Check Point 1100 / 1200R / 600 Appliances: Günther W. Albrecht
Check Point 1100 / 1200R / 600 Appliances: Günther W. Albrecht
Albrecht
The 1100 and 600 series firmware can be upgraded using the WebGUI, but this leaves the
factory default image at the former, lower firmware version, as it only updates the primary
firmware image. So when using “Revert to the factory default image and settings“, the old
firmware version from the factory default image will be used, and the firmware will have to be
upgraded using the WebGUI.
Using a USB Flash device, both the 1100 and 600 series factory default and the primary
firmware can be upgraded at once. This installation procedure works after every reboot if the
USB medium is attached and readable. Details can be found in sk98549 How to Burn
CheckPoint 600 / 1100 Appliances version with Disk-On-Key. CAUTION: Different USB
Flash media may show a different behaviour concerning loading images from USB; for
example, USB Flash that installs a new firmware image successfully on 1100 / 600 may fail to
install with a SG80.
Streaming disabled
Write allocate disabled
Module 0 is RGMII
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 2 von 23
Module 1 is TDM
USB 0: host mode
PEX 0: interface detected no Link.
Net: egiga0, egiga1 [PRIME]
reading u-boot-octeon_evb7000_sff.bin
______ __ __ _______ _ _
.' ___ |[ | [ | _ |_ __ \ (_) / |_
/ .' \_| | |--. .---. .---. | | / ] | |__) | .--. __ _ .--. `| |-'
| | | .-. |/ /__\\/ /'`\] | '' < | ___// .'`\ \[ | [ `.-. | | |
\ `.___.'\ | | | || \__.,| \__. | |`\ \ _| |_ | \__. | | | | | | | | |,
`.____ .'[___]|__]'.__.''.___.'[__| \_] |_____| '.__.' [___][___||__]\__/
OCTEON CN7010-AAP pass 1.2, Core clock: 1200 MHz, IO clock: 500 MHz, DDR clock: 667
MHz (1334 Mhz DDR)
Base DRAM address used by u-boot: 0x4e000000, size: 0x2000000
DRAM: 1 GiB
Clearing DRAM...... done
Octeon MMC/SD0: 1
Flash: 0 Bytes
PCIe: Port 0 not in PCIe mode, skipping
PCIe: Port 1 not in PCIe mode, skipping
PCIe: Port 2 not in PCIe mode, skipping
PCI console init succeeded, 1 consoles, 1024 bytes each
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 3 von 23
PCIe: Port 1 not in PCIe mode, skipping
PCIe: Port 2 not in PCIe mode, skipping
Type the command 'usb start' to scan for USB storage devices.
MMC read: dev # 1, address # a80000, count 524288 ... 1024 blocks read: OK
Verifying CRC for settings area... Done
Trying to load image (u-boot*.bin) from USB flash drive using FAT FS
Looking for file_fat_read u-boot*.bin
Trying to load image (dsl*.img) from USB flash drive using FAT FS
Looking for file_fat_read dsl*.img
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 4 von 23
Erasing at 0x100000 -- 0% complete.
Erasing at 0x600000 -- 1% complete.
Erasing at 0xb20000 -- 2% complete.
****** lines have been left out here ******
Erasing at 0x1ffe0000 -- 100% complete.
OK
Done.
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 5 von 23
77987840 bytes read: OK
Verifying image CRC
Now the unit is rebooted and starts from the new primary firmware image. If a backup
from the same firmware version is available, we can restore the backup. Otherwise, we can
also install another firmware version using WebGUI to be able to restore the backup.
When importing backup, the MAC address, firewall type and license are imported as well.
GUI will show all that information imported. This is a "cosmectic" issue that can safely be
ignored. The model logo will revert to the right model logo within 24 hours. If you run
ifconfig, the correct MAC address is shown. Another possibility is to use autoconf.clish
files for configuration as explained in following 3rd part: USB First Time Config using
autoconf.clish files.
This command switches off SecureXL until the next reboot. To disable SecureXL
permanently, you have to follow these steps:
6. Reboot the appliance. SecureXL should be off now - check with 'fwaccel stat' command.
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 6 von 23
Part 3: USB First Time Config using autoconf.clish files
a. How it works
The autoconf.clish files have only barely been documented (in SG80, 1100 Central and
600 Admin Guides and in the 1100 600 Appliance CLI AdvRouting Admin Guide), and
there is no special syntax apart from standard CLISH commands. As it will mostly be used
instead of the First Time Wizard, it is clear which configuration details it contains.
Two kinds of autoconf.clish can be used: A general autoconfiguration CLI script named
autoconf.clish and/or a MAC-specific autoconfiguration CLI script autoconf.XX-XX-XX-
XX-XX.clish with the MAC of the unit in the filename. These files are used as follows:
System Started...
Start running MAC-specific autoconfiguration CLI script from USB1 ...Done
System Started...
Start running general autoconfiguration CLI script from USB1 Start running MAC-
specific autoconfiguration CLI script from USB1 ...Done
If not successful, a log is saved containing the commands and the corresponding errors:
System Started...
Start running general autoconfiguration CLI script from USB1 ... Error.
autoconf.00-1C-7F-70-2F-58.2014-10-07.0931.log was copied to USB1
System Started...
Start running MAC-specific autoconfiguration CLI script from USB1 ... Error.
autoconf.00-1C-7F-70-2F-58.2014-10-07.1706.log was copied to USB1
The USB LED is red when there is a problem running the configuration script. After an
error, the unit is in the First Time Wizard state, but values may have been set that are not
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 7 von 23
shown in First Time Wizard. So a restore default-settings should be issued and the
process repeated after correcting the autoconf.clish file.
b. How it is used
The autoconf.clish files will run if the unit is rebooted in Initial Configuration state. An
already configured unit will have to be reset before new configuration, so here that is done
using the CLI:
GW-620> restore default-settings
Restoring the default settings will delete your current settings and reboot the
appliance
Are you sure you want to continue? (yes/no): y
Restoring factory default settings...
Please wait while the appliance reboots. Please do not pull out the power cable.
Now the configuration will be read from autoconf.clish file only. If an existing
configuration has to be changed using autoconf.clish, we can set the unit to run it on next
reboot:
If the unit is rebooted now, values already configured will be overwritten with the values
from autoconf.clish, and some commands may not work at all if intended for First Time
configuration (like adding two Internet connections). After next reboot, autoconf.clish will
not be run. You can also set this so that after every reboot, the unit will run the
autoconf.clish again if present:
c. How it is written
Now we will look at the details of the autoconfig.clish, mixing the file with the
corresponding log messages in italics. We can define the unit name first:
set hostname GW_620
Could not set hostname hostname: Device name can only contain [A-F], [0-9] and '-'
characters
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 8 von 23
The name is wrong, so we have to use a – instead to make it work:
The First Time Wizard at this point lets you set the country also, but that is possible in
CLISH only using the wlan settings; if not using wlan we could issue:
set wlan radio country australia
set wlan disable
The last line is a comment – use the # to structure, comment and explain the file !
After setting the time zone, the estimated current date and time is displayed. The same is
done after setting the NTP Server to on.
Here, admin password is set – better for security is to set the password-hash instead:
The connection test will try to reach the ISP, if using value zero, the connection test is
skipped, otherwise, the value is the time limit in seconds.
# set DNS
set dns primary ipv4-address x.x.x.x
set dns secondary ipv4-address y.y.y.y
set dns tertiary ipv4-address 8.8.8.8
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 9 von 23
set dhcp server interface LAN1_Switch include-ip-pool 192.168.x.1-192.168.x.254
set dhcp server interface LAN1_Switch enable
#set DMZ
set dhcp server interface DMZ disable
set interface DMZ ipv4-address 192.168.y.1 subnet-mask 255.255.255.0
Other configuration steps can be constructed from clish commands. As this procedure
works for 1100 and 600 appliances, it also works for centrally managed 1100 units.
