Hi @Vinz129,
Here I have described the structure of the different files:
- R80.x - Policy Installation Flowchart
Here are the most important config files, which we can customize Check Point INSPECT code individually:
|-> user.def -> User-defined implied rules that can be added in Check Point INSPECT language (sk98239)
|-> fwui_head.def
|-> table.def -> Definitions of various kernel tables for Check Point security gateway (sk98339)
|-> auth.def
|-> base.def
|-> crypt.def -> VPN encryption macros (sk98241)
|-> services.def
|-> proxy.def
|-> crypt.def
If you are looking for entries that have been changed, use diff to compare an original file with yours. I install the same version under vmware and compare the files with the existing files. So you will quickly find the differences.
Typically, the following three files are edited:
- user.def
- table.def
- crypt.def
➜ CCSM Elite, CCME, CCTE ➜ www.checkpoint.tips