A href="https://sc1.checkpoint.com/documents/SmartConsole/WhatsNew.html"&gt;R80.20.M1&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;mgmt_cli add threat-indicator name "BadHost" observables.1.name "BadHostObservable" observables.1.ip-address 11.11.11.11&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this way you can provision this to multiple gateways.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2018 18:01:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Sam-Rule-and-quot-sam-Failed-to-enforce-inhibit-rules-quot/m-p/35738#M2206</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2018-07-02T18:01:57Z</dc:date>
    </item>
    <item>
      <title>Re: Sam Rule and "sam: Failed to enforce inhibit rules"</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Sam-Rule-and-quot-sam-Failed-to-enforce-inhibit-rules-quot/m-p/110925#M5589</link>
      <description>&lt;P&gt;What are the requirement for fw sam to work? I am trying to check it from SmartMonitor or from the cli and get the following error:&lt;BR /&gt;&lt;BR /&gt;[Expert@dc1fm4:0]# fw sam -t 60 -j src x.x.x.x&lt;BR /&gt;sam: fw1 (0/2) failed 'Inhibit Drop src ip x.x.x.x on All' processing&lt;BR /&gt;sam: fw2 (1/2) failed 'Inhibit Drop src ip x.x.x.x on All' processing&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;I wonder what the requirements are and why it is failing?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2021 14:32:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Sam-Rule-and-quot-sam-Failed-to-enforce-inhibit-rules-quot/m-p/110925#M5589</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-02-16T14:32:14Z</dc:date>
    </item>
    <item>
      <title>Re: Sam Rule and "sam: Failed to enforce inhibit rules"</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Sam-Rule-and-quot-sam-Failed-to-enforce-inhibit-rules-quot/m-p/110931#M5590</link>
      <description>&lt;P&gt;Try invoking it with debugging and post the output:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fw -d sam -t 60 -j src x.x.x.x&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2021 16:14:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Sam-Rule-and-quot-sam-Failed-to-enforce-inhibit-rules-quot/m-p/110931#M5590</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-02-16T16:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: Sam Rule and "sam: Failed to enforce inhibit rules"</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Sam-Rule-and-quot-sam-Failed-to-enforce-inhibit-rules-quot/m-p/110943#M5591</link>
      <description>&lt;P&gt;[Expert@fw1:0]# fw -d sam -M -ijn all&lt;BR /&gt;[7197 4124510016]@fw1[16 Feb 17:20:31] run_full_fw: running original fw:&lt;/P&gt;&lt;P&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] PM_policy_create: version 5301.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] PM_policy_add_name_to_group: finished successfully.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] PM_policy_set_local_names: () names. finished successfully.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] PM_policy_create: finished successfully.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] PM_policy_read (/opt/CPshrd-R80.40/conf/sic_policy.conf): finished successfully.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] PM_set_external_host_groups: 49 names. finished successfully.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] PM_policy_add_name_to_group: finished successfully.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] PM_policy_set_local_names: (local_sic_name) names. finished successfully.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] PM_policy_add_name_to_group: finished successfully.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] PM_policy_set_local_names: (127.0.0.1) names. finished successfully.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] PM_policy_add_name_to_group: finished successfully.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] PM_policy_set_local_names: ("CN=fw1,O=fm1.n9wfk4") names. finished successfully.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] PM_apply_default_dn: ca_dn = [O=fm1.n9wfk4].&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] PM_apply_default_dn: calling PM_policy_DN_conversion ..&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] PM_apply_default_dn: finished successfully.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fwPubKeyfromPKCS8: decoding RSA key&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSLctx_New: prefs = 12&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] is_initialized: new process or forked&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] hash_drbg_add_sample: Adding 55 bytes worth 27500 milibits. Total: 27500. Required: 0&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] hash_drbg_add_sample: Adding 110 bytes worth 440000 milibits. Total: 467500. Required: 0&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpcrypto_get_registry_value: could not query value of key 'CKPSSL_MIN_TLS_VERSION'.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSL_Get_TLS_Version_From_Registry: SOFTWARE\CheckPoint\FW1\CKPSSL_MIN_TLS_VERSION wasn't found in the registry&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSL_Set_TLS_Version: setting minimum TLS version: 0x301&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpcrypto_get_registry_value: could not query value of key 'ENABLE_3DES'.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpcrypto_get_registry_value: could not query value of key 'Get_Disable_RC4'.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] Error opening file /opt/CPshrd-R80.40/database//authkeys.C:: No such file or directory&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSLctx_New: prefs = 12&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSL_Set_TLS_Version: setting minimum TLS version: 0x301&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpcrypto_get_registry_value: could not query value of key 'Get_Disable_RC4'.