Check Point - Gaia - Reset Admin Password

There are 2 primary method for resetting the admin password. Both methods require a reboot of the device and downtime if the device is not part of a cluster

Method 1: Use emergendisk
This method requires a device with the same chassis model as the device that requires a password reset, running gaia, and a USB disk

  1. Insert a usb drive into the device that we do have access to
  2. Run the command 'emergendisk' to create the USB recovery disk
  3. After completion, plug the USB disk into the device that requires a password reset and reboot the device
  4. During reboot, a "Press any key" option will appear on screen. Press any key to enter the emergendisk menu
  5. Select the option that states 'Reset Admin Password'. This is usually the second option
  6. You should receive the following once the reset is complete. On some devices, you may not receive this or an error message. You should wait 1-2 minutes after boot to ensure the script has finished.

    Admin password successfully reset
    Please remove disk or any other media and press enter to restart

  7. Remove the USB drive and reboot. The username/password should now be admin/admin. If not, you may need to follow Method 2.

Method 2: Use a live CD or live USB disk
This method requires a live CD, such as Ubuntu, to boot from.

  1. Boot from the live CD or USB disk
  2. On some distros (Ubuntu, for example), the system will automatically mount the Check Point partitions. In Ubuntu, this is mounted to /media/ubuntu/. On one of these mount points, there you should be able to run the following to verify the correct mount point. Make sure to note this down as it will be required in the next steps.
    ls -lh /media/ubuntu/<UUID>/config/db/initial_db
    If the partitions are not mounted, you will need to locate the correct partition and mount it someplace. Below is an example:
    sudo mount /dev/sda1 /mnt/checkpoint

  3. Once you have located the correct partition, run the following to change the working root to Check Point's root

    sudo chroot
    Example: sudo chroot /media/Ubuntu/2cbbf000-blah

  4. Modify the sqlite database

    sqlite3 /config/db/initial_db

  5. Locate the current admin password by running the following. The last line is the current password hash.

    SELECT * from revisions WHERE binding="passwd:admin:passwd";

  6. Run the following to change the password to 'admin'. Replace '<old-pw-hash> with the last hash from step 5.

    UPDATE revisions SET value="$1$zIVyrIdj$1LBW7Pg6XOcXYIgFPTppY." WHERE binding="passwd:admin:passwd" AND VALUE='<old-pw-hash>';

  7. Exit sqlite3


  8. Reboot the device and login with admin/admin. Make sure to change the password via clish once logged in

More Information: Documentation

Check Point - cpview - View live statistics of device

The following command will allow you to view CPU statistics, memory usage, hard drive usage, throughput, etc in real time through the firewall or management server

This command was added in R77. Older versions do not have this ability.


To start the cpviewd process:

cpwd_admin start -name CPVIEWD -path "$FWDIR/bin/cpviewd" -command "cpviewd"

To stop the cpviewd process

cpwd_admin stop -name CPVIEWD
More Information: Documentation

Check Point - Determining if Aggressive Aging is Active

fw ctl pstat

* Aggressive aging causes idle connections to timeout much sooner (for instance, 60 seconds in stead of 60 minutes)
* A device may enter Aggressive Aging when running low on memory. The following log maybe seen when this happens:

Number:                              111111
Date:                                     1Jan2014
Time:                                     01:00:00
Origin:                                   CPDEVICE
Type:                                     Log
Information:                      Memory consumption: <#>% - <#>MB out of <#>MB
                                                Capacity notification: Memory consumption has exceeded 80%
                                                Aggressive aging status: Active
                                                Connections table capacity: <#>% - <#> out of <#>

Attack Information:        Connections table's denial of service prevention mechanism
Product:                               IPS Software Blade

Juniper SRX - View CPU Usage

show system processes summary
show system processes extensive

* Summary will provide a brief overview with the top 3 processes
* Extensive includes all processes