<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Patching a Force 19000 security gateway in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/246672#M48095</link>
    <description>&lt;P&gt;We have many issues with UPPAK and VSX on 19200 (without Maestro). At the moment we are running in KPPAK. TAC cases are open since months. RnD is searching for solutions. I would recomend staying at KPPAK for the moment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 16 Apr 2025 13:35:40 GMT</pubDate>
    <dc:creator>Jan_Kleinhans</dc:creator>
    <dc:date>2025-04-16T13:35:40Z</dc:date>
    <item>
      <title>Patching a Force 19000 security gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/244816#M47645</link>
      <description>&lt;P&gt;The new 19000 Quantum Force are shipped with R81.20 Build 722.&lt;/P&gt;
&lt;P&gt;When trying to patch them to Take 98, the verifier discourages us to do so as it might lead to system instability unless we go first to Take 24.&lt;/P&gt;
&lt;P&gt;R81.20 Take 24 is not compatible with R81.20 build 722.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk180520" target="_blank" rel="noopener"&gt;sk180520&lt;/A&gt;&amp;nbsp;seems to point out that Take 65 is the minimum supported for 19K and 29K series, so that could be the verifier not taking the build and platform into account.&lt;/P&gt;
&lt;P&gt;Our understanding that we should patch to Take 65 then Take 98, but we have an SR open being checked internally to clear up any doubt and proceed the right way. The verifier specially states Take 24, not Take 24 or above.&lt;/P&gt;
&lt;P&gt;For information for anyone facing the same scenario, or who already successfully upgraded these devices and could confirm.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Mar 2025 13:32:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/244816#M47645</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2025-03-26T13:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: Patching a Force 19000 security gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/244939#M47678</link>
      <description>&lt;P&gt;You will need to wait for resolution for your SR.&amp;nbsp; There were a variety of problems with R81.20 Jumbo HFA Take 96/98 and Quantum Force appliances (9000/19000/29000) due to the fact they utilize UPPAK:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk183181" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;sk183181: SecureXL in the User Mode (UPPAK) may have compatibility issues with R81.20 Jumbo Hotfix Take 96 and Take 98&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 02:52:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/244939#M47678</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-03-27T02:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: Patching a Force 19000 security gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/244941#M47679</link>
      <description>&lt;P&gt;We had couple cases recently about VPN issues after jumbo 89 and 92 install and TAC recommended take 99, though not recommended, but appears lots of issues resolved in it. If you try verify jumbo 99, does it complain?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 02:59:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/244941#M47679</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-27T02:59:18Z</dc:date>
    </item>
    <item>
      <title>Re: Patching a Force 19000 security gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/244967#M47687</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will wait for TAC to confirm the approach for stability and performance. These are Maestro appliances and run KPPAK out of the box.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 09:52:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/244967#M47687</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2025-03-27T09:52:58Z</dc:date>
    </item>
    <item>
      <title>Re: Patching a Force 19000 security gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/244970#M47689</link>
      <description>&lt;P&gt;Good idea&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/10384"&gt;@Alex-&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 10:54:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/244970#M47689</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-27T10:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: Patching a Force 19000 security gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/244979#M47694</link>
      <description>&lt;P&gt;Ah Maestro would explain why these gateways are still in KPPAK mode although&amp;nbsp;Maestro appliances are supposed to support UPPAK &amp;amp; Lightspeed cards starting in R81.20 Jumbo HFA 89+ and in R82+.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 12:14:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/244979#M47694</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-03-27T12:14:11Z</dc:date>
    </item>
    <item>
      <title>Re: Patching a Force 19000 security gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/245050#M47707</link>
      <description>&lt;P&gt;The issue referred to by the verifier only occurs if you uninstall the JHF. If you're not planning on uninstalling it, you can ignore the warning. There is more information in the 'Important Notes' part of the JHF documentation.&lt;/P&gt;
&lt;P&gt;Take 99 resolves the main issues with take 98 on Maestro as far as I know so it's probably better to go straight to that one.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Mar 2025 03:32:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/245050#M47707</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2025-03-28T03:32:42Z</dc:date>
    </item>
    <item>
      <title>Re: Patching a Force 19000 security gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/245077#M47717</link>
      <description>&lt;P&gt;We have MAESTRO with R81.20 take 98 and a portfix on the top. (&lt;SPAN&gt;fw1_wrapper_HOTFIX_R81_20_JHF_T98_249_MAIN_GA_FULL.tar)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Mar 2025 12:30:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/245077#M47717</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2025-03-28T12:30:57Z</dc:date>
    </item>
    <item>
      <title>Re: Patching a Force 19000 security gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/246658#M48089</link>
      <description>&lt;P&gt;The SR is still being investigated but that Security Group needs to go online so I went again through eh SK and did the following:&lt;/P&gt;
&lt;P&gt;- Upgrade SG members to Take 65: No warnings, success&lt;/P&gt;
&lt;P&gt;- Upgrade SG members to Take 99: No warnings, success&lt;/P&gt;
&lt;P data-unlink="true"&gt;The SG is now back online, still in KPPAK. &lt;A href="https://support.checkpoint.com/results/sk/sk179432" target="_blank" rel="noopener"&gt;SK179432&lt;/A&gt;&amp;nbsp;&amp;nbsp;explains KPPAK is the default mode with SG19200 in Maestro, so this needs to be changed manually. Since this is VSX on top and a rather complex deployment, I'd believe keeping the default KPPAK would be the safe option now, unless there are compelling arguments to enable UPPAK before this system goes live this week.&lt;/P&gt;
&lt;P data-unlink="true"&gt;UPPAK still has some limitations also, which could be relevant in this deployment.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2025 15:38:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/246658#M48089</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2025-04-16T15:38:31Z</dc:date>
    </item>
    <item>
      <title>Re: Patching a Force 19000 security gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/246672#M48095</link>
      <description>&lt;P&gt;We have many issues with UPPAK and VSX on 19200 (without Maestro). At the moment we are running in KPPAK. TAC cases are open since months. RnD is searching for solutions. I would recomend staying at KPPAK for the moment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2025 13:35:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/246672#M48095</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2025-04-16T13:35:40Z</dc:date>
    </item>
    <item>
      <title>Re: Patching a Force 19000 security gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/246680#M48098</link>
      <description>&lt;P&gt;That was our perspective as well, thanks for sharing your insights.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2025 13:51:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/246680#M48098</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2025-04-16T13:51:28Z</dc:date>
    </item>
    <item>
      <title>Re: Patching a Force 19000 security gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/247699#M48379</link>
      <description>&lt;P&gt;19200 Maestro with R81.20 Build 722:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;--&amp;gt; Patch to Take 65&lt;/P&gt;
&lt;P&gt;--&amp;gt; Patch to Take 99&lt;/P&gt;
&lt;P&gt;Security groups work. I've noticed other attention points which will be shared in dedicated posts.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Apr 2025 17:13:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Patching-a-Force-19000-security-gateway/m-p/247699#M48379</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2025-04-29T17:13:38Z</dc:date>
    </item>
  </channel>
</rss>

