- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Been looking under the hood at R82 GA all morning, here are a few things I've uncovered. I'll try to avoid restating findings that are already in the release notes, also keep in mind these are initial impressions which may not be 100% accurate.
1) All NIC drivers (igb/ixgbe/vmxnet3/mlx_core etc) are taking a major driver version update due to the new 4.18 kernel, this may result in changes in network interface behavior upon upgrade (like this when we moved to kernel 3.10: sk166424: Number of RX packet drops on interfaces increases on a Security Gateway R80.30 and higher ...). The e1000 driver (which is the default interface in many virtualized environments) is deprecated in R82 and will throw a console warning if you are trying to use it. The e1000 driver still seems to work anyway on an SMS in VMWare, but does NOT work for me on a security gateway in VMWare so look out. sk180572: Hardware Compatibility Notifications
2) If you create a new R82 security gateway or cluster, Anti-Bot and Anti-Virus will be enabled by default. These features under R82 now also support a kind of hybrid between "Background" and "Hold", whereas if Hold is causing excessive latency connections start slowly getting treated as background in a very interesting trade-off (this hybrid mode doesn't appear to be enabled by default): sk181434: "Maximum Security" feature in Anti-Virus and Anti-Bot R82 and higher
3) The Advanced DNS protections introduced in R81.20 have been exposed somewhat in the TP profile settings, but it looks like all you can do is turn them off for testing purposes, not sure if exceptions could be created for these:
4) A new "Dynamic Layer" of rules can be added directly on a gateway even if the SMS is unreachable, kind of like SAM rules on steroids: sk182252: Dynamic Layer in Access Control Policy. Also it looks like the R82 gateways now cache multiple versions of previously installed policies so you can revert to an older known-good policy directly on the gateway itself, kind of like the Installation History screen in SmartConsole. sk181437: Access Control Policy Revert Tool (policy_rev_tool) Could be very handy when a policy install causes all hell to break loose including cutting off the gateway from the SMS, to recover you could just jump directly onto the gateway and reinstall the known-good policy that was installed just before the "bad" one was, as opposed to fw unloadlocal causing a full outage.
5) Looks like a new daemon called cpview_api_service has been added to R82 according to sk97638, I assume this would allow cpview data to be retrieved directly via Gaia API calls which opens up some verrrry interesting monitoring/reporting capabilities.
6) Looks like the ips command has gotten pimped out with some new options beyond just looking up the name of a protection ID you see in a debug, appears you now can switch off individual IPS protections right from the gateway's CLI without a policy install. Guess Check Point got tired of administrators running ips off and gave them some more granular options:
ips protections print_name <protection_id (hex)> # Display protection name
ips protections print_id '<protection name>' # Display protection ID
ips protections disabled show # Show IPS disabled and excluded protections
ips protections disabled exclude <protection_id> # Exclude IPS disabled protection
ips protections disabled delete_exclude <protection_id>|all # Delete excluded IPS disabled protection
7) New command called turbostat shows very detailed information about the processors such as power consumption, current clock rate and lots of other goodies. @Bob_Zimmerman would approve.
8) Looks like we picked up two new paths in the output of fwaccel stats -s, presumably for Hyperflow boosting of QUIC and SMB/CIFS. Also the connection_pipelining command has been renamed hyperflow.
UDP IS XL pkts/Total pkts : 0/541805 (0%)
UDP IS pipeline pkts/Total pkts : 0/541805 (0%)
9) The great new connview tool requires USFW to function, it doesn't work if your firewall is in kernel mode.
10) The classic Unix command strace is back in Gaia (although it was previously available via the undocumented perf trace command). This great command can be used to sniff the system calls between an existing runaway/malfunctioning process and the kernel. You can see everything it is trying to access (files, sockets, etc) and even the data it is reading/writing. Awesome troubleshooting tool for processes that can be attached to a process that is already running.
11) All the configuration options for HTTPS Inspection including CA updates and such are now located in the main SmartConsole GUI and no longer in the legacy SmartDashboard which means they have been extricated from the vile clutches of fwm, speaking of which...
12) It seems that while the legacy single-threaded fwm process still exists in R82, it has had even more responsibilities taken away from it on the SMS which is a good thing. Policy installations seem WAY faster in R82 and watching the output of top during a policy installation shows fwm is doing very little now. In R81.20 and earlier fwm is always the major bottleneck for policy installation performance, even for accelerated ones.
13) Enhanced VPN Link Selection looks very nice, should make setting up ISP-redundant VPNs with non-Check Point gateways much easier.
Very nice!
1) Great chance to remind everybody that e1000 has been a mediocre option in VMware for a long time. vmxnet3 is much better.
4) Important note in that Dynamic Layer SK: "It is not supported to edit or delete individual dynamic rules on the Security Gateway after you add them." This seems like a really, really good way to shoot yourself in the foot. Use with extreme caution.
6) Really looking forward to more granular ways to work with IPS on the command line. I'd love the ability to take a flow tuple and get a list of which IPS protections it will hit so I can target just those ones.
7) turbostat(8) has actually been included at least since the move to kernel 3.10. I don't have any 2.6 systems handy to see if it's present that far back. It's a nice tool for monitoring processor performance, though I wish it had some kind of structured output like JSON instead of the top-like table. Unfortunately, Linux still doesn't have great tools for monitoring cross-NUMA-node traffic, so it's still hard to notice the QPI/UPI links are saturated. Intel's PCM (Performance Counter Monitor) is available, but not included in any Linux I'm aware of. Definitely not included in Gaia.
Yes, agree there, vmxnet3 is much better.
Andy
You went full board into twiddling the nerd knobs 🙂
The Dynamic Layer stuff is basically a definition for a policy layer via a JSON file and a gateway can support multiple of them.
The policy pushed to the gateway must include the Dynamic Layers in order to be used.
Dynamic Layers are not meant to be manipulated in the same way a regular policy is.
The actual details of what you can do in this JSON are in the Gaia API documentation.
As I type this, it appears the v1.8 documentation is NOT public.
However, if you have R82 installed (even the EA), you can read the documentation here: https://mgmt-ip/gaia_docs/#web/set-dynamic-content~v1.8%20
From my read of this documentation, you can set a policy using objects defined in the JSON (most object types are supported).
Some types of objects can be "externally referenced" (taken from management), specifically:
The externally referenced objects used in the policy must be explicitly specified in the JSON along with the ones you're using in the policy.
In fact, any changes to the dynamic layer must be done with a new JSON file (replacing the existing one).
It's a bit more complicated than sam rules for sure, but you can do a whole lot more with it, it appears.
Looks like in R82 we can FINALLY on a per-gateway basis tell it which IP address of the SMS (real or NAT) to initiate the logging connections to and also for fetching policies. (sk171055: Security Gateway tries to fetch the policy from / sends logs to the real IP address of the...)
This replaces creating those clunky fake log server objects when there was a mixture of gateways managed across the Internet and some through an internal WAN, and is a huge improvement:
Thanks for pointing that out, very nice!
Andy
Hi @Timothy_Hall,
You can find more changes between the releases (R81.20 and R82) in the following SK:
sk180180 - Software changes between Quantum release versions
CUT>>>
set dns timeout <value>
" to control how long Gaia OS waits for a response from a DNS server before it sends the DNS request to the next configured DNS server.clish -c
" now supports the context of a Virtual Gateway / Virtual Switch with this syntax:clish -v <Virtual Device ID> -c "<Gaia Clish Command>"
cphwd_medium_path_qid_by_mspi
parameter from 1 to 0 and cphwd_medium_path_qid_by_cpu_id
parameter from 0 to 1.orchd stop
" command (or reboots it), and the Orchestrator detects that other Orchestrators on the Maestro Site are not operational, then before stopping (or rebooting) the Orchestrator shows a warning and a prompt to the administrator.orchd restart
" command.show interfaces
" on Scalable Platforms was aligned with the output of this command on a regular Security Gateway.Deprecated Command | Use this Command in the Expert mode | Use this Command in Gaia gClish |
asg cluster_site_admin |
cluster_site_admin -c <Site ID - 1 or 2> {down | up} |
set cluster site-id <Site ID> admin-state {up | down} set cluster sites-admin-state id <Site ID> {down | up} |
asg conns |
insights cluster-cli show connection --help g_connview --help |
insights show cluster info connection <parameter> |
asg cores_stat |
insights cluster-cli show cpu |
insights show cluster info cpu |
asg diag asg_diag asg6 diag |
insights hcp --help (run the applicable tests) |
insights |
asg if asg_if asg6 if |
insights hcp --help (run the applicable tests) cluster-cli show interfaces |
insights show cluster info interfaces |
asg perf |
insights cluster-cli show --help |
insights show cluster info <parameter> |
asg resource asg6 resource |
insights cluster-cli show --help |
insights show cluster info <parameter> |
asg search asg6 search |
insights cluster-cli show connection --help |
insights show cluster info connection <parameter> |
asg_bond |
hcp --help (run the "Bond Health" test) |
N / A |
asg_chassis_admin |
cluster_site_admin -c <Site ID - 1 or 2> {down | up} |
N / A |
toggle_same_vmac |
toggle_same_vmac_os |
N / A |
show smo set smo delete smo |
show cluster <parameters> set cluster <parameters> |
|
show chassis id {1|2} general unique_ip set chassis id {1|2} general unique_ip delete chassis id {1|2} general unique_ip |
N / A | show cluster configuration unique-ip <Site ID> interface <parameters> set cluster configuration unique-ip <Site ID> interface <parameters> delete cluster configuration unique-ip site-id <Site ID> interface <parameters> |
show chassis high-availability <parameters> set chassis high-availability <parameters> |
N / A | show cluster configuration high-availability <parameters> set cluster configuration high-availability <parameters> |
asg_collect_vsx_logs |
cpinfo -h (see sk92739) |
cpinfo -h (see sk92739) |
drop_monitor |
N / A | N / A |
asg_affinity_enhance |
N / A | N / A |
adlogconfig
command. See the R82 CLI Reference Guide.max_concurrent_vpn_tunnels
" parameter from 200 to 10000 in VSX environments.<<<CUT
Monitoring dashboard for Scalable Platforms (ElasticXL Cluster, Maestro, Scalable Chassis).
# insights
Just realized R82 is actually missing something, the annoying "Security Tip" Infinity services popups that could only be disabled for a month seem to be gone, or at least I haven't run into them yet on R82. Also the "why did you disable this Threat Prevention blade" popups don't seem to be present any more either.
This is a good thing, has anyone else encountered any unexpected and/or annoying SmartConsole popups in R82? The disk space warning popup for /opt is still there (which is fine); the only other use of SmartConsole popups I'd feel is appropriate would be issues such as the VPN Information Disclosure vulnerability awhile back. However it looks like another security vendor has had far more serious issues than just warning popups could cover over the last week...
Yea, I totally forgot about it Tim, but I had not seen any of those either in my R82 lab so far.
Andy
Looks like R82 (and now R81.20 HFA 96+) supports the detection and auto-configuration of new port numbers associated with application objects via a registry hack, but is not enabled by default:
sk182790: Automatic configuration of Application Control Categories on the Security Gateway
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
12 | |
6 | |
5 | |
5 | |
5 | |
4 | |
3 | |
3 | |
3 |
Wed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY