I've been told by Check Point's Tech. Support that it's alright to edit
this file - although I haven't tried it yet. They said to go in and delete
the record associated with the IP address you're trying to do a putkey
to. (Of course, make a back-up of the file before you edit it.)
At 09:40 PM 9/23/00 -0700, Ian Campbell wrote:
>Hi folks,
>
>I understand that when you do a putkey between a managment module and an FW
>module, that the keys are stored in the fwauth.keys file. I recently wrote
>about an unreliable IKE tunnel that I had. With this particular linkage, due
>to stupidity, it took about 3 tries to get the putkey right.
>
>I had been told to delete or rename the fwauth.keys file if this happened
>and just proceed again by my reseller many moons in the past. I did do this
>on the FW module, but I'm scared to do it on the managment server. If I
>delete the fwauth.keys file from the management console, will I have to redo
>a putkey with each one of my reinforcement modules again, or can I safely
>delete it off both before trying this again?
>
>Thanks for any info and enlightment,
>
>Ian
>
>
>================================================================================
> To unsubscribe from this mailing list, please see the instructions at
> http://www.checkpoint.com/services/mailing.html
>================================================================================
>
---
"It is better to be true to what you believe,
though it be wrong, than to be false to what
you believe, even if that belief is correct."
-- Anna Howard Shaw
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================