R81.20 Jumbo Hotfix Take 111

 

Note - This Take contains all fixes from all earlier Takes.

ID

Product

Description

Take 111

Released on 04 August 2025

Take 111 - New Functionality

 

PRJ-59919,
PRJ-60198

Gaia OS

NEW: Added the option to send Gaia backup to a Remote Server using SFTP protocol. This feature also supports restore operations via SFTP and scheduled backups (including retention policy support).

Take 111 - Improvements and Resolved Issues

 

PRJ-60771,

HEC-868,

PMTR-114867

Diagnostics

UPDATE: Added the ability to monitor the CPU cores that run CoreXL SND (Secure Network Dispatcher) instances separately from the CPU cores that run CoreXL Firewall instances. The monitoring of CPU cores handling CoreXL SND instances was improved. It is possible now to:

  • view the exact number of CPU cores running SND instances that are under load, instead of seeing it as a percentage of total CPU cores.

  • configure the load threshold for CPU cores running CoreXL SND instances.

  • configure the load duration for SND CPU cores.

When these parameters are configured, the load on SND CPUs triggers a failover at a different time and under different load conditions compared to Firewall CPUs. Refer to the R81.20 ClusterXL Administration Guide > Advanced Features and Procedures > ClusterXL Failover based on the Load on ClusterXL SND Instances.

PRJ-61387,
PRHF-39859

Security Management

UPDATE: On Security Management Servers, environment variables set using the override_server_setting.sh script now apply to all processes. Refer to sk165938.

PRJ-60791,
PRJ-60790

Logging

UPDATE: In SmartConsole > Logs & Monitor > Logs, added information to the "Per Session" logs:

  • NAT fields

  • Dynamic object name

  • Updatable object name

  • Network feed object name

  • Destination Domain Name field

PRJ-60244,

PMTR-110297

Logging

UPDATE: Log Exporter is now delivered as an autoupdatable package, replacing the maintrain-based deployment. This approach shifts from version-based to component-level updates, enabling a more granular and agile update mechanism. Refer to sk182866.

PRJ-59880,
PRHF-38023

Security Gateway

UPDATE: Improved processing of ICMP packets in the Security Gateway.

PRJ-61486

Security Gateway

UPDATE: Quantum Force 9400 and 9300 appliances with Standalone configuration now run in User Space Firewall (USFW) Mode by default.

PRJ-60046,
PMTR-110330

Security Gateway

UPDATE: Added an out-of-the-box package for updatable objects that is included with clean installations or Jumbo Accumulator Hotfix Takes (when no other package exists). If the out-of-the-box package is present during policy installation, an update is now initiated in addition to the automatic update.

PRJ-61794,
PRHF-40060

Scalable Platforms

UPDATE: The "fwha_allow_different_corexl_instances" kernel parameter is now added to prevent cluster members from entering a Down state because of firewall instance count mismatches.

PRJ-61405,
PMTR-112536

Scalable Platforms

UPDATE: Increased the maximum supported number of Uplink interfaces from 64 to 99 on Maestro Orchestrator. Refer to Quantum Maestro Getting Started Guide.

PRJ-60584,
PMTR-116355

VPN

UPDATE: Added the "inclusions" feature to the Split Tunnel Remote Access functionality. Refer to the R81.20 Remote Access VPN Admin Guide > Dynamic Split Tunneling for SaaS Using Updatable Objects.

PRJ-61572,
ODU-2674,

PRJ-62644,

ODU-2856

Automatic Updates - CPView

UPDATE: Added Take 179 and Take 192 of CPotelcol (OpenTelemetry Collector) Release Updates. Refer to sk180522.

PRJ-61566,
ODU-2690

Automatic Updates - CPView

UPDATE: Added Take 47 of CPquid (QUID) Release Updates. Refer to sk181458.

PRJ-61563,
ODU-2682,

PRJ-62647,

ODU-2848

Automatic Updates - CPView

UPDATE: Added Take 44 and Take 75 of CPViewExporter Release Updates. Refer to sk180521.

PRJ-61758,

ODU-2722,

PRJ-62172,

ODU-2754

Automatic Updates - Web SmartConsole

UPDATE: New features and improvements are released in Take 140, Take 142, Take 143 via self-updatable package. Refer to sk170314.

PRJ-60351,
PMTR-114300

Diagnostics

An FD (file descriptor) memory leak may occur when creating a new object in SmartConsole.

PRJ-60518,
PMTR-114274

Security Management

VPN certificate renewal may generate certificates with 2K key sizes instead of the 3K size specified in Global Properties.

PRJ-61042,
PRHF-39465

Security Management

In rare scenarios, accelerated policy installation fails to initialize, the full Access Control Policy installation is executed instead and it may take up to 20 minutes.

PRJ-61516

Security Management

The "Mellanox firmware update *** FAILED ***" error is displayed during reboot when upgrading a Quantum Appliance to R81.20 Jumbo Hotfix Accumulator Take 99. Refer to sk183468.

PRJ-58351,
PRHF-37197

Security Management

In some scenarios, policy installation fails with the "/opt/<xxxxx>-R81.20/conf/Policy-name.pf" line N: ERROR: syntax error Error compiling IPv6 flavor. Operation ended with errors" error.

PRJ-60960,
PRHF-38808

Security Management

In rare scenarios, in multi-site Multi-Domain Security Management environments, operations across two or more Servers, such as Global Domain Assignment, IPS and Application Control update may fail.

