- Products
- Learn
- Local User Groups
- Partners
- More
Stop Babysitting Rules.
Go Agentic
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Which version/JHF of Management is used here?
Where the processes restarted after per the instructions?
gaia os R80.40 take 125
Just to confirm this is a distributed deployment with separate SG / SMS...
How is the following currently set?
(Ignore if management)
hello chris
yes, we have set this value as TLS 1.2 and did install database
Can you please share the output of:
"show configuration ssl tls"
That looks like a Gateway, not the Management - which has the issue?
hello chris ,
this is management i just chenged the hostname .
I think thats default output...I tested in R80.40, R81.10 and R81.20, same thing.
Silly question, but did you actually reboot the device after all changes?
no that is in production network. we have to gone thru lot of permission to reboot the device . but we have tried to restart the ssh and httpd2 service after modifications done on the sms . is there any possible way to resolve the vulnerability
The SK provides the instructions, if those aren't working when followed fully (including reboot) please contact/consult TAC.
thank you for your reply
Rebooting the management server does not affect production operations, other than a very short availability of the management server itself. I am pretty sure, if you open a TAC request, they will ask for that anyway.
hello val,
thanks for the update.i have created the case with TAC already.
i will try to do the reboot device .
Dont bother rebooting, its never needed for this. All you do is enable/disable the cipher you want, save config, thats it.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 23 | |
| 19 | |
| 9 | |
| 9 | |
| 8 | |
| 7 | |
| 7 | |
| 5 | |
| 4 | |
| 4 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 12 Jun 2026 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 47: Continuous Threat Exposure ManagementThu 18 Jun 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point WAF - The Next Generation of AI powered protectionFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY