R81.20 Jumbo Hotfix Take 101

 

Note - This Take contains all fixes from all earlier Takes.

ID

Product

Description

Take 101

Released on 19 May 2025

Take 101 - New Functionality

 

PRJ-52556

CloudGuard Network

NEW: Added support for CloudGuard Controller scanner for Global NSX-T Manager. This feature is disabled by default. Refer to R81.20 CloudGuard Controller Administration Guide.

Take 101 - Improvements and Resolved Issues

PRJ-58950,
PMTR-110805

Security Management

UPDATE: Management upgrade performance is improved by up to 15%.

  • The fix will only be applied if the upgrade to this Jumbo Hotfix Take is done using a Blink image or with the Advanced Upgrade method.

PRJ-48563,
PRHF-29060

Security Management

UPDATE: Added a tool to extract data from the API logs to get the API usage information. Refer to sk181906.

PRJ-60048,

FMW-4284,

PMTR-113641

CPView

UPDATE: CPView and SNMP can now show Hide NAT statistics for up to 200 top NAT IP Pools (the default is 3 top NAT IP Pools). Configure the required value for the kernel parameter "fwx_alloc_top_pools_num" with the CLI command "fw ctl set -f int fwx_alloc_top_pools_num <integer from 1 to 200>".

PRJ-53198,
PRHF-31159

Logging

UPDATE: Added a mechanism to prevent log display delays, when SmartView reports show "No data found" in some widgets. Refer to sk181209.

PRJ-50210,
PMTR-96165

Security Gateway

UPDATE: Improved the FW Monitor command output syntax. Refer to sk30583.

PRJ-58553,
FMW-2292,

PMTR-110440

Security Gateway

UPDATE: Support TLS 1.3 for the RAD process requests. To activate it, change the TLS version to "TLSv1_3". Refer to sk178505.

PRJ-57078,
PRHF-35181

Security Gateway

UPDATE: RAD extended flow information is now logged into a cyclic CSV file - $FWDIR/log/rad_events/rad_flows.csv. This enhancement provides visibility into RAD connections, helping to monitoring and troubleshooting. Refer to sk183108.

PRJ-58753,
PRHF-36873

Mobile Access

UPDATE: Added support for the Mobile Access Portal "WebSocket" applications to work in environments with asymmetric network bandwidth (the download speed is faster than the upload speed) between external and internal networks. Refer to sk95311.

PRJ-58257,
PMTR-111169

ClusterXL

UPDATE: SecureXL User Mode (UPPAK) is now blocked in Active-Active cluster configurations, as this combination is not supported.

PRJ-60023

SecureXL

UPDATE: The Bidirectional Forwarding Detection (BFD) protocol is now supported in environments with SecureXL in User Mode (UPPAK).

PRJ-58741,
ACCHA-3835

SecureXL

UPDATE: Optimized memory management when processing Jumbo Frames.

PRJ-48872

VPN

UPDATE: Improved the VPN traffic performance in Maestro environments.

PRJ-58999,

SDWANGW-2280,

PMTR-111637,

PRHF-38118

SD-WAN

UPDATE: SD-WAN now supports AWS Cross Availability Zone Clusters, enabling distributed security deployments across multiple AWS regions.

PRJ-58672,

SDWANM-2809,

PMTR-110601

SD-WAN

UPDATE: In the Gateways Connector feature:

  • Implemented selection capability for specific Security Gateways for onboarding to the Infinity Portal.

  • Added option to completely disable the feature.

Refer to sk180557.

PRJ-51315,

PMTR-98157

Harmony Endpoint

UPDATE: Harmony Endpoint Management Server Anti-Malware (E2) updater now supports Linux packages. Previously, Linux packages were available for download and installation only through other tools.

PRJ-60788,

ODU-2443,

PRJ-61123,

ODU-2491

Automatic Updates - Web SmartConsole

UPDATE: New features and improvements are released in Take 135 and Take 136 via self-updatable package. Refer to sk170314.

