Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Is it possible to restore a policy from the firewall back to the CP management console?

Posted on 2009-05-12
2
Medium Priority
?
508 Views
Last Modified: 2013-11-16
I accidentally deleted a policy from the Checkpoint Management Console (Checkpoint SmartDashboard).  The policy is still installed and I can open it by pulling it directly from the firewall.  How can I get it back into the management station so I can edit it and manage it.  I have policies installed and active but only did this to one of them...

Thanks!
0
Comment
Question by:A.V.
2 Comments
 
LVL 14

Accepted Solution

by:
grimkin earned 2000 total points
ID: 24372504
Hi there,

Could you exaplin what you mean with "The policy is still installed and I can open it by pulling it directly from the firewall" -

Can you open this in the management interface or do you mean a rulebase file or what exactly are you pulling directly from the firewall?

Thnx
0
 
LVL 7

Author Closing Comment

by:A.V.
ID: 31580705
I just recreated the policy.  Thanks anyway...
0

Featured Post

New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

876 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question