Solved

Copying a security policy on checkpoint...

Posted on 2004-08-02
1
532 Views
Last Modified: 2013-11-16

Can anyone help me, how do I copy a security policy from a clients server to a test server? and complete a fwm load ? the export/import tools do not seem to work if servers are on the same platform level, ie NG FP2?


Also if I upgrade from FW1 NG FP2, how do I load the policy? as it loads the default, and the file-open does not work? and how do I de-install
R55 back to NG FP2 or can I?
0
Comment
Question by:mrodriques
1 Comment
 
LVL 23

Accepted Solution

by:
Tim Holman earned 500 total points
ID: 11721127
Copy the entire conf directory, and also everything in the registry that appears under Check Point.

http://www.attackprevention.com/ap/library/ng_backup.pdf
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
pfSense and Sophos Mobile Control Security 4 109
iptables and udp ports 23 131
Is my Machine open to hackers 3 115
Forwarding web requests to different web servers 15 178
Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

680 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question