- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi everyone!
Setup: Newly installed ClusterXL+SMS (R81.20 JHF Take 84)
The standby member was not updating its IPS database, and in order make it work, I followed sk43807 and added the ports and protocols to the table.def file on the SMS. It worked perfectly fine and the standby member was able to update its IPS database to the same version as the active node.
Although the standby member can update its IPS version, the output of fw tab -t no_hide_services_ports -u does not show the ports and protocols that I added through the table.def file.
After that, I deleted the added ports and protocols from the table.def file and clicked on 'Install Policy'. It failed with the following error message:
"Policy installation failed on gateway. If the problem persists contact Check Point support (Error code: 0-1-2000096)."
I have already looked up the error code on support.checkpoint.com, and read the only two CheckMates links that it gave me (this and this). I also read all the seemingly similar SKs about policy installation errors. However there is no information about this specific error code.
Additionally, I tried replacing the table.def file from another newly installed setup, removed and reinstalled JHF package, used policy_debug.sh, manually debugged cpm, fwm, fwd and cpd processes while installing policy. I found nothing that seems useful.
Threat Prevention policy installs with no issues.
It is just a lab, but I wonder what I would do if one of our customers had a similar issue (before opening a TAC ticket). I don't think opening a TAC ticket for my case is currently necessary.
Where else can I look? Did anyone else encounter such an issue?
Cheers!
@Gaurav_Pandya doing # fw fetch <IP-of-SMS> told me this:
Management rejected fetch for this module - sic name does not match.
Policy Fetch Failed
And then I went on and reestablished SIC on both nodes, and everything worked perfectly fine.
Thank you very much!
As a side note, it's kind of a shame that I didn't see anything related to non-matching SIC names in all the debugs I did.
Hi,
Try to fetch policy from below command, it will give more description why policy installation is failing.
#fetch policy <mgmt_IP>
Never heard of this commend - i always use
fw -d fetch <Master 1>
|
|
Specifies the Check Point computer(s), from which to fetch the policy. You can fetch the policy from the Management Server, or a peer Cluster Member.
|
Right. "fetch policy" is for SMB appliances. You need to run "fw fetch" command.
@Gaurav_Pandya doing # fw fetch <IP-of-SMS> told me this:
Management rejected fetch for this module - sic name does not match.
Policy Fetch Failed
And then I went on and reestablished SIC on both nodes, and everything worked perfectly fine.
Thank you very much!
As a side note, it's kind of a shame that I didn't see anything related to non-matching SIC names in all the debugs I did.
If policy install fails for other reasons than time out, checking communication/SIC in Dashboard is always the first step before doing debugs...
Hello All,
I have got the same problem, but after resetting the SIC in doesn't work again in a few minutes...
My infrastructure consists of two SMB 1900 devices managed over the Internet using SMS R81.20. The SMB 1900 doesn't support ClusterXL that's why I set up Small Office Cluster - is it correct Cluster for SMB 1900? Although the installation of policies does not work for me, the logs are recorded without problems, i.e. there is still some kind of communication between SMB and SMS.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 22 | |
| 15 | |
| 7 | |
| 6 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY