Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client side logic to Server-side logic. The cpm process:
A.
Performs database tasks such as creating, deleting, and modifying objects and indexing logs
B.
Allows SmartConsole to communicate over TCP Port 19001
C.
Performs database tasks such as creating, deleting, and modifying objects and compiling policy.
D.
Allows SmartConsole to communicate over TCP Port 18190
https://support.checkpoint.com/results/sk/sk115557 :
Database tasks
The CPM process is also responsible for performing all database tasks, such as: creating, removing, and modifying objects, rules.
I think A, based off this documentation which mentions log files. I see no mention of compilng policy.
CPM is the Check Point main management server process for this release. It is a multi-threaded, Java process that uses Web services to expose its functionality and to efficiently handle many, concurrent requests.
- CPM uses port 19009 for remote communication and port 9009 for local SIC traffic
- Log files are located in In $MDS_TEMPLATE/log (<file_name>.elg)
- Jar files are located in In $MDS_TEMPLATE/cpm-server
https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_Multi-DomainSecurityManagement_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_Multi-DomainSecurityManagement_AdminGuide/124911
More info.. still no mention of compiling policy.
Communication between the SmartConsole application (1) and the CPM (5) process uses Web Services (3). CPM communicates directly with the PostgreSQL (7) database to update tables or records. CPM can also use a use Solr (6) to run a query to get information or locate records in the PostgreSQL database.
One final comment from me, it seems it may actually be C after all, based off this:
2) The first stage is the process that CPM convert the objects with Java from new DB language/ files to the old set language and to files. Then the policy installation process is verifying compiling it to a "language" the security gateway can understand and implement. The verification and compilation stages are performed by the FWM and in the future by CPM process.
https://community.checkpoint.com/t5/Management/R80-x-Policy-Installation-Flowchart/td-p/67458#
upvoted 1 times
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
LegitimateBuilding6
1 year, 1 month agoShahrouz
1 year, 3 months agoMcBeano
1 year, 4 months agoMcBeano
1 year, 4 months agoMcBeano
1 year, 4 months ago