This week, 16 major vulnerabilities were found in Microsoft's Remote Desktop Protocol clients.
Cisco Startup config errors are not present Highly available cluster member interface is down ASDM history is enabled
Check Point Gaia Management SecurePlatform IPSO ClusterXL old or too-new arriving updates percentage is normal Database revisions are set to automatically delete ClusterXL old or too-new arriving updates percentage is normal ICMP out of state drops are disabled on gateway ClusterXL Avg missing updates per request under 20 Database revision control will not be deleted [...]
Check Point Secure Internal Communication (SIC) is established Fan speed is within normal levels System temperature is high CPU temperature is high Power supplies are healthy Free memory level is acceptable More than 50% of packets are taking medium path More than 50% of packets are taking slow path ICMP inspection is enabled
An easy way to find out your top 5 used rules in R76 and above from the CLI (command-line interface) on your Check Point firewall is to type cpstat blades. The command is not super intuitive, but it does produce results. [[email protected]:0]# cpstat blades |grep -A9 "Top Rule" Top Rule Hits ----------------------- |rule index|rule count| [...]
Check Point TCP start timer is default Drop out-of-state ICMP packets TCP session timeout is default Drop out-of-state UDP packets TCP end timeout is default Drop out-of-state TCP packets UDP session timeout is default Log out-of-state TCP drops ICMP session timeout is default Log out-of-state UDP drops Other protocol session timeout is default Log out-of-state [...]
CyberSana provides a secure bridge into your infrastructure. The ability to type the same commands on multiple devices is used for triage, incident response, upgrades, baselines and general information gathering. Regardless of the destination, you can now easily type a command to all devices or specific target groups or individual devices.
When acceleration is enabled in Check Point, you will not see the entire packet. When troubleshooting, engineers often disable SecureXL acceleration and do not re-enable it. Whether on the fly or on a scheduled basis, this is how you can ensure the entire infrastructure is running at an optimal state.
In a large environment, finding the Check Point manager for a firewall can be challenging. Generally, in a MSSP, large enterprise or an acquisition/growth phase business, you will have a separate domain/CMA (Customer Management Add-on) for each customer, line of business, purpose or location. Each management station is unique and when there are hundreds of them [...]
At some point in the past, Check Point allowed us to click an object and drag it into a group object. This can be very useful, especially with discontiguous ip ranges and/or hostnames. Sometimes you have a group object or objects that need to be updated multiple times a week with newly created objects. Regardless, [...]