PrepAway - Latest Free Exam Questions & Answers

14 Comments on “Which rule is responsible for the installation failure?

  1. Szeremle says:

    The coorrect answer is B

    Based on the official documentation
    https://downloads.checkpoint.com/fileserver/SOURCE/direct/ID/11844/FILE/How-To-Troubleshoot-Policy-Installation-Issues.pdf

    To check connectivity, ensure that the policy installation ports are open:
    1
    .
    On the Management station issue the command:
    # netstat

    na | grep 18191
    and ensure it is listening on port 18191, which is used by the CPD process for communications such as
    policy installation.
    The output from the management station should show something similar to:
    tcp 0 0 0.0.0.0:18191 0.0.0.0:*
    LISTEN
    tcp 0 0 192.168.70.163:18191 192.168.70.162:52744 ESTABLISHED
    This means there is an established connection (due to the policy installation action) between the
    SmartCenter server (192.168.70.163) and the
    security gateway (192.168.70.162).
    In addition, verify that port 18191 is on listening in the Security gateway:

    1.
    netstat – na | grep 18191
    tcp 0 0 0.0.0.0:18191 0.0.0.0:* LISTEN
    tcp 0 0 192.168.70.162:38566 192.168.
    70.163:18191 ESTABLISHED

    2
    .
    Ensure that port 256 is also open for communication.
    When installing a policy, the management console uses this port to push the policy to the Security
    gateway module. On both devices, you should see the following:
    # netstat
    -na | grep 256
    tcp 0 0 0.0.0.0:256 0.0.0.0:* LISTEN




    0



    0
  2. Mostro says:

    B. Rule 4 is blocking anything going to the firewall. Before rule 4, there isn’t any other rules allowing communication between the management and the firewall, assuming someone disabled the accept control implied rules.




    0



    0
  3. Markus says:

    In my opinion it is C.
    Because C access http traffic form net_singapore and net_sydney to websignapore, that is set to Client Auth in Rule 3. So Rule 6 allows, what Rule 3 want to authenticate.

    A: Rule 3
    It is Client Auth, so Any can be at Source, because only in User Auth a Access Role is needed.

    B: Rule 4
    Communication between Mgmt and Firewall is accepted in the implicit Rules. Rule 2 (Mgmt Rule) allows Traffic to the firewall, so the administrator can make a ssh session for the CLI and a https session for the Web Interface.

    C: Rule 5
    It is normal VPN Rule.




    0



    0

Leave a Reply