For what is worth, since AI seems to be part of every day life these days, here you go : - )
Andy
*******************************
Typical steps to change WAN IP on a Check Point Gateway
- 
Pre-change policy rule (good call!) 
- 
Add a temporary rule allowing management traffic (SmartConsole / SIC / SSH, etc.) from your SMS (Security Management Server) to the new WAN IP. 
- 
Install policy. 
- 
This makes sure once the gateway is re-addressed, you can still reach it. 
 
- 
Change the IP on the gateway itself 
- 
On SMB appliances: done via WebUI or CLI (set interface,set static-route, etc.).
 
- 
On Gaia: via clishor WebUI (update interface IP, update default route if needed).
 
- 
Verify routing so return traffic goes back via the new WAN. 
 
- 
Update the object/topology in SmartConsole 
- 
Push policy again 
- 
Install policy to the gateway with updated topology. 
- 
Verify SIC trust if needed (if management IP is changing, see note below). 
 
- 
Clean up 
Common gotchas / additional considerations
- 
Management (SIC) IP
 If the management server itself talks to the gateway over this WAN IP, you’ll need to update the gateway’s “General Properties” → “IP Address” field to the new one. Otherwise SIC trust will break.
 If management connectivity is via another interface (e.g. internal LAN), you don’t need to worry here.
 
- 
NAT rules
 If the old WAN IP was explicitly used in NAT rules (static NATs, hide behind, etc.), you’ll need to update those too.
 
- 
Anti-Spoofing
 Double-check anti-spoofing settings on the external interface. The new WAN subnet should be reflected there.
 
- 
Routing
 Make sure the new default route points correctly, otherwise you’ll lose outbound connectivity.
 
Your question about “lockout” and recovery
Yes — if you forget to allow traffic to the new IP in advance, you can absolutely lock yourself out.
On a Gaia gateway:
- 
You’d need console access (serial/ILO/DRAC/VM console) to get in. 
- 
Run fw unloadlocal— that unloads the policy and leaves only the implicit accept (basically open firewall).
 
- 
Fix the interface, topology, push policy again. 
On an SMB appliance:
✅ So your original steps are basically correct — the only extras I’d add are:
- 
Update anti-spoofing settings 
- 
Update any NATs involving the old IP 
- 
Be mindful of SIC/management connectivity if SMS → gateway communication depended on that WAN IP 
	Best,
Andy