- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi All,
I have Migrated our Management server to Smart-1 Cloud and looking to import user.def file. Not sure if its possible, as i have not found any reference in smart-1 cloud management guide. does it have to be uploaded via API?
I can browse to the home directory on smart-1 cloud but not sure if the file need to be uploaded there.
The location depends on GW version, see sk98239 (Location of 'user.def' file on Management Server)
But with Smart-1 Cloud you will have to contact TAC, afaik it is not possible/supported to change special files after migration yourself.
Anything that requires dbedit or editing .def files on Smart-1 Cloud will require a TAC case to perform.
Procedures that require file editing on the Management machine are not directly supported in Smart-1 Cloud. Such cases should indeed go through TAC and they will make the change & document it so that we can take it into account when maintaining the environment.
It's worth mentioning two things in this context:
interesting in the custom vpn domains, could you give a reference or explain how this could be used to exclude ip addresses from a vpn? We are now hitting this as we move customers over to smart-1 cloud.
You can see a screenshot of it here: https://community.checkpoint.com/t5/Security-Gateways/multiple-domain-per-vpn-community/m-p/115382/h...
There are still going to be situations where .def files will need to be edited, which will have to be done by the TAC.
yeah definitely doesn't match my case, 1500 remote gateways with route-all vpn, but now we need to exclude the cloud Maas service IP addresses for things to work correctly with smart-1 cloud.
Someday we will be able to modify and exclude encryption domains on all devices.
Hi @Ted_Serreyn,
Can you share some details on what didn't work for you and whether excluding the Management service IPs really solved the issue?
Did you exclude the Management instance internal IP, or the IPs of other service entry points?
Theoretically, there should be implied rules that exclude Management services from the VPN community. I'd like to understand why this didn't work out of the box.
If you prefer to take the discussion offline, we can do that as well.
Thanks,
Tomer
After our short conversation, it seems that the outgoing traffic from the gateway to the Management in the cloud is encrypted by the "route all traffic through VPN" setting. It might be possible to handle this via .def changes on the Management, but there is a simpler solution.
On the latest Gaia Embedded firmware (R80.20.30) there is a new parameter for this scenario, in which you can exclude encryption on outgoing traffic that originates from the satellite gateway.
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
(SMB-15429 - accept_outgoing_without_vpn)
We will follow up to see that the issue is indeed resolved. Also, we will check how to improve this scenario and make it work seamlessly out-of-the-box, without manual tweaks.
Hi Tomer,
Just for my own information, though it might be slightly unrelated, if there is ever a need to modify any files in cloud mgmt server, what is official process? Open TAC case or something else? I ask, because I know there is no ssh access to cloud mgmt and what can be opened from web portal I believe only gives basic api access, not even regular clish commands.
Thanks in advance.
The official process is opening a TAC case and we make the required changes on the backend.
Indeed, a TAC case is needed when a customer / partner needs to change a file or use some expert setting on the Management environment.
We understand that this is not always convenient, so we are working to minimize the need for such cases.
I hope the extra info helps.
Yes, thank you, very good explanation!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
2 | |
1 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY