Danny Jung

R77.30 Take 292: New Jumbo Hotfix GA Release

Discussion created by Danny Jung Champion on Jan 3, 2018
Latest reply on Feb 23, 2018 by Billye Moore

A new General Availability Jumbo Hotfix Accumulator take for R77.30 (Take 292) is available.

 

Take_292 is the latest General Availability release that can be directly downloaded from Check Point Cloud using CPUSE and from sk106162

 

Take

Date

CPUSE Identifier

CPUSE offline package

Take_292

19 Dec 2017

Check_Point_R77_30_JUMBO_HF_1_Bundle_T292_FULL.tgz

 (TGZ)

 

Note: Effective Dec 19th 2017, the General Availability Take_292 is available for CPUSE online installation in Gaia Portal and Gaia Clish (it replaces Take_286).

 

It includes important stability and security software updates:

 

IDProductSymptoms

Take 292 (19 Dec 2017) - General Availability Take

02563960IPSfwd process or fw_full process on Security Gateway consumes memory at high level after installing Take 206 of R77.30 Jumbo Hotfix Accumulator (sk117655)
02569432Threat EmulationWhen Threat Emulation was configured to send some of the files to the cloud and some locally, the files were sent only locally and not to the cloud. In this release, the configuration in the GUI will take effect and files will be sent to emulation according to the policy. 
02659361ClusterXLSNMP query returns wrong outputs for haClusterIpTable
02665619SNXIn rare cases, client running Windows 10 Anniversary update experiences disconnections within SNX tunnel.
02656968Security GatewayIn rare scenarios, when working with Dynamic Objects, NAT rules are not applied anymore after policy installation or update of software blades signatures. This causes traffic outage for all connections that should undergo NAT.
02536207VSX

Added:

  • Ability to query specific Virtual Device directly using the IP address of the Virtual System.
  • Ability to query SNMP daemons in the contexts of Virtual Devices sent to the IP Address of VSX Gateway itself using SNMPv1, SNMPv2 and SNMPv3.
  • New OIDs in the SNMP VSX tree: 
    • Memory usage for each Virtual System.
CPU usage for each Virtual System for each core.
02659849VoIPData connections of H323 protocol were not opened correctly in VSX cluster environments.
02660349DLP, Threat ExtractionSecurity enhancements for Data Loss Prevention and Threat Extraction blades
02659678Threat EmulationLinks inside email with Domain suffix (e.g. www.example.com) were emulated as com files.
02661043SmartLogImproved stability of "smartlog_server" process when running queries in SmartLog GUI to several Log Servers.
Refer to sk112826.
Note: This fix is relevant for any Take of R77.30 Jumbo Hotfix Accumulator between Take 198 and Take 286 including.
02655985SmartLogImproved stability of "smartlog_server" process when activating the "Auto Refresh" button in SmartLog GUI (upper right corner) for several hours.
02555984Security Gateway, Security Management Server, Multi-Domain Security Management ServerImproved memory consumption by FW process and FWD process.
Refer to sk117655.
Note: This fix is relevant for any Take of R77.30 Jumbo Hotfix Accumulator between Take 206 and Take 286 including.
02590882SmartEventNew events are not created in SmartEvent GUI, and "ERROR: duplicate key value violates unique constraint "seam_event_XXX_pkey"" in $RTDIR/log/cpsemd.elg file.
Refer to sk105185.
02532160SecureXLFor 21000 appliances with SAM card, improved stability of SAM card when running the "cpstop -fwflag -driver" command as a part of kernel memory leak detection procedure.
Refer to sk35496.
02401494VoIPImproved check for memory allocation failures under heavy load of VoIP traffic.
02573235VSXImproved support for Connectivity Upgrade (CU) in VSX VSLS.
Note: This fix is relevant for any Take of R77.30 Jumbo Hotfix Accumulator between Take 198 and Take 286 including.

 

 Notes:
  • For Threat Emulation customers that do not allow automatic updates from the cloud, and following the integration of TLS1.2 support,

it is important to update the Threat Emulation Engine according to the next SK: sk92509 - Offline updates for Threat Emulation images and engine.

 

  • For all ThreatEmulation E-Mail users:

 

            Check your custom postfix modifications after the upgrade.

 

            This JHF GA also includes a known issue with emulation of links in email - sk118280:

 

            It is therefore important to disable “Emulation of links in email” until the TE Engine 6.9 is deployed

            when installing this JHF GA build:

   1. vi $FWDIR/conf/mail_security_config

   2. add “te_mta_emulate_links_inside_emails=0” under "[mta]" section

   3. Save and install policy

   4. When TE engine 6.9 is deployed revert the above setting, Save and install policy.

Outcomes