I've been told by Check Point's Tech. Support that it's alright to edit 
this file - although I haven't tried it yet.  They said to go in and delete 
the record associated with the IP address you're trying to do a putkey 
to.  (Of course, make a back-up of the file before you edit it.)


At 09:40 PM 9/23/00 -0700, Ian Campbell wrote:

>Hi folks,
>
>I understand that when you do a putkey between a managment module and an FW
>module, that the keys are stored in the fwauth.keys file. I recently wrote
>about an unreliable IKE tunnel that I had. With this particular linkage, due
>to stupidity, it took about 3 tries to get the putkey right.
>
>I had been told to delete or rename the fwauth.keys file if this happened
>and just proceed again by my reseller many moons in the past. I did do this
>on the FW module, but I'm scared to do it on the managment server. If I
>delete the fwauth.keys file from the management console, will I have to redo
>a  putkey with each one of my reinforcement modules again, or can I safely
>delete it off both before trying this again?
>
>Thanks for any info and enlightment,
>
>Ian
>
>
>================================================================================
>      To unsubscribe from this mailing list, please see the instructions at
>                http://www.checkpoint.com/services/mailing.html
>================================================================================ 
>







---
"It is better to be true to what you believe,
  though it be wrong, than to be false to what
  you believe, even if that belief is correct."
                                  -- Anna Howard Shaw



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to