{"id":105,"date":"2015-05-04T07:08:39","date_gmt":"2015-05-04T07:08:39","guid":{"rendered":"http:\/\/www.safekom.pl\/blog\/?p=105"},"modified":"2015-11-04T12:04:58","modified_gmt":"2015-11-04T12:04:58","slug":"checkpoint-user-expert","status":"publish","type":"post","link":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/","title":{"rendered":"Checkpoint [SPAT] user z uprawnieniami expert"},"content":{"rendered":"<p>Dodanie u\u017cytkownika z prawami expert:<\/p>\n<pre class=\"lang:sh decode:true \">useradd -u 0 -g 0 -o -s \/bin\/bash &lt;username&gt;<\/pre>\n<p>&nbsp;<\/p>\n<p>zmieniamy has\u0142o dla tego &lt;username&gt;<\/p>\n<pre class=\"lang:sh decode:true \">\/usr\/bin\/passwd\u00a0&lt;username&gt;<\/pre>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dodanie u\u017cytkownika z prawami expert: useradd -u 0 -g 0 -o -s \/bin\/bash &lt;username&gt; &nbsp; zmieniamy has\u0142o dla tego &lt;username&gt; \/usr\/bin\/passwd\u00a0&lt;username&gt; &nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[8],"tags":[29,38,28],"class_list":["post-105","post","type-post","status-publish","format-standard","hentry","category-checkpoint","tag-checkpoint","tag-expert","tag-splat"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Checkpoint [SPAT] user z uprawnieniami expert - SafeKom Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Checkpoint [SPAT] user z uprawnieniami expert - SafeKom Blog\" \/>\n<meta property=\"og:description\" content=\"Dodanie u\u017cytkownika z prawami expert: useradd -u 0 -g 0 -o -s \/bin\/bash &lt;username&gt; &nbsp; zmieniamy has\u0142o dla tego &lt;username&gt; \/usr\/bin\/passwd\u00a0&lt;username&gt; &nbsp;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/\" \/>\n<meta property=\"og:site_name\" content=\"SafeKom Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/safekompl\" \/>\n<meta property=\"article:published_time\" content=\"2015-05-04T07:08:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-11-04T12:04:58+00:00\" \/>\n<meta name=\"author\" content=\"Micha\u0142 Iwa\u0144czuk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@MIwaczuk\" \/>\n<meta name=\"twitter:site\" content=\"@MIwaczuk\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"Micha\u0142 Iwa\u0144czuk\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/\"},\"author\":{\"name\":\"Micha\u0142 Iwa\u0144czuk\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181\"},\"headline\":\"Checkpoint [SPAT] user z uprawnieniami expert\",\"datePublished\":\"2015-05-04T07:08:39+00:00\",\"dateModified\":\"2015-11-04T12:04:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/\"},\"wordCount\":22,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#organization\"},\"keywords\":[\"checkpoint\",\"expert\",\"splat\"],\"articleSection\":[\"Checkpoint\"],\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/\",\"url\":\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/\",\"name\":\"Checkpoint [SPAT] user z uprawnieniami expert - SafeKom Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#website\"},\"datePublished\":\"2015-05-04T07:08:39+00:00\",\"dateModified\":\"2015-11-04T12:04:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.safekom.pl\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Checkpoint [SPAT] user z uprawnieniami expert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#website\",\"url\":\"https:\/\/www.safekom.pl\/blog\/\",\"name\":\"SafeKom Blog\",\"description\":\"Notatki Architekta i in\u017cyniera zwi\u0105zanego rozwi\u0105zaniami on-prem\",\"publisher\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.safekom.pl\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#organization\",\"name\":\"SafeKom Blog\",\"url\":\"https:\/\/www.safekom.pl\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1\",\"width\":512,\"height\":512,\"caption\":\"SafeKom Blog\"},\"image\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/safekompl\",\"https:\/\/x.com\/MIwaczuk\",\"https:\/\/www.linkedin.com\/in\/michaliwanczuk\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181\",\"name\":\"Micha\u0142 Iwa\u0144czuk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g\",\"caption\":\"Micha\u0142 Iwa\u0144czuk\"},\"description\":\"Pasjonat komputerowy od zawsze oraz maniak w zakresie sieci, wirtualizacji oraz bezpiecze\u0144stwa IT. Kompetentny in\u017cynier z du\u017cym do\u015bwiadczeniem w realizacji projekt\u00f3w informatycznych i telekomunikacyjnych. Wieloletni administrator IT, kt\u00f3ry utrzymuje systemy informatyczne dostosowuj\u0105c je do wymog\u00f3w biznesowych z zapewnieniem dost\u0119pno\u015bci 24\/7\/365.\",\"url\":\"https:\/\/www.safekom.pl\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Checkpoint [SPAT] user z uprawnieniami expert - SafeKom Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/","og_locale":"pl_PL","og_type":"article","og_title":"Checkpoint [SPAT] user z uprawnieniami expert - SafeKom Blog","og_description":"Dodanie u\u017cytkownika z prawami expert: useradd -u 0 -g 0 -o -s \/bin\/bash &lt;username&gt; &nbsp; zmieniamy has\u0142o dla tego &lt;username&gt; \/usr\/bin\/passwd\u00a0&lt;username&gt; &nbsp;","og_url":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/","og_site_name":"SafeKom Blog","article_publisher":"https:\/\/www.facebook.com\/safekompl","article_published_time":"2015-05-04T07:08:39+00:00","article_modified_time":"2015-11-04T12:04:58+00:00","author":"Micha\u0142 Iwa\u0144czuk","twitter_card":"summary_large_image","twitter_creator":"@MIwaczuk","twitter_site":"@MIwaczuk","twitter_misc":{"Napisane przez":"Micha\u0142 Iwa\u0144czuk"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/#article","isPartOf":{"@id":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/"},"author":{"name":"Micha\u0142 Iwa\u0144czuk","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181"},"headline":"Checkpoint [SPAT] user z uprawnieniami expert","datePublished":"2015-05-04T07:08:39+00:00","dateModified":"2015-11-04T12:04:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/"},"wordCount":22,"commentCount":0,"publisher":{"@id":"https:\/\/www.safekom.pl\/blog\/#organization"},"keywords":["checkpoint","expert","splat"],"articleSection":["Checkpoint"],"inLanguage":"pl-PL","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/","url":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/","name":"Checkpoint [SPAT] user z uprawnieniami expert - SafeKom Blog","isPartOf":{"@id":"https:\/\/www.safekom.pl\/blog\/#website"},"datePublished":"2015-05-04T07:08:39+00:00","dateModified":"2015-11-04T12:04:58+00:00","breadcrumb":{"@id":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-user-expert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.safekom.pl\/blog\/"},{"@type":"ListItem","position":2,"name":"Checkpoint [SPAT] user z uprawnieniami expert"}]},{"@type":"WebSite","@id":"https:\/\/www.safekom.pl\/blog\/#website","url":"https:\/\/www.safekom.pl\/blog\/","name":"SafeKom Blog","description":"Notatki Architekta i in\u017cyniera zwi\u0105zanego rozwi\u0105zaniami on-prem","publisher":{"@id":"https:\/\/www.safekom.pl\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.safekom.pl\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/www.safekom.pl\/blog\/#organization","name":"SafeKom Blog","url":"https:\/\/www.safekom.pl\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"SafeKom Blog"},"image":{"@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/safekompl","https:\/\/x.com\/MIwaczuk","https:\/\/www.linkedin.com\/in\/michaliwanczuk\/"]},{"@type":"Person","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181","name":"Micha\u0142 Iwa\u0144czuk","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g","caption":"Micha\u0142 Iwa\u0144czuk"},"description":"Pasjonat komputerowy od zawsze oraz maniak w zakresie sieci, wirtualizacji oraz bezpiecze\u0144stwa IT. Kompetentny in\u017cynier z du\u017cym do\u015bwiadczeniem w realizacji projekt\u00f3w informatycznych i telekomunikacyjnych. Wieloletni administrator IT, kt\u00f3ry utrzymuje systemy informatyczne dostosowuj\u0105c je do wymog\u00f3w biznesowych z zapewnieniem dost\u0119pno\u015bci 24\/7\/365.","url":"https:\/\/www.safekom.pl\/blog\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p7i9ri-1H","jetpack-related-posts":[{"id":47,"url":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-vpn-debug-splat\/","url_meta":{"origin":105,"position":0},"title":"Checkpoint vpn debug [Splat]","author":"Micha\u0142 Iwa\u0144czuk","date":"21.04.2015","format":false,"excerpt":"Pomocne komendy przy troubleshootingu VPN w Checkpoint w wersji SPLAT: vpn debug on - w\u0142\u0105czenie debug fazy 2 vpn debug ikeon - w\u0142\u0105czenie debug fazy 1 vpn debug off - wy\u0142\u0105czenie debug dla fazy 1 vpn debug ikeoff - wy\u0142\u0105czenie dla fazy 2 cd $FWDIR\/log\/ - katalog gdzie znajduj\u0105 si\u0119\u2026","rel":"","context":"In &quot;Checkpoint&quot;","block_context":{"text":"Checkpoint","link":"https:\/\/www.safekom.pl\/blog\/category\/checkpoint\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":226,"url":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-sip-nat-problem\/","url_meta":{"origin":105,"position":1},"title":"Checkpoint SIP NAT &#8211; problem","author":"Micha\u0142 Iwa\u0144czuk","date":"27.06.2015","format":false,"excerpt":"Ostatnio mia\u0142em problem z przepuszczenie SIP'a gdzie na Checkpoint'cie mia\u0142em skonfigurowany static nat - zachodzi\u0142 pre nat.Kt\u00f3ry nie pozwala na poprawne zestawienie si\u0119 komunikacj SIP, Jak to s\u0119 objawia - zamiast komunikacji SRC IP i DST IP zachodzi\u0142o po porcie SRC PORT 5060 to Chceckpoint podmienia port ten powy\u017cej 10000.\u2026","rel":"","context":"In &quot;Checkpoint&quot;","block_context":{"text":"Checkpoint","link":"https:\/\/www.safekom.pl\/blog\/category\/checkpoint\/"},"img":{"alt_text":"udp_5060_1","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/06\/udp_5060_1.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":412,"url":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-pierwsze-uruchomienie\/","url_meta":{"origin":105,"position":2},"title":"CheckPoint pierwsze uruchomienie","author":"Micha\u0142 Iwa\u0144czuk","date":"30.10.2015","format":false,"excerpt":"Poni\u017cej przedstawi\u0119 krok po kroku jak wygl\u0105da pierwsze uruchomienie w wersji Gaia 77.30. Aby dosta\u0107 si\u0119 do urz\u0105dzenia musimy pod\u0142\u0105czy\u0107 si\u0119 do interfejsu MGMT, w mym przypadku b\u0119dzie to port 8. Przy pierwszym uruchomieniu interfejs jest zaadresowany adresem 192.168.1.1. Musimy pod\u0142\u0105czy\u0107 si\u0119 PC do tego portu i z poziomu przegl\u0105darki\u2026","rel":"","context":"In &quot;Checkpoint&quot;","block_context":{"text":"Checkpoint","link":"https:\/\/www.safekom.pl\/blog\/category\/checkpoint\/"},"img":{"alt_text":"cp1","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/10\/cp1.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/10\/cp1.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/10\/cp1.png?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/10\/cp1.png?resize=700%2C400 2x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/10\/cp1.png?resize=1050%2C600 3x"},"classes":[]},{"id":157,"url":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-splat-upgrade\/","url_meta":{"origin":105,"position":3},"title":"Checkpoint [Splat] &#8211; upgrade_export &#8211; brakuje miejsca na partycji \/","author":"Micha\u0142 Iwa\u0144czuk","date":"10.05.2015","format":false,"excerpt":"ostatnio mia\u0142em do wykonania export konfiguracji przy podnoszeniu wersji checkpoint ale mia\u0142em za ma\u0142o miejsca na partycji \/ # df -hT Filesystem \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Type Size Used \u00a0Avail Use% Mounted on \/dev\/mapper\/vg_splat-lv_current\u00a0ext3 7.9G 5.7G 1.8G 76% \u00a0\/ \/dev\/sda1 \u00a0 \u00a0 \u00a0 \u00a0\u2026","rel":"","context":"In &quot;Checkpoint&quot;","block_context":{"text":"Checkpoint","link":"https:\/\/www.safekom.pl\/blog\/category\/checkpoint\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2805,"url":"https:\/\/www.safekom.pl\/blog\/vmware\/nsx\/nsx-niewygasanie-hasla\/","url_meta":{"origin":105,"position":4},"title":"NSX niewygasanie has\u0142a","author":"Micha\u0142 Iwa\u0144czuk","date":"26.09.2023","format":false,"excerpt":"Ostatnio mia\u0142em problem - wygas\u0142y has\u0142a dla u\u017cytkownik\u00f3w kt\u00f3rzy zostali skonfigurowani podczas instalacji NSX Managera : root admin audit Aby wykona\u0107 restart ich mamy dwie drogi: CLI API Poni\u017cej przedstawi\u0119 obie drogi dla scenariuszy: ustawienie niewygasanie has\u0142a reset has\u0142a dla audit CLI Poni\u017cej komendy dla ustawienia niewygasania has\u0142a do kont\u2026","rel":"","context":"In &quot;Bez kategorii&quot;","block_context":{"text":"Bez kategorii","link":"https:\/\/www.safekom.pl\/blog\/category\/bez-kategorii-pl\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2023\/09\/Zrzut-ekranu-2023-09-25-o-13.29.42.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2023\/09\/Zrzut-ekranu-2023-09-25-o-13.29.42.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2023\/09\/Zrzut-ekranu-2023-09-25-o-13.29.42.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2023\/09\/Zrzut-ekranu-2023-09-25-o-13.29.42.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2023\/09\/Zrzut-ekranu-2023-09-25-o-13.29.42.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2023\/09\/Zrzut-ekranu-2023-09-25-o-13.29.42.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":479,"url":"https:\/\/www.safekom.pl\/blog\/checkpoint\/checkpoint-rename-interfacow\/","url_meta":{"origin":105,"position":5},"title":"checkpoint &#8211; rename interfac\u00f3w","author":"Micha\u0142 Iwa\u0144czuk","date":"01.02.2016","format":false,"excerpt":"Jak zmieni\u0107 nazwy interfejs\u00f3w sieciowych w checkpoincie, bardzo pomocne gdy robimy upgrade np. \u00a0z UTM1 na nowszy urz\u0105dzenie w mym przypadku jest to model z serii 2200: wy\u015bwietlamy nazwy interfejs\u00f3w na \u00a0starym urz\u0105dzeniu: ID==\"0000:01:00.0\", NAME=\"Internal\" ID==\"0000:02:00.0\", NAME=\"External\" ID==\"0000:03:00.0\", NAME=\"DMZ\" ID==\"0000:04:00.0\", NAME=\"Lan1\" ID==\"0000:05:03.0\", NAME=\"Lan2\" ID==\"0000:05:04.0\", NAME=\"Lan3\" odnajdujemy plik zaczynaj\u0105cy si\u0119 do\u2026","rel":"","context":"In &quot;Checkpoint&quot;","block_context":{"text":"Checkpoint","link":"https:\/\/www.safekom.pl\/blog\/category\/checkpoint\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts\/105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/comments?post=105"}],"version-history":[{"count":0,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts\/105\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/media?parent=105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/categories?post=105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/tags?post=105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}