- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi all,
I was wondering whether anybody has either seen the error below before or know how to fix it.

I have already consulted sk97691 but it doesn't seem to cover the error above.
Many thanks in advance.
A couple questions:
Thanks for responding Dameon.
Both questions are valid.
The Management version is 80.20 while the gateway's version is R70.
It goes without saying that the above deployment is not recommended by any means but my team and I were interested in figuring out whether such an implementation would be feasible. The work I've done so far took place in a virtualized environment. Please see the steps taken below:


Due to the “packet size limited during capture” messages seen on Wireshark, I re-run tcpdump with the following syntax to capture the full packet:
Tcpdump -vvvi eth0 port 18191 -s0 -w SIC_entirepacket.pcap
The result is the following:

The TLS-handshake is now more detailed but again the gateway resets the connection as it can’t decrypt the packet.
Any help or insight would be much appreciated.
Backwards compatibility for an R80.20 SMS only extends back to gateway version R75.20, so having your SMS attempt to communicate with an R70 gateway is not supported. Is there some special reason you are using a version of software on the gateway that has not been supported for several years?
--
Second Edition of my "Max Power" Firewall Book
Now Available at http://www.maxpowerfirewalls.com
We only considered it due to a certain customer's production network though we were almost certain that the experiment wouldn't work anyway....
From a closer technical perspective however, would you say that it is the newer TLS ciphers that a gateway as old as R70 wouldn't support, hence being unable to decrypt the SIC traffic?
Possibly, a gateway that old will try to use 3DES instead of AES for SIC encryption, and may also try to use the deprecated SHA-1 algorithm instead of SHA-256 which the R80.20 SMS will definitely not like. A gateway that old may also try to use the deprecated SSL protocol instead of TLS. Just because you can set the version on the gateway object to something that old prior to R75.20 doesn't mean everything will still work. 🙂
--
Second Edition of my "Max Power" Firewall Book
Now Available at http://www.maxpowerfirewalls.com
True, thanks very much for your input!
What you're seeing is expected behavior.
The default hash used for certificates generated by the ICA is:
R71 was the first release to support SHA256 certificates.
That means for any R80+ manager trying to gateway prior to R71, if you attempt to establish SIC, it will surely fail.
See: SHA-1 and SHA-256 certificates in Check Point Internal CA (ICA)
Now, if you were managing the gateway in R77.30 and then upgraded that manager to R80+, you could still push policy to the gateway.
In fact, I tested this myself by upgrading an R77.30 Manager to R80.10 and pushing policy to an R65 gateway.
While completely and totally unsupported, it worked. ![]()
However, if I ever regenerate the SIC certificate for this gateway, SIC would likely start failing because of this.
Hmmm. Maybe you can help me with a block on rule 995 in my R65 gateway 😉
Yikes, that brings back some memories ![]()
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 15 | |
| 9 | |
| 8 | |
| 7 | |
| 5 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 3 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY