?
Solved

Checkpoints !

Posted on 2013-01-20
9
Medium Priority
?
325 Views
Last Modified: 2013-05-30
Hello,

We have Checkpoint firewalls at branch offices which would be integrated to a Checkpoint Smart-center at the central HO.

I understand (although not sure) if its possible for us to edit / change the configurations for multiple of branch site firewalls at same time ? Does Smart-center permit such or is it the case that only one person can login to make changes to one given box ?

Thx in advance.




Regards,
AM.
0
Comment
Question by:rush2amol
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
9 Comments
 
LVL 18

Accepted Solution

by:
deimark earned 672 total points
ID: 38799307
A single smartcentre can manage multiple firewalls and when we push the changes, it can go to more than one firewall at a time.

We can limit what firewalls users can modify through the user roles and permissions section, but in essence, the answer is yes.
0
 
LVL 10

Assisted Solution

by:ujitnos
ujitnos earned 664 total points
ID: 38799803
At a given point of time, only one admin with read/write access can do changes in a SmartCenter Dashboard. If a second read/write admin tries to login, he/she will get a message saying that another admin is logged in, and he will have an option to login as a Read-Only user.
0
 

Author Comment

by:rush2amol
ID: 38800451
Hi Deimark, If I understand you correctly multiple admins can perfrom read/write in the smartcenter ? Can you pl. help in how we can do that ?
0
Moving data to the cloud? Find out if you’re ready

Before moving to the cloud, it is important to carefully define your db needs, plan for the migration & understand prod. environment. This wp explains how to define what you need from a cloud provider, plan for the migration & what putting a cloud solution into practice entails.

 

Author Comment

by:rush2amol
ID: 38800893
In addition to above can you gentlemen help me with following ? We are basically in mid of a migration and some things are really hurting us.

We are migrating from one Smart-center (under administration of different vendor) to another Smart-center (under our own administration). Is there a way like Cisco ASA that i can download the running configuration from one box using TFTP or FTP and upload it to another box ?

To my limited understanding of Checkpoint, i am not sure if above is possible, so that is why we have opted for a manual process where we are capturing a dump and re-writing the rules in the new Smart-center and to our misery this is increasing the opportunity to errors and lot of pains in the whole migration approach.

Your response would be highly appreciated. Thx in advance.




Regards,
AM.
0
 
LVL 12

Assisted Solution

by:Fidelius
Fidelius earned 664 total points
ID: 38805792
Hello,

Yes you can. SSH to management server, enter expert mode, and go to:
cd $FWDIR/bin/upgrade_tools/

Exit all SmartConsole GUI, and issue cpstop

Depending on version you have two options:
prior to R75.40
- use for export on old server:
./upgrade_export
- for import on new server:
./upgrade_import

Similar, for R75.40 and later:
./migrate export
./migrate import

Regards!
0
 

Author Comment

by:rush2amol
ID: 38812216
Ok great .. shall try this out.

Would it be ok if i can contact you via mail ? If i have any questions around this i would list them out and sent it across or perhaps have a IM chat.

*** email address removed - Qlemo ***

Thx in advance.
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question