<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R77.30 Take 292: New Jumbo Hotfix GA Release in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-292-New-Jumbo-Hotfix-GA-Release/m-p/20711#M3812</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, has anyone had a chance to install? Would be interested to hear about how it went, and if there were any issues encountered during upgrading. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 01 Feb 2018 16:01:16 GMT</pubDate>
    <dc:creator>Sean_Tracey</dc:creator>
    <dc:date>2018-02-01T16:01:16Z</dc:date>
    <item>
      <title>R77.30 Take 292: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-292-New-Jumbo-Hotfix-GA-Release/m-p/20710#M3811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV class=""&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;A new General Availability Jumbo Hotfix Accumulator take for R77.30 (Take 292) is available.&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;&lt;STRONG&gt;&lt;EM&gt;Take_292&lt;/EM&gt;&lt;/STRONG&gt; is the&amp;nbsp;&lt;EM&gt;latest&lt;/EM&gt;&amp;nbsp;General Availability release that can be directly downloaded from Check Point Cloud using CPUSE and from &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106162" rel="nofollow" style="color: purple; text-decoration: underline;"&gt;sk106162&lt;/A&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; padding: 0px; margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;TABLE style="text-indent: 0px; background-color: white;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="background-color: #ebebeb; padding: 3pt;" width="120"&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;&lt;STRONG&gt;Take&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background-color: #ebebeb; padding: 3pt;" width="100"&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;&lt;STRONG&gt;Date&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background-color: #ebebeb; padding: 3pt;" width="420"&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;&lt;STRONG&gt;CPUSE Identifier&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background-color: #ebebeb; padding: 3pt;" width="200"&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;&lt;STRONG&gt;CPUSE offline package&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3pt;"&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;Take_292&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3pt;"&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;19 Dec 2017&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3pt;"&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;Check_Point_R77_30_JUMBO_HF_1_Bundle_T292_FULL.tgz&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3pt;"&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;&amp;nbsp;(TGZ)&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;P style="min-height: 8pt; padding: 0px; margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: Effective Dec 19th 2017, the General Availability Take_292 is available for CPUSE online installation in Gaia Portal and Gaia Clish (it replaces Take_286).&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;It includes important stability and security software updates:&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="4" cellspacing="2" style="table-layout: fixed;" width="100%"&gt;&lt;TBODY&gt;&lt;TR bgcolor="#d6dff0" class="" style="text-align: center;"&gt;&lt;TD width="11%"&gt;ID&lt;/TD&gt;&lt;TD width="13%"&gt;Product&lt;/TD&gt;&lt;TD width="76%"&gt;Symptoms&lt;/TD&gt;&lt;/TR&gt;&lt;TR bgcolor="#33ccff" class=""&gt;&lt;TD colspan="3" style="text-align: center;"&gt;&lt;P&gt;Take 292 (19 Dec 2017) - &lt;EM&gt;General Availability Take&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02563960&lt;/TD&gt;&lt;TD&gt;IPS&lt;/TD&gt;&lt;TD&gt;&lt;EM&gt;fwd process&lt;/EM&gt; or &lt;EM&gt;fw_full&lt;/EM&gt; process on Security Gateway consumes memory at high level after installing Take 206 of R77.30 Jumbo Hotfix Accumulator (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk117655" target="_blank"&gt;sk117655&lt;/A&gt;)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02569432&lt;/TD&gt;&lt;TD&gt;Threat Emulation&lt;/TD&gt;&lt;TD&gt;When Threat Emulation was configured to send some of the files to the cloud and some locally, the files were sent only locally and not to the cloud. In this release, the configuration in the GUI will take effect and files will be sent to emulation according to the policy.&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02659361&lt;/TD&gt;&lt;TD&gt;ClusterXL&lt;/TD&gt;&lt;TD&gt;SNMP query returns wrong outputs for haClusterIpTable&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02665619&lt;/TD&gt;&lt;TD&gt;SNX&lt;/TD&gt;&lt;TD&gt;In rare cases, client running Windows 10 Anniversary update experiences disconnections within SNX tunnel.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02656968&lt;/TD&gt;&lt;TD&gt;Security Gateway&lt;/TD&gt;&lt;TD&gt;In rare scenarios, when working with Dynamic Objects, NAT rules are not applied anymore after policy installation or update of software blades signatures. This causes traffic outage for all connections that should undergo NAT.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02536207&lt;/TD&gt;&lt;TD&gt;VSX&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Added:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Ability to query specific Virtual Device directly using the IP address of the Virtual System.&lt;/LI&gt;&lt;LI&gt;Ability to query SNMP daemons in the contexts of Virtual Devices sent to the IP Address of VSX Gateway itself using SNMPv1, SNMPv2 and SNMPv3.&lt;/LI&gt;&lt;LI&gt;New OIDs in the SNMP VSX tree:&amp;nbsp;&lt;UL&gt;&lt;LI&gt;Memory usage for each Virtual System.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;CPU usage for each Virtual System for each core.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02659849&lt;/TD&gt;&lt;TD&gt;VoIP&lt;/TD&gt;&lt;TD&gt;Data connections of H323 protocol were not opened correctly in VSX cluster environments.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02660349&lt;/TD&gt;&lt;TD&gt;DLP, Threat Extraction&lt;/TD&gt;&lt;TD&gt;Security enhancements for Data Loss Prevention and Threat Extraction blades&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02659678&lt;/TD&gt;&lt;TD&gt;Threat Emulation&lt;/TD&gt;&lt;TD&gt;Links inside email with Domain suffix (e.g. www.example.com) were emulated as com files.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02661043&lt;/TD&gt;&lt;TD&gt;SmartLog&lt;/TD&gt;&lt;TD&gt;Improved stability of "&lt;CODE&gt;smartlog_server&lt;/CODE&gt;" process when running queries in SmartLog GUI to several Log Servers.&lt;BR /&gt; Refer to &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112826" target="_blank"&gt;sk112826&lt;/A&gt;.&lt;BR /&gt; Note: This fix is relevant for any Take of R77.30 Jumbo Hotfix Accumulator between Take 198 and Take 286 including.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02655985&lt;/TD&gt;&lt;TD&gt;SmartLog&lt;/TD&gt;&lt;TD&gt;Improved stability of "&lt;CODE&gt;smartlog_server&lt;/CODE&gt;" process when activating the "Auto Refresh" button in SmartLog GUI (upper right corner) for several hours.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02555984&lt;/TD&gt;&lt;TD&gt;Security Gateway, Security Management Server, Multi-Domain Security Management Server&lt;/TD&gt;&lt;TD&gt;Improved memory consumption by FW process and FWD process.&lt;BR /&gt; Refer to &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk117655" target="_blank"&gt;sk117655&lt;/A&gt;.&lt;BR /&gt; Note: This fix is relevant for any Take of R77.30 Jumbo Hotfix Accumulator between Take 206 and Take 286 including.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02590882&lt;/TD&gt;&lt;TD&gt;SmartEvent&lt;/TD&gt;&lt;TD&gt;New events are not created in SmartEvent GUI, and "&lt;CODE&gt;ERROR: duplicate key value violates unique constraint "seam_event_XXX_pkey"&lt;/CODE&gt;" in &lt;EM&gt;$RTDIR/log/cpsemd.elg&lt;/EM&gt; file.&lt;BR /&gt; Refer to &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105185" target="_blank"&gt;sk105185&lt;/A&gt;.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02532160&lt;/TD&gt;&lt;TD&gt;SecureXL&lt;/TD&gt;&lt;TD&gt;For 21000 appliances with SAM card, improved stability of SAM card when running the "&lt;CODE&gt;cpstop -fwflag -driver&lt;/CODE&gt;" command as a part of kernel memory leak detection procedure.&lt;BR /&gt; Refer to &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk35496" target="_blank"&gt;sk35496&lt;/A&gt;.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02401494&lt;/TD&gt;&lt;TD&gt;VoIP&lt;/TD&gt;&lt;TD&gt;Improved check for memory allocation failures under heavy load of VoIP traffic.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02573235&lt;/TD&gt;&lt;TD&gt;VSX&lt;/TD&gt;&lt;TD&gt;Improved support for Connectivity Upgrade (CU) in VSX VSLS.&lt;BR /&gt; Note: This fix is relevant for any Take of R77.30 Jumbo Hotfix Accumulator between Take 198 and Take 286 including.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;&lt;SPAN style="color: #1f497d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&amp;nbsp;Notes:&lt;UL style="margin-bottom: 0in; color: #000000; text-indent: 0px; margin-top: 0in;"&gt;&lt;LI style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;For Threat Emulation customers that do not allow automatic updates from the cloud, and following the integration of TLS1.2 support,&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin: 0in 0in 0.0001pt 1in; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;it is important to update the Threat Emulation Engine according to the next SK:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92509" rel="nofollow" style="color: purple; text-decoration: underline;"&gt;sk92509 - Offline updates for Threat Emulation images and engine&lt;/A&gt;.&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt 1in; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;For all ThreatEmulation E-Mail users:&lt;/LI&gt;&lt;/UL&gt;&lt;P style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Check your custom postfix modifications after the upgrade.&lt;/P&gt;&lt;P style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;This JHF GA also includes a known issue with emulation of links in email - &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk118280" rel="nofollow"&gt;sk118280&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;It is therefore important to disable “Emulation of links in email” until the &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk95235" rel="nofollow"&gt;TE Engine 6.9&lt;/A&gt; is deployed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;when installing this JHF GA build:&lt;/P&gt;&lt;P style="text-indent: 35.4pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;1. vi $FWDIR/conf/mail_security_config&lt;/P&gt;&lt;P style="text-indent: 35.4pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;2. add “te_mta_emulate_links_inside_emails=0” under "[mta]" section&lt;/P&gt;&lt;P style="text-indent: 35.4pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;3. Save and install policy&lt;/P&gt;&lt;P style="text-indent: 35.4pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;4. When TE engine 6.9 is deployed revert the above setting, Save and install policy.&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jan 2018 15:12:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-292-New-Jumbo-Hotfix-GA-Release/m-p/20710#M3811</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2018-01-03T15:12:39Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 292: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-292-New-Jumbo-Hotfix-GA-Release/m-p/20711#M3812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, has anyone had a chance to install? Would be interested to hear about how it went, and if there were any issues encountered during upgrading. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2018 16:01:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-292-New-Jumbo-Hotfix-GA-Release/m-p/20711#M3812</guid>
      <dc:creator>Sean_Tracey</dc:creator>
      <dc:date>2018-02-01T16:01:16Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 292: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-292-New-Jumbo-Hotfix-GA-Release/m-p/20712#M3813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On tuesday I upgraded one customer's Appliance (Standalone) from take 178 to this take.&lt;/P&gt;&lt;P&gt;I did not have issues during upgrand and so far, everithing is working right. Anyway, dont forget to do a snapshot before.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2018 19:43:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-292-New-Jumbo-Hotfix-GA-Release/m-p/20712#M3813</guid>
      <dc:creator>KennyManrique</dc:creator>
      <dc:date>2018-02-01T19:43:58Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 292: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-292-New-Jumbo-Hotfix-GA-Release/m-p/20713#M3814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had one issue with 292, I had a device patch in order to manage 1400 series FW's that had to be removed prior to installing. Found out during the install&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Feb 2018 19:26:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-292-New-Jumbo-Hotfix-GA-Release/m-p/20713#M3814</guid>
      <dc:creator>Billye_Moore</dc:creator>
      <dc:date>2018-02-23T19:26:54Z</dc:date>
    </item>
  </channel>
</rss>

