- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters
E1: How AI is Reshaping Our World
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Dear Expert,
I encountered problems when I disabled the rule on the old policy package that we stopped using a long time ago.
During the troubleshooting, we found some service is still inspected on the rule with the old policy packet causing the service have issues. After we discussed it internally, we decided to disable the rule on the old policy packet and plan to delete and remove it from Manage Policy due to we still have another policy package running. Unfortunately, disabling the rule poses a problem in our operation.
Old policy package = Standard
Has anyone else experienced a similar issue?
Could you kindly share any advice with me?
CP_OS_R81.10
Dear PhoneBoy,
Thank you for your sharing.
I found the real issues due to my team installing the new rule on the existing package (Standard) that caused the gateway to work on AC Policy and Threat Prevention Policy with (Standard) and override the current rule.
Now I have fixed this issues.
There are two policies here, Network Security and Threat Prevention. Which one is problematic?
Dear Val,
After disabling all existing rules on the old policy package, we select network security and threat prevention and install them to override.
Clearly you created a new policy package (Standard_something) and are intending to install it on a gateway with a different policy package installed (Standard).
This is not an error, but a warning to confirm this is what you intended to do.
Dear PhoneBoy,
Thank you for your sharing.
I found the real issues due to my team installing the new rule on the existing package (Standard) that caused the gateway to work on AC Policy and Threat Prevention Policy with (Standard) and override the current rule.
Now I have fixed this issues.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 16 | |
| 15 | |
| 7 | |
| 5 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsThu 08 Jan 2026 @ 05:00 PM (CET)
AI Security Masters Session 1: How AI is Reshaping Our WorldAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY