Solved

Check Point UTM-1 Device

Posted on 2008-10-29
1
515 Views
Last Modified: 2013-12-04
The company I work for has recently acquired a facility that is using a Check Point UTM-1 Firewall.  This is a manufacturing facility that depends on continuous availability of the network.

My question is regarding the grub menu options of the device.  I can not afford to reset the device to factory defaults.  Instead, I need to get in and reset the login credentials to be able to pull the configuration and see what this device is actually doing.  I have a feeling that there is a way to do this, but I do not have the luxury of taking this device down to simply browse the menu options.  I have been tasked with converting the entire network from the network ip addressing of the old company to the subnets for the new company and do not need this device standing in the way of making this happen successfully.  

Any advice would be greatly appreciated since I am not that familiar with Unix/Linux/Free BSD based boot loaders.
0
Comment
Question by:RHMaxwell
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 

Accepted Solution

by:
RHMaxwell earned 0 total points
ID: 22891253
I have since been able to contact the vendor who installed the device and have gained control over it.  It was strictly by accident that we found the vendor, the salesman that sold the old company the device happened to mention it while talking with my IT Manager about some additional equipment we are considering.

Consider this question closed.  No points awarded to anyone.
0

Featured Post

Now Available: Firebox Cloud for AWS and FireboxV

Firebox Cloud brings the protection of WatchGuard’s leading Firebox UTM appliances to public cloud environments. It enables organizations to extend their security perimeter to protect business-critical assets in Amazon Web Services (AWS).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question