<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SMB 1530 prohibits connections to devices after power down in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/162113#M7763</link>
    <description>&lt;P&gt;Is there a different situation if the other SMB is the active node ? HW failure on both SMBs are not impossible, but i would not assume that first. In your situation, any possible solution is better than the current situation that the GW is down for a longer time until policy install after every power outage. I would rather test a new 1530 cluster in Lab, exchange the surely working SMB pair for the cluster with the issue and put that in Lab for tests / replacement.&lt;/P&gt;</description>
    <pubDate>Tue, 15 Nov 2022 10:04:15 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2022-11-15T10:04:15Z</dc:date>
    <item>
      <title>SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/161934#M7735</link>
      <description>&lt;P&gt;Good afternoon, everyone.&lt;BR /&gt;There are 2 SMB1530 in the cluster with strange behavior.&lt;BR /&gt;After the power is turned off and the subsequent power-on occurs:&lt;BR /&gt;1. Devices are being loaded;&lt;BR /&gt;2. The management console sees them;&lt;BR /&gt;3. There is no connection with the equipment connected to this cluster;&lt;BR /&gt;4. The policy is being installed from the management console - network connectivity appears.&lt;/P&gt;&lt;P&gt;It looks like the default policy is being installed.&lt;BR /&gt;Unfortunately, the devices are found on a remote site and I do not yet understand what is better to do for diagnostics, the only idea is to reinstall the image.&lt;/P&gt;</description>
      <pubDate>Sun, 13 Nov 2022 11:53:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/161934#M7735</guid>
      <dc:creator>MiniNinja</dc:creator>
      <dc:date>2022-11-13T11:53:41Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/161947#M7736</link>
      <description>&lt;P&gt;Which version are the devices running / installed with?&lt;/P&gt;</description>
      <pubDate>Sun, 13 Nov 2022 13:41:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/161947#M7736</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-11-13T13:41:27Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/161962#M7737</link>
      <description>&lt;P&gt;This happens constantly or started recently? Any changes made?&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 00:20:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/161962#M7737</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-11-14T00:20:03Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/162052#M7755</link>
      <description>&lt;P&gt;Current image name: R80_992002467_20_35&lt;BR /&gt;Current image version: 467&lt;/P&gt;&lt;P&gt;Default image name: R80_992000884_20_01&lt;BR /&gt;Default image version: 884&lt;/P&gt;&lt;P&gt;kernel: R80.20.35 - Build 344&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 16:47:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/162052#M7755</guid>
      <dc:creator>MiniNinja</dc:creator>
      <dc:date>2022-11-14T16:47:44Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/162053#M7756</link>
      <description>&lt;P&gt;After each power outage.&lt;/P&gt;&lt;P&gt;The first time was 03.11.2022.&lt;/P&gt;&lt;P&gt;No changes.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 16:36:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/162053#M7756</guid>
      <dc:creator>MiniNinja</dc:creator>
      <dc:date>2022-11-14T16:36:50Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/162103#M7760</link>
      <description>&lt;P&gt;What about upgrading firmware to a more recent version (.40, .50) ? I would suggest to test it without cluster configured to exclude clustering as cause of the issue. Like a SMB that after reboot always entered FTW this looks like a possible RMA.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2022 09:42:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/162103#M7760</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-11-15T09:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/162109#M7762</link>
      <description>&lt;P&gt;I would like to understand that the update will definitely help, since it is difficult to justify to the management, especially since the devices are installed far away and in case of problems you will have to go to the place.&lt;BR /&gt;I agree the cluster can influence, but I have not found any similar situations, mentions and the object where the devices are installed requires HA.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2022 09:52:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/162109#M7762</guid>
      <dc:creator>MiniNinja</dc:creator>
      <dc:date>2022-11-15T09:52:21Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/162113#M7763</link>
      <description>&lt;P&gt;Is there a different situation if the other SMB is the active node ? HW failure on both SMBs are not impossible, but i would not assume that first. In your situation, any possible solution is better than the current situation that the GW is down for a longer time until policy install after every power outage. I would rather test a new 1530 cluster in Lab, exchange the surely working SMB pair for the cluster with the issue and put that in Lab for tests / replacement.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2022 10:04:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/162113#M7763</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-11-15T10:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/162132#M7764</link>
      <description>&lt;P&gt;I can tell you that even if you opened TAC case for this, most likely, they will give you 3 options (ok, maybe 4, depending on outcome of first 3):&lt;/P&gt;
&lt;P&gt;1) upgrade firmware&lt;/P&gt;
&lt;P&gt;2) reboot&lt;/P&gt;
&lt;P&gt;3) reinstall&lt;/P&gt;
&lt;P&gt;4) RMA if none of those work&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2022 13:18:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/162132#M7764</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-11-15T13:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/162133#M7765</link>
      <description>&lt;P&gt;- Upgrade firmware only makes sense if the issue is known and fixed in the version, so it does not apply !&lt;/P&gt;
&lt;P&gt;- Reboot is part of the issue here, so it does not apply !&lt;/P&gt;
&lt;P&gt;- Reinstall does not make much sense here; firmware install from USB medium does check the flash for bad sectors and sometimes can resolve issue&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2022 13:33:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/162133#M7765</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-11-15T13:33:39Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/162135#M7766</link>
      <description>&lt;P&gt;Agree with you 100%, I was more referring generally what steps would have been suggested : - )&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2022 13:52:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/162135#M7766</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-11-15T13:52:39Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/163806#M7879</link>
      <description>&lt;P&gt;TAC insists on updating even without any diagnostic steps or explanations.&lt;BR /&gt;Moreover, there is no guarantee that the problem will be solved after the update.&lt;/P&gt;&lt;P&gt;If you turn off both devices and first turn on only 1 then the other, then everything is fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2022 05:20:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/163806#M7879</guid>
      <dc:creator>MiniNinja</dc:creator>
      <dc:date>2022-12-01T05:20:23Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/163815#M7880</link>
      <description>&lt;P&gt;Do the Firewalls boot more quickly than the adjacent switches and by how much?&lt;/P&gt;
&lt;P&gt;If this describes your symptoms you should atleast try the current build of R80.20.35 (&lt;SPAN&gt;992002613&lt;/SPAN&gt;) if not R80.20.40 or higher&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2022 07:52:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/163815#M7880</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-12-01T07:52:36Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/163835#M7882</link>
      <description>&lt;P&gt;The test was carried out without disconnecting the switch to which the cluster is connected, i.e. only devices in the cluster - 2 gateways were shut down.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2022 11:14:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/163835#M7882</guid>
      <dc:creator>MiniNinja</dc:creator>
      <dc:date>2022-12-01T11:14:44Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/164203#M7892</link>
