<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R82 Interesting Findings in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/230341#M44329</link>
    <description>&lt;P&gt;You went full board into twiddling the nerd knobs &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;The Dynamic Layer stuff is basically a definition for a policy layer via a JSON file and a gateway can support multiple of them.&lt;BR /&gt;The policy pushed to the gateway must include the Dynamic Layers in order to be used.&lt;BR /&gt;Dynamic Layers are&amp;nbsp;not meant to be manipulated in the same way a regular policy is.&lt;BR /&gt;The actual details of what you can do in this JSON are in the Gaia API documentation.&lt;BR /&gt;As I type this, it appears the v1.8 documentation is NOT public.&lt;BR /&gt;However, if you have R82 installed (even the EA), you can read the documentation here: https://mgmt-ip/gaia_docs/#web/set-dynamic-content~v1.8%20&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;From my read of this documentation, you can set a policy using objects defined in the JSON (most object types are supported).&lt;BR /&gt;Some types of objects can be "externally referenced" (taken from management), specifically:&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-unlink="true"&gt;Services&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;Custom Application/Sites&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;Application Categories&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;Access Layers&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;Updatable Objects&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The externally referenced objects used in the policy must be explicitly specified in the JSON along with the ones you're using in the policy.&lt;BR /&gt;In fact, any changes to the dynamic layer must be done with a new JSON file (replacing the existing one).&lt;/P&gt;
&lt;P&gt;It's a bit more complicated than sam rules for sure, but you can do a whole lot more with it, it appears.&lt;/P&gt;</description>
    <pubDate>Mon, 21 Oct 2024 23:03:34 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-10-21T23:03:34Z</dc:date>
    <item>
      <title>R82 Interesting Findings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/230320#M44323</link>
      <description>&lt;P&gt;Been looking under the hood at R82 GA all morning, here are a few things I've uncovered.&amp;nbsp; I'll try to avoid restating findings that are already in the release notes, also keep in mind these are initial impressions which may not be 100% accurate.&lt;/P&gt;
&lt;P&gt;1) All NIC drivers (igb/ixgbe/vmxnet3/mlx_core etc) are taking a major driver version update due to the new 4.18 kernel, this may result in changes in network interface behavior upon upgrade (like this when we moved to kernel 3.10:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk166424" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;sk166424: Number of RX packet drops on interfaces increases on a Security Gateway R80.30 and higher with Gaia kernel 3.10&lt;/SPAN&gt;&lt;/A&gt;).&amp;nbsp; The e1000 driver (which is the default interface in many virtualized environments) is deprecated in R82 and will throw a console warning if you are trying to use it.&amp;nbsp; The e1000 driver still seems to work anyway on an SMS in VMWare, but does NOT work for me on a security gateway in VMWare so look out.&amp;nbsp;&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk180572" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;sk180572: Hardware Compatibility Notifications&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;2) If you create a new R82 security gateway or cluster, Anti-Bot and Anti-Virus will be enabled by default.&amp;nbsp; These features under R82 now also support a kind of hybrid between "Background" and "Hold", whereas if Hold is causing excessive latency connections start slowly getting treated as background in a very interesting trade-off (this hybrid mode doesn't appear to be enabled by default):&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk181434" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;sk181434: "Maximum Security" feature in Anti-Virus and Anti-Bot R82 and higher&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;3) The Advanced DNS protections introduced in R81.20 have been exposed somewhat in the TP profile settings, but it looks like all you can do is turn them off for testing purposes, not sure if exceptions could be created for these:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dnssettings.jpg" style="width: 802px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28148i84FE094A6A62CC80/image-size/large?v=v2&amp;amp;px=999" role="button" title="dnssettings.jpg" alt="dnssettings.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;4) A new "Dynamic Layer" of rules can be added directly on a gateway even if the SMS is unreachable, kind of like SAM rules on steroids:&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182252" target="_blank" rel="noopener"&gt;sk182252: Dynamic Layer in Access Control Policy&lt;/A&gt;.&amp;nbsp; Also it looks like the R82 gateways now cache multiple versions of previously installed policies so you can revert to an older known-good policy directly on the gateway itself, kind of like the Installation History screen in SmartConsole.&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk181437" target="_blank" rel="noopener"&gt;sk181437: Access Control Policy Revert Tool (policy_rev_tool)&lt;/A&gt;&amp;nbsp;&lt;SPAN&gt; Could be very handy when a policy install causes all hell to break loose including cutting off the gateway from the SMS, to recover you could just jump directly onto the gateway and reinstall the known-good policy that was installed just before the "bad" one was, as opposed to &lt;STRONG&gt;fw unloadlocal&lt;/STRONG&gt; causing a full outage.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;5) Looks like a new daemon called &lt;STRONG&gt;cpview_api_service&lt;/STRONG&gt; has been added to R82 according to &lt;A href="https://support.checkpoint.com/results/sk/sk97638" target="_blank" rel="noopener"&gt;sk97638&lt;/A&gt;, I assume this would allow cpview data to be retrieved directly via Gaia API calls which opens up some verrrry interesting monitoring/reporting capabilities.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;6) Looks like the &lt;STRONG&gt;ips&lt;/STRONG&gt; command has gotten pimped out with some new options beyond just looking up the name of a protection ID you see in a debug, appears you now can switch off individual IPS protections right from the gateway's CLI without a policy install.&amp;nbsp; Guess Check Point got tired of administrators running &lt;STRONG&gt;ips off&lt;/STRONG&gt; and gave them some more granular options:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;&lt;STRONG&gt; ips protections print_name&lt;/STRONG&gt; &amp;lt;protection_id (hex)&amp;gt; # Display protection name&lt;BR /&gt;&lt;STRONG&gt;ips protections print_id&lt;/STRONG&gt; '&amp;lt;protection name&amp;gt;' # Display protection ID&lt;BR /&gt;&lt;STRONG&gt;ips protections disabled show&lt;/STRONG&gt; # Show IPS disabled and excluded protections&lt;BR /&gt;&lt;STRONG&gt;ips protections disabled exclude&lt;/STRONG&gt; &amp;lt;protection_id&amp;gt; # Exclude IPS disabled protection&lt;BR /&gt;&lt;STRONG&gt;ips protections disabled delete_exclude&lt;/STRONG&gt; &amp;lt;protection_id&amp;gt;|all # Delete excluded IPS disabled protection&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;7) New command called &lt;STRONG&gt;turbostat&lt;/STRONG&gt; shows very detailed information about the processors such as power consumption, current clock rate and lots of other goodies.&amp;nbsp;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/27871"&gt;@Bob_Zimmerman&lt;/a&gt;&amp;nbsp;would approve.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;8)&lt;/img&gt; Looks like we picked up two new paths in the output of &lt;STRONG&gt;fwaccel stats -s&lt;/STRONG&gt;, presumably for Hyperflow boosting of QUIC and SMB/CIFS.&amp;nbsp; Also the &lt;STRONG&gt;connection_pipelining&lt;/STRONG&gt; command has been renamed &lt;STRONG&gt;hyperflow&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;UDP IS XL pkts/Total pkts : 0/541805 (0%)&lt;BR /&gt;UDP IS pipeline pkts/Total pkts : 0/541805 (0%)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;9) The great new &lt;STRONG&gt;connview&lt;/STRONG&gt; tool requires USFW to function, it doesn't work if your firewall is in kernel mode.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;10) The classic Unix command &lt;STRONG&gt;strace&lt;/STRONG&gt; is back in Gaia (although it was previously available via the undocumented &lt;STRONG&gt;perf trace&lt;/STRONG&gt; command).&amp;nbsp; This great command can be used to sniff the system calls between an existing&amp;nbsp; runaway/malfunctioning process and the kernel.&amp;nbsp; You can see everything it is trying to access (files, sockets, etc) and even the data it is reading/writing.&amp;nbsp; Awesome troubleshooting tool for processes that can be attached to a process that is already running.&lt;/P&gt;
&lt;P&gt;11) All the configuration options for HTTPS Inspection including CA updates and such are now located in the main SmartConsole GUI and no longer in the legacy SmartDashboard which means they have been extricated from the vile clutches of fwm, speaking of which...&lt;/P&gt;
&lt;P&gt;12) It seems that while the legacy single-threaded fwm process still exists in R82, it has had even more responsibilities taken away from it on the SMS which is a good thing.&amp;nbsp; Policy installations seem WAY faster in R82 and watching the output of top during a policy installation shows fwm is doing very little now.&amp;nbsp; In R81.20 and earlier fwm is always the major bottleneck for policy installation performance, even for accelerated ones.&lt;/P&gt;
&lt;P&gt;13) Enhanced VPN Link Selection looks very nice, should make setting up ISP-redundant VPNs with non-Check Point gateways much easier.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jan 2025 13:38:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/230320#M44323</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-01-04T13:38:36Z</dc:date>
    </item>
    <item>
      <title>Re: R82 Interesting Findings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/230327#M44325</link>
      <description>&lt;P&gt;Very nice!&lt;/P&gt;
&lt;P&gt;1) Great chance to remind everybody that e1000 has been a mediocre option in VMware for a long time. vmxnet3 is &lt;STRONG&gt;much&lt;/STRONG&gt; better.&lt;/P&gt;
&lt;P&gt;4) Important note in that Dynamic Layer SK: "It is not supported to edit or delete individual dynamic rules on the Security Gateway after you add them." This seems like a really, really good way to shoot yourself in the foot. Use with &lt;EM&gt;extreme&lt;/EM&gt; caution.&lt;/P&gt;
&lt;P&gt;6) Really looking forward to more granular ways to work with IPS on the command line. I'd love the ability to take a flow tuple and get a list of which IPS protections it will hit so I can target just those ones.&lt;/P&gt;
&lt;P&gt;7) &lt;A href="https://www.linux.org/docs/man8/turbostat.html" target="_self"&gt;turbostat(8)&lt;/A&gt; has actually been included at least since the move to kernel 3.10. I don't have any 2.6 systems handy to see if it's present that far back. It's a nice tool for monitoring processor performance, though I wish it had some kind of structured output like JSON instead of the top-like table. Unfortunately, Linux still doesn't have great tools for monitoring cross-NUMA-node traffic, so it's still hard to notice the QPI/UPI links are saturated. &lt;A href="https://github.com/intel/pcm" target="_self"&gt;Intel's PCM&lt;/A&gt; (Performance Counter Monitor) is available, but not included in any Linux I'm aware of. Definitely not included in Gaia.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2024 20:03:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/230327#M44325</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2024-10-21T20:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: R82 Interesting Findings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/230340#M44328</link>
      <description>&lt;P&gt;Yes, agree there, vmxnet3 is much better.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2024 21:39:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/230340#M44328</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-10-21T21:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: R82 Interesting Findings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/230341#M44329</link>
      <description>&lt;P&gt;You went full board into twiddling the nerd knobs &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;The Dynamic Layer stuff is basically a definition for a policy layer via a JSON file and a gateway can support multiple of them.&lt;BR /&gt;The policy pushed to the gateway must include the Dynamic Layers in order to be used.&lt;BR /&gt;Dynamic Layers are&amp;nbsp;not meant to be manipulated in the same way a regular policy is.&lt;BR /&gt;The actual details of what you can do in this JSON are in the Gaia API documentation.&lt;BR /&gt;As I type this, it appears the v1.8 documentation is NOT public.&lt;BR /&gt;However, if you have R82 installed (even the EA), you can read the documentation here: https://mgmt-ip/gaia_docs/#web/set-dynamic-content~v1.8%20&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;From my read of this documentation, you can set a policy using objects defined in the JSON (most object types are supported).&lt;BR /&gt;Some types of objects can be "externally referenced" (taken from management), specifically:&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-unlink="true"&gt;Services&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;Custom Application/Sites&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;Application Categories&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;Access Layers&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;Updatable Objects&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The externally referenced objects used in the policy must be explicitly specified in the JSON along with the ones you're using in the policy.&lt;BR /&gt;In fact, any changes to the dynamic layer must be done with a new JSON file (replacing the existing one).&lt;/P&gt;
&lt;P&gt;It's a bit more complicated than sam rules for sure, but you can do a whole lot more with it, it appears.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2024 23:03:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/230341#M44329</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-10-21T23:03:34Z</dc:date>
    </item>
    <item>
      <title>Re: R82 Interesting Findings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/231543#M44648</link>
      <description>&lt;P&gt;Looks like in R82 we can FINALLY on a per-gateway basis tell it which IP address of the SMS (real or NAT) to initiate the logging connections to and also for fetching policies.&amp;nbsp; (&lt;SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk171055" target="_blank" rel="noopener"&gt;sk171055: Security Gateway tries to fetch the policy from / sends logs to the real IP address of the Management Server instead of the public (NATed) IP address&lt;/A&gt;)&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;This replaces creating those clunky fake log server objects when there was a mixture of gateways managed across the Internet and some through an internal WAN, and is a huge improvement:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="logging_ip.png" style="width: 766px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28309iE91CFA3BA7FAA76D/image-size/large?v=v2&amp;amp;px=999" role="button" title="logging_ip.png" alt="logging_ip.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Nov 2024 16:57:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/231543#M44648</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-11-02T16:57:16Z</dc:date>
    </item>
    <item>
      <title>Re: R82 Interesting Findings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/231548#M44651</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;, &lt;SPAN class="css-13y3t3g"&gt;&lt;SPAN class="css-vy7rm"&gt;&lt;BR /&gt;&lt;BR /&gt;You can find more changes between the releases (R81.20 and R82) in the following SK:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk180180" target="_self"&gt;sk180180 - Software changes between Quantum release versions&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CUT&amp;gt;&amp;gt;&amp;gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Management Server&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Security Gateways R77.30 are not supported.&lt;/LI&gt;
&lt;LI&gt;The search in SmartConsole Object Explorer and "Objects" sidebar was improved in a specific scenario. The partial search in text fields (name of an object, comment, and so on) does not require entering the wildcard character "*"(asterisk) anymore. See &lt;A href="https://support.checkpoint.com/results/sk/sk182006" target="_blank" rel="noopener"&gt;sk182006&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Gaia Operating System&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Updated the Gaia OS Linux kernel version to 4.18.&lt;/LI&gt;
&lt;LI&gt;CPView Utility saves its log messages in these files:
&lt;UL&gt;
&lt;LI&gt;On a Management Server / Log Server / Security Gateway:
&lt;UL&gt;
&lt;LI&gt;&lt;EM&gt;$CPDIR/log/cpviewd.elg&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;EM&gt;$CPDIR/log/cpview_api_service.elg&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;On a VSX Gateway:
&lt;UL&gt;
&lt;LI&gt;&lt;EM&gt;$CPDIR/log/cpviewd.elg.vs&amp;lt;VSID&amp;gt;&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;EM&gt;$CPDIR/log/cpview_api_service.elg.vs&amp;lt;VSID&amp;gt;&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Added the Python v3.11 package.&lt;/LI&gt;
&lt;LI&gt;Introducing a dedicated messaging daemon MSGD&lt;/LI&gt;
&lt;LI&gt;You can use the Gaia Clish command "&lt;CODE&gt;set dns timeout &amp;lt;value&amp;gt;&lt;/CODE&gt;" to control how long Gaia OS waits for a response from a DNS server before it sends the DNS request to the next configured DNS server.&lt;/LI&gt;
&lt;LI&gt;The log files in the &lt;EM&gt;$RTDIR/laas/adjuster_service/log/ &lt;/EM&gt;directory moved from the root partition "/" to the "&lt;EM&gt;/var/log/&lt;/EM&gt;" partition.&lt;/LI&gt;
&lt;LI&gt;More user space log files are now rotated based on the settings in the &lt;EM&gt;/etc/cpshell/log_rotation.conf&lt;/EM&gt; configuration file.&lt;/LI&gt;
&lt;LI&gt;The name template of a Gaia regular backup file changed:&lt;BR /&gt;from "backup_--_&amp;lt;HostName&amp;gt;.&amp;lt;Domain&amp;gt;_&amp;lt;DD&amp;gt;_&amp;lt;MM&amp;gt;_&amp;lt;YYYY&amp;gt;_&amp;lt;HH&amp;gt;_&amp;lt;MM&amp;gt;_&amp;lt;SS&amp;gt;.tgz"&lt;BR /&gt;to "backup_--_&amp;lt;HostName&amp;gt;.&amp;lt;Domain&amp;gt;_&amp;lt;YYYY&amp;gt;_&amp;lt;MM&amp;gt;_&amp;lt;DD&amp;gt;_&amp;lt;HH&amp;gt;_&amp;lt;MM&amp;gt;_&amp;lt;SS&amp;gt;.tgz"&lt;/LI&gt;
&lt;LI&gt;The name template of a Gaia scheduled backup file changed:&lt;BR /&gt;from "backup_-&amp;lt;Name_of_Scheduled_Backup&amp;gt;-_&amp;lt;HostName&amp;gt;.&amp;lt;Domain&amp;gt;_&amp;lt;DD&amp;gt;_&amp;lt;MMM&amp;gt;_&amp;lt;YYYY&amp;gt;_&amp;lt;HH&amp;gt;_&amp;lt;MM&amp;gt;_&amp;lt;SS&amp;gt;.tgz"&lt;BR /&gt;to "backup_-&amp;lt;Name_of_Scheduled_Backup&amp;gt;-_&amp;lt;HostName&amp;gt;.&amp;lt;Domain&amp;gt;_&amp;lt;YYYY&amp;gt;_&amp;lt;MM&amp;gt;_&amp;lt;DD&amp;gt;_&amp;lt;HH&amp;gt;_&amp;lt;MM&amp;gt;_&amp;lt;SS&amp;gt;.tgz"&lt;/LI&gt;
&lt;LI&gt;User Space Firewall (USFW) is now enabled by default on all environments except Threat Emulation (TE) Appliances and Standalone setup.&lt;/LI&gt;
&lt;LI&gt;Default disk space limit for storing core dump files was increased:
&lt;UL&gt;
&lt;LI&gt;Management Server - from 1000 MB to 5000 MB&lt;/LI&gt;
&lt;LI&gt;Security Gateway in the Kernel Space Firewall (KSFW) mode - from 1000 MB to 5000 MB&lt;/LI&gt;
&lt;LI&gt;Security Gateway in the User Space Firewall (USFW) mode - from 10000 MB to 15000 MB&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;VSX&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;In the Legacy VSX mode, the default value for concurrent connections in the Virtual System object was increased from 15,000 to 50,000 (Optimizations section &amp;gt; Capacity Optimization page).&lt;/LI&gt;
&lt;LI&gt;In the VSNext mode, the Expert mode command "&lt;CODE&gt;clish -c&lt;/CODE&gt;" now supports the context of a Virtual Gateway / Virtual Switch with this syntax:&lt;BR /&gt;&lt;CODE&gt;clish -v &amp;lt;Virtual Device ID&amp;gt; -c "&amp;lt;Gaia Clish Command&amp;gt;"&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;VPN&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;When a Check Point Management Server creates an IKE certificate, by default this certificate contains the "Server Authentication" attribute within the "Extended Key Usage" field.&lt;/LI&gt;
&lt;LI&gt;Changed the default value of "Maximum concurrent IKE negotiations" from 1,000 to 10,000 in the Security Gateway / ClusterXL object &amp;gt; the "Optimization" page.&lt;/LI&gt;
&lt;LI&gt;Changed the default value of &lt;CODE&gt;cphwd_medium_path_qid_by_mspi&lt;/CODE&gt; parameter from 1 to 0 and &lt;CODE&gt;cphwd_medium_path_qid_by_cpu_id&lt;/CODE&gt; parameter from 0 to 1.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Quantum Maestro, Scalable Chassis, and ElasticXL&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Newly added Scalable Platform Member always clones the image from the SMO Member, regardless of the SMO Image Cloning state.&lt;/LI&gt;
&lt;LI&gt;Outputs of CLI commands were unified to use the same terms on an ElasticXL Cluster, a Maestro Security Group, and a Scalable Chassis:
&lt;UL&gt;
&lt;LI&gt;"Site" (instead of "Chassis")&lt;/LI&gt;
&lt;LI&gt;"Member" (instead of "SGM")&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;The feature name changed from "Unique IP Address per Chassis" (UIPC) to "Unique IP Address per Site" (UIPS).&lt;/LI&gt;
&lt;LI&gt;On the Maestro Orchestrator MHO-175 ports, increased the default MTU size from 9216 to 10240 bytes.&lt;/LI&gt;
&lt;LI&gt;Automated creation of the management bond interface (MAGG). All management interfaces assigned to a Security Group are automatically assigned to this MAGG interface.&lt;/LI&gt;
&lt;LI&gt;If an administrator stops a Maestro Orchestrator with the "&lt;CODE&gt;orchd stop&lt;/CODE&gt;" command (or reboots it), and the Orchestrator detects that other Orchestrators on the Maestro Site are not operational, then before stopping (or rebooting) the Orchestrator shows a warning and a prompt to the administrator.&lt;/LI&gt;
&lt;LI&gt;When an administrator changes the administrative state of a port on a Maestro Orchestrator, this change now survives an Orchestrator reboot and the restart of the Orchestrator daemon with the "&lt;CODE&gt;orchd restart&lt;/CODE&gt;" command.&lt;/LI&gt;
&lt;LI&gt;On the Orchestrator, the Gaia Portal &amp;gt; Network Management section &amp;gt; Network Interfaces page now hides interfaces that are used for internal purposes:&lt;BR /&gt;&amp;nbsp; &amp;nbsp;Sync-ext&lt;BR /&gt;&amp;nbsp; &amp;nbsp;Sync-int&lt;BR /&gt;&amp;nbsp; &amp;nbsp;dl&amp;lt;number&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;eth&amp;lt;number&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;eth&amp;lt;number&amp;gt;-CIN&amp;lt;number&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;swid0_eth&lt;/LI&gt;
&lt;LI&gt;On the Maestro Orchestrator, it is no longer supported to convert an existing Security Group from the 'Gateway' mode to the 'VSX' mode (by selecting the corresponding checkbox in the Security Group properties).&lt;/LI&gt;
&lt;LI&gt;The output of the Gaia gClish / Gaia Clish command "&lt;CODE&gt;show interfaces&lt;/CODE&gt;" on Scalable Platforms was aligned with the output of this command on a regular Security Gateway.&lt;/LI&gt;
&lt;LI&gt;These CLI commands were deprecated and replaced (where possible):&lt;BR /&gt;
&lt;DIV class="table-wrapper"&gt;
&lt;TABLE class="footnote" style="table-layout: fixed; border: 1px solid;" border="1" width="100%" cellspacing="2" cellpadding="4"&gt;
&lt;TBODY&gt;
&lt;TR class="SubTitle" style="text-align: center;" bgcolor="#d6dff0"&gt;
&lt;TD&gt;Deprecated Command&lt;/TD&gt;
&lt;TD&gt;Use this Command in the Expert mode&lt;/TD&gt;
&lt;TD&gt;Use this Command in Gaia gClish&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;CODE&gt;asg cluster_site_admin&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;cluster_site_admin -c &amp;lt;Site ID - 1 or 2&amp;gt; {down | up}&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;set cluster site-id &amp;lt;Site ID&amp;gt; admin-state {up | down}&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;set cluster sites-admin-state id &amp;lt;Site ID&amp;gt; {down | up}&lt;/CODE&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;CODE&gt;asg conns&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;insights&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;cluster-cli show connection --help&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;g_connview --help&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;insights&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;show cluster info connection &amp;lt;parameter&amp;gt;&lt;/CODE&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;CODE&gt;asg cores_stat&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;insights&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;cluster-cli show cpu&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;insights&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;show cluster info cpu&lt;/CODE&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;CODE&gt;asg diag&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;asg_diag&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;asg6 diag&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;insights&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;hcp --help&lt;/CODE&gt;&lt;BR /&gt;(run the applicable tests)&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;insights&lt;/CODE&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;CODE&gt;asg if&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;asg_if&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;asg6 if&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;insights&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;hcp --help&lt;/CODE&gt;&lt;BR /&gt;(run the applicable tests)&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;cluster-cli show interfaces&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;insights&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;show cluster info interfaces&lt;/CODE&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;CODE&gt;asg perf&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;insights&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;cluster-cli show --help&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;insights&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;show cluster info &amp;lt;parameter&amp;gt;&lt;/CODE&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;CODE&gt;asg resource&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;asg6 resource&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;insights&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;cluster-cli show --help&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;insights&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;show cluster info &amp;lt;parameter&amp;gt;&lt;/CODE&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;CODE&gt;asg search&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;asg6 search&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;insights&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;cluster-cli show connection --help&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;insights&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;show cluster info connection &amp;lt;parameter&amp;gt;&lt;/CODE&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;CODE&gt;asg_bond&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;hcp --help&lt;/CODE&gt;&lt;BR /&gt;(run the "Bond Health" test)&lt;/TD&gt;