PRJ-61149,

ODU-2483

Automatic Updates - HCP

UPDATE: Added Update 22 of HealthCheck Point (HCP) Release. Refer to sk171436.

PRJ-58242,
PMTR-110065

Diagnostics

After rebooting a Multi-Domain Security Management Server, the CPView (sk101878) and Skyline (sk178566) tools do not return data (for example, when running the "cpview -m", "cpview -t", "cpview -s" commands).

PRJ-56782,

PRHF-35847

Diagnostics

In SmartConsole, in the Gateways & Servers view, under Device & License Information of a Security Gateway or Cluster object, or in CPView and SNMP traps, the value of "new connection rate" for OID .1.3.6.1.4.1.2620.1.1.26.11.6.0 is incorrect.

PRJ-59024,
PRHF-37832

Security Management

Access Policy installation may take a long time when updatable objects are used in the policy.

PRJ-58919,
PRHF-37819

Security Management

In rare scenarios, policy installation fails with "Policy installation had failed due to an internal error".

PRJ-57322,
PRHF-36147

Security Management

When modifying the URL definition type in an Application Site object using the "set application-site" Management API command with the "urls-defined-as-regular-expression" parameter, the type of pre-existing URLs remains unchanged.

PRJ-59096,
PRHF-37788

Security Management

Management Server operations may be slow because of some API commands, and multiple core dumps may be generated.

PRJ-57720,
PRHF-36549

Security Management

Inserting the "\n" character in the name of a rule fails with an unclear error message not indicating the cause of the failure.

PRJ-57138,

PRHF-36149

Security Management

In some scenarios, the Security Management Server with a proxy configured is unable to connect to Infinity Portal after changing the proxy settings.

PRJ-57629,
PRHF-36614

Security Management

In rare scenarios, Infinity Portal shows the "Failed to update Infinity Portal with objects from your on-premises Management Server. Contact Check Point Support" error.

PRJ-58685,

PMTR-110626

Security Management

Duplicated licenses on the Security Management Server may impact the vsec_lic_cli utility.

PRJ-58916,

PRHF-37822

Security Management

Policy Installation may not be accelerated after modifying a host in a rule with the inline layer action.

PRJ-58502,
PRHF-37445

Security Management

Renaming a Secondary Security Management Server that was promoted to Primary fails.

PRJ-59432,
PRHF-38264

Security Management

In some scenarios, opening a specific VPN community in SmartConsole fails and the "Unable to load page" message is printed, while other communities can be opened.

PRJ-59340,
PMTR-111778

Security Management

When a Security Gateway object is deleted, its license may still appear as attached even though the Security Gateway Object no longer exists.

PRJ-51378,
PMTR-98267

Security Management

The "set lsm-gateway" and "set lsm-cluster" Management API commands fail to modify multiple dynamic objects in a single API call.

PRJ-55937,
PRHF-34898

Security Management

Packet mode search or search within Object Explorer for IP address ranges may not work correctly on the Standby Security Management Server.

PRJ-59630,
PRHF-38384

Security Management

In a rare scenario, December date comments in the IPS User Settings view may display incorrect year.

PRJ-60695,

PRHF-39191,

PMTR-114757

Security Management

Login using a TACACS Server created with the "add tacacs-server" Management API command, fails with "authentication to server failed".

PRJ-59307,
PRHF-38068

Security Management

In some scenarios, the "Log Servers" tab in the Logs & Monitor view of SmartConsole is not visible. Refer to sk183154.

PRJ-57306,
PRHF-36241

Security Management

If a custom login message exceeds 1000 characters, the login output file, which contains the sid and other session data, cannot be parsed as expected. Using the "mgmt_cli" with the "-s" parameter results in the "Failed to parse login output file" error.

PRJ-58776,
PRHF-37360

Multi-Domain Security Management

In a Multi-Domain Security Management environment, an audit log is not created after changing the "Parent rule for Domain's policy" Domain layer.

PRJ-58873,
PRHF-37752

Multi-Domain Security Management

In certain scenarios, when Cluster objects are used in a Multi-Domain Security Management Server with Domains that have Global Domain Assignments, an upgrade may fail with "Tried to persist object OBJ_ID with domain 1e294ce0-367a-11e3-aa6e-0800200c9a66 while active domain is DOMAIN_ID".

  • The fix will only be applied if the upgrade to this Jumbo Hotfix Take is done using a Blink image or with the Advanced Upgrade method.

PRJ-58980,
PRHF-37890

Multi-Domain Security Management

In some scenarios, the "SIC Error for EntitlementManager: Peer sent wrong DN" error is printed in cpd.elg on a VSX Gateway.

PRJ-59599,
PRHF-38330

Security Management

In rare scenarios, Global Policy Assignment fails with an "IPS update is currently running in local domain" message, although IPS update is not running in that Domain.

PRJ-60252,

PMTR-114256

Multi-Domain Security Management

Multiple errors "T_get_event: cannot register socket %d (%d sockets already registered for %s)" are printed in $MDSDIR/log/ in.msd.

PRJ-59214,
PRHF-38104

Multi-Domain Security Management

Policy installation fails on all Domains on the Multi-Domain Security Management Server with "Layer LAYER NAME': Verification failed due to an internal error" if an Externally Managed Security Gateway object with IPsec enabled does not have an encryption Domain. Refer to sk183003.

PRJ-56976,
PRHF-35998

Multi-Domain Security Management

In some scenarios, in the Multi-Domain Security Management Server, certain previously utilized global objects may remain hidden from both the SmartConsole's Object Explorer View and the "show unused-objects" Management API command.

PRJ-57777,
PRHF-36292

Multi-Domain Security Management

In some scenarios, on a Multi-Domain Security Management Server, implied rules are not logged for clusters managed by Domains with Global Domain Assignment.

PRJ-59768,
PMTR-112934

Compliance

In rare scenarios, the "Blades" widget in the Compliance Blade Overview page is blank.

PRJ-59592,
PRJ-59591

Logging

When opening a log card in the Logs View, duplicate values may appear in the "Resource" and "Reason" fields.

PRJ-59113,
PRHF-37640

Security Gateway

Some Access Control Rule Base flows may increase CPU utilization .

PRJ-60289,

PRHF-38919

Security Gateway

Memory handling issue, causing the FWK process to unexpectedly restart.

PRJ-59202,

PRHF-37975

Security Gateway

In a rare scenario, the FWK process may unexpectedly exit and bring down the Security Gateway.

PRJ-58743,
PRHF-37487

Security Gateway

In a rare scenario, when the Anti-Virus Blade and the ICAP Server are enabled, there may be high CPU usage.

PRJ-59352,
PRHF-37361

Security Gateway

In a rare scenario, an outage may occur in an Azure environment after one cluster member crashes and recovers.

PRJ-60285,

PRHF-38898

Security Gateway

In rare scenarios, HTTPS inspection may block the downloading and uploading of PDF files to and from the Web Server.

PRJ-59606,

PRHF-38380

Security Gateway

In a specific scenario, file downloads intermittently stop until resumed manually because of HTTP parsing issues and Content Awareness parsing failures.

PRJ-60202,
PRHF-38844

Security Gateway

In a rare scenario, VoIP Traffic fails after the initial call when SecureXL operates in User Mode (UPPAK). Refer to sk183218.

PRJ-59548,

PRHF-38160

Security Gateway

In certain scenarios, the $SAMLPORTAL_HOME/logs/error_log file may continuously grow, potentially consuming a significant amount of disk space.

PRJ-60529,
PRHF-38547

Security Gateway

In a rare scenario, the Security Gateway may crash during email inspection.

PRJ-60411,

PRHF-39061

Security Gateway

Policy installation fails with the error message: "All the rules in layer "<Name of Layer>" contain only expired time objects. See sk155253 for more details".

PRJ-59202,

PRHF-37975

Security Gateway

Resolved an issue where incorrect handling in rare flows could lead to an FWK crash

PRJ-58216,
PRHF-37208

Security Gateway

A rare race condition may cause a Security Gateway to restart when updating the statistics.

PRJ-58627,

PRHF-36742

Security Gateway

In a Maestro environment with configured Virtual System Load Sharing (VSLS) Mode, one of the Security Gateways on an SGM may be unresponsive until it is restarted several times.

PRJ-59815,
PRHF-38598

Security Gateway

In rare scenarios, the CPD process may unexpectedly exit, generating a core dump.

PRJ-57931,
PRHF-36685

Security Gateway

In rare scenarios, Security Gateway may crash when running the "ethtool -x" or the "ethtool -X" command for an interface that uses the AWS ENA network driver.

PRJ-59150,
PRHF-37843

Security Gateway

After enabling Security Zones in NAT Rule , wrong IP address is shown in logs and NAT is performed incorrectly. Refer to sk183088.

PRJ-59618,
PMTR-111544

Security Gateway

In a rare scenario, if the USIM process exits during firewall memory mapping, it can result in a Security Gateway crash.

PRJ-58630,
PRHF-36749

Security Gateway

In a rare scenario, the FWK process may exit because of memory corruption.

PRJ-58389,

PRHF-36744

Security Gateway

The DSD process (Dynamic Split Daemon) may exit when the "affinity" command input is large.

PRJ-58633,
PRHF-37150

Security Gateway

On a Security Group Member, one of the Security Gateways using Virtual System Load Sharing (VSLS) may become unresponsive.

PRJ-60945,

PRHF-39464

Security Gateway

The CPD or FWK process may unexpectedly restart when handling the interface statistics.

PRJ-57739,

PRHF-36496

Security Gateway

Local connections originating from the Security Gateway may fail to refresh their timeout values.

PRJ-60803,

PRHF-38473

Security Gateway

The FWK process exits with core dumps and error messages in $FWDIR/log/fwk.elg:"malware_res_rep_match_dns_response: check_dns_response_activate() failed".

PRJ-60852

Security Gateway

In some scenarios, when working with SecureXL in User Mode (UPPAK) and enabling a debug filter, the Security Gateway may crash.

PRJ-55871,
PRHF-37089,

PMTR-106133

Security Gateway

In rare scenarios, in a VSX environment, a Virtual System may boot with the default filter. Refer to sk182453.

PRJ-61154,

PRHF-39691

Security Gateway

A rare issue in HTTP/2 multiplexing may lead to traffic disruption. Refer to sk183441.

PRJ-55775,

PMTR-104789

Security Gateway

Using NAT64 may lead to high memory consumption (memory leak) because some packets are not released.

PRJ-59130,
PRHF-38022

Security Gateway

The DHCPv6 relay drops reply messages from the DHCPv6 server rather than forwarding them to the clients.

PRJ-50282,
PRHF-26394

Security Gateway

In rare scenarios, the CPD process may unexpectedly exit and create a core dump file.

PRJ-57786,
PMTR-100187

Security Gateway

The "fileapp_parser_get_attribs: call orig_get_attrib failed" error is printed in the $FWDIR/log/fwk.elg file.

PRJ-41828,
PRHF-25598

Security Gateway

When a NAT-T tunnel is set up between VPN peers, packets having UDP encapsulation added to the headers are not transmitted out of the PPPoE interface as they should be. VPN connection appears to be established but does not actually pass traffic.

PRJ-57868,
AAD-2659

Threat Prevention

In rare scenarios, SSH connections may be dropped when SSH Deep Packet Inspection (SSH DPI) is activated on the Security Gateway.

PRJ-55826,
PRHF-34607

Threat Prevention

The Anti-Virus Blade incorrectly classifies the .pqx files as .zip files, resulting in failure logs.

PRJ-59027,

PRHF-35823

Threat Prevention

In some scenarios, when Zero Phishing is enabled, kernel crash may occur.

PRJ-55328,
PRHF-33276

Threat Emulation

In rare scenarios, the Threat Emulation Blade may fail to correctly classify the file type.

PRJ-59610,
PRHF-38383

Application Control

If the Access Rule Base does not contain Extended/Detailed Log Tracking options, category override functionality fails when the "partial load" feature is enabled.

PRJ-59616,
PRHF-38387

Application Control

Some custom applications in the HTTPS Inspection policy are not matched if they are part of a Group object. Refer to sk183176.

PRJ-58636,

PRHF-37064

Application Control

The fwk.elg file may be flooded with the Application Control information messages "appi_clobs_observer_convert_context_dependent_ex: application id (60341234) has unknown context id and won't be free", "appi_clobs_observer_convert_context_dependent_ex: unknown exists: current cmi context = 181 ; removed dependent context = 720". This is a cosmetic issue.

PRJ-58756,
PRHF-37462

URL Filtering

In some scenarios, when URL Filtering Blade analyzes web requests, the RAD error may appear in /var/log/messages: "rad_kernel_urlf_request_serialize: string len =XXXX bigger than max 4096".

PRJ-57181,

PRHF-36126

URL Filtering

URL Filtering may not classify a site in a specific rare scenario when the Security Gateway is configured as a proxy.

PRJ-56475,
PRHF-35174

IPS

In some scenarios, a Security Gateway is not listed as an option for the Threat Prevention uninstall, even though the Threat Prevention Blade is disabled on the Security Gateway object.

PRJ-59573,

PMTR-112600

IPS

In rare scenarios, a memory leak in the FWK process may occur when IPS is active.

PRJ-59376,
PRJ-59379

Anti-Virus

In some scenarios, the user configurations are overwritten in the RAD configuration file.

PRJ-49484,
PRHF-30036

Anti-Virus

When Anti-Virus is enabled, files are not downloaded with the "Failed writing the file" error printed in logs, and the block page is not displayed.

PRJ-58655,

PRHF-37376

Anti-Virus

RAD queries fail, generating "wrong status code in reply" errors logged in $FWDIR/log/rad_events/Error/* files. Refer to sk183009.

PRJ-58840,

PMTR-105936

Anti-Bot

When the Security Gateway with FIPS mode is enabled, running the Anti-Virus and Anti-Bot Blades updates with the "fw update -b AB -b AV -f" command fails.

PRJ-60010,

PMTR-113461

Anti-Bot

In some scenarios, the Anti-Bot Blade fails to parse external IoC feeds with IP address observables.

PRJ-56079,

PMTR-103768

Anti-Bot

In rare scenarios, the Anti-Bot Blade may fail to inspect Domains because of communication errors with ThreatCloud.

PRJ-59223,

PRHF-38081

Anti-Bot

In some scenarios, a SmartConsole log with the Anti-Bot Blade entries may appear when the Anti-Bot Blade is disabled in the profile.

PRJ-58829,

PMTR-111480

Anti-Bot

The "malware_res_rep_match_dns_response: check_dns_response_activate() failed" error is printed in fwk.elg. This is a cosmetic issue.

PRJ-57460,
PMTR-109067,

PRJ-58870,
PMTR-110943

SSL Inspection

When a TLS connection is rejected because of no shared key exchange between the client and the Security Gateway, no log is generated to inform the administrator.

PRJ-60105,
PRHF-38755

Mobile Access

The HTTPD process periodically exits when accessing the Mobile Access Blade Citrix application because of the memory leak in the Citrix proxy implementation.

PRJ-46241,
PMTR-87652

Mobile Access

In a VSX environment, the WebSocket applications in Mobile Access may fail to resolve their destination addresses through DNS when the DNS configuration at the global level differs from the DNS configuration of a local Virtual System.