Management server would be configured there as follows:
# set Management Server IP and SIC to fetch certificate and policy:
set sic_init password VeryGoodPassWord
fetch certificate mgmt-ipv4-address x.x.x.x gateway-name GW-1100
fetch policy mgmt-ipv4-address x.x.x.x
With centrally managed 1100 units, the log server is defined in the policy. If a 600 device
should log to a CP Log server, this can only be configured in WebGUI or bash, as there
are no CLISH commands for log server configuration.
After the above autoclish has finished, FW Blade is on with “Hide internal networks
behind the Gateway's external IP address” enabled and User Awareness is on but not
configured, but all other blades are set off. No other Blades, WebServer or Rules
configuration is available in CLISH – only AntiSpam can be enabled:
# set AntiSpam on:
set antispam mode on detection_method content-based log log spam_content_action block
flag_subject_stamp spam
So it is always necessary to configure locally managed 600 / 1100 appliances using the
WebGUI, as only very basic settings are available to autoconf.clish.
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 10 von 23
Part 4: CLI license activation and bashUser mode
The sk93595 resolves issues like “License file cannot be activated through the automatic
online process” or when manual activation of the license file fails with the error message
"Failed to install license: License operation failed. License may not match device."
Cause: Licenses for SG-80 appliances, 600 appliances, and 1100 appliances use the MAC
Address of the WAN interface. Issue is caused when the license was generated using a
different MAC Address.
To resolve this issue, first confirm the MAC Address of the WAN interface on the
appliance via the CLI on the appliance. Run this command:
# fw_printenv hw_mac_addr
In the User Center, locate the Certificate Key with the MAC Address of the WAN
interface as identified in the output. Then, license the MAC Address of the WAN interface
and install the new license. From Expert mode run the command:
# bashUser on
to enable the SCP connectivity (refer to sk52763). Upload the new ActivationFile.xml file
to the appliance over SCP protocol (use WinSCP) and run the following command to
install the new activation file:
# fw activation --offline /<path_to>/ActivationFile.xml
To confirm the new license has been installed, run the command "cplic print" on the
appliance. Two licenses with the same feature set should be displayed.
Note: the command bashUser on changes the default login to be directly to expert mode
instead of cpshell, and it also allows scp connection to the appliance (according to the
Administrator Access restrictions).
When using WinSCP, the default protocol chosen by the application is "SFTP (Allow SCP
fallback)". This option is not supported in Security Gateway 80 and 1100 Appliances.
Change the protocol to the "SCP" option.
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 11 von 23
Part 5: CP 1100 / 1200R / 600 Appliances as Demo Units
Demonstration units from the 1100 and 600 series have a different licensing compared to
the „bigger“ Appliances. Using Eval Licenses from User Center is not possible – the 1100
and 600 series is licensed offline with the file CPActivationFile.xml, not files
CPLicenseFile.lic and ServiceContract.xml.
As Demo Units often have a year Support and Services, it is easy to use the „real“
licenses. But for Demo use, e.g. as POC at a customers site, another way of licensing is
recommended to be able to always use a 30 Day Trial License instead of the „real“, soon
expired License.
Please do not connect the WAN Port with the Internet at all to rule out „Self Service“ by
pulling the License from UserCenter. In Checkpoint Appliance Wizard, configure the
Admin credentials, country, date and time, unit name, for 1100s also kind of Management.
Then select for Internet Connection „Configure Internet Connection later“:
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 12 von 23
Next is defining the Local and WLAN network and Administrator access. Then you will
see the page:
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 13 von 23
Clicking „OK“ here accepts the Trial License, that is also listed on the final first time
configuration summary:
License now looks as shown in the next screenshot; after these steps you now can define
the Internet access in WebGUI.
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 14 von 23
Using it again as a Demonstration unit
The Trial License makes it possible to use all blades and services for 30 days including
Updates. After 30 days, the unit must be reset by a Factory Reset. Backup with Trial
License includes the same, complete with the starting date. Restoring backups – contrary
to Edge/Safe@ – is possible while the Trial License is installed, but Attention: the 1100
and 600 series Backups include the Licenses installed at the time of the Backup! That
makes it necessary – same as with Edge/Safe@ – to configure the box with the Trial
License again after Factory Reset.
If the unit has already been used with the „real“ License that now is expired, installing 30
Day Trial License is a bit more complicated. As 1100 and 600 series remember the
installed license even after a Reset to Factory Defaults, the license with expired services –
see picture - must be removed explicitly.
Removing is only possibly using CLI, by deleting License (and SIC with 1100) during
Reset, but staying with the current Firmware Version (to Revert to the factory default
image and settings, use revert to factory-defaults):
1100er > restore default-settings preserve-sic no preserve-license no
Restoring the default settings will delete your current settings and reboot the
appliance
Are you sure you want to continue? (yes/no): y
Restoring factory default settings...
Please wait while the appliance reboots. Please do not pull out the power cable.
1100er >
Broadcast message from root (Thu Sep 18 09:29:02 2014):
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 15 von 23
______ __ __ _______ _ _
.' ___ |[ | [ | _ |_ __ \ (_) / |_
/ .' \_| | |--. .---. .---. | | / ] | |__) | .--. __ _ .--. `| |-'
| | | .-. |/ /__\\/ /'`\] | '' < | ___// .'`\ \[ | [ `.-. | | |
\ `.___.'\ | | | || \__.,| \__. | |`\ \ _| |_ | \__. | | | | | | | | |,
`.____ .'[___]|__]'.__.''.___.'[__| \_] |_____| '.__.' [___][___||__]\__/
Flash: 0 kB
set device[0x21] gpio[3] hi
set device[0x21] gpio[4] hi
set device[0x20] gpio[7] hi
set device[0x20] gpio[1] hi
set device[0x20] gpio[3] hi
set device[0x20] gpio[0] hi
set device[0x20] gpio[4] hi
set device[0x20] gpio[2] hi
set device[0x20] gpio[5] hi
set device[0x21] gpio[2] hi
set device[0x21] gpio[5] hi
set device[0x20] gpio[6] low
set device[0x21] gpio[5] hi
set device[0x20] gpio[6] hi
set device[0x21] gpio[0] low
set device[0x21] gpio[6] low
set device[0x21] gpio[0] hi
set device[0x21] gpio[6] hi
set device[0x21] gpio[7] low
set device[0x21] gpio[1] low
set device[0x21] gpio[7] hi
set device[0x21] gpio[1] hi
set device[0x21] gpio[3] low
set device[0x21] gpio[4] low
Streaming disabled
Write allocate disabled
Module 0 is RGMII
Module 1 is TDM
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 16 von 23
NAND read: device 0 offset 0x100000, size 0x800000
Reading data from 0x900000 -- 100% complete.
8388608 bytes read: OK
Saving Environment to NAND...
Erasing Nand...Writing to Nand... done
## Booting image at 02000200 ...
Image Name: Linux-2.6.22.18
Created: 2014-08-05 17:27:50 UTC
Image Type: ARM Linux Kernel Image (uncompressed)
Data Size: 5790000 Bytes = 5.5 MB
Load Address: 00008000
Entry Point: 00008000
Verifying Checksum ... OK
OK
Uncompressing
Linux................................................................................
.....................................................................................
.....................................................................................
....... done, booting the kernel.
INIT: version 2.86 booting
1100er login:
Now, the Checkpoint Appliance Wizard can be used for configuration as explained above.
1. Connect over SSH to the Locally Managed 600 / 1100 / SG-80 appliance.
This will display a table containing all users which are currently connected with their
corresponding IP addresses (in Hexadecimal format).
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 17 von 23
Part 7: Logs, Debugs and other files
1. Important logs:
/var/log/log/sfwd.el*
/var/log/messages
/var/log/log/cpwd.elg
/var/log/log/boot_log.elg
/fwtmp/temp_boot_log
2. Upgrade logs:
Log files of the upgrade and the upgrades auto-generated clish file is in directory:
/pfrm2.0/post_upgrade
and a log file in: /tmp/post_upgrade.log and /logs/backup_settings
Start VPND debugging and VPN IKE debugging: # vpn debug trunc
Start VPND debugging at the maximal level: # vpn debug on TDERROR_ALL_ALL=5
(Start VPN IKE debugging: # vpn debug ikeon)
There is a debug rotation which will overwrite the old information, so this can
be left on for a time…
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 18 von 23
- Reproduce the issue to see drops and relevant packet capture
8. How to debug IPS, Application Control and Anti-Virus update failure (sk95134):
- In Expert mode, start the debug of the main Security Daemon:
# fw debug sfwd on TDERROR_ALL_CIU=5
# fw debug sfwd on TDERROR_ALL_OnlineUpdateLib=5
# fw debug sfwd on TDERROR_ALL_FDT=5
- Perform an online update either from GUI or from CLI by running:
o To force an Anti-Virus update:
o # online_update_cmd -b AV -o update
o To force an Application Control update:
o # online_update_cmd -b APPI -o update
o To force an IPS update:
o # online_update_cmd -b IPS - o update
- Wait for a while, until the update process fails.
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 19 von 23
References:
Check Point 1100 and 600 Appliance CLI and Advanced Routing Administration Guide
(http://supportcontent.checkpoint.com/documentation_download?ID=26395)
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 20 von 23
sk62482 How to debug VPN issues on Security Gateway 80_600_1100 appliances
sk62822 Link Selection probing feature is not supported on Security Gateway 80_600_1100 appliances
sk65015 How to disable SecureXL permanently on Security Gateway 80_600_1100 appliance
sk66381 How to configure Management behind NAT in Security Gateway 80 / 1100 Appliance setup
sk69726 VPN Routing does not work and traffic to other satellites leaves in_clear_when setting up SmartLSM profile in Star Community
appliance
sk86321 How to debug FWD daemon
sk87520 600 Appliance - How to connect to the office using Check Point Remote Access (VPN) clients
sk87522 600 Appliance - How to connect to the office using SSL VPN
sk87523 600 Appliance - How to connect to the office using Windows VPN client (L2TP client)
sk90342 Check Point 1100 Appliance Known Limitations
sk91842 Check Point 600 Appliance Known Limitations
sk92445 Check Point 600 Appliance
sk92446 Check Point 1100 Appliance
sk92741 Gaia Embedded OS features
sk92809 Supported 3G and 4G/LTE Modems with Check Point 600 / 1100 / 1200R appliances
sk93200 SIP traffic is blocked by IPS default policy on 600_1100 appliance
sk93532 Invalid certificate_error when trying to establish a Site-to-site VPN with locally managed Check Point 600 or 1100
sk93566 DAIP/LSM 1100/SG80 has connectivity issues with Security Management / Log server
sk93588 How to create_Allow and Forward_rule on 600 and 1100 locally managed appliances
sk93595 How to resolve the 'License may not match device' error
sk93613 How to enable Remote Desktop from specific host on the Internet to a server behind 600_1100 appliance
sk93746 Connection on TCP port 443 is blocked on 600 and 1100 appliances
sk93776 How to uninstall R75.47 from upgraded Security Management Server that manages Security Gateway 80 and 1100 appliances
with WLAN or VAP interfaces through SmartProvisioning
sk94028 Configuring Site-to-Site VPN between a Locally Managed 600_1100 appliance and an R75 Security Gateway using certificate
sk95009 Failure to establish SIC or push policy to 1100 appliance
sk95134 How to debug IPS, Application Control and Anti-Virus update failure on 600_1100 appliances
sk95208 MIB files location in 600 and 1100 appliances
sk95236 GUI not showing the correct MAC or firewall type after importing backup
sk95448 600_1100 appliance does not send logs to Log Server
sk95769 Configuring Proxy ARP for Manual NAT on Locally Managed 600_1100 appliances
sk95770 Changing the priority of Internet connections on Locally Managed 600_1100 appliances