      <description>&lt;P&gt;one more think from&amp;nbsp;show logs kernel:&lt;/P&gt;&lt;P&gt;mvpp2 f2000000.ethernet WAN: bad rx status 16018510 (crc error), size=1340&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;judging by the messages, there is a policy, but a VPN is not installed:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2022 Dec 5 11:55:34 Dec authpriv.notice 05: 11:55:33+03:00 172.25.31.3 Action="drop" inzone="Internal" outzone="External" service_id="domain-udp" src="172.25.31.201" dst="8.8.8.8" proto="17" UP_match_table="TABLE_START" ROW_START="0" match_id="58" layer_uuid="b3e4b8dd-d54c-4659-b7ca-5039524c22ae" layer_name="KAS_AZS_Rules Network" rule_uid="f29c3f25-16cf-46c8-a209-93f3951a3a15" rule_name="Cleanup rule" ROW_END="0" UP_match_table="TABLE_END" UP_action_table="TABLE_START" ROW_START="0" action="0" ROW_END="0" UP_action_table="TABLE_END" ProductName="VPN-1 &amp;amp; FireWall-1" svc="53" sport_svc="15884" ProductFamily="" 2022 Dec 5 11:55:34 Dec authpriv.notice 05: 11:55:34+03:00 172.25.31.3 Action="encrypt" inzone="Internal" outzone="External" service_id="domain-udp" src="172.25.31.26" dst="192.168.234.196" proto="17" scheme:="IKE" methods:="ESP: AES-256 + SHA256 + PFS (group 14)" peer gateway="192.168.234.180" encryption failure:="" partner="" community="KAS-AZS-VPN" fw_subproduct="VPN-1" vpn_feature_name="VPN" UP_match_table="TABLE_START" ROW_START="0" match_id="12" layer_uuid="b3e4b8dd-d54c-4659-b7ca-5039524c22ae" layer_name="KAS_AZS_Rules Network" rule_uid="f7e66fdb-2821-4ca3-83cd-0234f6935740" rule_name="RULE_AZS_to_DC" ROW_END="0" UP_match_table="TABLE_END" ProductName="VPN-1 &amp;amp; FireWall-1" svc="53" sport_svc="57711" ProductFamily="" 2022 Dec 5 11:55:36 Dec authpriv.notice 05: 11:55:34+03:00 172.25.31.3 Action="encrypt" inzone="Internal" outzone="External" service_id="domain-udp" src="172.25.31.26" dst="192.168.234.196" proto="17" scheme:="IKE" methods:="ESP: AES-256 + SHA256 + PFS (group 14)" peer gateway="192.168.234.180" encryption failure:="" partner="" community="KAS-AZS-VPN" fw_subproduct="VPN-1" vpn_feature_name="VPN" UP_match_table="TABLE_START" ROW_START="0" match_id="12" layer_uuid="b3e4b8dd-d54c-4659-b7ca-5039524c22ae" layer_name="KAS_AZS_Rules Network" rule_uid="f7e66fdb-2821-4ca3-83cd-0234f6935740" rule_name="RULE_AZS_to_DC" ROW_END="0" UP_match_table="TABLE_END" ProductName="VPN-1 &amp;amp; FireWall-1" svc="53" sport_svc="64141" ProductFamily="" 2022 Dec 5 11:55:36 Dec authpriv.notice 05: 11:55:34+03:00 172.25.31.3 Action="drop" inzone="Internal" outzone="External" service_id="domain-udp" src="172.25.31.120" dst="192.168.234.197" proto="17" UP_match_table="TABLE_START" ROW_START="0" match_id="58" layer_uuid="b3e4b8dd-d54c-4659-b7ca-5039524c22ae" layer_name="KAS_AZS_Rules Network" rule_uid="f29c3f25-16cf-46c8-a209-93f3951a3a15" rule_name="Cleanup rule" ROW_END="0" UP_match_table="TABLE_END" UP_action_table="TABLE_START" ROW_START="0" action="0" ROW_END="0" UP_action_table="TABLE_END" ProductName="VPN-1 &amp;amp; FireWall-1" svc="53" sport_svc="44088" ProductFamily="" 2022 Dec 5 11:55:38 Dec authpriv.notice 05: 11:55:36+03:00 172.25.31.3 Action="drop" inzone="Internal" outzone="External" service_id="domain-udp" src="172.25.31.4" dst="10.135.130.13" proto="17" UP_match_table="TABLE_START" ROW_START="0" match_id="58" layer_uuid="b3e4b8dd-d54c-4659-b7ca-5039524c22ae" layer_name="KAS_AZS_Rules Network" rule_uid="f29c3f25-16cf-46c8-a209-93f3951a3a15" rule_name="Cleanup rule" ROW_END="0" UP_match_table="TABLE_END" UP_action_table="TABLE_START" ROW_START="0" action="0" ROW_END="0" UP_action_table="TABLE_END" ProductName="VPN-1 &amp;amp; FireWall-1" svc="53" sport_svc="50655" ProductFamily="" 2022 Dec 5 11:55:38 Dec authpriv.notice 05: 11:55:36+03:00 172.25.31.3 Action="encrypt" inzone="Internal" outzone="External" service_id="domain-udp" src="172.25.31.26" dst="192.168.234.196" proto="17" scheme:="IKE" methods:="ESP: AES-256 + SHA256 + PFS (group 14)" peer gateway="192.168.234.180" encryption failure:="" partner="" community="KAS-AZS-VPN" fw_subproduct="VPN-1" vpn_feature_name="VPN" UP_match_table="TABLE_START" ROW_START="0" match_id="12" layer_uuid="b3e4b8dd-d54c-4659-b7ca-5039524c22ae" layer_name="KAS_AZS_Rules Network" rule_uid="f7e66fdb-2821-4ca3-83cd-0234f6935740" rule_name="RULE_AZS_to_DC" ROW_END="0" UP_match_table="TABLE_END" ProductName="VPN-1 &amp;amp; FireWall-1" svc="53" sport_svc="59734" ProductFamily="" 2022 Dec 5 11:55:38 Dec authpriv.notice 05: 11:55:37+03:00 172.25.31.3 Action="accept" inzone="Local" outzone="External" service_id="FW1_log" src="172.25.252.231" dst="192.168.234.134" proto="6" UP_match_table="TABLE_START" ROW_START="0" match_id="0" layer_uuid="b3e4b8dd-d54c-4659-b7ca-5039524c22ae" layer_name="KAS_AZS_Rules Network" rule_uid="0E3B6801-8AB0-4b1e-A3&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but after installing the policy from SmartConsole, the VPN connects and everything is fine.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2022 16:00:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/164203#M7892</guid>
      <dc:creator>MiniNinja</dc:creator>
      <dc:date>2022-12-05T16:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/164233#M7894</link>
      <description>&lt;P&gt;What should happen when a gateway boots is the following:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Gateway fetches policy from management&lt;/LI&gt;
&lt;LI&gt;If gateway cannot fetch policy from management, gateway will use the last policy installed to it.&lt;/LI&gt;
&lt;LI&gt;If neither is possible, default filter is loaded and connectivity to the device will be blocked&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Based on this and what you’ve described, I’m guessing you’re experiencing a variant of&amp;nbsp;&lt;SPAN&gt;SMB-16203.&lt;BR /&gt;In which case, upgrading your firmware to a later release is highly recommended.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2022 18:06:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/164233#M7894</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-05T18:06:52Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/164278#M7896</link>
      <description>&lt;P&gt;I have a question: where does the policy come from if there was a return to factory settings?&lt;BR /&gt;In my message you can find the name "KAS_AZS_Rules Network".&lt;/P&gt;&lt;P&gt;Last time I forgot to attach the show logs kernel.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Dec 2022 04:56:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/164278#M7896</guid>
      <dc:creator>MiniNinja</dc:creator>
      <dc:date>2022-12-06T04:56:55Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/164339#M7898</link>
      <description>&lt;P&gt;one more think:&lt;/P&gt;&lt;P&gt;according&amp;nbsp;sk170534 GA for 1500/1600/1800 R80.20.20 but&amp;nbsp;&lt;/P&gt;&lt;P&gt;according to Ssk170534&amp;nbsp;GA for 1500/1600/1800 R80.20.20, but the engineer TAC claims R80.20.50&lt;/P&gt;</description>
      <pubDate>Tue, 06 Dec 2022 14:54:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/164339#M7898</guid>
      <dc:creator>MiniNinja</dc:creator>
      <dc:date>2022-12-06T14:54:10Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/164340#M7899</link>
      <description>&lt;P&gt;Thank you all for your help, now the TAC engineer, without going into further diagnostics (which leads to an update, which is not a fact that will solve the issue), suggested RMA, I am waiting for approval from the management and hope that everything will be fine.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Dec 2022 14:56:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/164340#M7899</guid>
      <dc:creator>MiniNinja</dc:creator>
      <dc:date>2022-12-06T14:56:13Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1530 prohibits connections to devices after power down</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/164343#M7900</link>
      <description>&lt;P&gt;If the device returns to factory settings, it shouldn’t get any policy.&lt;BR /&gt;However, I have seen instances reported on the community where problems randomly occur that are fixed by a policy install from the management.&lt;BR /&gt;Which suggests files are getting deleted along the way that shouldn’t be, which is what this bug is ultimately about; Reverting to Factory Defaults is merely one possible symptom.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Remote-Access-VPN/CheckPoint-Mobile-Ike-Cert-error/m-p/157350#M7940" target="_blank"&gt;https://community.checkpoint.com/t5/Remote-Access-VPN/CheckPoint-Mobile-Ike-Cert-error/m-p/157350#M7940&lt;/A&gt;&lt;BR /&gt;If you’re getting an RMA, then I recommend making sure the latest firmware is loaded on the device before putting it into production.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Dec 2022 14:59:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1530-prohibits-connections-to-devices-after-power-down/m-p/164343#M7900</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-06T14:59:25Z</dc:date>
    </item>
  </channel>
</rss>