PRJ-60296,

PMTR-98413

ClusterXL

In rare scenarios, the FWK process exits during a cluster failover.

PRJ-59490,
PMTR-111453

ClusterXL

During cluster startup with routing separation enabled, a mismatch between routing and firewall process initialization can trigger premature full synchronization pnotes when the routing process is not fully synchronized.

PRJ-59362,
PMTR-111468

SecureXL

When SecureXL is in User Mode (UPPAK), in a VSX environment with many virtual systems, the WebUI may not be accessible when it reaches its internal connection limit.

PRJ-59968,

PMTR-113266

SecureXL

A warning message "adp_rt4_delete: rt entry .... does not exist for slot 1" may be printed in the /var/log/dmesg file while VPN the connection remains active.

PRJ-59915,

PMTR-113479

SecureXL

In some scenarios, the Security Gateway may crash while running "cpstop" or disabling MDPS when SecureXL in User Mode (UPPAK) is enabled.

PRJ-60395,

PRHF-39028,

PRJ-60383,

PRHF-38461

SecureXL

In an asymmetric UDP traffic scenario (Client-to-Site VPN and Site-to-Site VPN distributed to different members), the connection may not get accelerated.

PRJ-60309,

PMTR-114110

SecureXL

The USIM_x86 may potentially exit because of a race condition when a route is simultaneously used by multiple SND cores.

PRJ-60466,

PMTR-114455

SecureXL

In some scenarios, a memory leak occurs in the FWK process when SecureXL fails to update an existing route's next hop.

PRJ-60055,

PRHF-38747

SecureXL

After a VSX reboot, other Virtual Systems (VS's) enter a Down/Lost state while USIM core files are generated.

PRJ-60255,

PMTR-113688

SecureXL

SecureXL in User Mode (UPPAK) may restart when the Security Gateway is under high load and cpWatchDog triggers a reboot.

PRJ-61004

SecureXL

SecureXL in User Mode (UPPAK) may restart when adding or removing VLAN interfaces and the Security Gateway is under high load.

PRJ-60567,

PMTR-113304

SecureXL

In a rare scenario, the Security Gateway may become unresponsive during extended high memory utilization.

PRJ-60685,

PRHF-39209

SecureXL

The packets may not be accelerated because of a routing issue.

PRJ-60413,

PMTR-114373

SecureXL

The Hardware Acceleration offloaded connection may break when the route is updated, affecting the offload flow and slowing down operations.

PRJ-58781,
ROUT-3107

Routing

The ROUTED daemon may exit with a coredump file during IBGP synchronization.

PRJ-58787,
PRHF-37697

Routing

Duplicate entries in the kernel routing table can occur when iBGP peers disconnect and reconnect, causing the same routes to be added multiple times rather than properly replaced.

PRJ-59244,
ROUT-3336

Routing

The ROUTED daemon asserts when enabling eBGP multihop on a directly connected interface.

PRJ-60237,

PRHF-37606

Routing

In rare cases, when an internal BGP (iBGP) peer disconnects during a graceful restart, BGP may fail to advertise all routes. However, the missing routes still appear under "adj-rib-out" with a next hop of "0.0.0.0."

PRJ-58953,
PMTR-86085

Routing

Netflow logs appear in /var/log/messages, although netflow is not enabled. Refer to sk109038.

PRJ-60019,

ROUT-2303,

PMTR-113526,

PRHF-38771

Routing

When configuring a per-peer local address in BGP, IPv6 local address validation fails.

PRJ-60100,
HAAN-880

Routing

BGP sessions may terminate upon receiving a BGP Update containing an AS_SET Path Attribute when Peer Local AS was configured on the Security Gateway.

PRJ-59011,
PRHF-37820

Gaia OS

In a Maestro environment, an error message about short string length may be incorrectly displayed when setting an expert password string that includes the colon ":" character on the Security Gateway.

