- Products
- Learn
- Local User Groups
- Partners
- More
The State of Ransomware Q1 2026
Key Trends and Their Impact
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
If you use Quantum SD-WAN in the Infinity Portal, the Nano Agent is the component that turns your gateway into a cloud-managed enforcement point: it receives policy, applies Nano services, and sends telemetry back to the portal. Without it, SD-WAN becomes “local config + hope.” (And that’s usually where troubleshooting starts.)
The Nano Agent is a lightweight agent installed on the Security Gateway / Cluster Member that “hosts” and manages Nano Services. In SD-WAN, it is the mechanism for:
installing/updating SD-WAN policy on the gateway,
orchestrating the services required for SD-WAN,
sending events and metrics to the Infinity Portal.
In practice: you install it using a command/script generated in the portal, and from that point on the gateway has a control channel for SD-WAN.
The SD-WAN guide itself lists the Nano Agent as a required workflow item (“on the gateway… SD-WAN interfaces and the Nano Agent”). (sc1.checkpoint.com)
A mental model that avoids 80% of errors:
Data plane
User traffic (Internet/Overlay/Backhaul) flows over WAN links, VPN, etc.
Control plane (Nano)
The Nano Agent communicates with the cloud (Fog/iNext), downloads policy, reports state/events, and receives updates.
Your slide captures it well: Fog acts as a mediator between iNext and the agent, transporting policy and collecting gateway information.
Text diagram (flow):
Infinity Portal (SD-WAN app) → iNext/Fog (cloud control) → Nano Agent (GW) → Nano Services (SD-WAN, Logger, Metric Provider)
GW → (events/metrics/status) → Nano Agent → Fog/iNext → Infinity Portal
When something “disappears” in the portal or a policy does not install, the first t-shoot step is:
cpnano -s → shows detailed status of the Nano Agent and Nano Services (versions, last update, registration, etc.)
This becomes your baseline: before hunting for an “SD-WAN bug,” validate connectivity, registration, and service health.
In SD-WAN, you typically see:
Orchestration Nano Service (baseline, not SD-WAN exclusive)
SD-WAN Nano Service
SD-WAN Logger Nano Service
Cpview Metric Provider
The logic is simple: the orchestrator ensures the other services are present, updated, and running with the correct policy.
Think of it as the orchestrator that:
polls cloud control for updates/policy,
downloads policy and distributes it to the relevant Nano services,
reports status, versions, and health back to Fog/iNext.
In SD-WAN, when there is applicable policy for a gateway, the orchestrator triggers the flow to download/update services and their artifacts (SD-WAN/Logger/Metric Provider).
If the gateway does not “update” or the portal does not reflect status, focus on the control plane.
Logs
/var/log/nano_agent/cp-nano-orchestration.log
/var/log/nano_agent/cp-nano-orchestration.dbg
The main Nano Agent orchestration log is referenced in official documentation (in other Nano contexts, but the file and pattern are consistent). (sc1.checkpoint.com)
Debug/trace (for communication and HTTP)
cpnano -d --add --flags D_COMMUNICATION=Trace
cpnano -d --add --flags D_HTTP_REQUEST=Trace
rollback: cpnano -d -default
What I look for in the .dbg (time-saving order)
DNS resolution / outbound route / proxy (if any)
TLS/handshake errors, HTTP codes, timeouts
Token/registration state (agent “registered” vs “pending”/“disconnected”)
“policy fetched” vs “policy applied” (these are different states!)
Gateway Sharing and local policy updates:
collects/updates VPN peer data and local SD-WAN configuration (next hop, ISP, etc.)
sends updates to the cloud backend (Fog) when something changes
applies local SD-WAN policy when a relevant change occurs (peers / topology / link attributes)
Practical point: when gateway sharing does not converge, you get “policy in the portal” but inconsistent state across sites.
This file is one of the best local validation points:
$FWDIR/state/local/SDWAN/sdwan_steering_policy.json
The Quantum SD-WAN guide explicitly references this file for inspecting parameters such as Circuit ID and peer/link details. (sc1.checkpoint.com)
Useful sections (from your slide)
sdwan_steering_vpn_peers
sdwan_steering_vpn_local
Objective t-shoot
“What the portal thinks I am” vs “what the installed policy says I am.”
If they diverge, it’s not a “link problem”: it’s policy propagation / install / parsing.
When the pain is “policy does not install” / “steering does not happen”:
Logs
/var/log/nano_agent/cp-nano-sdwan.log
/var/log/nano_agent/cp-nano-sdwan.dbg
SD-WAN policy trace
cpnano -d --add --flags D_SDWAN_POLICY=Trace
rollback (as in the slide): cpnano -d --add --flags D_SDWAN_POLICY=Error
Practical checklist (my sequence)
cpnano -s → is the SD-WAN service Running? Which version/policy?
Check whether sdwan_steering_policy.json changed after publish/install.
Validate whether traffic matches the correct SD-WAN rule (breakout/overlay/backhaul). There are scenarios where traffic matches breakout and disables overlay encryption (documented in troubleshooting). (sc1.checkpoint.com)
Validate health-checks/probing (latency/jitter/loss) and whether links are eligible per thresholds (SD-WAN decisions are based on this). (sc1.checkpoint.com)
The SD-WAN Logger is the event pipeline:
receives events from SD-WAN steering (link swap, ISP status, etc.)
receives events from the CPSDWAN process (enablement, policy installation events, …)
sends them to Fog → iNext → and finally the Infinity Portal displays them
Classic symptom: steering works locally, but the portal looks “blind.”
Primary suspects: logger stopped, delivery backlog, or control-plane issues (orchestration/HTTP).
Portal/Profile: is the gateway in the right profile? is policy published? (Infinity Portal) (sc1.checkpoint.com)
Nano health: cpnano -s (registered? last update? services running?)
Cloud connectivity: route/DNS/proxy/SSL inspection on the outbound path (top “silent” root cause)
Orchestration logs: cp-nano-orchestration.log/.dbg (HTTP/TLS/timeouts) (sc1.checkpoint.com)
SD-WAN policy install: SD-WAN logs + sdwan_steering_policy.json (sc1.checkpoint.com)
Rule/behavior match: breakout vs overlay vs backhaul (avoids wrong diagnosis) (sc1.checkpoint.com)
Telemetry/events: logger + portal (if “it works but doesn’t show,” the issue is observability/pipeline)
Amazing...thanks for that @WiliRGasparetto
Thank you so much Andy, coming from someone I admire very much, it means a lot.
Thanks brother, truly appreciate that! I dont think anyone ever said that for me, and if they did, they must have been drunk OR high...or both 😂😂
Not at all, Andy is an example for all of us.
Thanks man, really, really appreciate all your comments. I always try to do my best to help, thats all. Hey, FWIW, here is what MS copilot AI gave about this sibjects. Thoughts? : -)
*********************************
In Quantum SD‑WAN, the Nano Agent is essentially the cloud control-plane component that turns a Security Gateway (or cluster member) into a cloud-managed enforcement point: it receives SD‑WAN policy, runs/hosts the Nano Services that implement SD‑WAN functions, and sends telemetry/events back to the Infinity Portal. [community….kpoint.com]
Think of the Nano Agent as a lightweight runtime on the gateway that:
A useful mental model is:
Nano Services are the modular processes that run under the Nano Agent. The SD‑WAN admin documentation explicitly calls out the core set you should see in a healthy deployment (Status: Running) when you check Nano status. [sc1.checkpoint.com]
From the SD‑WAN admin guide (and typical deployments), expect these services: [sc1.checkpoint.com]
Broader context: Check Point describes “Nano‑Agents” as a platform concept where Nano Services and attachments are the building blocks that can be used across environments. [github.com]
A simplified flow (conceptually consistent with Check Point’s SD‑WAN control plane explanation): [community….kpoint.com]
Infinity Portal (SD‑WAN app)
→ Cloud backend (iNext/Fog)
→ Nano Agent on Gateway
→ Nano Services (SDWan, Logger, Metrics, Orchestration, …)
→ (telemetry/events/status) back through Nano Agent to cloud/portal [community….kpoint.com]
Why this matters: If your SD‑WAN “looks configured” in the portal but doesn’t behave on the wire, the issue is often control-plane propagation (agent registration, service health, connectivity, policy install) rather than raw routing. [community….kpoint.com]
The SD‑WAN admin guide shows Nano Agent installation via nano-egg using the authentication token from your Quantum Profile in Infinity Portal. [sc1.checkpoint.com]
Example shown in the guide (Maestro/SG context):
nano-egg --install --token <Authentication Token> ... [sc1.checkpoint.com]cpnano -sA recurring best practice in Quantum SD‑WAN troubleshooting is to run:
cpnano -s to see Nano Agent/Nano Service status, versions, registration, and update state. [community….kpoint.com], [sc1.checkpoint.com]The SD‑WAN admin guide explicitly says you should verify required Nano Services are Status: Running in the cpnano -s output. [sc1.checkpoint.com]
Operational troubleshooting often centers on the Nano control-plane logs and (when needed) enabling targeted debug flags. Example log locations and debug approach are described in the Check Point community post: [community….kpoint.com]
/var/log/nano_agent/ (e.g., orchestration log/dbg) [community….kpoint.com]/var/log/nano_agent/ (e.g., sdwan log/dbg) [community….kpoint.com]cpnano -d ... [community….kpoint.com]A classic symptom described is: steering works locally, but the Infinity Portal shows no SD‑WAN events. In that case, focus on the SD‑WAN Logger Nano Service and upstream control-plane connectivity (orchestration/HTTP). [community….kpoint.com]
If SD‑WAN isn’t behaving as expected, a pragmatic sequence is:
cpnano -s (all required services Running). [community….kpoint.com], [sc1.checkpoint.com]cpnano -s = the first place you look when things don’t install/show up. [community….kpoint.com], [sc1.checkpoint.com]
I found Copilot’s comments very interesting.
I feel it compiles everything it can find from smartest people out there and breaks it down in sections, so it looks presentable. O well, it is AI at the end of the day lol
Yes, I definitely need to start summarizing my materials with AI, but I don't really like putting too much information in them because I don't know how the data presented there is actually handled.
I feel it would be literally impossible these days to keep all that data fully protected...just my 2 cents.
I completely agree with you; nowadays we no longer have a choice of whether or not to use our data and whether or not to be exposed to AI.
100%...thats what data brokers do.
@WiliRGasparetto @the_rock Guys, get ready in R82.20 we re-design SD-WAN management.
We will merge it into Smart-1, the nano agent will not be used.
BR,
Amit
Looking forward to it!
@the_rock We will soon start with EA invitations.
Good news. Will there be free demo customers can get access to?
Will check the feasibility with the training team and update as part of the EA
Amit
Thanks a lot!
If you want and need beta testers, I would very much like to help you.
Very good, another thing I saw about the R82.20 is that it will also accept CGNAT, which will help a lot.
You can try it now @WiliRGasparetto . CG-NAT phase one is already available as EA and will be GA on the next JHF of R82.10:
SD-WAN VPN peers behind CGNAT Multi interfaces modes behind ISP router
I asked R&D to create a detailed SK
Amit
Very good. If possible, once this SK is published and you are able to share it with us, it would be great for us to review it and also pass it along to our customers.
Excellent idea.
Pretty comprehensive write-up.
thank you very much
Thank you Very mucho for the content
thank you very much Dom
Great breakdown of the Nano Agent and services.
thank you very much
well done
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 1 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceTue 19 May 2026 @ 06:00 PM (IDT)
AI Security Masters E8 - Claude Myphos: New Era in Cyber SecurityAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY