- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Yes, this is this time of year, again.
Same as one year ago, we turn to the community and ask you, good folks, to propose the idea of the year. Or, better:
The rules are the same as before, it is about ideas that you wish Check Point would develop into a product/service offering, or improvements to existing ones.
Do you think we miss something important or we should consider to expand our product portfolio, feature set, functionalities, get to a completely new playground, change the rules of the game?
A few disclaimers/notes:
@Dorit_Dor and R&D leaders will choose the best ideas, and if you win, you will get a prize! What prize? We will tell you later.
@HeikoAnkenbrand- I fussed to the powers that be at CPX360 in Vegas this year about how bad it is to troubleshoot what can end up being tiny issues. Troubleshooting VPNs is a royal pain in the ethernet interface.
I wouldn't get my hopes up that changes will be coming soon. But they did note that they were working on a new interface for the VPN side of things.
VPN runs in SecureXL and CoreXL (more see here in my article R80.x Security Gateway Architecture (Logical Packet Flow))
From my point of view it is relatively easy to enable VPN debugging from the management server on a gateway. I have also written a script for this on the CLI (more see here: GAIA - Easy execute CLI commands on all gateways simultaneously).
Furthermore, you can already execute scripts via the SmartConsole on the gateway. This could be used to enable VPN debugging. Therefore a part is already present (see picture). Now you only have to transfer the log data of the files ike.elg and ikev2.xml to the SmartConsole. Now you have to analyze the log data like with IKEVIEW in the SmartConsole.
From my point of view, Check Point should be able to integrate this into the SmartConsole.
Regards
Heiko
@HeikoAnkenbrand- no disagreement from me.
At the end of the day there are far too many steps necessary to "enable" advanced troubleshooting in Gaia.
We're supposed to be wishes and ideas.
With version R85 or R90 😀 this is already possible.
@HeikoAnkenbrand- I've been posting wishes and ideas.
Sorry they're so advanced that we will have to wait 20 years to see them! 🙂
I see this topic coming very out of bounds - people started with 1 - 3 ideas per posting, but meanwhile, people write long lists reminding me of the letters with wishes for Xmas... This makes it nearly impossible just to give a Kudo to a brilliant idea as the post contains more than twenty, so you also have to post und clutter all up.
SDWAN
VXLAN
@Ruta_Thornber Something is coming soon, stay tuned
1. Have all the modifications to the kernel parameters, configuration files, scripts, affinity configurations, etc.. that are done in addition to the actions available via SmartConsole or WebUI to be compiled in the exportable archive for each device and presented in a readable form from the right click menu of the Check Point objects in SmartConsole.
2. Have SAM rules to be present on demand (if manually toggled) in the rulebase in the expandable section. Have dynamic indicator icon on the GW objects show up when SAM rules are triggered.
3. Enable DNS proxy functionality to improve function and logging of DNS trap protections when DNS servers are on the same network as the clients.
Change the red "X" on the gateways that fail to download latest signature updates to something less threatening.
It throws off the focus of admins as well as TAC (had my fare share of this first hand), when troubleshooting TP issues.
It will also be beneficial to improve the situation with the TP and the entitlements updates. Their availability, to put it mildly, could be better.
I can save you one request for next year 🙂
We are in advanced stages of a new elastic update server so i expect no failures in the future
The new server is expected to be ready in a month or so and the change should be transparent to customers (they will get the new update server automatically once its ready).
- Allow recovery/viewing of IKE pre-shared secrets, this is a major pain during firewall replacement projects and typically forces coordination with external partners/vendors which is a bottleneck to the whole process. There is no reason to secure this information from an authorized GUI administrator; making it visible in the SmartConsole or via some kind of CLI tool would be great. I realize this will entail a rework of how the pre-shared keys are stored since they appear to be kept as some kind of one-way hash.
- When a monitored interface is declared as DOWN by ClusterXL, provide more information about *why* in commands like cphaprob -a if. Physical link failure/flap? Cluster members can't seem to see each other at all? High CCP loss due to mulitcast mode causing switch forwarding issues? No other responding hosts detected on that interface at all? Bond problem? It is a guessing game right now.
- When ClusterXL Cluster Under Load (CUL) is active, display a notification or color change on the Gateways & Servers tab of SmartConsole or make this an alertable event.
- Want to echo Danny's request for a packet tracer type functionality that integrates all the disparate tools like the following, if the packet is dropped by any Check Point code show why similar to fw ctl zdebug drop:
- Big honking warnings ("Wide Impact" Icon?) or extra confirmation on the Global Properties NAT screen prior to turning off "translate destination on client side" or "Automatic ARP Configuration" which will cause instant death for all NATs on most firewalls upon policy install, or a slow painful death of all NATs over the period of 4 hours, respectively.
- Provide the built-in ability to easily perform a "clusterXL_admin down/up" command from the R80+ SmartConsole (yes you could run a one-time script to do this). When a cluster member is stopped/started from the old SmartView Monitor it performs a cphastop/cphastart which is NOT the same thing.
-In a firewall traffic log entry, always update it with the egress interface even if Accounting is not enabled. This will allow immediate verification that the firewall itself routed the traffic correctly by looking at logs.
- Provide a SmartConsole alarm/status alert if overall packet loss at the network level on a firewall's interface (RX-DRP/RX-ERR/RX-OVR) exceeds some ridiculously high configurable threshold like 5% for an extended period.
A very simple idea.
Please add pipe and grep to clish. It would be very useful in restricted environments without bash access.
Maybe a specialiced one like other cli vendors do:
clish>show configuration | include "this\|or this"
clish>show configuration | exclude "this\|or this"
clish>show configuration | include "this" | include "then this"
Or fully grep
clish>show configuration | grep "this\|or this"
clish>show configuration | grep -v "this\|or this"
Best regards
Alois
I've posted a couple other times about how the OS being different for the SMB appliances and the bigger gateways is annoying. Here's another one I'd like to see added - Dynamic objects.
You can't do a domain dynamic object. Which is painful because with systems like Azure and AWS being so dynamic you are really hamstrung at writing effective rules when IP's are changing all the time.
1) A "Do nothing" / "No Action" action for the SSL Inspection Policy so we have a proper way to bypass traffic without doubts.
2) A SOAR (Security Orchestration Automation and Response) product would be amazing, DevSecOps is becoming hot, I think that would be a really nice addition to the Check Point portfolio.
A dark mode / soft tones for Smart Console would be awesome.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
11 | |
7 | |
7 | |
6 | |
6 | |
5 | |
5 | |
5 | |
5 | |
4 |
Wed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY