<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ICAP Server on VM appliance in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICAP-Server-on-VM-appliance/m-p/252889#M49531</link>
    <description>&lt;P&gt;In terms of background could you please confirm:&lt;/P&gt;
&lt;P&gt;*Jumbo take ?&lt;/P&gt;
&lt;P&gt;*License ?&lt;/P&gt;
&lt;P&gt;*Blade update status &amp;amp; connectivity to check point cloud services?&lt;/P&gt;
&lt;P&gt;* Deep scanning enabled for AV?&lt;/P&gt;</description>
    <pubDate>Wed, 09 Jul 2025 23:59:26 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2025-07-09T23:59:26Z</dc:date>
    <item>
      <title>ICAP Server on VM appliance</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICAP-Server-on-VM-appliance/m-p/252842#M49514</link>
      <description>&lt;P&gt;Hi guys,&lt;BR /&gt;&lt;BR /&gt;I'm currently working on a POC to replace an ICAP server by a checkpoint.&lt;BR /&gt;&lt;BR /&gt;To do this POC, we deploy a GAIA R81.20 as standalone appliance, then enable ICAP server and AV blade, and play with c-icap to validate if it working as expected or not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;as far I can see, it's not the case.&lt;BR /&gt;Whatever the test we do, I got: "No modification needed (Allow 204 response"&lt;/P&gt;
&lt;P&gt;Even if I put an eicar file as tests.&lt;/P&gt;
&lt;P&gt;(see my screenshot)&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I try from a demo point environement, but get the same behavior.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;If we enable debug, we can see that verdict by blade is always "unknown" (see other screenshot)&lt;BR /&gt;&lt;BR /&gt;Could you please help me to understand the issue ?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;BR /&gt;Arthur&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jul 2025 13:25:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICAP-Server-on-VM-appliance/m-p/252842#M49514</guid>
      <dc:creator>Arthur_DENIS1</dc:creator>
      <dc:date>2025-07-09T13:25:58Z</dc:date>
    </item>
    <item>
      <title>Re: ICAP Server on VM appliance</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICAP-Server-on-VM-appliance/m-p/252889#M49531</link>
      <description>&lt;P&gt;In terms of background could you please confirm:&lt;/P&gt;
&lt;P&gt;*Jumbo take ?&lt;/P&gt;
&lt;P&gt;*License ?&lt;/P&gt;
&lt;P&gt;*Blade update status &amp;amp; connectivity to check point cloud services?&lt;/P&gt;
&lt;P&gt;* Deep scanning enabled for AV?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jul 2025 23:59:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICAP-Server-on-VM-appliance/m-p/252889#M49531</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-07-09T23:59:26Z</dc:date>
    </item>
    <item>
      <title>Re: ICAP Server on VM appliance</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICAP-Server-on-VM-appliance/m-p/253012#M49580</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Sorry for delay&lt;BR /&gt;&lt;BR /&gt;On customer environment we try with R81.20 JHF105.&lt;BR /&gt;We are using full trial license.&lt;BR /&gt;Blade are up to date with connectivity to cloud services via a proxy&lt;BR /&gt;&lt;BR /&gt;On demo point, i have R81.20 JHF84&lt;BR /&gt;Extended trial license in place, connectivity to checkpoint cloud services and update ok.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Deep scanning was disabled - I will check with deep scanning and keep you informed&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2025 09:17:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICAP-Server-on-VM-appliance/m-p/253012#M49580</guid>
      <dc:creator>Arthur_DENIS1</dc:creator>
      <dc:date>2025-07-11T09:17:04Z</dc:date>
    </item>
    <item>
      <title>Re: ICAP Server on VM appliance</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICAP-Server-on-VM-appliance/m-p/253031#M49584</link>
      <description>&lt;P&gt;The TP admin guide says AV isn't supported for ICAP otherwise so hopefully this was the answer, keep us posted on your progress&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2025 23:54:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICAP-Server-on-VM-appliance/m-p/253031#M49584</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-07-11T23:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: ICAP Server on VM appliance</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICAP-Server-on-VM-appliance/m-p/253157#M49611</link>
      <description>&lt;P&gt;Seems indeed working as expected now, thanks for pointing me to this solution&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2025 08:49:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICAP-Server-on-VM-appliance/m-p/253157#M49611</guid>
      <dc:creator>Arthur_DENIS1</dc:creator>
      <dc:date>2025-07-15T08:49:59Z</dc:date>
    </item>
  </channel>
</rss>

