|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [FW1] fwauth.keys
I've been told by Check Point's Tech. Support that it's alright to edit
this file - although I haven't tried it yet. They said to go in and delete
the record associated with the IP address you're trying to do a putkey
to. (Of course, make a back-up of the file before you edit it.)
At 09:40 PM 9/23/00 -0700, Ian Campbell wrote:
Hi folks,
I understand that when you do a putkey between a managment module and an FW
module, that the keys are stored in the fwauth.keys file. I recently wrote
about an unreliable IKE tunnel that I had. With this particular linkage, due
to stupidity, it took about 3 tries to get the putkey right.
I had been told to delete or rename the fwauth.keys file if this happened
and just proceed again by my reseller many moons in the past. I did do this
on the FW module, but I'm scared to do it on the managment server. If I
delete the fwauth.keys file from the management console, will I have to redo
a putkey with each one of my reinforcement modules again, or can I safely
delete it off both before trying this again?
Thanks for any info and enlightment,
Ian
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================
---
"It is better to be true to what you believe,
though it be wrong, than to be false to what
you believe, even if that belief is correct."
-- Anna Howard Shaw
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================
|
|