<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R77.30 Take 286: New Jumbo Hotfix GA Release in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6565#M753</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for including that important detail.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Sep 2017 16:09:47 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2017-09-27T16:09:47Z</dc:date>
    <item>
      <title>R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6557#M745</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;A new General Availability Jumbo Hotfix Accumulator take for R77.30 (take_286) is available.&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;It includes important stability and Security software updates:&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;Support for TLS 1.2&lt;SPAN style="color: #1f497d;"&gt; - &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk107166" style="color: purple; text-decoration: underline;"&gt;sk107166&lt;/A&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;support for Smart-1 405 and 410 appliances - &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk117578" style="color: purple; text-decoration: underline;"&gt;sk117578&lt;/A&gt;.&lt;/LI&gt;&lt;LI style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;Support for Online Certificate Status Protocol (OCSP).&lt;/LI&gt;&lt;LI style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;Improved MTA.&lt;/LI&gt;&lt;LI style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;Support for Capsule Workspace App Wrapping -&lt;SPAN style="color: #1f497d;"&gt; &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk111558" style="color: purple; text-decoration: underline;"&gt;sk111558&lt;/A&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;Support for Mobile Access Reverse Proxy -&lt;SPAN style="color: #1f497d;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110348" style="color: purple; text-decoration: underline;"&gt;sk110348&lt;/A&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;&lt;SPAN style="color: #1f497d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;&lt;STRONG&gt;&lt;EM&gt;Take_286&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;is the&amp;nbsp;&lt;EM&gt;latest&lt;/EM&gt;&amp;nbsp;General Availability release that can be directly downloaded from Check Point Cloud using CPUSE and from &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106162" style="color: purple; text-decoration: underline;"&gt;sk106162&lt;/A&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;&lt;/P&gt;&lt;TABLE style="text-indent: 0px; background-color: white;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="background-color: #ebebeb; padding: 3pt;" width="120"&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;&lt;STRONG&gt;Take&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background-color: #ebebeb; padding: 3pt;" width="100"&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;&lt;STRONG&gt;Date&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background-color: #ebebeb; padding: 3pt;" width="420"&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;&lt;STRONG&gt;CPUSE Identifier&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background-color: #ebebeb; padding: 3pt;" width="200"&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;&lt;STRONG&gt;CPUSE offline package&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3pt;"&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;Take_286&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3pt;"&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;13 Sep 2017&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3pt;"&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;Check_Point_R77_30_JUMBO_HF_1_Bundle_T286_FULL.tgz&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3pt;"&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;&amp;nbsp;(TGZ)&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: Effective Sep 25th 2017, the General Availability Take_286 is available for CPUSE online installation in Gaia Portal and Gaia Clish (it replaces Take_216).&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;Notes:&lt;/P&gt;&lt;UL style="margin-bottom: 0in; color: #000000; text-indent: 0px; margin-top: 0in;"&gt;&lt;LI style="margin: 0in 0in 0.0001pt; font-size: 11pt;"&gt;For Threat Emulation customers that do not allow automatic updates from the cloud, and following the integration of TLS1.2 support,&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin: 0in 0in 0.0001pt 1in; font-size: 11pt; color: #000000; text-indent: 0px;"&gt;it is important to update the Threat Emulation Engine according to the next SK:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92509" style="color: purple; text-decoration: underline;"&gt;sk92509 - Offline updates for Threat Emulation images and engine&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Sep 2017 15:32:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6557#M745</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-09-25T15:32:10Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6558#M746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When I installed this Take_286 last Thursday, my SmartCenter CA broke. &lt;SPAN style="overflow-y: auto; max-height: 300px; overflow-x: hidden; width: 455px; word-wrap: break-word;"&gt;Neither &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk33224"&gt;sk33224&lt;/A&gt; nor &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk101833"&gt;sk101833&lt;/A&gt; solved the issue. So I reverted back to the previous Take_226 which solved it but broke my Gaia WebUI that worked previously.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58875_pastedImage_1.png" style="width: 620px; height: 356px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I opened a Service Request last Friday and I'm still waiting for a Remote Session. Support wanted cpinfo -z -o cpinfo.gz, cpinfo -y all, migrate export and screen shot of the issue that I had already attached and then delayed this ever since. Hopefully they'll do a remote session tomorrow to look into it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Sep 2017 17:10:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6558#M746</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2017-09-25T17:10:34Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6559#M747</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have applied Take_282 to one of our customer, based on inputs from TAC last week. It seems to be very stable.&lt;/P&gt;&lt;P&gt;No&amp;nbsp;issue till now.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Sep 2017 17:35:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6559#M747</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2017-09-25T17:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6560#M748</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Danny,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had the same problem installing the first take with TLS 1.2 Support (HFA 266).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After a rollback to my original HFA 225, and verify the symptoms of sk115732 and sk91380, none of them applied for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did some research and to solve first I had to verify the parameter name was SSLMutex on file "/web/templates/httpd-ssl.conf.templ", this because on the new HFA the instruction SSLMutex is replaced by Mutex (this because of apache update):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@hostname:0]# cat /web/templates/httpd-ssl.conf.templ | grep SSLMutex&lt;BR /&gt;SSLMutex&amp;nbsp; file:/usr/local/apache2/logs/ssl_mutex&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then, I tried to start manually the httpd2 process:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@hostname:0]# /opt/CPshrd-R77/web/Apache/2.2.0/bin/httpd2 -k start -f /web/conf/httpd2.conf -D FOREGROUND&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After executing this I got an error of corrupted library (and the path). I replace the library from another gateway with same version and HFA as original (R77.30 HFA 225) and after this the Gaia WebUI was accesible again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Sep 2017 15:25:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6560#M748</guid>
      <dc:creator>KennyManrique</dc:creator>
      <dc:date>2017-09-26T15:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6561#M749</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your response. The Gaia WebUI issue was&amp;nbsp;fixed in JHF Take 286 (see Release Notes). My issue is that it introduced another issue with the SmartCenter CA. I'm still waiting for Check Point R&amp;amp;D to provide a Remote Session in order to fix it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also upgraded another Customer to JHF Take 286 today without any issues. Fingers crossed.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Sep 2017 15:51:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6561#M749</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2017-09-26T15:51:28Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6562#M750</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great to hear that! Please let us know the news about your CA issues. Also had customers with old GA HFA because of this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Sep 2017 15:59:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6562#M750</guid>
      <dc:creator>KennyManrique</dc:creator>
      <dc:date>2017-09-26T15:59:15Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6563#M751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I missed the OCSP part in the updated SK.&lt;/P&gt;&lt;P&gt;Good to hear it is now part of the mainstream JHF.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Sep 2017 12:31:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6563#M751</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2017-09-27T12:31:30Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6564#M752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In &lt;A href="https://community.checkpoint.com/migrated-users/2075"&gt;Dameon Welch Abernathy&lt;/A&gt;'s &lt;A _jive_internal="true" href="https://community.checkpoint.com/thread/5712-r7730-take-286-new-jumbo-hotfix-ga-release"&gt;post&lt;/A&gt; also missing for all ThreatEmulation E-Mail users is the following addition to his Notes:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check your custom postfix modifications after the upgrade.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This JHF GA also includes a known issue with emulation of links in email - &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk118280"&gt;sk118280&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is therefore important to disable “Emulation of links in email” &lt;SPAN style="color: red;"&gt;until&lt;/SPAN&gt; the TE engine 6.9 (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk95235"&gt;currently EA&lt;/A&gt;) is deployed when installing this JHF GA build:&lt;/P&gt;&lt;P style="text-indent: 35.4pt;"&gt;1.vi $FWDIR/conf/mail_security_config&lt;/P&gt;&lt;P style="text-indent: 35.4pt;"&gt;2.add “te_mta_emulate_links_inside_emails=0” under "[mta]" section&lt;/P&gt;&lt;P style="text-indent: 35.4pt;"&gt;3.Save and install policy&lt;/P&gt;&lt;P style="text-indent: 35.4pt;"&gt;4. When TE engine 6.9 is deployed revert the above setting, Save and install policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Sep 2017 15:07:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6564#M752</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2017-09-27T15:07:30Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6565#M753</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for including that important detail.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Sep 2017 16:09:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6565#M753</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-09-27T16:09:47Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6566#M754</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I learned it the hard way today. Had to have the virtual.db recreated and everything.&lt;/P&gt;&lt;P&gt;Btw, I like Badges &lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/wink.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Sep 2017 16:24:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6566#M754</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2017-09-27T16:24:11Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6567#M755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You deserve one &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Sep 2017 16:34:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6567#M755</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-09-27T16:34:53Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6568#M756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I saw this issue on the MTA of one of my customers and as written in the SK there is also a fix available!&lt;/P&gt;&lt;P&gt;So why not head for the custom fix? Why disable emulation of links-inside-mails instead?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 08:03:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6568#M756</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2017-09-28T08:03:53Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6569#M757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Because adding one line to $FWDIR/conf/mail_security_config is so much quicker to solve the issue when the customer is already suffering instead of &lt;A href="http://www.checkpoint.com/services/contact/index.html" target="_blank"&gt;contacting Check Point Support&lt;/A&gt; to wait for getting a custom built and JHF specific Hotfix for this issue that needs to be requested of each single JHF take and customer environment again. Also you have no dependencies regarding custom Hotfixes installed on top of a JHF takes and therefore much more control about what is actually configured and running on your highly critical firewall system.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 08:15:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6569#M757</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2017-09-28T08:15:14Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6570#M758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, so I think your solution is a workaround for customers, who don't want to install the hotfix or have to wait for it to be ported for their environment.&lt;/P&gt;&lt;P&gt;Another workaround would be to disable ".com" extension for profile of MTA to be emulated (That's what we did in this case).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 08:24:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6570#M758</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2017-09-28T08:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6571#M759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Danny - Has your management CA issue been resolved?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 19:34:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6571#M759</guid>
      <dc:creator>D_TK</dc:creator>
      <dc:date>2017-09-28T19:34:09Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6572#M760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not yet. Check Point Support couldn't troubleshoot it on the production system so they are now trying to recreate the issue in their lab which can take a while. I'm currently providing more and more backup / debug files.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also we encountered a new issue with R77.30 JHF (Take 286) today. If you are using the Giraffe_V2 GA Hotfix for Identity Awareness Agents (pdpd daemon issue), you can't upgrade to Take 286 yet as Giraffe_V2 wasn't integrated into it and can't be installed on top of it and Giraffe_V3 is not available yet nor has an ETA. Only other option is to go straight to R80.10.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 21:28:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6572#M760</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2017-09-28T21:28:05Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6573#M761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, i have the same issue.&lt;BR /&gt;the threat emulation policy was completely wiped clean, and had to recreate everything.&lt;BR /&gt;After creation mails got blocked when passing through threat emulation and MTA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when an emulation error occurred, valid mails got blocked !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can concur that "te_mta_emulate_links_inside_emails=0" helped me to disable the option "links inside mails".&lt;BR /&gt;Because the option can't be modified from the point where it used to be -&amp;gt; in the TE policy.&lt;BR /&gt;&lt;BR /&gt;Also, smartlog stopped logging after the upgrade and i had to reboot or even do a sic reset for some gateways...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Sep 2017 07:33:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6573#M761</guid>
      <dc:creator>Tim_Tielens</dc:creator>
      <dc:date>2017-09-29T07:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6574#M762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;we installed JBHF286 to 3 clusters 2 gateways and 3 management appliances about a week ago, so far no issues to report.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Oct 2017 14:03:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6574#M762</guid>
      <dc:creator>Paul_Rutkowski</dc:creator>
      <dc:date>2017-10-06T14:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6575#M763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you seen any improvements with HTTPS inspection post JBHF286?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Oct 2017 16:06:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6575#M763</guid>
      <dc:creator>Corey_Christmas</dc:creator>
      <dc:date>2017-10-06T16:06:25Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 Take 286: New Jumbo Hotfix GA Release</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6576#M764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you working with TAC on the incompatibility with the Identity Collector hotfix?&lt;/P&gt;&lt;P&gt;For those wondering what we're talking about:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108235" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108235"&gt;Identity Collector - Technical Overview&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In general, it's always a good idea to engage with the TAC in a situation where you are using hotfixes that conflict with the current Jumbo Hotfix.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Oct 2017 05:46:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R77-30-Take-286-New-Jumbo-Hotfix-GA-Release/m-p/6576#M764</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-10-11T05:46:49Z</dc:date>
    </item>
  </channel>
</rss>

