Solved

adding a gateway to checkpoint management station

Posted on 2015-02-02
2
176 Views
Last Modified: 2015-02-20
Hi,

I have a management station with two checkpoints gateways. I have Three licensees left on my management station  to use. I just have two new gate ways that I need to add and manage them using the management station.

1. When I add the a gateway it appears that its using the same policy as the same gateways  ...
2. How can I add this two or one gateway to use its on independent policy, because I will like to manage a different network with this policy and gateways.

Please advice
0
Comment
Question by:Thlware
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 12

Accepted Solution

by:
Fidelius earned 500 total points
ID: 40585723
Hello,

You have two options.
First one is to have same policy for all gateways and in "Install On" column you decide on which rule will be installed on which gateway.

Second option is to create new Policy package, File -> New...
Using this option, you will have to go to File -> Open every time you want to switch policies.

In both cases, you will share all objects (Nodes, Networks, Groups, Users,...). You can't separate objects.
In both cases, be careful to specify Gateways/Clusters in "Install On" column and not leave
default value "Policy targets".

Regards!
0
 
LVL 2

Author Closing Comment

by:Thlware
ID: 40620894
Ok thanks boss bit confusing at times, but any ways got my two cluster running with two different rules. I wish we could separate the objects though for each cluster.

chz
0

Featured Post

Stressed Out?

Watch some penguins on the livecam!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question