&lt;TD&gt;N / A&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;CODE&gt;asg_chassis_admin&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;cluster_site_admin -c &amp;lt;Site ID - 1 or 2&amp;gt; {down | up}&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;N / A&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;CODE&gt;toggle_same_vmac&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;toggle_same_vmac_os&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;N / A&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;CODE&gt;show smo&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;set smo&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;delete smo&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;show cluster &amp;lt;parameters&amp;gt;&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;set cluster &amp;lt;parameters&amp;gt;&lt;/CODE&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;CODE&gt;show chassis id {1|2} general unique_ip&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;set chassis id {1|2} general unique_ip&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;delete chassis id {1|2} general unique_ip&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;N / A&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;show cluster configuration unique-ip &amp;lt;Site ID&amp;gt; interface &amp;lt;parameters&amp;gt;&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;set cluster configuration unique-ip &amp;lt;Site ID&amp;gt; interface &amp;lt;parameters&amp;gt;&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;delete cluster configuration unique-ip site-id &amp;lt;Site ID&amp;gt; interface &amp;lt;parameters&amp;gt;&lt;/CODE&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;CODE&gt;show chassis high-availability &amp;lt;parameters&amp;gt;&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;set chassis high-availability &amp;lt;parameters&amp;gt;&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;N / A&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;show cluster configuration high-availability &amp;lt;parameters&amp;gt;&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;CODE&gt;set cluster configuration high-availability &amp;lt;parameters&amp;gt;&lt;/CODE&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;CODE&gt;asg_collect_vsx_logs&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;cpinfo -h&lt;/CODE&gt; (see &lt;A href="https://support.checkpoint.com/results/sk/sk92739" target="_blank" rel="noopener"&gt;sk92739&lt;/A&gt;)&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;cpinfo -h&lt;/CODE&gt; (see &lt;A href="https://support.checkpoint.com/results/sk/sk92739" target="_blank" rel="noopener"&gt;sk92739&lt;/A&gt;)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;CODE&gt;drop_monitor&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;N / A&lt;/TD&gt;
&lt;TD&gt;N / A&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;CODE&gt;asg_affinity_enhance&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;N / A&lt;/TD&gt;
&lt;TD&gt;N / A&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Security Gateway&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;In the feature "Hide NAT behind IP Address Range", it is now possible to configure the Security Gateway to select the Hide NAT IP address based on the combination of the source IP address and the source port. See &lt;A href="https://support.checkpoint.com/results/sk/sk105302" target="_blank" rel="noopener"&gt;sk105302&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Improved the output of the &lt;CODE&gt;adlogconfig&lt;/CODE&gt; command. See the &lt;A href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_CLI_ReferenceGuide/Default.htm" target="_blank" rel="noopener"&gt;R82 CLI Reference Guide&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;In the Threat Prevention Engine Settings, the default "Connection Unification" period changed from 600 minutes to 180 minutes (in SmartConsole, click "Manage &amp;amp; Settings" &amp;gt; "Blades" &amp;gt; in the "Threat Prevention" section, click "Advanced Settings" &amp;gt; click the "General" page).&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Mobile Access&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Changed the default value of the "&lt;CODE&gt;max_concurrent_vpn_tunnels&lt;/CODE&gt;" parameter from 200 to 10000 in VSX environments.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;QoS&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;QoS policy now supports different Service objects with the same Destination Port and different Source Ports.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SmartConsole&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Upgraded the SmartConsole .NET Framework from 4.5 to 4.8.&lt;/LI&gt;
&lt;LI&gt;Upgraded the SmartConsole Visual C++ Redistributable from 2012 to 2019.&lt;/LI&gt;
