- CheckMates
- :
- Products
- :
- CloudMates Products
- :
- Cloud Network Security
- :
- Discussion
- :
- Re: How to fw unloadlocal in azure?
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
How to fw unloadlocal in azure?
Hi,
I can't reach my Azure test Installation atm. It is based on the R80.10 Cluster. How can I do the fw unloadlocal on azure based machines?
Kinrd Regards
Sascha Iseringhaus
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
Since you don't have access to the console this is a little tricky, but doable.
You need to run a script via Exension. So create a shell script and and run this scripts as Custom Script for Linux.
The script can be like this, but there must be an empty line at the end:
#!/bin/bash
fw unloadlocal
Azure Linux Extensions: Custom Script for Linux | Azure Linux Support Team
Arnfinn
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
We cover this in the following sk: How to unload a security policy from vSEC for Azure Gateway
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi, is the only way to do this via a support incident? I assume this is an Azure limitation?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Azure and AWS do not provide a way to access the console of a given VM.
Which means, if you lock out network access, regaining access may not be possible.
When I linked that SK, I believe the information in it was externally available--it's now in the internal portion that a Check Point TAC engineer can provide.
That said, it's similar to what https://community.checkpoint.com/people/astrad60b6d5c-7545-332e-aed1-6fead7f2c654 discussed above.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I really like the question. Anyone who ever needed the "fw unloadlocal" command will never forget that.
So I wanted to know how this method works before actually getting into such a situation where my stress level would go up.
I created the script, added the empty line and added the extension to a test vSEC gateway.
Make sure you use "bash nameofscript.sh" and not the standard filled in "sh script.sh"
The deployment of the script took about 4 minutes but at the end the policy uninstall was done. So it worked ![]()
For some reason the deployment of the extension kept running, but you can uninstall the extension which you should do anyway.
I don't know why Check Point isn't releasing the official sk...this article is worth gold.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I have just heard of a beta program with virtual serial connection on the US East Coast - so this might change soon...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I assume once it's something AWS or Azure provides, we will support it.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Serial console is now available in preview in most regions, very handy
https://azure.microsoft.com/en-us/updates/azure-serial-console/
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Have used Azure Serial Console for "fw unloadlocal", works ![]()


