Solved

Check Point UTM-1 Device

Posted on 2008-10-29
1
516 Views
Last Modified: 2013-12-04
The company I work for has recently acquired a facility that is using a Check Point UTM-1 Firewall.  This is a manufacturing facility that depends on continuous availability of the network.

My question is regarding the grub menu options of the device.  I can not afford to reset the device to factory defaults.  Instead, I need to get in and reset the login credentials to be able to pull the configuration and see what this device is actually doing.  I have a feeling that there is a way to do this, but I do not have the luxury of taking this device down to simply browse the menu options.  I have been tasked with converting the entire network from the network ip addressing of the old company to the subnets for the new company and do not need this device standing in the way of making this happen successfully.  

Any advice would be greatly appreciated since I am not that familiar with Unix/Linux/Free BSD based boot loaders.
0
Comment
Question by:RHMaxwell
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 

Accepted Solution

by:
RHMaxwell earned 0 total points
ID: 22891253
I have since been able to contact the vendor who installed the device and have gained control over it.  It was strictly by accident that we found the vendor, the salesman that sold the old company the device happened to mention it while talking with my IT Manager about some additional equipment we are considering.

Consider this question closed.  No points awarded to anyone.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
A 2007 NCSA Cyber Security survey revealed that a mere 4% of the population has a full understanding of firewalls. As business owner, you should be part of that 4% that has a full understanding.
This is a high-level webinar that covers the history of enterprise open source database use. It addresses both the advantages companies see in using open source database technologies, as well as the fears and reservations they might have. In this…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question