sk95969 List of Implied Rules for R75.20.X
sk96189 How to debug random reboot issues on 600/1100 Locally Managed appliance
sk97286 Policy installation in WebUI or CLI fails on Security Gateway 80 appliance
sk97519 1100 Appliance does not send logs to a Security Management server behind NAT
sk97867 Policy installation on 1100 Appliances from SmartDashboard fails when there are more than 10 objects of 1100 gateways defined
sk97949 SmartView Tracker logs shows that X11 traffic was rejected as "Attack Name: X11 Enforcement Violation"
sk98089 Application Control_URL Filtering logs from 600_1100 appliance show only some URLs from the session when using_Extended
Log
sk98157 Centrally managed 1100 appliance with multiple external interfaces fails to re-establish VPN tunnel
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 21 von 23
sk98190 How to configure Route-Based VPN with BGP on Locally managed 600_1100 appliance
sk98487 Website partially loads if users are behind 600_1100 gateway
sk98549 How to Burn CheckPoint 600_1100 Appliances version with Disk-On-Key
sk98604 No valid SA when creating VPN tunnel between 600 appliance and 3rd party gateway
sk98606 Policy fetch fails or Policy Install fails on Centrally Managed 1100 appliance with "Error loading security policy"
sk98858 DHCP daemon saves dhcpd.conf.LANx file incorrectly on 1100_600_Security Gateway 80 appliance
sk98981 Client cannot reach resources on the remote site
sk99015 Policy installation onto Centrally Managed 1100 appliance fails due to over-sized 'local.cfg' file
sk99055 Source IP address is natted on Check Point 600_1100 appliance
sk99117 How to configure DHCP Option 66 on Check Point 600_1100 appliances
sk99131 ADSL fails to connect in CP600_1100
sk99132 Setting SNX connection timeout in 600_1100 appliances for R75.20 HFA50
sk100236 DHCP is not providing an IP address on Locally managed 600_1100 appliances
sk100242 Although DDNS on the Locally Managed 600_1100 appliance renewed the IP address, VPN clients still connect to the previous
IP
sk100245 Site-to-Site VPN between 600_1100 appliance and Safe@Office device does not pass traffic
sk100270 Unable to establish connectivity when configuring a Route Based VPN for Locally Managed 600_1100 appliance
sk100278 C2S not connecting to updated IP when using DDNS
sk100306 Some web sites are not blocked by URL Filtering on Locally Managed 600_1100 appliance
sk100307 How to verify the version of Check Point MIB file on Security Gateway 80_600_1100 appliances
sk100313 How to configure PPTP passthrough on 600_1100 appliances
sk100316 VPN Tunnel status is 'Down' in Locally Managed 600_1100 appliances GUI even though the VPN tunnel is up
sk100471 When trying to access a web sites located behind a Locally Managed 600_1100 appliance, user is redirected to appliances Web
GUI
sk100509 How to use Windows 8.1 Check Point Mobile VPN plugin to connect to locally managed 1100/600
sk100519 Security Management Portal for Check Point 600 Appliance
sk100565 1100 Appliance does not send logs to Security Management server
sk100577 Traffic stops passing through a Site-to-site VPN tunnel with 600_1100 appliance
sk101066 How to configure external WAP with inspection on 600_1100 appliance
sk101131 Wrong routing decisions on Appliance 1100_600
sk101187 In strict mode, Nodes behind 600_1100 appliance are unable to access resources behind remote gateway through VPN tunnel
sk101307 600_1100 appliance hangs_freezes, fails to update software blades
sk101460 How to configure Site to Site with overlapping encryption networks
sk101433 BGP_Peer x.x.x.x not configured_error on CLI when trying to configure Internal BGP peer on 600_1100_Security Gateway 80
sk101466 Configure L2TP connection from Windows 7 client to Locally Managed 600_1100 appliance
sk101535 When trying to establish C2S VPN, connection gets stuck at 43% with error "Connection failed "No response from gateway for
1st packet""
sk101469 Site to Site VPN fails when locally managed 600_1100 or Edge is Natted behind another machine
sk101568 VPN tunnel fails to recover between locally managed 600_1100 appliance on DAIP and centrally managed gateway
sk101666 Allowed inbound rule blocked on rule 0 for locally managed Check Point 600 appliance
sk101828 Remote Access client connects successfully to Centrally Managed 600_1100_Security Gateway 80 appliance, but is not able to
sk101850 How to define Administrator's access to 600_1100 appliance from WAN in a secure manner
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 22 von 23
sk102046 When select Turn on QoS Logging checkbox, selection not saved in Centrally Managed 600_1100_Security Gateway 80 object
sk102069 Remote Access VPN users are unable to access internal network resources through 600_1100 appliance via resource DNS name
sk102087 Access Role containing a network object is not enforced on 1100 Gateway
sk102126 When attempt to login to appliance WebUI, see following error: "Login attempt is denied because 'admin' user already logged in"
sk102187 Endpoint Connect client connects to Locally Managed 600_1100 appliance, but disconnects after 20 seconds, if SecureXL is
enabled
sk102208 When remote access users connect to the local 600_1100 VPN server, one of the sides is unable to hear anything
sk102296 How to activate inspection on internal traffic (1100_600 appliances)
sk102367 Running port scans on 600 and 1100 appliances show 443 with no servers defined
sk102400 Unable to activate software blades in the object of Centrally Managed 600_1100 appliance
sk102526 Pushing policy to 1100 appliance from SmartProvisioning fails with "CPRID error #1" or "CPRID error #2"
sk102559 Bridge mode 600_1100 URLF_APP traffic is not redirected correctly_Redirect action rule 1953 (outgoing)
sk102567 ADLog command fails when adding network exclusion to ADQuery on 1100 Appliance
sk102803 How to see users currently connected via Client-to-Site VPN on Locally Managed 600_1100_Security Gateway-80 appliance
sk102819 Policy installation on Centrally Managed 600_1100 appliance fails with_Installation failed. Reason_IP = X.X.X.X is not
available
sk102834 Activate 600_1100 (Locally managed) while disconnected from internet
sk102836 L2TP VPN connection to Locally Managed 600_1100_Security Gateway 80 appliance disconnects every 2 minutes
sk102947 Policy installation on Security Gateway 80_600_100 appliance fails with_ERROR_target Name_of_Object is prohibited
sk103210 A certificate error pops-up when open a Microsoft Outlook 2007/2010
sk103215 1100 Appliance managed by Smart Provisioning/Smart LSM sends logs to internal IP address of Security Management
sk103288 Policy installation on 1100 appliance fails with 'Load on Module failed - failed to load Security Policy' after IPS update
sk103368 Internal URLs are not resolved from internal DNS server for Remote Access Clients for locally managed 600/1100
sk103413 Changes in custom_logserver_ip are not saved after reboot on 600 / 1100
sk103423 Access to web sites fails with multiple "Internal System Error" logs from Application Control / URL Filtering
sk103495 Active Directory Server fails with "no matches found" error
sk103497 600 / 1100 appliance fails to connect to Cloud Services Server with log "Web server error ... attempt to perform arithmetic on
local 'hbInterval' (a nil value)"
sk103565 Permanent VPN Tunnel between 600 / 1100 appliance and Check Point Security Gateway is reported as 'Down'
sk103973 Unable to establish a VPN between Microsoft Azure and a 600 / 1100 / Security Gateway 80 Appliance
sk104082 Unable to establish incoming SIP calls through Locally Managed 600 / 1100 appliance when using two separate external servers
for SIP and RTP
sk104095 RC4 cipher is allowed for Inbound HTTPS inspection
sk104599 DHCP Relay functionality over VPN on 600 / 1100 appliance stops working after fail-over from ADSL to Cellular Modem (3G)
sk104783 "malloc failed: Cannot allocate memory" failure during policy installation on 600 / 1100 / Security Gateway 80 appliance
sk104999 Migration from Edge device to Check Point 600 / 1100 appliance
sk105537 Security Management Portal R12 for Check Point 600 / 1100 / 1200R Appliances
sk106290 Security Management Portal R12 for Check Point 600 / 1100 / 1200R Appliances Known Limitations
sk106348 Working with VLANs on 600 / 1100 / 1200R appliances and Edge / Safe@Office devices
sk106367 Policy installation fails on 1100 / 1200R appliance when using Threat Prevention rules installed on cluster
Günther W. Albrecht: CheckPoint 1100 / 1200R / 600 Un- (or barely) documented Features 15.3.4 / Seite 23 von 23