<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Excessive RAD Events/Alerts after R80.40 HF-139 Updates in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RAD-Events-Alerts-after-R80-40-HF-139-Updates/m-p/140419#M21553</link>
    <description>&lt;P&gt;Excessive RAD Events/Alerts after R80.40 HF-139 Updates&lt;/P&gt;&lt;P&gt;Excessive RAD Events in Firewall Logs 'Failed to Fetch Check Point Resources'&lt;/P&gt;&lt;P&gt;Excessive RAD Alerts in /var/log/messages 'Failed to fetch CP Site Resource Server Returned nothing (no headers, no data)&lt;/P&gt;</description>
    <pubDate>Thu, 03 Feb 2022 17:25:25 GMT</pubDate>
    <dc:creator>D_Riddleberger</dc:creator>
    <dc:date>2022-02-03T17:25:25Z</dc:date>
    <item>
      <title>Excessive RAD Events/Alerts after R80.40 HF-139 Updates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RAD-Events-Alerts-after-R80-40-HF-139-Updates/m-p/140419#M21553</link>
      <description>&lt;P&gt;Excessive RAD Events/Alerts after R80.40 HF-139 Updates&lt;/P&gt;&lt;P&gt;Excessive RAD Events in Firewall Logs 'Failed to Fetch Check Point Resources'&lt;/P&gt;&lt;P&gt;Excessive RAD Alerts in /var/log/messages 'Failed to fetch CP Site Resource Server Returned nothing (no headers, no data)&lt;/P&gt;</description>
      <pubDate>Thu, 03 Feb 2022 17:25:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RAD-Events-Alerts-after-R80-40-HF-139-Updates/m-p/140419#M21553</guid>
      <dc:creator>D_Riddleberger</dc:creator>
      <dc:date>2022-02-03T17:25:25Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive RAD Events/Alerts after R80.40 HF-139 Updates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RAD-Events-Alerts-after-R80-40-HF-139-Updates/m-p/140636#M21602</link>
      <description>&lt;P&gt;Depending on what Jumbo HFA you upgraded from into Take 139, this may be expected behavior and not a new problem due to this enhancement introduced in Take 114:&lt;/P&gt;
&lt;TABLE class="footnote" border="1" width="100%" cellspacing="2" cellpadding="4"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;PRJ-21296,&lt;BR /&gt;PMTR-63495&lt;/TD&gt;
&lt;TD&gt;URL Filtering&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;UPDATE:&lt;/STRONG&gt; Improved RAD event output to provide additional information on events, such as detailed timing. This update also activates the retry mechanism by default.&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Sat, 05 Feb 2022 15:14:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RAD-Events-Alerts-after-R80-40-HF-139-Updates/m-p/140636#M21602</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-02-05T15:14:02Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive RAD Events/Alerts after R80.40 HF-139 Updates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RAD-Events-Alerts-after-R80-40-HF-139-Updates/m-p/141126#M21738</link>
      <description>&lt;P&gt;Thanks, I give it a go to figure it out.&lt;/P&gt;&lt;P class="lia-align-right"&gt;&lt;A href="https://iogames.site" target="_self"&gt;&lt;FONT size="1 2 3 4 5 6 7" color="#FFFFFF"&gt;io games&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 07:20:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RAD-Events-Alerts-after-R80-40-HF-139-Updates/m-p/141126#M21738</guid>
      <dc:creator>judimercier</dc:creator>
      <dc:date>2022-02-15T07:20:58Z</dc:date>
    </item>
  </channel>
</rss>

