How to Reset SIC in Check Point Firewall – Complete Guide
Introduction
SIC (Secure Internal Communication) is the encrypted trust channel between Check Point Security Management Server (SMS) and Security Gateways. It uses certificates to authenticate and encrypt all management traffic (policy installation, logs, monitoring, etc.).
When SIC breaks, you see errors like:
- "SIC not initialized"
- "Invalid certificate"
- "Communication error with gateway"
- Gateway status shows "Problem" or "Disconnected"
Resetting SIC re-establishes this trust. This guide covers the full process for R80+ versions (including R81, R81.10, R81.20), based on official Check Point documentation (SK65764).
Common Reasons SIC Needs Resetting
- Certificate expired or corrupted
- Management server restored from backup
- Gateway re-imaged or recovered
- Hostname or IP changed on gateway or SMS
- After major upgrade or migration
- Manual certificate revocation
Resetting SIC requires direct access (console/SSH) to the gateway. Remote reset is not possible if communication is already broken.
Prerequisites Before Resetting SIC
- Admin access to SmartConsole and gateway CLI
- Gateway must be reachable via SSH/console
- Know the gateway's Secure Internal Communication name (usually same as hostname)
- Backup current configuration on both sides
- Plan a short maintenance window (gateway will lose policy during reset)
Step-by-Step: Reset SIC on the Gateway
- Log in to the gateway via console or SSH as admin
- Enter expert mode:
expert - Reset SIC:
cpconfig - Select option 5 (Secure Internal Communication)
- Choose Reset Secure Internal Communication
- Confirm with y when asked
- Exit cpconfig (services will restart automatically)
After reset, the gateway no longer trusts the management server — status will show "SIC not initialized". Reboot is not required, but services restart automatically.
Re-initialize SIC from SmartConsole
- Open SmartConsole
- Go to Gateways & Servers view
- Right-click the affected gateway → Reset SIC
- Enter the Activation Key (one-time password you choose)
- Click OK
On the gateway CLI (if not already done):
cpconfig → 5 → Initialize → Enter same Activation Key
Wait 1–2 minutes. Gateway status should change to "Communicating".
Verify SIC Is Working
On gateway CLI:
cpwd_admin list | grep cpm
Should show cpm running.
On SmartConsole:
- Gateway status = green (Communicating)
- Install policy successfully
- Logs appear normally
Common Errors & Fixes
- SIC initialization failed → Wrong activation key → Double-check and retry
- Certificate not trusted → Hostname/IP mismatch → Verify in SmartConsole matches gateway
- cpd process stuck → High CPU/memory → Reboot gateway if needed
Best Practices After SIC Reset
- Immediately install policy to gateway
- Verify logs are forwarding
- Check SmartView Monitor for status
- Document activation key used
- Test remote management access
Conclusion
Resetting SIC is a standard procedure when trust between Check Point management server and gateway is broken. The process is safe and reversible — just follow the steps carefully and verify communication afterward.
Always reset SIC during a maintenance window. After reset, your gateway should communicate normally again.