Technical data

Command Line Reference
Check Point VSX Administration Guide NGX R67 | 199
Description
Changes the cluster internal communication network IP address
Comments
We recommend that you back up the management database before
using this command.
The private network IP address must be unique and not used
anywhere behind the VSX gateway, cluster or Virtual Systems.
The new cluster private network must conform to the net mask
255.255.252.0.
Execute the command and follow the instructions on the screen.
fw fetch
Description Fetches the Inspection Code from the specified host and installs it to the kernel.
Usage fw fetch [-n] [-f <filename>] [-c] [-i] master1 [master2] ...
Syntax
Argument
Description
-n
Fetch the Security Policy from the Security Management Server
to the local state directory, and install the Policy only if the
fetched Policy is different from the Policy already installed.
-f <filename>
Fetch the Security Policy from the Security Management Server
listed in <filename>. If filename is not specified, the list in
conf/masters is used.
-c
Cluster mode, get policy from one of the cluster members, from
the Check Point High Availability (CPHA) kernel list.
-i
Ignore SIC information (for example, SIC name) in the database
and use the information in conf/masters. This option is used
when a Security Policy is fetched for the first time by a DAIP
gateway from a Security Management Server with a changed
SIC name.
master1
Runs the command on the designated master.
The name of the Security Management Server from which to
fetch the Policy. You may specify a list of one or more Security
Management Servers, such as master1 master2 which will be
searched in the order listed.
If targets is not specified, or inaccessible, the policy is fetched
from localhost.
-vs <VSID>
Fetches a Security Policy to the specified Virtual System.
change_interfaces
Description
Automatically replaces designated existing interfaces with new
interfaces on all virtual devices to which the existing interfaces connect.
This command is useful when converting a deployment to use Link
Aggregation, especially where VLANs connect to many virtual devices.