<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R82.00.10 Remote Access using Cert seems broken in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275120#M13867</link>
    <description>&lt;P&gt;The build 998002133 is exactly the version I have loaded. This seems to be an issue, where after successful auth. the traffic on the smb device is not linked to the user that has been authenticated.&amp;nbsp;&lt;BR /&gt;When the clients are connected and authenticated, I can see traffic drops originating from the clients office mode ip. When I add a rule src:&amp;lt;dynamic-office-mode-ip&amp;gt; the traffic passes instead of being matched via the remote access rule (user, not group) that worked in previous versions.&lt;/P&gt;&lt;P&gt;Additionally the gw ui does not show the connected user as authenticated.&lt;/P&gt;&lt;P&gt;To me this is bug on the gw-side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 08 Apr 2026 15:42:03 GMT</pubDate>
    <dc:creator>HerbertP</dc:creator>
    <dc:date>2026-04-08T15:42:03Z</dc:date>
    <item>
      <title>R82.00.10 Remote Access using Cert seems broken</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275090#M13861</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;after following the issues with R82.00.10 for a while, I have now tried to upgrade one locally managed appliance 1535 to&amp;nbsp;&lt;/P&gt;&lt;P&gt;R82.00.10.&lt;/P&gt;&lt;P&gt;Now clients using remote acess with certificate based auth can no longer reach internal hosts via vpn.&lt;/P&gt;&lt;P&gt;Windows and IOS Client (cert based auth is the only working way to use vpn on demand and split tunneling&amp;nbsp; on IOS) can connect, the office mode address is assigned and routing seems to be correctly set on the client, but traffic does not reach internal sites.&lt;/P&gt;&lt;P&gt;When the client is connected, the UI VPN/Connected remote users does not show that the users are connected.&lt;/P&gt;&lt;P&gt;Is this an know issue, is there a solution, as this completly breaks functionality.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 12:46:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275090#M13861</guid>
      <dc:creator>HerbertP</dc:creator>
      <dc:date>2026-04-08T12:46:02Z</dc:date>
    </item>
    <item>
      <title>Re: R82.00.10 Remote Access using Cert seems broken</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275110#M13863</link>
      <description>&lt;P&gt;Suggest this will need an SR with TAC if not already?&lt;/P&gt;
&lt;P&gt;Please also confirm the build of R82.00.10 image used and the applicable Endpoint client version/s?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 14:40:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275110#M13863</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2026-04-08T14:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: R82.00.10 Remote Access using Cert seems broken</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275116#M13865</link>
      <description>&lt;P&gt;What build of R82.00.10 did you load?&lt;BR /&gt;There's a known issue with certificate validation in some releases:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk184766" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk184766&lt;/A&gt;&lt;BR /&gt;My understanding is that build 998002133 (currently linked in the &lt;A href="https://support.checkpoint.com/results/sk/sk184357" target="_blank"&gt;R82.00.10 SK&lt;/A&gt;) should contain the CRL fix.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 15:17:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275116#M13865</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-08T15:17:53Z</dc:date>
    </item>
    <item>
      <title>Re: R82.00.10 Remote Access using Cert seems broken</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275120#M13867</link>
      <description>&lt;P&gt;The build 998002133 is exactly the version I have loaded. This seems to be an issue, where after successful auth. the traffic on the smb device is not linked to the user that has been authenticated.&amp;nbsp;&lt;BR /&gt;When the clients are connected and authenticated, I can see traffic drops originating from the clients office mode ip. When I add a rule src:&amp;lt;dynamic-office-mode-ip&amp;gt; the traffic passes instead of being matched via the remote access rule (user, not group) that worked in previous versions.&lt;/P&gt;&lt;P&gt;Additionally the gw ui does not show the connected user as authenticated.&lt;/P&gt;&lt;P&gt;To me this is bug on the gw-side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 15:42:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275120#M13867</guid>
      <dc:creator>HerbertP</dc:creator>
      <dc:date>2026-04-08T15:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: R82.00.10 Remote Access using Cert seems broken</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275123#M13868</link>
      <description>&lt;P&gt;You wouldn't be getting this far if the CRL bug were involved.&lt;BR /&gt;Suggest a TAC case here.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 16:26:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275123#M13868</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-08T16:26:49Z</dc:date>
    </item>
    <item>
      <title>Re: R82.00.10 Remote Access using Cert seems broken</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275411#M13881</link>
      <description>&lt;P&gt;TAC does not seem to be able to help, due to misunderstanding how certificate based authentication works / and is setup in general.&lt;/P&gt;&lt;P&gt;I am beginning to believe, that support for this product again is not at all working/reliable and that setting up business cases with this risky.&lt;/P&gt;&lt;P&gt;When I startet with checkpoint back in 2004, support offered world class support.&lt;/P&gt;&lt;P&gt;--Philip&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 11:11:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275411#M13881</guid>
      <dc:creator>HerbertP</dc:creator>
      <dc:date>2026-04-14T11:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: R82.00.10 Remote Access using Cert seems broken</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275415#M13883</link>
      <description>&lt;P data-end="127" data-start="15"&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/133582"&gt;@HerbertP&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="127" data-start="15"&gt;My name is Ohad, and I’m from the SMB R&amp;amp;D team. Please feel free to reach out to me at &lt;STRONG data-end="126" data-start="102"&gt;&lt;A class="decorated-link cursor-pointer" rel="noopener" data-end="124" data-start="104" target="_blank"&gt;ohadp@checkpoint.com&lt;/A&gt;&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P data-end="167" data-start="129"&gt;I’d be happy to assist with your case.&lt;/P&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="183" data-start="169"&gt;&lt;BR data-end="179" data-start="176" /&gt;Ohad&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 12:15:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275415#M13883</guid>
      <dc:creator>ohadp</dc:creator>
      <dc:date>2026-04-14T12:15:08Z</dc:date>
    </item>
    <item>
      <title>Re: R82.00.10 Remote Access using Cert seems broken</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275439#M13888</link>
      <description>&lt;P&gt;Can you please share the output of:&lt;BR /&gt;ps aux | grep pdp (expert mode)&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 15:29:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275439#M13888</guid>
      <dc:creator>Dafna</dc:creator>
      <dc:date>2026-04-14T15:29:24Z</dc:date>
    </item>
    <item>
      <title>Re: R82.00.10 Remote Access using Cert seems broken</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275441#M13889</link>
      <description>&lt;P&gt;.. does not seem to be running&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@XXXX-XXXX-GW-BN]# ps aux | grep pdp&lt;BR /&gt;root 18843 0.0 0.0 4484 784 pts/0 S+ 17:36 0:00 grep pdp&lt;BR /&gt;[Expert@XXXX-XXXX-GW-BN]#&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 15:39:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R82-00-10-Remote-Access-using-Cert-seems-broken/m-p/275441#M13889</guid>
      <dc:creator>HerbertP</dc:creator>
      <dc:date>2026-04-14T15:39:03Z</dc:date>
    </item>
  </channel>
</rss>

