?
Solved

Check Point UTM-1 Device

Posted on 2008-10-29
1
Medium Priority
?
517 Views
Last Modified: 2013-12-04
The company I work for has recently acquired a facility that is using a Check Point UTM-1 Firewall.  This is a manufacturing facility that depends on continuous availability of the network.

My question is regarding the grub menu options of the device.  I can not afford to reset the device to factory defaults.  Instead, I need to get in and reset the login credentials to be able to pull the configuration and see what this device is actually doing.  I have a feeling that there is a way to do this, but I do not have the luxury of taking this device down to simply browse the menu options.  I have been tasked with converting the entire network from the network ip addressing of the old company to the subnets for the new company and do not need this device standing in the way of making this happen successfully.  

Any advice would be greatly appreciated since I am not that familiar with Unix/Linux/Free BSD based boot loaders.
0
Comment
Question by:RHMaxwell
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 

Accepted Solution

by:
RHMaxwell earned 0 total points
ID: 22891253
I have since been able to contact the vendor who installed the device and have gained control over it.  It was strictly by accident that we found the vendor, the salesman that sold the old company the device happened to mention it while talking with my IT Manager about some additional equipment we are considering.

Consider this question closed.  No points awarded to anyone.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Have you created a query with information for a calendar? ... and then, abra-cadabra, the calendar is done?! I am going to show you how to make that happen. Visualize your data!  ... really see it To use the code to create a calendar from a q…
Suggested Courses
Course of the Month13 days, 19 hours left to enroll

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question