PRJ-58802,
PRHF-37713

Gaia OS

When attempting to create cloning groups on an R82 Security Gateway, the "Error - Home directory for 'cadmin' cannot be in /home/cadmin directory" error is printed. Refer to sk182989.

PRJ-60485

Gaia OS

Incorrect SmartConsole download link in the Gaia Portal.

PRJ-57126,
PMTR-108327

VPN

VPN traffic may be dropped when there is Large Scale VPN (LSV) peer.

PRJ-48114,
PMTR-109855

VPN

When a network connection is established simultaneously in both directions (server-to-client and client-to-server), the Security Gateway experiences connectivity issues because of incorrect packet dispatching, leading to dropped packets. Refer to sk183072.

PRJ-47094,
PRHF-27999

VSX

In a VSX environment, the Security Gateway may crash when removing an interface from topology.

PRJ-47769,
PMTR-93189

VSX

The FWM core dump file is created when running the "vsx_util vsls" command on a VSX cluster without Virtual Systems configured.

PRJ-55478,
PRHF-34244

VSX

In rare scenarios, an entry in the FDB (bridge forwarding table) may be incorrectly marked as "Do not update". This can cause a traffic outage lasting several minutes after a Virtual System fails over from one member to another. This issue only affects users who are using both VSLS with VS distribution and a vSwitch.

PRJ-57293,

PRHF-36254

VSX

Output of the "dynamic_split -p" command shows "Dynamic Split is currently off (Stopped due to State Verification failure)" on a VSX Gateway. Refer to sk181231.

PRJ-59170,
PRHF-37466

VSX

A memory leak may occur in a VSX environment, related to the transmitting packets module.

PRJ-57672,

PMTR-109851

VSNext

Creating multiple Virtual Gateways may fail with "Setting management connection failed!".

PRJ-60459,

PMTR-114441,

VSECPC-10081

CloudGuard Network

The CloudGuard Network Central License utility incorrectly distributes licenses to Azure Virtual vWAN Gateways that already have licenses included during deployment.

PRJ-59474,

SDWANGW-2360,

PMTR-112190

SD-WAN

Dynamic IP address changes for DAIP Gateway objects are not propagated to all Security Gateways in the SD-WAN VPN community, causing VPN connectivity failures.

PRJ-47625,
PRHF-29470

Scalable Platforms

DNS configuration may not be pulled to other Security Gateway Members (SGMs) from the Single Management Object (SMO).

PRJ-58488,
PMTR-109895

Scalable Platforms

Upon contract renewal, non-SMO members in the Maestro Security Group may not get the updated contract automatically.

  • The fix requires this Jumbo Hotfix Accumulator Take to be installed on all the members of the group.

PRJ-52526,
PMTR-98152

Scalable Platforms

When a new user is added via the gClish command "add user" or through the WebUI, an unnecessary reboot of members in the Security Group occurs when configuration pulling is triggered (after a member goes down and up).

PRJ-60893,

PRHF-39212

Scalable Platforms

TCP and UDP traffic over VLAN IDs greater than 2024 does not pass through a Maestro Security Group when SecureXL in User Mode (UPPAK) is enabled. Refer to sk183337.

See the Critical Information section.

PRJ-61044,

FMW-4849,

PRHF-39679

Scalable Platforms

In Maestro deployments with SecureXL working in User Mode (UPPAK), after an upgrade, CIN traffic may be dropped and cause outage.

PRJ-59984,

PRHF-38615

Scalable Platforms

High CPU usage may occur on Security Group members.

PRJ-59167,

FMW-3410

Scalable Platforms

The "ws_mux_host_only_active_pass: ERROR: There is not enough data in stream to pass" error may be printed in logs. This is a cosmetic issue.

PRJ-58087,
PRHF-36586

Scalable Platforms

Configured proxy ARP may not work as expected, when the "Same VMAC" feature is enabled.

PRJ-58161,
PMTR-113610

Scalable Platforms

IP broadcast helper cannot forward the packets if the IP address of the "relay to" is not directly connected to the Security Gateway.