- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Observed interesting Issue in GAIA R81.10 OS regarding access rules: Policy Verification succeed from Menu option but Policy verification failed when install Policy, Does That Mean Access Rules are not get verified from Menu option(Policy verification)
The policy verification only looks for inconsistencies with the access policy itself.
It does not check for errors in the configuration outside of that (for example, if you're using an Access Role in the policy and don't have Identity Awareness enabled).
This is expected behavior, I believe.
I see where your confusion is coming from.
Policy verification only looks at the rules logic and nothing else.
The error during policy installation results from your incorrect blade settings on the target GW. It can only be discovered during a pre-compilation stage when the policy is being prepared for a specific GW, and the GW's blade settings are fetched.
This is how it is supposed to work, there is nothing wrong here. You just need more knowledge about management procedures.
Just in case you are still missing the point.
Explicit policy validation only checks your policy rules logic, without relations to GWs this policy can be installed on. Pre-compilation process looks deeper and catches further errors.
Imagine your rulebase is to be installed on two gateways. GW1 has Identity Awareness enabled, GW2 does not. Rulebase itself is fine, but when installed, it will fail on GW2 and pass on GW1. This can only be detected during installation process, when a specific GW config is being verified.
Both are policy verifications, one just much deeper than the other.
The policy verification changed as of R80.40: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
What is the precise error that you see when you install policy?
Thank You Sir for quick response , If you check my YouTube video(Today I have discover Interesting issue with GAIA R81.10 OS of Check Point Firewall - YouTube)
I have detailed what is problem , As per sk161574 ,
---- But In my example when I do verification from Menu option (As shown in Video) Verification succeeded and same config When Verify before Policy installation(As shown in Video) we receive error about access rule (This is expected Behaviors as I have not enable IA) So My concern is how verification acts differently here? Please see video for more clarity . Thanks
I will check it after and see what it does.
I get what you are doing in a video, but I also believe CP wording is totally wrong. Here is why I say that...so when you push policy, error says policy verification failed, BUT, thats not true, it does not mean policy verification failed, it simply complains that certain blade settings / layer options are wrong.
So, all in all, I agree with you 100%, R&D should fix it, because it is a bit convoluted, to put it bluntly. By the way, its not a bug, its been doing that since early days of R80 : - )
The policy verification only looks for inconsistencies with the access policy itself.
It does not check for errors in the configuration outside of that (for example, if you're using an Access Role in the policy and don't have Identity Awareness enabled).
This is expected behavior, I believe.
Hello Sir if you see My video https://youtu.be/e81XjWM2WGQ my concern is why policy verification behaviour is not same when we do from Menu Option and when we it happens when we install policy. Results are different why so?
I see where your confusion is coming from.
Policy verification only looks at the rules logic and nothing else.
The error during policy installation results from your incorrect blade settings on the target GW. It can only be discovered during a pre-compilation stage when the policy is being prepared for a specific GW, and the GW's blade settings are fetched.
This is how it is supposed to work, there is nothing wrong here. You just need more knowledge about management procedures.
I would agree with you if error only talks about IA blade in gateway , However Error also mentioned Policy Verification Failed which means to me policy verification also involved here. this appears to me policy verification for Preparing GW install is different and Verification from Menu is different In that case why we need option from Menu which dont detect/verify indepth. Pls watch my video for better clarity
I did watch your video before commenting. This does not change what I have said already.
Also, an admin note, soliciting clicks on your youtube video is really unnecessary.
Just in case you are still missing the point.
Explicit policy validation only checks your policy rules logic, without relations to GWs this policy can be installed on. Pre-compilation process looks deeper and catches further errors.
Imagine your rulebase is to be installed on two gateways. GW1 has Identity Awareness enabled, GW2 does not. Rulebase itself is fine, but when installed, it will fail on GW2 and pass on GW1. This can only be detected during installation process, when a specific GW config is being verified.
Both are policy verifications, one just much deeper than the other.
Hello Sir, Please refer me to documentation from CP talking about two different approach of policy verification so I can use future reference.
Please just drop "sir" in this community, we are equal peers.
Please look into sk101226, sk112111, and sk179626. The last one is an illustration that during the installation phase, there are some advanced "policy verification" errors that may appear.
Thank You for sharing SKs , I saw in organization engineers dependent on Verification of Policy a lot due to they configure policy and Verify it and install during maintenance time . Hoping There will be more improvement on policy verification feature .
Thanks for all support and guidance!
I still stand by what I said yesterday, wording could definitely be more clear...something along the lines when you click verify from menu, that says blades are misconfigured or inline layer is placed wrongly. something like that. For anyone brand new to CP, it sure can be confusing / convoluted. So, Im glad you made that video @FirewallGyaan
@the_rock Thanks for Your All your support
Here is my corny joke of the day...for you, no charge, except iphone charge and if you dont use iphone, then you get coffee and a donut ; - )
sk101226: Policy installation flow
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
31 | |
17 | |
5 | |
4 | |
3 | |
3 | |
3 | |
3 | |
2 | |
2 |
Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY