Installing the Access Control Policy

Important - With the "fw up_execute" command, you can examine the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. behavior (R82 and above) for a specified traffic before you make changes to your Access Control Policy. See the R82 CLI Reference Guide > Chapter "Security Gateway Commands" > Section "fw" > Section "fw up_execute".

  1. On the Global Toolbar, click Menu > Verify Access Control Policy > select the required policy > click Verify.

    Alternatively, click the left Security Policies view > Access Control > from the top toolbar, click Actions > Verify Access Policy.

    Note - Starting from R82, it is possible to verify the Access Control policy before you publish the session.

    Make the required changes.

  2. On the top Global Toolbar, click Publish session.

  3. On the top Global Toolbar, click Install Policy.

    The Install Policy window opens showing the Security Gateways.

  4. If there is more than one Policy package: From the Policy drop-down list, select a policy package.

  5. Select Access Control. You can also select other Policies.

  6. If there is more than one Security Gateway: Select the Security Gateways, on which to install the policy.

  7. Select the Install Mode:

  8. Click Install.