&lt;LI&gt;Hovering over the SmartConsole icon on the Windows OS taskbar now shows the SmartConsole version in the tooltip in this format:&lt;BR /&gt;&amp;lt;IP_Address&amp;gt;-&amp;lt;Version&amp;gt;-SmartConsole&lt;/LI&gt;
&lt;LI&gt;The "HTTPS Inspection" tab was removed from the Legacy SmartDashboard.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;lt;&amp;lt;&amp;lt;CUT&lt;/P&gt;</description>
      <pubDate>Sat, 02 Nov 2024 23:12:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/231548#M44651</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2024-11-02T23:12:21Z</dc:date>
    </item>
    <item>
      <title>Re: R82 Interesting Findings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/231550#M44652</link>
      <description>&lt;P&gt;Monitoring dashboard for &lt;SPAN class="mc-variable Vars_ScalablePlatforms.tp_sps variable"&gt;Scalable Platforms&lt;/SPAN&gt; (&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_elasticxl_cl variable"&gt;ElasticXL Cluster&lt;/SPAN&gt;, &lt;SPAN class="mc-variable Vars_ScalablePlatforms.tp_maestro variable"&gt;Maestro&lt;/SPAN&gt;, &lt;SPAN class="mc-variable Vars_ScalablePlatforms.tp_scalable_chassis variable"&gt;Scalable Chassis&lt;/SPAN&gt;).&lt;/P&gt;
&lt;P&gt;# insights&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="In1_534534.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28310i07C930C606259E96/image-size/large?v=v2&amp;amp;px=999" role="button" title="In1_534534.jpg" alt="In1_534534.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditor_1f2a43850a9cdeHeikoAnkenbrand_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Nov 2024 23:20:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/231550#M44652</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2024-11-02T23:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: R82 Interesting Findings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/231564#M44656</link>
      <description>&lt;P&gt;Thanks for pointing that out, very nice!&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 03 Nov 2024 15:43:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/231564#M44656</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-03T15:43:45Z</dc:date>
    </item>
    <item>
      <title>Re: R82 Interesting Findings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/233832#M45275</link>
      <description>&lt;P&gt;Just realized R82 is actually missing something, the annoying "Security Tip" Infinity services popups that could only be disabled for a month seem to be gone, or at least I haven't run into them yet on R82.&amp;nbsp; Also the "why did you disable this Threat Prevention blade" popups don't seem to be present any more either.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is a good thing, has anyone else encountered any unexpected and/or annoying SmartConsole popups in R82?&amp;nbsp; The disk space warning popup for /opt is still there (which is fine); the only other use of SmartConsole popups I'd feel is appropriate would be issues such as the VPN Information Disclosure vulnerability awhile back.&amp;nbsp; However it looks like another security vendor has had far more serious issues than just warning popups could cover over the last week...&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 14:42:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/233832#M45275</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-11-26T14:42:52Z</dc:date>
    </item>
    <item>
      <title>Re: R82 Interesting Findings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/233835#M45277</link>
      <description>&lt;P&gt;Yea, I totally forgot about it Tim, but I had not seen any of those either in my R82 lab so far.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 14:44:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/233835#M45277</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-26T14:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: R82 Interesting Findings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/237704#M46164</link>
      <description>&lt;P&gt;Looks like R82 (and now R81.20 HFA 96+) supports the detection and auto-configuration of new port numbers associated with application objects via a registry hack, but is not enabled by default:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182790" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;sk182790: Automatic configuration of Application Control Categories on the Security Gateway&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 15:58:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Interesting-Findings/m-p/237704#M46164</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-01-06T15:58:31Z</dc:date>
    </item>
  </channel>
</rss>

