Solved

adding a gateway to checkpoint management station

Posted on 2015-02-02
2
160 Views
Last Modified: 2015-02-20
Hi,

I have a management station with two checkpoints gateways. I have Three licensees left on my management station  to use. I just have two new gate ways that I need to add and manage them using the management station.

1. When I add the a gateway it appears that its using the same policy as the same gateways  ...
2. How can I add this two or one gateway to use its on independent policy, because I will like to manage a different network with this policy and gateways.

Please advice
0
Comment
Question by:Thlware
2 Comments
 
LVL 12

Accepted Solution

by:
Fidelius earned 500 total points
ID: 40585723
Hello,

You have two options.
First one is to have same policy for all gateways and in "Install On" column you decide on which rule will be installed on which gateway.

Second option is to create new Policy package, File -> New...
Using this option, you will have to go to File -> Open every time you want to switch policies.

In both cases, you will share all objects (Nodes, Networks, Groups, Users,...). You can't separate objects.
In both cases, be careful to specify Gateways/Clusters in "Install On" column and not leave
default value "Policy targets".

Regards!
0
 
LVL 2

Author Closing Comment

by:Thlware
ID: 40620894
Ok thanks boss bit confusing at times, but any ways got my two cluster running with two different rules. I wish we could separate the objects though for each cluster.

chz
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now