Security Appliance Policy Management
Check Point Maestro R80.20SP Administration Guide | 49
Security Appliance Policy Management
In This Section:
Synchronizing Policy and Configuration Between Security Appliances
Understanding the Configuration File List
MAC Addresses and Bit Conventions
MAC Address Resolver (asg_mac_resolver)
Because the Security Group works as one large Security Gateway, all Security Appliances are configured
with the same policy. When you install a policy from the Security Management Server, it first installs the
policy on the SMO. The SMO copies the policy and Security Appliance configuration to all Security
Appliances in the UP state. When the Security Appliance enters the UP state, it automatically gets the
installed policy and configurations that are installed, from the SMO. When there is only one Security
Appliance in the UP state, it is possible there is no SMO. Then, that Security Appliance uses its local policy
and configuration.
If there are problems with the policy or configuration on the Security Appliance, you can manually copy the
information from a different Security Appliance.
The Security Appliance configuration has these components:
n
Firewall policy, which includes the Rule Base
n
Set of configuration files defined in the
/etc/xfer_files_list
file. This file contains the
location of all related configuration files. It also defines the action to take if the copied file is different
from the one on the local Security Appliance.