Create a Post
Showing results for 
Search instead for 
Did you mean: 

R77.30 Take 292: New Jumbo Hotfix GA Release

A new General Availability Jumbo Hotfix Accumulator take for R77.30 (Take 292) is available.

Take_292 is the latest General Availability release that can be directly downloaded from Check Point Cloud using CPUSE and from sk106162




CPUSE Identifier

CPUSE offline package


19 Dec 2017




Note: Effective Dec 19th 2017, the General Availability Take_292 is available for CPUSE online installation in Gaia Portal and Gaia Clish (it replaces Take_286).

It includes important stability and security software updates:


Take 292 (19 Dec 2017) - General Availability Take

02563960IPSfwd process or fw_full process on Security Gateway consumes memory at high level after installing Take 206 of R77.30 Jumbo Hotfix Accumulator (sk117655)
02569432Threat EmulationWhen Threat Emulation was configured to send some of the files to the cloud and some locally, the files were sent only locally and not to the cloud. In this release, the configuration in the GUI will take effect and files will be sent to emulation according to the policy. 
02659361ClusterXLSNMP query returns wrong outputs for haClusterIpTable
02665619SNXIn rare cases, client running Windows 10 Anniversary update experiences disconnections within SNX tunnel.
02656968Security GatewayIn rare scenarios, when working with Dynamic Objects, NAT rules are not applied anymore after policy installation or update of software blades signatures. This causes traffic outage for all connections that should undergo NAT.


  • Ability to query specific Virtual Device directly using the IP address of the Virtual System.
  • Ability to query SNMP daemons in the contexts of Virtual Devices sent to the IP Address of VSX Gateway itself using SNMPv1, SNMPv2 and SNMPv3.
  • New OIDs in the SNMP VSX tree: 
    • Memory usage for each Virtual System.
CPU usage for each Virtual System for each core.
02659849VoIPData connections of H323 protocol were not opened correctly in VSX cluster environments.
02660349DLP, Threat ExtractionSecurity enhancements for Data Loss Prevention and Threat Extraction blades
02659678Threat EmulationLinks inside email with Domain suffix (e.g. were emulated as com files.
02661043SmartLogImproved stability of "smartlog_server" process when running queries in SmartLog GUI to several Log Servers.
Refer to sk112826.
Note: This fix is relevant for any Take of R77.30 Jumbo Hotfix Accumulator between Take 198 and Take 286 including.
02655985SmartLogImproved stability of "smartlog_server" process when activating the "Auto Refresh" button in SmartLog GUI (upper right corner) for several hours.
02555984Security Gateway, Security Management Server, Multi-Domain Security Management ServerImproved memory consumption by FW process and FWD process.
Refer to sk117655.
Note: This fix is relevant for any Take of R77.30 Jumbo Hotfix Accumulator between Take 206 and Take 286 including.
02590882SmartEventNew events are not created in SmartEvent GUI, and "ERROR: duplicate key value violates unique constraint "seam_event_XXX_pkey"" in $RTDIR/log/cpsemd.elg file.
Refer to sk105185.
02532160SecureXLFor 21000 appliances with SAM card, improved stability of SAM card when running the "cpstop -fwflag -driver" command as a part of kernel memory leak detection procedure.
Refer to sk35496.
02401494VoIPImproved check for memory allocation failures under heavy load of VoIP traffic.
02573235VSXImproved support for Connectivity Upgrade (CU) in VSX VSLS.
Note: This fix is relevant for any Take of R77.30 Jumbo Hotfix Accumulator between Take 198 and Take 286 including.


  • For Threat Emulation customers that do not allow automatic updates from the cloud, and following the integration of TLS1.2 support,

it is important to update the Threat Emulation Engine according to the next SK: sk92509 - Offline updates for Threat Emulation images and engine.

  • For all ThreatEmulation E-Mail users:


            Check your custom postfix modifications after the upgrade.


            This JHF GA also includes a known issue with emulation of links in email - sk118280:


            It is therefore important to disable “Emulation of links in email” until the TE Engine 6.9 is deployed

            when installing this JHF GA build:

   1. vi $FWDIR/conf/mail_security_config

   2. add “te_mta_emulate_links_inside_emails=0” under "[mta]" section

   3. Save and install policy

   4. When TE engine 6.9 is deployed revert the above setting, Save and install policy.

3 Replies

Hi, has anyone had a chance to install? Would be interested to hear about how it went, and if there were any issues encountered during upgrading.

0 Kudos


On tuesday I upgraded one customer's Appliance (Standalone) from take 178 to this take.

I did not have issues during upgrand and so far, everithing is working right. Anyway, dont forget to do a snapshot before.



I had one issue with 292, I had a device patch in order to manage 1400 series FW's that had to be removed prior to installing. Found out during the install

0 Kudos


Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events