A financial services company reports that their R81 Security Gateway cluster is experiencing high CPU utilization on fwk_1 worker core, specifically during peak trading hours. A preliminary analysis with `cpview` shows a significant number of logs being generated by a single, overly broad 'Any-Any-Accept' rule at the bottom of the policy. Which action is the MOST effective first step to mitigate the performance issue while investigating a long-term fix?
Q2
During a Site-to-Site VPN debug, an administrator captures IKE packets and observes that their R81 gateway is sending a 'NO_PROPOSAL_CHOSEN' notification to the peer gateway during IKEv2 Phase 1 (IKE_SA_INIT) negotiation. What is the most likely cause of this error?
Q3Multiple answers
A troubleshooter needs to capture traffic on a Security Gateway to diagnose an issue with clear-text SMTP traffic being dropped. They want to see the packet as it is processed by the firewall kernel chain, both before and after the Access Control policy is applied. Which `fw monitor` chain points are the most appropriate for this task? (Select TWO).
Q4
An administrator is troubleshooting a policy installation failure to a remote Security Gateway. The error in SmartConsole is 'Installation failed. Reason: TCP connectivity failure (port 18191)'. The administrator has verified with `netstat` that the `fwd` process is listening on port 18191 on the Management Server. A traceroute from the remote gateway to the Management Server completes successfully. What is the most logical next step?
Q5
True or False: The `fw ctl zdebug` command is functionally identical to `fw ctl debug` but writes its output to a compressed file instead of a memory buffer.
Q6
To collect comprehensive diagnostic data from a Security Gateway, including configuration, process status, log files, and OS information, for submission to Check Point Support, which command should be executed in Expert mode?
Q7
**Case Study:** A retail company uses an R81 cluster with the Identity Awareness blade enabled, using AD Query as the identity source. Recently, the IT department deployed a new fleet of Point-of-Sale (POS) terminals that run a custom Linux OS. The security team created an Access Role for these terminals based on their static IP addresses. However, store managers, who use Windows laptops and are part of the 'Store_Managers' AD group, report that they can no longer access the inventory server, which they could access before the POS deployment. Troubleshooting shows that the managers' traffic is being dropped by a rule that denies access from the POS terminals' Access Role to the inventory server. Logs indicate that when a manager logs in, their IP address is incorrectly being associated with the POS Access Role instead of their AD-based user identity. The POS terminals are on the same subnet as the managers' laptops. What is the most likely reason for this identity misidentification?
Q8
You are debugging a slow database issue on a Security Management Server. You suspect the `solr` process, which handles log indexing, is consuming excessive resources. Which command would you use to safely restart ONLY the `solr` process without impacting other critical management services like `cpm`?
Q9Multiple answers
An administrator is troubleshooting an issue where traffic that should be accelerated by SecureXL is being processed by the Firewall (FW) path instead, causing high CPU. They check `fwaccel stats -s` and see that 'Accelerated conns' is very low. They suspect a specific NAT rule is causing traffic to be de-accelerated. Which of the following NAT configurations are known to prevent SecureXL acceleration? (Select TWO).
Q10
A kernel debug is being performed on a production gateway to trace a complex packet flow issue. The administrator needs to ensure the debug buffer is large enough to capture all relevant data without wrapping too quickly, but also wants to avoid consuming excessive kernel memory. What is the command to set the kernel debug buffer to 16384 KB?