To check connectivity, ensure that the policy installation ports are open:
1
.
On the Management station issue the command:
# netstat
–
na | grep 18191
and ensure it is listening on port 18191, which is used by the CPD process for communications such as
policy installation.
The output from the management station should show something similar to:
tcp 0 0 0.0.0.0:18191 0.0.0.0:*
LISTEN
tcp 0 0 192.168.70.163:18191 192.168.70.162:52744 ESTABLISHED
This means there is an established connection (due to the policy installation action) between the
SmartCenter server (192.168.70.163) and the
security gateway (192.168.70.162).
In addition, verify that port 18191 is on listening in the Security gateway:
1.
netstat – na | grep 18191
tcp 0 0 0.0.0.0:18191 0.0.0.0:* LISTEN
tcp 0 0 192.168.70.162:38566 192.168.
70.163:18191 ESTABLISHED
2
.
Ensure that port 256 is also open for communication.
When installing a policy, the management console uses this port to push the policy to the Security
gateway module. On both devices, you should see the following:
# netstat
-na | grep 256
tcp 0 0 0.0.0.0:256 0.0.0.0:* LISTEN
B. Rule 4 is blocking anything going to the firewall. Before rule 4, there isn’t any other rules allowing communication between the management and the firewall, assuming someone disabled the accept control implied rules.
In my opinion it is C.
Because C access http traffic form net_singapore and net_sydney to websignapore, that is set to Client Auth in Rule 3. So Rule 6 allows, what Rule 3 want to authenticate.
A: Rule 3
It is Client Auth, so Any can be at Source, because only in User Auth a Access Role is needed.
B: Rule 4
Communication between Mgmt and Firewall is accepted in the implicit Rules. Rule 2 (Mgmt Rule) allows Traffic to the firewall, so the administrator can make a ssh session for the CLI and a https session for the Web Interface.
Network traffic should be placed above the steath rule right?
D. ?
hmmm, why is it “C”? explain pls
hmmm, how can you find that it is “C”?
The web page answer is not C and no one said that the correct answer is C.
Please explain.
I donĀ“t think the image match the question.
The coorrect answer is B
Based on the official documentation
https://downloads.checkpoint.com/fileserver/SOURCE/direct/ID/11844/FILE/How-To-Troubleshoot-Policy-Installation-Issues.pdf
To check connectivity, ensure that the policy installation ports are open:
1
.
On the Management station issue the command:
# netstat
–
na | grep 18191
and ensure it is listening on port 18191, which is used by the CPD process for communications such as
policy installation.
The output from the management station should show something similar to:
tcp 0 0 0.0.0.0:18191 0.0.0.0:*
LISTEN
tcp 0 0 192.168.70.163:18191 192.168.70.162:52744 ESTABLISHED
This means there is an established connection (due to the policy installation action) between the
SmartCenter server (192.168.70.163) and the
security gateway (192.168.70.162).
In addition, verify that port 18191 is on listening in the Security gateway:
1.
netstat – na | grep 18191
tcp 0 0 0.0.0.0:18191 0.0.0.0:* LISTEN
tcp 0 0 192.168.70.162:38566 192.168.
70.163:18191 ESTABLISHED
2
.
Ensure that port 256 is also open for communication.
When installing a policy, the management console uses this port to push the policy to the Security
gateway module. On both devices, you should see the following:
# netstat
-na | grep 256
tcp 0 0 0.0.0.0:256 0.0.0.0:* LISTEN
Correct Answer ist D
Did not understand why it is B…
Can anyone explain please?
The correct answer is D (Rule 6).
B. Rule 4 is blocking anything going to the firewall. Before rule 4, there isn’t any other rules allowing communication between the management and the firewall, assuming someone disabled the accept control implied rules.
Please help me to understand why it is D. RULE 4 is being block accessing gateway
In my opinion it is C.
Because C access http traffic form net_singapore and net_sydney to websignapore, that is set to Client Auth in Rule 3. So Rule 6 allows, what Rule 3 want to authenticate.
A: Rule 3
It is Client Auth, so Any can be at Source, because only in User Auth a Access Role is needed.
B: Rule 4
Communication between Mgmt and Firewall is accepted in the implicit Rules. Rule 2 (Mgmt Rule) allows Traffic to the firewall, so the administrator can make a ssh session for the CLI and a https session for the Web Interface.
C: Rule 5
It is normal VPN Rule.
can anyone explain pls? Which is true?