Leave a Reply 14

Your email address will not be published. Required fields are marked *


solo

solo

Network traffic should be placed above the steath rule right?

MB

MB

hmmm, why is it “C”? explain pls

Sam

Sam

hmmm, how can you find that it is “C”?
The web page answer is not C and no one said that the correct answer is C.
Please explain.

Raul

Raul

I donĀ“t think the image match the question.

Szeremle

Szeremle

The coorrect answer is B

Based on the official documentation
https://downloads.checkpoint.com/fileserver/SOURCE/direct/ID/11844/FILE/How-To-Troubleshoot-Policy-Installation-Issues.pdf

To check connectivity, ensure that the policy installation ports are open:
1
.
On the Management station issue the command:
# netstat

na | grep 18191
and ensure it is listening on port 18191, which is used by the CPD process for communications such as
policy installation.
The output from the management station should show something similar to:
tcp 0 0 0.0.0.0:18191 0.0.0.0:*
LISTEN
tcp 0 0 192.168.70.163:18191 192.168.70.162:52744 ESTABLISHED
This means there is an established connection (due to the policy installation action) between the
SmartCenter server (192.168.70.163) and the
security gateway (192.168.70.162).
In addition, verify that port 18191 is on listening in the Security gateway:

1.
netstat – na | grep 18191
tcp 0 0 0.0.0.0:18191 0.0.0.0:* LISTEN
tcp 0 0 192.168.70.162:38566 192.168.
70.163:18191 ESTABLISHED

2
.
Ensure that port 256 is also open for communication.
When installing a policy, the management console uses this port to push the policy to the Security
gateway module. On both devices, you should see the following:
# netstat
-na | grep 256
tcp 0 0 0.0.0.0:256 0.0.0.0:* LISTEN

taha

taha

Correct Answer ist D

Joseph

Joseph

Did not understand why it is B…

German

German

Can anyone explain please?

Marko

Marko

The correct answer is D (Rule 6).

Mostro

Mostro

B. Rule 4 is blocking anything going to the firewall. Before rule 4, there isn’t any other rules allowing communication between the management and the firewall, assuming someone disabled the accept control implied rules.

nikkohla

nikkohla

Please help me to understand why it is D. RULE 4 is being block accessing gateway

Markus

Markus

In my opinion it is C.
Because C access http traffic form net_singapore and net_sydney to websignapore, that is set to Client Auth in Rule 3. So Rule 6 allows, what Rule 3 want to authenticate.

A: Rule 3
It is Client Auth, so Any can be at Source, because only in User Auth a Access Role is needed.

B: Rule 4
Communication between Mgmt and Firewall is accepted in the implicit Rules. Rule 2 (Mgmt Rule) allows Traffic to the firewall, so the administrator can make a ssh session for the CLI and a https session for the Web Interface.

C: Rule 5
It is normal VPN Rule.

ayk

ayk

can anyone explain pls? Which is true?