- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Yes, the Security Gateway keeps working regardless on the Security Management.
When you Install Policy, the policy is sent to the Security Gateway were it is installed "locally".
You can check that the policy is installed using the following commands:
For Access Control Policy use fw stat or cpstat fw commands
For Threat Prevention Policy use fw stat -b AMW command
Both will show the policy name and when it was installed
Yes, gateways will filter traffic just fine.
Yes, the Security Gateway keeps working regardless on the Security Management.
When you Install Policy, the policy is sent to the Security Gateway were it is installed "locally".
You can check that the policy is installed using the following commands:
For Access Control Policy use fw stat or cpstat fw commands
For Threat Prevention Policy use fw stat -b AMW command
Both will show the policy name and when it was installed
Hi @Tal_Paz-Fridman curious about if the connection is lost between FW and Management. What will happens?
Last time i experinced with this in 80.x all the traffic was blocked by the FW. is it expected behaviour?
Connection to Security Management Server should not affect the Security Policy that is installed on the Security Gateway.
Perhaps this was a case where connection was lost, SIC was reset which then installs the Initial Policy.
@Tal_Paz-Fridman is 100% right. I would also say if there was a SIC issue, if sic is reset, then by default, it loads initial policy, which pretty muchblocks anything, except web UI on port 443 and ssh.
Tal, PLEASE be safe mate, Im praying for tolerance and peace over there 🕊🕊
Andy
Btw, I found an old notes I had back in R77 days when customer had this issue and mgmt was down for 3 days, but they told me after all VPN tunnels stayed up and there was no traffic issue. Mind you, there was no cp to cp vpn tunnels, so as @CheckPointerXL said, its possible if mgmt is down for more than 24 hours, if you have any cp to cp s2s vpn tunnels, they may not work.
Andy
What happens is that gateway will enforce latest policy pushed to it from the management server. If mgmt server went down, traffic would still work just fine through the firewall, but huge downside to it is that you would not be able to make any further changes to the policy. as smart console would not be accessible.
Andy
If i remember correctly, you should pay big attention to CRL fetching. VPN between FW on same management could potentially be disrupted if there is no communication during the 24h fetching period.
Anyone can confirm or not?
Yes, that rings a bell, though couple of times mgmt was down for a customer, we never had that issue, but it could happen, for sure.
Andy
This is true; I've had this happen to me before, but that is on the condition that all devices being used are managed from the same Manager.
Never had that happen to me, but what @CheckPointerXL mentioned about CRL is 100% true.
Andy
Yes.
While the gateway will continue to pass traffic per the last installed policy, VPNs will fail after a period of time.
This is because the Internal CA resides on the Management Server and gateways/clients reach out to the CRL to validate the certificate.
For Site-to-Site VPNs, they will continue to work for 24 hours.
Remote Access clients (regardless of auth method) use the CRL and may fail.
Hope that clears things up.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
11 | |
8 | |
6 | |
6 | |
5 | |
5 | |
5 | |
5 | |
5 |
Thu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasMon 22 Sep 2025 @ 03:00 PM (CEST)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security EMEAMon 22 Sep 2025 @ 02:00 PM (EDT)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security AMERThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasMon 22 Sep 2025 @ 03:00 PM (CEST)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY