- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
We not using Checkpoint remote VPN in current setup but still we want to fix the TLS related below mentioned vulnerability.
TLS Version 1.0 and 1.1 Protocol Detection Vulnerbility.
We have VSX deployment and running r80.10 gaia os.
Also what will be the impact if we disable 1.1 and enable 1.2.
I assume the context here is sk154532 what other blades are enabled in the environment?
Can you share me the sk154532 link?
Note access to some SK articles may depend on you support/partner/certification level.
We have received report from VAPT team after rescanning the Checkpoint devices, still this Vulnerability is showing Open in the report.
TAC has shared below sk.
Kindly check sk132712, if this is relevant? (For Disabling TLS1.0 and TLS1.1)
We followed the sk147272 on both the cluster member to mitigate TLS and sweet32 vulnerabilities and re-scaned the device now we don't see this in open.
Issue resolved
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 24 | |
| 20 | |
| 8 | |
| 7 | |
| 6 | |
| 5 | |
| 5 | |
| 5 | |
| 4 | |
| 4 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY