?
Solved

Help with Transfering files to Checkpoint 2200 appliance

Posted on 2012-08-13
7
Medium Priority
?
1,520 Views
Last Modified: 2012-08-25
Hi all,
Im setting up a new Checkpoint 2200 firewall and im having a problem with copying the ace folder into the appliance /var folder so as I can use SecureID for mobile client logins. In my old IP appliance I was able to SFTP into it and upload the files no problem but everytime I try on the new appliance It says that sftp isnt available. Can anyone guide me on how I can transfre the file over or how do I enable SFTP as I cant find the option anywere. The appliance is in standalone management mode
0
Comment
Question by:AGOIT
  • 2
3 Comments
 
LVL 65

Accepted Solution

by:
btan earned 1500 total points
ID: 38308888
SFTP uses port 22. Look for the ssh service instead. Checkpoint should have that service enabled. Can check out "Web/SSH and GUI Clients Configuration". i also sometimes used filezilla to connect to "browse" on top of the CLI approach

http://downloads.us.checkpoint.com/fileserver/SOURCE/direct/ID/12380/FILE/CP_2200_Appliance_GettingStartedGuide.pdf
0
 

Assisted Solution

by:AGOIT
AGOIT earned 0 total points
ID: 38315305
Thanks for the help on this. Thanks for the input breadtan. You are correct with the ssh being enabled so you can use CLI. It is very messy transferring the files over if you are not 100% familiar with how to use CLI so in case there is anyone else that ever needs to do this I did find a simpler solution to the problem. Using the web interface create a backup of your configuration, download it and then on a Linux system open the TAR archive and then add the files that you want transferred over. Then restore this configuration onto your device and bobs your uncle. Files done. Strange way of doing it but it works.
0
 

Author Closing Comment

by:AGOIT
ID: 38332180
Also works so alternative to using ssh and CLI
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you’re involved with your company’s wide area network (WAN), you’ve probably heard about SD-WANs. They’re the “boy wonder” of networking, ostensibly allowing companies to replace expensive MPLS lines with low-cost Internet access. But, are they …
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question