- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
I'm looking to change my WAN IP address on an SMB Gateway (although I think the process is the same on normal Gateway also)
I have done this before but some time ago. If I recall, this was the processed I followed.
Have I missed anything out here?
I did this once without doing step one and I think I locked myself out of the firewall. Hypothetically in this instance you would need to do an "fw unloadlocal" , then push the policy again right?
Thanks
You've got this more or less correct, and yes fw unloadlocal might be necessary.
For what is worth, since AI seems to be part of every day life these days, here you go : - )
Andy
*******************************
Pre-change policy rule (good call!)
Add a temporary rule allowing management traffic (SmartConsole / SIC / SSH, etc.) from your SMS (Security Management Server) to the new WAN IP.
Install policy.
This makes sure once the gateway is re-addressed, you can still reach it.
Change the IP on the gateway itself
On SMB appliances: done via WebUI or CLI (set interface, set static-route, etc.).
On Gaia: via clish or WebUI (update interface IP, update default route if needed).
Verify routing so return traffic goes back via the new WAN.
Update the object/topology in SmartConsole
Edit the Gateway object → update external interface IP(s) and topology.
Make sure the new IP is correctly marked as “External” if relevant.
Save.
Push policy again
Install policy to the gateway with updated topology.
Verify SIC trust if needed (if management IP is changing, see note below).
Clean up
Remove the temporary rule you added in Step 1.
Push policy again to tidy things up.
Management (SIC) IP
If the management server itself talks to the gateway over this WAN IP, you’ll need to update the gateway’s “General Properties” → “IP Address” field to the new one. Otherwise SIC trust will break.
If management connectivity is via another interface (e.g. internal LAN), you don’t need to worry here.
NAT rules
If the old WAN IP was explicitly used in NAT rules (static NATs, hide behind, etc.), you’ll need to update those too.
Anti-Spoofing
Double-check anti-spoofing settings on the external interface. The new WAN subnet should be reflected there.
Routing
Make sure the new default route points correctly, otherwise you’ll lose outbound connectivity.
Yes — if you forget to allow traffic to the new IP in advance, you can absolutely lock yourself out.
On a Gaia gateway:
You’d need console access (serial/ILO/DRAC/VM console) to get in.
Run fw unloadlocal — that unloads the policy and leaves only the implicit accept (basically open firewall).
Fix the interface, topology, push policy again.
On an SMB appliance:
Similar idea, but you’d use WebUI/CLI locally to reset policy if it blocks you.
✅ So your original steps are basically correct — the only extras I’d add are:
Update anti-spoofing settings
Update any NATs involving the old IP
Be mindful of SIC/management connectivity if SMS → gateway communication depended on that WAN IP
You've got this more or less correct, and yes fw unloadlocal might be necessary.
Thanks
For what is worth, since AI seems to be part of every day life these days, here you go : - )
Andy
*******************************
Pre-change policy rule (good call!)
Add a temporary rule allowing management traffic (SmartConsole / SIC / SSH, etc.) from your SMS (Security Management Server) to the new WAN IP.
Install policy.
This makes sure once the gateway is re-addressed, you can still reach it.
Change the IP on the gateway itself
On SMB appliances: done via WebUI or CLI (set interface, set static-route, etc.).
On Gaia: via clish or WebUI (update interface IP, update default route if needed).
Verify routing so return traffic goes back via the new WAN.
Update the object/topology in SmartConsole
Edit the Gateway object → update external interface IP(s) and topology.
Make sure the new IP is correctly marked as “External” if relevant.
Save.
Push policy again
Install policy to the gateway with updated topology.
Verify SIC trust if needed (if management IP is changing, see note below).
Clean up
Remove the temporary rule you added in Step 1.
Push policy again to tidy things up.
Management (SIC) IP
If the management server itself talks to the gateway over this WAN IP, you’ll need to update the gateway’s “General Properties” → “IP Address” field to the new one. Otherwise SIC trust will break.
If management connectivity is via another interface (e.g. internal LAN), you don’t need to worry here.
NAT rules
If the old WAN IP was explicitly used in NAT rules (static NATs, hide behind, etc.), you’ll need to update those too.
Anti-Spoofing
Double-check anti-spoofing settings on the external interface. The new WAN subnet should be reflected there.
Routing
Make sure the new default route points correctly, otherwise you’ll lose outbound connectivity.
Yes — if you forget to allow traffic to the new IP in advance, you can absolutely lock yourself out.
On a Gaia gateway:
You’d need console access (serial/ILO/DRAC/VM console) to get in.
Run fw unloadlocal — that unloads the policy and leaves only the implicit accept (basically open firewall).
Fix the interface, topology, push policy again.
On an SMB appliance:
Similar idea, but you’d use WebUI/CLI locally to reset policy if it blocks you.
✅ So your original steps are basically correct — the only extras I’d add are:
Update anti-spoofing settings
Update any NATs involving the old IP
Be mindful of SIC/management connectivity if SMS → gateway communication depended on that WAN IP
Thanks for that Andy.
The problem with AI is that it often just makes up things which are not true.
Well, it was invented by humans lol
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 4 | |
| 2 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY