The Unified Policy is a feature that allows you to create a single policy layer that combines the functionality of Access Control, Threat Prevention, and HTTPS Inspection12. To debug the Unified Policy, you need to use the command fw ctl debug with the module name UP and the flag all or specific flags for different aspects of the Unified Policy inspection34. The possible flags for the Unified Policy module are:
up_match: Shows the matching process of the Unified Policy rules.
up_inspect: Shows the inspection process of the Unified Policy rules.
up_action: Shows the action process of the Unified Policy rules.
up_log: Shows the logging process of the Unified Policy rules.
up_tls: Shows the TLS inspection process of the Unified Policy rules.
up_clob: Shows the CLOB (Content Limitation and Optimization Blade) inspection process of the Unified Policy rules.
up_rulebase: Shows the rulebase loading process of the Unified Policy rules.
up_connection: Shows the connection tracking process of the Unified Policy rules.
The flag tls is not a valid flag for the Unified Policy module, as it is used for the TLS Inspection module5. Therefore, the correct answer is A. tls. The other options are valid flags for the Unified Policy module, as explained above34. References:
1: CCTE Courseware, Module 8: Advanced Access Control, Slide 7
2: Check Point R81 Security Gateway Architecture and Packet Flow, Chapter 5: Unified Policy, Page 29
3: CCTE Courseware, Module 8: Advanced Access Control, Slide 17
4: Check Point R81 Security Gateway Architecture and Packet Flow, Chapter 5: Unified Policy, Page 32
5: Check Point R81 Security Gateway Architecture and Packet Flow, Chapter 6: TLS Inspection, Page 36