<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216817#M36099</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;&amp;nbsp;I'm facing the alert saying "Note: Missing software subscription to download this file" when I try to download the relevant TGZ. I've managed to Download the ISO, though, with Take_5. But I'm afraid that I won't be able to download the JHF with the fix for CVE-2024-24919 after that, I might be mistaken tho and looking at the wrong location.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="R77.30_cant_download.jpg" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26148iF1B6863CE253D7F0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="R77.30_cant_download.jpg" alt="R77.30_cant_download.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
    <pubDate>Fri, 07 Jun 2024 11:44:37 GMT</pubDate>
    <dc:creator>not_a_net_admin</dc:creator>
    <dc:date>2024-06-07T11:44:37Z</dc:date>
    <item>
      <title>Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/215926#M35783</link>
      <description>&lt;P&gt;Hello Checkmates!&lt;/P&gt;&lt;P&gt;Disclaimer - I'm not a network guy - not to the least - I'm only a GNU/Linux sysadm helping a friend. He has one quite old Datacenter with 2 CP4200 + Gaia VM running without licenses nor support contract.&lt;/P&gt;&lt;P&gt;After the CVE-2024-24919 he reached out to me to see what I could do to help him. First thing I did was to backup the configuration through SmartConsole, and I thought I was safe and that I could easily restore the situation whatever happens. Foolish.&lt;/P&gt;&lt;P&gt;After applying the GAIA hotfix mentioned in the subject, doing some changes (disabling Remote VPN, Mobile access, etc), verifying no local users were in use, changing the password of the AD service account system user used to sync the database, all was good until I could not apply changes any longer, due to the error:&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Installation failed. Reason: Peer SIC Certificate has been revoked try to reset SIC on the peer and re-establish the trust. &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;( message from member GW-FW01 )&lt;/P&gt;&lt;P class=""&gt;The above message repeats for the stacked twin with the message being identical other than mentioning the stacked GW-FW02.&lt;/P&gt;&lt;P class=""&gt;So I ran cp_config to try to re-establish trust, but it asks for a Key issued at installation time. And we don't have that Key around anymore, it's been too long and too many different network admins later, there's no one with context to help.&lt;/P&gt;&lt;P class=""&gt;So I'm trying to figure out if it's possible to un-brick his setup, to bring back Remote VPN at least after all. Any guides I should follow? Is there anything that could be done to this old pair of CP4200 on R77_20?&lt;/P&gt;&lt;P class=""&gt;Best regards and keep filtering out the bad actors!&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 14:33:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/215926#M35783</guid>
      <dc:creator>not_a_net_admin</dc:creator>
      <dc:date>2024-05-31T14:33:04Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216006#M35829</link>
      <description>&lt;P&gt;You're referring to SmartConsole...Is your management R8x?&lt;BR /&gt;Otherwise, you're doing this in SmartDashboard.&lt;BR /&gt;Please clarify.&lt;/P&gt;
&lt;P&gt;Actually, what you're setting with cpconfig is the initial key used by the management when SIC is (re)established.&lt;BR /&gt;In the relevant gateway objects, you reset SIC and supply the same password.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 00:26:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216006#M35829</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-01T00:26:53Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216015#M35832</link>
      <description>&lt;P&gt;SIC can literally be anything, as long as its at least 4 password character and you dont need to worry, its one time key thats encrypted. Can be 1234, earth, homersimpson, planet, you get the idea. As&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;said, you do this via cpconfig menu on the gw, exit, will do cpstop/cpstart (meaning load initial policy), then you reset it from gateway object in smart console using same oassword you typed on the ssh when doing a reset.&lt;/P&gt;
&lt;P&gt;Test, make sure its established, push policy, verify.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 02:20:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216015#M35832</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-01T02:20:23Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216241#M35917</link>
      <description>&lt;P&gt;Hello PhoneBoy,&amp;nbsp;&lt;/P&gt;&lt;P&gt;After resetting the SIC and re-establishing trust I was able to restore a backup from clish.&amp;nbsp;&lt;/P&gt;&lt;P&gt;And mostly everything is restored, but I'm now unable to open SmartDashboard. I've tried resetting the GUI clients and Admin users with cpconfig, but no luck so far.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm now reading&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Management/Cannot-connect-SmartDashboard-because-of-expired-certificate/td-p/137810" target="_blank"&gt;https://community.checkpoint.com/t5/Management/Cannot-connect-SmartDashboard-because-of-expired-certificate/td-p/137810&lt;/A&gt;&amp;nbsp;to see if I can manage to revoke the old Certificates to be able to login, or I was thinking that I could try to generate a certificate to login to SmartDashboard without user/pass, but I'm yet to find the relevant documentation regarding that.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much for pointing me to the general direction of my first issue!&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 15:32:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216241#M35917</guid>
      <dc:creator>not_a_net_admin</dc:creator>
      <dc:date>2024-06-03T15:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216276#M35929</link>
      <description>&lt;P&gt;The ICA is likely expired and needs to be regenerated with the command fwm sic_reset.&lt;BR /&gt;This will cause an outage with all managed gateways and will require SIC to be re-established.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 18:45:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216276#M35929</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-03T18:45:08Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216307#M35941</link>
      <description>&lt;P&gt;Got myself in a Chicken vs Egg issue, I can't get SmartDashboard to open because it has trust issues with Gaia, and Gaia won't allow me to reset SIC because of some IKE issue:&lt;/P&gt;&lt;P&gt;```&lt;/P&gt;&lt;P&gt;-sh-3.1# fwm sic_reset&lt;BR /&gt;***************** Warning: ****************&lt;BR /&gt;This operation will reset the Secure Internal Communication (SIC).&lt;BR /&gt;The internal Certificate Authority will be destroyed and ALL remote Check Point Components,&lt;BR /&gt;including VPN and Endpoint clients, will not be able to communicate.&lt;/P&gt;&lt;P&gt;In case of Endpoint &amp;amp; VPN clients, this action is not REVERSIBLE which means that clients&lt;BR /&gt;will lose connection with the Server and the only way to re-establish it can be done by&lt;BR /&gt;re-issuing all certificates (for VPN) or by the re-connect tool for Endpoint clients.&lt;/P&gt;&lt;P&gt;Server communication can be re-established if the following operations are implemented:&lt;BR /&gt;1. Re-initialize the Internal Certificate Authority (use cpconfig).&lt;BR /&gt;2. Restart Check Point Services (cpstart, cpridstart).&lt;BR /&gt;3. Reset SIC on each Station that is managed by this Security Management Server.&lt;BR /&gt;4. Re-establish Trust with each Station that is managed by&lt;BR /&gt;this Security Management Server.&lt;BR /&gt;*******************************************&lt;BR /&gt;This operation will stop all Check Point Services (cpstop)&lt;BR /&gt;Are you sure you want to reset? (y/n) [n] ? y&lt;/P&gt;&lt;P&gt;*** Checking IKE Certificates ***&lt;BR /&gt;There are IKE Certificates that were generated by the&lt;BR /&gt;internal Certificate Authority.&lt;BR /&gt;Please remove them (using the SmartDashboard) so that&lt;BR /&gt;the internal Certificate Authority can be destroyed.&lt;/P&gt;&lt;P&gt;SIC Reset operation could not be completed&lt;BR /&gt;-sh-3.1#&lt;/P&gt;&lt;P&gt;```&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I screwed ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 07:48:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216307#M35941</guid>
      <dc:creator>not_a_net_admin</dc:creator>
      <dc:date>2024-06-04T07:48:50Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216311#M35942</link>
      <description>&lt;P&gt;I'm not sure it's relevant but to add a bit more context:&amp;nbsp;&lt;/P&gt;&lt;P&gt;```&lt;/P&gt;&lt;P&gt;-sh-3.1# cpca_client lscert -stat Valid -kind SIC&lt;BR /&gt;Operation succeeded. rc=0.&lt;BR /&gt;3 certs found.&lt;/P&gt;&lt;P&gt;Subject = CN=NET04-FW01,O=NET04-FW-GFW01..mi6waq&lt;BR /&gt;Status = Valid Kind = SIC Serial = 12291 DP = 0&lt;BR /&gt;Not_Before: Sun Jun 2 09:50:29 2024 Not_After: Sat Jun 2 09:50:29 2029&lt;/P&gt;&lt;P&gt;Subject = CN=NET04-FW-GFW01.corporate.net,O=NET04-FW-GFW01..mi6waq&lt;BR /&gt;Status = Expired Kind = SIC Serial = 84860 DP = 0&lt;BR /&gt;Not_Before: Sun Jul 26 19:24:01 2015 Not_After: Sat Jul 25 19:24:01 2020&lt;/P&gt;&lt;P&gt;Subject = CN=NET04-FW-GFW01,O=NET04-FW-GFW01..mi6waq&lt;BR /&gt;Status = Expired Kind = SIC Serial = 86175 DP = 0&lt;BR /&gt;Not_Before: Sun Jul 26 11:03:59 2015 Not_After: Sat Jul 25 11:03:59 2020&lt;BR /&gt;-sh-3.1#&lt;/P&gt;&lt;P&gt;```&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 08:09:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216311#M35942</guid>
      <dc:creator>not_a_net_admin</dc:creator>
      <dc:date>2024-06-04T08:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216416#M35980</link>
      <description>&lt;P&gt;Once you sort out the certificate issues, you can create an administrator user via cpconfig on the management station.&lt;BR /&gt;Meanwhile, back to the SIC issue.&lt;/P&gt;
&lt;P&gt;Normally you'd need to go into SmartDashboard to remove the IKE certificates first:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk14532" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk14532&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;Since you can't do that, you might be able to do it by removing the certificate line from the relevant objects in $FWDIR/conf/objects_5.0.C (it's a flat text file).&lt;BR /&gt;Then you can perform the SIC reset.&lt;/P&gt;
&lt;P&gt;There's another matter to be concerned with:&amp;nbsp;CVE-2024-24919.&lt;BR /&gt;While R77.x versions aren't mentioned, as they are largely out of support, the CVE exists there as well.&lt;BR /&gt;More information:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk182336&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Since this CVE is specifically related to Remote Access and that is your planned use case, the only valid mitigation is upgrading to a supported release, or at least a release with a patch.&lt;BR /&gt;All the various R80.x/R81.x releases have patches as of this writing (assuming you're on the latest JHF) as well as R77.20.xx for Quantum Spark (SMB) appliances.&lt;BR /&gt;The last release supported on the 4200 appliance (which is End of Life) is R80.40.&lt;BR /&gt;The necessary software to perform the upgrade(s) likely requires a support agreement to access.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 15:59:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216416#M35980</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-04T15:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216516#M36006</link>
      <description>&lt;P&gt;I'm afraid I can't touch IKE keys as I still have 2 site-to-sites being migrated out of the CP4200. I took the preventative measures to check about local users (had none with Remote VPN access) and Active Directory sync accounts.&lt;/P&gt;&lt;P&gt;The thing is now that after the password of this AD sync account was updated and the restore of the backup they're now both out of sync and I can't seem to find the old password to restore Auth for Remote VPN. As of now no-one that were able to connect remotely prior to the disclosure is able to authenticate due to this password change.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which is not a bad thing per-se, we were trying to decomission this piece of hardware since August 2023 but several factors and clients priorities didn't allow us to that earlier, we have other VPN solution in place but not everyone is happy with the change so I was thinking about re-establishing Remote Access until the final shutdown.&amp;nbsp;&lt;/P&gt;&lt;P&gt;New question: is it possible to edit the password of the ldap sync account using dbedit?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can print the object by running:&lt;/P&gt;&lt;P&gt;dbedit&amp;gt; print servers mydomain.local__AD&lt;/P&gt;&lt;P&gt;But if I try to modify the login_password for the configured user with:&lt;/P&gt;&lt;P&gt;dbedit&amp;gt;&amp;nbsp;modify servers mydomain.local__AD ldap_servers.login_password My$ecureP4$$w0rd&lt;/P&gt;&lt;P&gt;It returns:&lt;/P&gt;&lt;P&gt;failed to get field ldap_servers.login_password&lt;/P&gt;&lt;P&gt;and also if I don't try to unnest ldap_servers.login_password, trying to update only login_password returns the equivalent error:&lt;/P&gt;&lt;P&gt;failed to get field login_password&lt;/P&gt;&lt;P&gt;I feel it should be possible to update that object, but I'm missing how to get the parameters correctly.&lt;/P&gt;&lt;P&gt;In any case, these stacked boxes will be decommissioned soon, so I'm now mostly trying things out without too much pressure.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 13:05:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216516#M36006</guid>
      <dc:creator>not_a_net_admin</dc:creator>
      <dc:date>2024-06-05T13:05:32Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216531#M36009</link>
      <description>&lt;P&gt;Unless you can confirm that Mobile Access Blade is disabled and the gateway is not in the RemoteAccess encryption domain (ie Remote Access VPN is completely disabled), the gateway is vulnerable to the CVE regardless of whether you use weak passwords or not.&lt;/P&gt;
&lt;P&gt;While it may be possible to change the password with dbedit, it is not documented how to do so.&amp;nbsp;&lt;BR /&gt;Short of regenerating the ICA or backdating the systems as well as the clients used to access SmartDashboard (those certs a a hint at the date range you need to look at), I don’t see how you’re going to get into SmartDashboard as that is the only place you’re going to be able to make the necessary changes.&lt;BR /&gt;Even if you do all this, your gateway will still be vulnerable to the CVE unless you disable Remote Access VPN as per the SK.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 13:47:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216531#M36009</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-05T13:47:59Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216538#M36014</link>
      <description>&lt;P&gt;After I restored the backup Mobile Access came back but then I can't start SmartDashboard to be able to disable it.&lt;/P&gt;&lt;P&gt;Is there a way to do this without impacting site-to-site tunnels via command line interface ?&lt;/P&gt;&lt;P&gt;When I try to run `fwm load Standard MYNET-FW` it still complains about the mismatching SIC and won't install the policy. And I couldn't run `fwm sic_reset` as I don't want to disrupt traffic from site-to-site tunnels.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Perhaps I should. I'll see with the people upstairs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 14:04:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216538#M36014</guid>
      <dc:creator>not_a_net_admin</dc:creator>
      <dc:date>2024-06-05T14:04:10Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216561#M36024</link>
      <description>&lt;P&gt;I did run cvpnstop and confirm that no cvpnproc is running in neither of the blades of the stack. Now, am I correct to judge that removing the IKE from the objects_5_0.C would disrupt site-to-site connections ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 15:01:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216561#M36024</guid>
      <dc:creator>not_a_net_admin</dc:creator>
      <dc:date>2024-06-05T15:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216590#M36037</link>
      <description>&lt;P&gt;You may (almost certainly) need to revoke and recreate the cp_mgmt certificate. &amp;nbsp;Fear not, this isn't the same as SIC reset. &amp;nbsp;It's just the management certificate.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk137332" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk137332&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Do that and you will be able to open SmartDashboard. &amp;nbsp;Yes the article now discusses SmartConsole, but it's the same. &amp;nbsp;I've done this many many times.&lt;/P&gt;
&lt;P&gt;After you get into SmartDashboard, you can do whatever else you need.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 19:00:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216590#M36037</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2024-06-05T19:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216593#M36039</link>
      <description>&lt;P&gt;Yep, any futzing with the certificates in objects_5_0.C will break VPNs, but only if you install policy. &amp;nbsp;Simply editing the file does nothing; this has to be compiled into a policy package and delivered to the gateways. &amp;nbsp;Until then, all management-side things are done there and have no bearing on gateway functionality.&lt;/P&gt;
&lt;P&gt;After you get into SmartDashboard, you can renew gateway certificates (if required) and apply them without disruption.&lt;/P&gt;
&lt;P&gt;If you need to renew your ICA, Check Point's article on that is here, with various scenarios. &amp;nbsp;Choose your own adventure:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk158096" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk158096&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;There is a procedure to do a full SIC reset on the gateways WITHOUT having to restart services and break traffic flow. &amp;nbsp;I've done this numerous times as well: &amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk86521" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk86521&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you do this procedure, you REALLY should still schedule a time as early as you can to do the reboot/restart. &amp;nbsp;However, this will get you going.&lt;/P&gt;
&lt;P&gt;As for dbedit, please don't try to rely on that for management configuration changes. &amp;nbsp;As PhoneBoy said, that's a highly undocumented mechanism with an incredibly unstable command interface. &amp;nbsp;I've tried it myself over the years and was greeted with inconsistencies. &amp;nbsp;It's meant only for R&amp;amp;D access.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 19:21:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216593#M36039</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2024-06-05T19:21:56Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216617#M36046</link>
      <description>&lt;P&gt;I don't believe cvpnstop is enough to mitigate the vulnernability.&lt;BR /&gt;sk158096 seems to be your best option here, as suggested by&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/694"&gt;@Duane_Toler&lt;/a&gt;.&lt;/P&gt;
&lt;P&gt;Even if your plan is to decommission this box, I strongly recommend upgrading to a release that has a patch for CVE-2024-24919 before doing so.&lt;BR /&gt;We now have patches in &lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_self"&gt;sk182336&lt;/A&gt; for releases dating back to R77.30.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2024 00:54:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216617#M36046</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-06T00:54:38Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216667#M36061</link>
      <description>&lt;P&gt;Hello Phoneboy, thank you for your message.&lt;/P&gt;&lt;P&gt;Although I understand the issue, I'm afraid we can't upgrade this appliance unless we hire a support plan, in any ISO download page we're facing an alert stating we're "Missing software subscription to download this file".&amp;nbsp;&lt;/P&gt;&lt;P&gt;So unless there's a hassle-free way to download the correct ISO for R77.30 version to upgrade and install the Jumbo Hotfix for CVE-2024-24919 we will resort to mitigate the issue by not allowing local users nor AD users to authenticate against the disabled Remote VPN blade.&lt;/P&gt;&lt;P&gt;I'm not sure if we can upgrade this set of CP4200 with R77.30 or if Checkpoint would make EOL software/hardware Generally available for people to at least upgrade to their latest compatible software without forcing a subscription onto teams that are struggling to decommission hardware due to commercial constraints.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope I'm being clear. I'll keep on looking for a download link which isn't blocked by a paywall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards!&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2024 07:55:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216667#M36061</guid>
      <dc:creator>not_a_net_admin</dc:creator>
      <dc:date>2024-06-06T07:55:42Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216668#M36062</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/112463"&gt;@not_a_net_admin&lt;/a&gt;&amp;nbsp;I understand the concern. Upon checking, R77.30 should be available for download without a subscription. CVE hotfix for R77.30 still asks for a subscription, but I raised an issue internally, and I am pretty confident, this limitation will also be lifted.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;UPDATE: resolved see the next comment&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2024 09:26:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216668#M36062</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-06-06T09:26:51Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216677#M36066</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/112463"&gt;@not_a_net_admin&lt;/a&gt;&amp;nbsp;Both installation/upgrade software and the CVE Hotfix for R77.30 are now available to all registered UserCenter users, even without a support subscription.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2024 09:26:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216677#M36066</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-06-06T09:26:24Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216743#M36079</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;&amp;nbsp;thank you for your answer! But when I go to&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/download/41359" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/download/41359&lt;/A&gt;&amp;nbsp; - Even though I'm registered and logged in I'm still facing the Note:&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;"Missing software subscription to download this file."&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Am I missing something? Is there a different download page/link that I'm unaware of ?&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Best regards!&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 06 Jun 2024 14:45:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216743#M36079</guid>
      <dc:creator>not_a_net_admin</dc:creator>
      <dc:date>2024-06-06T14:45:38Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint 4200 HA (stacked) vR77.20 is bricked with SIC issues after Gaia HOTFIX_R77_20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216744#M36080</link>
      <description>&lt;P&gt;This should not be necessary to do an in-place upgrade of the existing management.&lt;BR /&gt;That said, it would probably be useful to make this available without a support subscription.&lt;BR /&gt;Will check and revert back.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2024 14:49:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-4200-HA-stacked-vR77-20-is-bricked-with-SIC-issues/m-p/216744#M36080</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-06T14:49:29Z</dc:date>
    </item>
  </channel>
</rss>