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSLctx_New: prefs = 12&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSL_Set_TLS_Version: setting minimum TLS version: 0x301&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpcrypto_get_registry_value: could not query value of key 'Get_Disable_RC4'.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSLctx_New: prefs = 32&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSL_Set_TLS_Version: setting minimum TLS version: 0x301&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpcrypto_get_registry_value: could not query value of key 'Get_Disable_RC4'.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSLctx_New: prefs = 12&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSL_Set_TLS_Version: setting minimum TLS version: 0x301&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpcrypto_get_registry_value: could not query value of key 'Get_Disable_RC4'.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSLctx_New: prefs = 12&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSL_Set_TLS_Version: setting minimum TLS version: 0x301&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpcrypto_get_registry_value: could not query value of key 'Get_Disable_RC4'.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSLctx_New: prefs = 32&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSL_Set_TLS_Version: setting minimum TLS version: 0x301&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpcrypto_get_registry_value: could not query value of key 'Get_Disable_RC4'.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSLctx_New: prefs = 32&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSL_Set_TLS_Version: setting minimum TLS version: 0x301&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpcrypto_get_registry_value: could not query value of key 'Get_Disable_RC4'.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSLctx_New: prefs = 11&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSL_Set_TLS_Version: setting minimum TLS version: 0x301&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpcrypto_get_registry_value: could not query value of key 'Get_Disable_RC4'.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSLctx_New: prefs = 31&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSL_Set_TLS_Version: setting minimum TLS version: 0x301&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpcrypto_get_registry_value: could not query value of key 'Get_Disable_RC4'.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSLctx_New: prefs = 11&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSL_Set_TLS_Version: setting minimum TLS version: 0x301&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpcrypto_get_registry_value: could not query value of key 'Get_Disable_RC4'.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSLctx_New: prefs = 11&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSL_Set_TLS_Version: setting minimum TLS version: 0x301&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpcrypto_get_registry_value: could not query value of key 'Get_Disable_RC4'.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSLctx_New: prefs = 31&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSL_Set_TLS_Version: setting minimum TLS version: 0x301&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpcrypto_get_registry_value: could not query value of key 'Get_Disable_RC4'.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSLctx_New: prefs = 31&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] ckpSSL_Set_TLS_Version: setting minimum TLS version: 0x301&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpcrypto_get_registry_value: could not query value of key 'Get_Disable_RC4'.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] sic_sslca_Free: defs = 0x852a820, references = 0&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fwobj_obj_initmode: mode=2&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fwobj_obj_initmode: MGR RO mode&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fwobj_destroy_reference_hash: reference_resolving_hash_users&amp;lt;0&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fetch_objects: Start&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fwobj_destroy_reference_hash: reference_resolving_hash_users&amp;lt;0&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] sam_client_main called&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fwdopsec_load called&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fwdopsec_load: fwdopsec library is loaded&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] resolver_gethostbyname: Performing gethostbyname for localhost&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] Env Configuration:&lt;BR /&gt;(&lt;BR /&gt;:type (opsec_info)&lt;BR /&gt;)&lt;/P&gt;&lt;P&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] Could not find info for ...opsec_sic_name...&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] Could not find info for ...opsec_sslca_file...&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] Could not find info for ...opsec_shared_local_path...&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] Could not find info for ...opsec_sic_policy_file...&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] Could not find info for ...opsec_mt...&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] opsec_init: multithread safety is not initialized&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fwasync_get_maxbuf: maxbuf=4194304&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] opsec_init_entity_sic: called for the client side&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] Configuring entity sam_server&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] Could not find info for ...sam_server...&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] Could not find info for ...sam_server...&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] Could not find info for ...sam_server...&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] Could not find info for ...sam_server...&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] Could not find info for ...sam_server...&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] Could not find info for ...sam_server...&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] Could not find info for ...sam_server...&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] Could not find info for ...sam_server...&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] opsec_init_entity_sic: Authentication not initialized...&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] opsec_init_entity_sic: in a CP product - no rules added to SIC&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] opsec_get_comm: creating comm for ent=855a220 peer=855b390 passive=0 key=2 info=0&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] c=0x855a220 s=0x855b390 comm_type=4&lt;/P&gt;&lt;P&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] Could not find info for ...opsec_client...&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] opsec_get_comm: Creating session hash (size=256)&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] opsec_get_comm: ADDING comm=0x855c518 to ent=0x855a220 with key=2&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fw_do_get_all_ipaddrs: called. naddrs=32769&lt;/P&gt;&lt;P&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] resolver_getaddrinfo_list: name=fw1, pref=0&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] resolver_getaddrinfo_list: found peer 0 x.x.x.y&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fw_do_get_all_ipaddrs: fw_ipaddr_both returned x.x.x.y ::&lt;/P&gt;&lt;P&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fw_do_get_all_ipaddrs: found 0 addresses&lt;/P&gt;&lt;P&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] sic_init_myaddr_ex: could not get my own IPv6 addresses.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] resolver_gethostbyname: Performing gethostbyname for fw1&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] peers addresses are&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] x.x.x.y&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] x.x.x.z&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] x.x.x.w&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] x.x.x.x&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] sic_client_do_connect: no server sic name supplied, server sic name is unknown.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpsicdemux_get_mode: the mode is 1&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpsicdemux_check_mode: server_mode=1 | requested_mode=1&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] sam_client_session_creator: created anchor record, session: 85625b0&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] opsec_send_datagram_e: SESSION ID:3 is sending DG_ID=3 DG_TYPE=0x1(DGTYPE_CREATE_SESSION)&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] pushing dgtype=1 len=0 to list=0x855c534&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] dg_stack_push: dg_counter=1&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] opsec_send_datagram_e: SESSION ID:3 is sending DG_ID=3 DG_TYPE=0x602(???)&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] pushing dgtype=602 len=0 to list=0x855c534&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] dg_stack_push: dg_counter=2&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] opsec_send_datagram_e: SESSION ID:3 is sending DG_ID=3 DG_TYPE=0x608(???)&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] pushing dgtype=608 len=42 to list=0x855c534&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] dg_stack_push: dg_counter=3&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] sam_retrieve_info: Sent dg: idnum: 1, type: 800, src: 0, submask: ffffffff, sport: 0, dst: 0, submask: ffffffff, dport: 0, ip_p: 0, actions: 305, serv_ip: ed3f86c5&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fwasync_conn_params: &amp;lt;7f000001,49787&amp;gt; -&amp;gt; &amp;lt;7f000001,18183&amp;gt;&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fwasync_connbuf_realloc: reallocating 0 from 0 to 1028&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fwasync_connbuf_realloc: reallocating 0 from 0 to 1028&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] sic_client_set_version: 15: protocol version is 59000000&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] cpsicdemux_check_mode: server_mode=1 | requested_mode=1&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:31] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] call_handlers_list: no conversion done, set CN=fw1,O=fm1.n9wfk4 as sic name&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] PM_session_init: given session O(CN=fw1,O=fm1.n9wfk4;CN=fw1,O=fm1.n9wfk4;18183;sam).&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] PM_policy_query: input session O(CN=fw1,O=fm1.n9wfk4;CN=fw1,O=fm1.n9wfk4;18183;sam).&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] PM_policy_query: rule found (ANY;ME;ANY;ANY;cp_local(1/1)).&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] PM_policy_query: finished successfully. 1st method = cp_local&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] PM_policy_choose: finished successfully. choose: cp_local.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] sic_client_handler: 15: auth result = 1&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] opsec_auth_client_connected:conn=0x855cc98 opaque=0x855ca28 err=0 comm=0x855c518&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] Attaching conn 855cc98 to comm 855c518&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] comm succeeded. fwconn=855c518&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] pulling dgtype=1 len=0 to list=0x855c534&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] dg_stack_pull: dg_counter=2&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] pulling dgtype=602 len=0 to list=0x855c534&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] dg_stack_pull: dg_counter=1&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] pulling dgtype=608 len=42 to list=0x855c534&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] dg_stack_pull: dg_counter=0&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] opsec_comm_send_datagram: COMM 855c518 switched to non-congested state&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] opsec_comm_notify: COM 0x855c518 got signal 131073&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] opsec_comm_notify: COM 0x855c518 got signal 131074&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] opsec_comm_notify: COM 0x855c518 got signal 131074&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] demultiplex type=5 session-id=3&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] demultiplex type=707 session-id=3&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] sam_client_demultiplex_datagram: INFO RETRIEVED&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] demultiplex type=707 session-id=3&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] sam_client_demultiplex_datagram: INFO RETRIEVED&lt;BR /&gt;sam: fw1 (0/2) failed 'Monitor Inhibit Drop Notify all on All' processing&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] demultiplex type=707 session-id=3&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] sam_client_demultiplex_datagram: INFO RETRIEVED&lt;BR /&gt;sam: hqfw2b (1/2) failed 'Monitor Inhibit Drop Notify all on All' processing&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] demultiplex type=707 session-id=3&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] sam_client_demultiplex_datagram: INFO RETRIEVED&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] opsec_end_session_e: scheduling the end of session 3&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] Destroying session (85625b0) id 3 (ent=855a220) reason=END_BY_APPLICATION&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] opsec_send_datagram_e: SESSION ID:3 is sending DG_ID=3 DG_TYPE=0x3(DGTYPE_NOTIFY_END_SESSION)&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] sam_client_pre_user_session_deletor: started&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] sam_client_pre_user_session_deletor: No queries were left unresolved&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] opsec_requset: destroyed Table: Table(8562658)&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] SESSION ID:3 already resumed read&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] opsec_comm_is_needed:comm 0x855c518 0/0 sessions need the comm.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] opsec_comm_notify: COM 0x855c518 got signal 131074&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] demultiplex type=a session-id=0&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] opsec_comm_is_needed:comm 0x855c518 0/0 sessions need the comm.&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] destroying comm 0x855c518&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] fwasync_conn_get: get max buffer size (4194304) .&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] Destroying comm 0x855c518 with 0 active sessions&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] pulling dgtype=ffffffff len=-1 to list=0x855c534&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] dg_stack_pull: dg_counter=0&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] REMOVING comm=0x855c518 from ent=0x855a220 with key=2&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] sic_client_end_handler: for conn id = 15&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] fwasync_do_end_conn: 15: calling 0xf37b4b20 to free opaque 0x855ca38&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] T_event_mainloop_e: T_event_mainloop_iter returns 0&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] The server doesn't run&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] Destroying entity 1 with 0 active comms&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] opsec_destroy_entity_sic: deleting sic rules for entity 0x855a220&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] The server doesn't run&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] Destroying entity 2 with 0 active comms&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] opsec_destroy_entity_sic: deleting sic rules for entity 0x855b390&lt;BR /&gt;[7197 3983104576]@fw1[16 Feb 17:20:32] destroy_rand_mutex: destroy&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2021 17:36:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Sam-Rule-and-quot-sam-Failed-to-enforce-inhibit-rules-quot/m-p/110943#M5591</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-02-16T17:36:51Z</dc:date>
    </item>
    <item>
      <title>Re: Sam Rule and "sam: Failed to enforce inhibit rules"</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Sam-Rule-and-quot-sam-Failed-to-enforce-inhibit-rules-quot/m-p/111020#M5606</link>
      <description>&lt;P&gt;I wonder if it has anything to do with data / mgmt plane separation.&lt;/P&gt;&lt;P&gt;The gateway mgmt ip is in the mgmt plane and the sam process runs in the data plane, no?&amp;nbsp; I wonder if it is a problem?&lt;/P&gt;&lt;P&gt;netstat -nap | grep 18183&lt;BR /&gt;tcp 0 0 0.0.0.0:18183 0.0.0.0:* LISTEN 11317/fwd&lt;BR /&gt;tcp 0 0 127.0.0.1:18183 127.0.0.1:41357 ESTABLISHED 11317/fwd&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 09:44:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Sam-Rule-and-quot-sam-Failed-to-enforce-inhibit-rules-quot/m-p/111020#M5606</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-02-17T09:44:11Z</dc:date>
    </item>
  </channel>
</rss>

