- Products
- Learn
- Local User Groups
- Partners
- More
The Great Exposure Reset
24 February 2026 @ 5pm CET / 11am EST
AI Security Masters E4:
Introducing Cyata - Securing the Agenic AI Era
AI Security Masters E3:
AI-Generated Malware
CheckMates Go:
CheckMates Fest
This post is written to be strictly evidence-based. Where Check Point documentation is explicit, I state it. Where it is not explicit (for example, “X was not supported in R81.20”), I do not claim it.
In practice, the biggest “change” you will notice when moving from R81.20 → R82.x (including R82.20) is that multiple SD-WAN capabilities are delivered as Early Availability (EA) features, gated behind R82 EA packages, with explicit guidance to coordinate with the SD-WAN team and to obtain packages via sk180605. (sc1.checkpoint.com)
Across multiple R82 SD-WAN capabilities, the Admin Guide repeats the same operational pattern:
“This section describes an SD-WAN feature in the Early Availability stage.”
“To get this feature, you must install the R82 Early Availability packages on the SD-WAN Security Gateway.”
“See the ‘Downloads’ section in sk180605.”
“Contact the SD-WAN team… before starting your journey.” (sc1.checkpoint.com)
Practical takeaway: Upgrading to R82.x does not automatically mean you “get everything.” For several capabilities, you must treat enablement as a controlled rollout: packages + validation + change plan.
R82 documentation explicitly includes “EA Feature: SD-WAN with a Maestro Security Group.” (sc1.checkpoint.com)
What is explicitly stated (high confidence):
It is Early Availability.
It requires the R82 EA packages, referenced via sk180605.
The document recommends coordinating with the SD-WAN team prior to enablement. (sc1.checkpoint.com)
Why this matters operationally: Maestro introduces an extra layer of distributed dataplane operations. SD-WAN support in Maestro SG changes onboarding and troubleshooting patterns (for example, ensuring the SD-WAN software/agent components and configuration are consistent across members), and you should treat it as feature-gated EA.
Note: If you want a “precise, step-by-step enablement checklist” (Nano Agent on SGMs, where to configure interfaces, and what to avoid), I can write it, but I will only do so by quoting the exact steps from the same R82 guide pages you are using.
R82 documentation explicitly includes “EA Feature: SD-WAN with a Traditional VSX Virtual System.” (sc1.checkpoint.com)
The Admin Guide also lists specific limitations for this EA feature. In the PDF excerpt returned by search results, it explicitly calls out that SD-WAN Profile supports only Layer 3 Virtual Systems and then continues with additional limitations. (sc1.checkpoint.com)
How to interpret this correctly (design impact):
VSX enablement is not “universal.” It is bounded by VS mode/type constraints documented in the SD-WAN guide.
Treat VSX SD-WAN as “architecture-driven,” not “toggle-driven.” If your VSX design doesn’t fit the supported model, you should not force it.
R82 documentation explicitly includes “EA Feature: SD-WAN with SmartLSM (SmartProvisioning).” (sc1.checkpoint.com)
What is explicitly stated:
It is Early Availability.
It requires R82 EA packages and references sk180605. (sc1.checkpoint.com)
Why this matters: SmartLSM is fundamentally about lifecycle at scale (profiles and standardized provisioning). SD-WAN integration here is a meaningful operational upgrade for large fleets—again, gated by EA packaging and rollout discipline.
R82 documentation explicitly includes “EA Feature: SD-WAN in Layer 2.” (sc1.checkpoint.com)
What is explicitly stated:
EA feature
Requires R82 EA packages via sk180605 (sc1.checkpoint.com)
Design note: L2 support can matter for specific edge cases and migrations, but because it is EA-gated, treat it as an engineering project (lab validation, change control).
R82 documentation explicitly includes “EA Feature: QoS in SD-WAN.” (sc1.checkpoint.com)
What is explicitly stated:
EA feature, requires R82 EA packages via sk180605 (same gating model). (sc1.checkpoint.com)
Operational importance: QoS tied to SD-WAN policy intent is a big deal for real-world deployments (voice/video vs bulk traffic), but here again: treat it as EA enablement, not default behavior.
R82 documentation explicitly includes “EA Feature: IPv6 in SD-WAN.” (sc1.checkpoint.com)
What is explicitly stated:
It is EA and requires R82 EA packages via sk180605. (sc1.checkpoint.com)
Precision note: IPv6 behavior details (what SD-WAN can and cannot do for IPv6) must be taken from the IPv6 EA section itself. If you want, I can summarize the IPv6 limitations and supported paths strictly from that page/PDF section.
Because many “headline” capabilities are EA-gated in R82, the best planning model is:
Identify whether you are targeting GA-only SD-WAN features or enabling one or more EA features.
If EA is in scope, treat it like a controlled release:
confirm R82 EA package requirements,
confirm platform/architecture constraints (especially VSX),
validate in lab,
deploy with rollback and operational runbooks,
align with Check Point SD-WAN guidance to coordinate before enablement. (sc1.checkpoint.com)
R82 with many good news.
Yes, also R82.10 as well.
yes
I heard some amazing things are coming in R82.20
Yes, I also found out about it. I even need to watch a webinar that @Amit_Navon sent me, which I suggest everyone watch; it's a high-level presentation. Here's the link: https://nam02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcommunity.checkpoint.com%2Ft5%2FSD... a0ee8ed%7C8bdaa6b6e44749e69956205195026c19%7C0%7C0%7C6390648094642 55639%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuM DAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=a6jGnOnSTcm4epeVQs4XY%2BKA1HdiRVVKKtOsTgylYd4%3D&reserved=0
Says bad request when I try the link.
Ah yes, that one, great session.
Yes @the_rock , that's a very good section. I asked the Support Center's AI to create a table with the differences as well; I'll post it here as an attachment.
For some reason the link in the post broke.
@Amit_Navon I would like to hear your opinion on this article.
@WiliRGasparetto @israelfds95 @the_rock
I agree that the SD‑WAN status in R82 is more fragmented than we would have liked. To address this, we added an important section to the SD‑WAN SK—(6) Supported SD‑WAN Features—to better streamline and communicate new EA capabilities.
Starting in Q2’26, a consolidation process will take place, with most capabilities becoming GA as part of the JHF. In parallel, the R&D teams are focused on delivering a significant boost in simplicity and deployment flexibility with R82.20, driven by the merger of SD‑WAN management into Smart‑1 and Smart‑1 Cloud.
BR, Amit
I genuinely believe this is part of the natural evolution of a product as robust and complex as SD-WAN. I’m very excited about the direction these improvements are taking, and I’m looking forward to what’s next. With these enhancements, SD-WAN has the potential to be one of Check Point’s standout success stories in 2026.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 42 | |
| 12 | |
| 9 | |
| 7 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Mon 23 Feb 2026 @ 11:00 AM (EST)
Latest updates on Quantum Spark including R82 features and Spark Management zero touch - AMERTue 24 Feb 2026 @ 10:00 AM (CET)
Latest updates on Quantum Spark including R82 features and Spark Management zero touch - EMEATue 24 Feb 2026 @ 11:00 AM (EST)
Under The Hood: CloudGuard Network Security for Azure Virtual WANMon 23 Feb 2026 @ 11:00 AM (EST)
Latest updates on Quantum Spark including R82 features and Spark Management zero touch - AMERTue 24 Feb 2026 @ 10:00 AM (CET)
Latest updates on Quantum Spark including R82 features and Spark Management zero touch - EMEATue 24 Feb 2026 @ 11:00 AM (EST)
Under The Hood: CloudGuard Network Security for Azure Virtual WANThu 26 Feb 2026 @ 05:00 PM (CET)
AI Security Masters Session 4: Introducing Cyata, Securing the Agentic AI EraFri 06 Mar 2026 @ 08:00 AM (COT)
Check Point R82 Hands‑On Bootcamp – Comunidad DOJO PanamáAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY