- Products
- Learn
- Local User Groups
- Partners
-
More
Celebrate the New Year
With CheckMates!
Value of Security
Vendor Self-Awareness
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
Mobile Security
Buyer's Guide Out Now
Important! R80 and R80.10
End Of Support around the corner (May 2021)
I'm currently busy migrating an environment running on R77.30 to an all R80.30 shop. Management is for now on R80.20 Take 117, gateways are physical appliances.
As part of the upgrade process, the latest GA JHF for R77.30 was applied on the gateways as the customer is using the full NGTX suite, so the firewalls are completely up to date before they are upgraded themselves.
The solution for remote access is only based on the SSL extender and users have no admin rights on their laptops.
Since the upgrade to the latest R77.30 GA JHF, it looks like the SSL framework tries to update itself, although the global properties and client policies in the legacy editor are set do "Do not upgrade - Do not check for new versions of the client". Switching these settings to "Ask user for upgrade" doesn't help either.
Would it be expected or should I open a case? I fear that upgrading the gateways to R80.30 will give a similar issue, which will lead to a few remote sessions to help mobile users in the holiday season.
Previous deployments of R77.30 JHF didn't produce this behavior.
Thanks for the reply. After upgrade of the whole infrastructure to R80.30 Take 111 with the setting still set to "Do not upgrade", the problem persists. I will open a ticket.
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY