- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hi,
I am cheking a mds migration with some old cluster...one of the requirement is making some mosification over table.def file in order to allow tacacs auth.
I modify the file over path noted on guide for making the change and pushed policy over the cluster but...on cluster table.def is not modify. Any suggenstions will be appreciated
TAC answer:
"Though sk98339 indicates differently, The table.def file on the GW will not change and should not be changed.
The sk will be updated in the near future.
The correct way to check if it worked on the GW was using the following command:
# fw tab -t no_hide_services_ports -u
"
make sure you modify the table in the right package. It has to be backward compatibility directory and not your regular $FWDIR on the management, if the cluster and GW versions are not matched.
I had checked 4 times...
Mds r80.40
gw r77.30
$MDSDIR/customers/domainname/CPR77CMPR80.40/lib/table.def
Please open a TAC case for this.
Sure, I did it. It is under investigation.
I only want to know if somebody found the same issue
One more question, did you restart your domain during this trials? If you did, go straight to TAC, if you did not, try that first.
Yes. I rebooted both...gateway and mds.
That would appear to be the right path...curious what TAC tells you. Keep us posted. Happy new Year!
TAC answer:
"Though sk98339 indicates differently, The table.def file on the GW will not change and should not be changed.
The sk will be updated in the near future.
The correct way to check if it worked on the GW was using the following command:
# fw tab -t no_hide_services_ports -u
"
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 66 | |
| 19 | |
| 13 | |
| 12 | |
| 11 | |
| 9 | |
| 9 | |
| 7 | |
| 7 | |
| 7 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY