For what is worth, since AI seems to be part of every day life these days, here you go : - )
Andy
*******************************
Typical steps to change WAN IP on a Check Point Gateway
-
Pre-change policy rule (good call!)
-
Add a temporary rule allowing management traffic (SmartConsole / SIC / SSH, etc.) from your SMS (Security Management Server) to the new WAN IP.
-
Install policy.
-
This makes sure once the gateway is re-addressed, you can still reach it.
-
Change the IP on the gateway itself
-
On SMB appliances: done via WebUI or CLI (set interface
, set static-route
, etc.).
-
On Gaia: via clish
or WebUI (update interface IP, update default route if needed).
-
Verify routing so return traffic goes back via the new WAN.
-
Update the object/topology in SmartConsole
-
Push policy again
-
Install policy to the gateway with updated topology.
-
Verify SIC trust if needed (if management IP is changing, see note below).
-
Clean up
Common gotchas / additional considerations
-
Management (SIC) IP
If the management server itself talks to the gateway over this WAN IP, you’ll need to update the gateway’s “General Properties” → “IP Address” field to the new one. Otherwise SIC trust will break.
If management connectivity is via another interface (e.g. internal LAN), you don’t need to worry here.
-
NAT rules
If the old WAN IP was explicitly used in NAT rules (static NATs, hide behind, etc.), you’ll need to update those too.
-
Anti-Spoofing
Double-check anti-spoofing settings on the external interface. The new WAN subnet should be reflected there.
-
Routing
Make sure the new default route points correctly, otherwise you’ll lose outbound connectivity.
Your question about “lockout” and recovery
Yes — if you forget to allow traffic to the new IP in advance, you can absolutely lock yourself out.
On a Gaia gateway:
-
You’d need console access (serial/ILO/DRAC/VM console) to get in.
-
Run fw unloadlocal
— that unloads the policy and leaves only the implicit accept (basically open firewall).
-
Fix the interface, topology, push policy again.
On an SMB appliance:
✅ So your original steps are basically correct — the only extras I’d add are:
-
Update anti-spoofing settings
-
Update any NATs involving the old IP
-
Be mindful of SIC/management connectivity if SMS → gateway communication depended on that WAN IP