<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: &amp;quot;Command to check which policy set is installed on a Gateway or cluster.&amp;quot; in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/quot-Command-to-check-which-policy-set-is-installed-on-a-Gateway/m-p/241462#M8939</link>
    <description>&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/latest/APIs/?#cli/install-policy~v2%20" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/latest/APIs/?#cli/install-policy~v2%20&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you have expert mode, just run fw stat to see which policy is currently installed, or if threat prevention is also active, then fw stat -b AMW. To revert, if you have access to smart console, you can install it from there, but if not, then you need to use mgmt_cli&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Tue, 18 Feb 2025 01:05:58 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-02-18T01:05:58Z</dc:date>
    <item>
      <title>"Command to check which policy set is installed on a Gateway or cluster."</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/quot-Command-to-check-which-policy-set-is-installed-on-a-Gateway/m-p/241461#M8938</link>
      <description>&lt;P&gt;I want to know the command to check which policy set is installed on a gateway and how to revert the incorrect policy installation on the wrong gateway.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Feb 2025 00:58:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/quot-Command-to-check-which-policy-set-is-installed-on-a-Gateway/m-p/241461#M8938</guid>
      <dc:creator>SecdetKrypton</dc:creator>
      <dc:date>2025-02-18T00:58:09Z</dc:date>
    </item>
    <item>
      <title>Re: "Command to check which policy set is installed on a Gateway or cluster."</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/quot-Command-to-check-which-policy-set-is-installed-on-a-Gateway/m-p/241462#M8939</link>
      <description>&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/latest/APIs/?#cli/install-policy~v2%20" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/latest/APIs/?#cli/install-policy~v2%20&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you have expert mode, just run fw stat to see which policy is currently installed, or if threat prevention is also active, then fw stat -b AMW. To revert, if you have access to smart console, you can install it from there, but if not, then you need to use mgmt_cli&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 18 Feb 2025 01:05:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/quot-Command-to-check-which-policy-set-is-installed-on-a-Gateway/m-p/241462#M8939</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-02-18T01:05:58Z</dc:date>
    </item>
    <item>
      <title>Re: "Command to check which policy set is installed on a Gateway or cluster."</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/quot-Command-to-check-which-policy-set-is-installed-on-a-Gateway/m-p/241473#M8940</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Totally agree with&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;, but if you not a CLI expert, just learn this command:&amp;nbsp;&lt;STRONG&gt;cpview&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-02-18 09_24_32-admin@gw-sakos-lab01_~.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29633iBD09DB0E929AA219/image-size/medium?v=v2&amp;amp;px=400" role="button" title="2025-02-18 09_24_32-admin@gw-sakos-lab01_~.png" alt="2025-02-18 09_24_32-admin@gw-sakos-lab01_~.png" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Feb 2025 08:25:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/quot-Command-to-check-which-policy-set-is-installed-on-a-Gateway/m-p/241473#M8940</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2025-02-18T08:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: "Command to check which policy set is installed on a Gateway or cluster."</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/quot-Command-to-check-which-policy-set-is-installed-on-a-Gateway/m-p/241575#M8941</link>
      <description>&lt;P&gt;Normally you would reinstall the correct policy to the gateway from the SmartConsole as the_rock said.&amp;nbsp; However if you can't do that for some reason, starting in R81.20 Jumbo 54+ and R82 the gateway itself will cache the last two policies installed prior to the current one.&amp;nbsp; These can be reinstalled right from the gateway itself using &lt;STRONG&gt;policy_rev_tool&lt;/STRONG&gt;:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk181437" target="_blank" rel="noopener"&gt;sk181437: Access Control Policy Revert Tool (policy_rev_tool)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;This is one of the tips in my upcoming CPX Vegas presentation.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Feb 2025 20:35:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/quot-Command-to-check-which-policy-set-is-installed-on-a-Gateway/m-p/241575#M8941</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-02-18T20:35:28Z</dc:date>
    </item>
    <item>
      <title>Re: "Command to check which policy set is installed on a Gateway or cluster."</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/quot-Command-to-check-which-policy-set-is-installed-on-a-Gateway/m-p/241584#M8942</link>
      <description>&lt;P&gt;Only thing i would like to add, if for some reason you cannot re-install the correct policy. You might need to run:&lt;/P&gt;
&lt;H1&gt;fw unloadlocal&lt;/H1&gt;
&lt;DIV class="No_Page_Break_Inside"&gt;
&lt;P class="Procedure_Heading"&gt;Description&lt;/P&gt;
&lt;P&gt;Uninstalls all policies from the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_clmb variable"&gt;Cluster Member&lt;/SPAN&gt;.&lt;/P&gt;
&lt;TABLE class="TableStyle-TP_Table_Notes" cellspacing="0"&gt;&lt;COLGROUP&gt;&lt;COL class="TableStyle-TP_Table_Notes-Column-Column_Style_Image" /&gt;&lt;COL class="TableStyle-TP_Table_Notes-Column-Column_Style_Text" /&gt;&lt;/COLGROUP&gt;
&lt;TBODY&gt;
&lt;TR class="TableStyle-TP_Table_Notes-Body-Body"&gt;
&lt;TD class="TableStyle-TP_Table_Notes-BodyB-Column_Style_Image-Body"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Lesley_0-1739914292399.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29648i3D6CB2C419CD055B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Lesley_0-1739914292399.png" alt="Lesley_0-1739914292399.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Notes-BodyA-Column_Style_Text-Body"&gt;
&lt;P&gt;&lt;SPAN class="Warning"&gt;Warning:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI value="1"&gt;
&lt;P&gt;The "&lt;CODE&gt;fw unloadlocal&lt;/CODE&gt;" command prevents all traffic from passing through the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_clmb variable"&gt;Cluster Member&lt;/SPAN&gt;), because it disables the IP Forwarding in the Linux kernel on the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_clmb variable"&gt;Cluster Member&lt;/SPAN&gt;).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="2"&gt;
&lt;P&gt;The "&lt;CODE&gt;fw unloadlocal&lt;/CODE&gt;" command removes all policies from the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_clmb variable"&gt;Cluster Member&lt;/SPAN&gt;). This means that the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_clmb variable"&gt;Cluster Member&lt;/SPAN&gt;) accepts all incoming connections destined to all active interfaces without any filtering or protection enabled.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 18 Feb 2025 21:32:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/quot-Command-to-check-which-policy-set-is-installed-on-a-Gateway/m-p/241584#M8942</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-02-18T21:32:17Z</dc:date>
    </item>
  </channel>
</rss>