PRJ-57974,
PRHF-36695

Security Management

In some scenarios, the Postgres database on the Standby Security Management Server is growing after every High Availability synchronization. Refer to sk182868.

PRJ-60698,
PRHF-39297

Security Management

The Management API command "set simple-gateway name 'XXX' usercheck-portal-settings.enabled {false|true}" fails to properly enable or disable User Check for Security Gateway objects. When running this command, the change is not applied to the Security Gateway configuration, and the "Enable UserCheck for active blades" setting in SmartConsole remains unchanged.

PRJ-56521,

PRHF-35230

Security Management

In rare scenarios, the first packet of a connection is incorrectly dropped when a non-FQDN object is used in the Rule Base.

PRJ-60469,
PRHF-38859

Security Management

Deleting a user that is used in a user group with more than 1000 users may cause SmartConsole to time out.

PRJ-55626,
PRHF-34401

Security Management

The "vsx-run-operation" Management API command may fail on the Multi-Domain Security Management Server. Refer to sk182524.

PRJ-60761,
PRHF-39098

Security Management

In rare scenarios, after deleting Data Center objects:

  • Login to the Security Management Server may fail with timeout.

  • Publish operations may take a long time.

PRJ-60150,
PRHF-38525

Security Management

In some scenarios, Virtual Security Gateways lose their licenses. This causes Site to Site VPN and Remote Access VPN services to go down, while general internet access remains functional. SmartUpdate may not load.

PRJ-60432,
PRHF-38563

Security Management

Virtual System routes and interfaces may not be synchronized to the Standby Security Management Servers.

PRJ-54442,
PRHF-33411

Security Management

In some scenarios, when exporting the Gateways and Servers View to CSV, the resulting file may contain an extra empty column. Refer to sk182233.

PRJ-61476,
PRHF-40016

Security Management

In rare scenarios, the CPRLIC process may exit with core files generated to the /var/log/dump/usermode/ directory on the Security Management Server.

PRJ-60339,
PRHF-38803

Security Management

In some scenarios, SmartTasks triggered by "after submit", "approve" and "reject" events fail to run.

PRJ-61358,
PRHF-39806

Security Management

In some scenarios, a cluster object may not be listed in the "Uninstall Threat Prevention Policy" window.

PRJ-61317,
PRHF-39827

Security Management

Fetching branches from an LDAP Server fails with "Failed to connect to LDAP Server. Please ensure that the administrator's credentials are correct and try again" when the LDAP Server does not support anonymous bind (when a client connects to an LDAP server without providing any credentials). To enable the ability, refer to sk183461.

PRJ-59624,

PRHF-38414

Multi-Domain Security Management

In rare scenarios, Domain creation fails with "Failed to create Domain server '<Domain Server Name>'. The connected administrator has no permission to create a Domain-Server on the specified Domain".

PRJ-60573,
PMTR-106428

Logging

When disconnecting the Security Management Server from the Infinity Portal and connecting to a different region, log sharing from Log Servers does not work until the Log Server restarts.

PRJ-61394

Logging

The "cp_log_export" command produces the correct output but displays a false error alert beforehand. This is a cosmetic issue.

PRJ-59894,
PRHF-38438

Security Gateway

The VSX Security Gateway may crash when an external interface connected to the Virtual Router or Virtual Switch starts flapping.

PRJ-60538,
PRHF-38647

Security Gateway

In a rare scenario, after an upgrade, the Security Gateway may crash with a vmcore.

PRJ-61451,

PRHF-39847,

PRJ-61448,
PRHF-39840,

PRJ-60948,
PRHF-39471

Security Gateway

  • In rare scenarios, the CPD, CPVIEW_SERVICES, RAD, SNMPD and VPN processes may exit with a core dump file because of memory corruption.

  • When handling interface statistics, the CPD or FWK processes may unexpectedly restart with an error related to IOCTL printed in logs.
    Refer to sk183544.

PRJ-60535,
PRHF-38638

Security Gateway

In some scenarios, in a cluster environment, when URL Filtering is enabled, there may be traffic disruption.

PRJ-60445,
PRHF-38975

Security Gateway

RADIUS authentication fails when a response packet contains the Message-Authenticator attribute. Refer to sk183244.

PRJ-59785,
PRHF-38340

Security Gateway

The FWK process may unexpectedly restart when running the memory detection leak procedure.

PRJ-59545,
PRHF-38154

Security Gateway

In some scenarios, the "Use of undefined constant session" warning is frequently printed in the SAML Portal's error_log file.

PRJ-57084,
PRHF-35275

Security Gateway

Intermittent DNS resolution failures on a specific Virtual System (VS) on the Maestro VSX Gateway.

PRJ-60426,
PMTR-114342

Security Gateway

In rare scenarios, the FWK process may unexpectedly exit when the IPS Blade logs triggered protections.

PRJ-58558,
PRHF-37480

Security Gateway

When running an HCP test, redundant errors "Global param: operation failed", "Unknown parameter (param name fw_je_leak_detection_set)/(param name cp_shmem_leak_detect)" may be printed in /var/log/messages log. This is a cosmetic issue.

PRJ-60547,
PRHF-38708

Security Gateway

Incorrect memory handling may cause the FWK process to unexpectedly exit.

PRJ-60128,
PRHF-38666

Security Gateway

Memory allocation issue may occur, when the Mirror and Decrypt feature is enabled.

PRJ-60125,
PRHF-38574

Security Gateway

When Mirror and Decrypt features are enabled, the Security Gateway may experience unexpected reboots.

PRJ-60578,
PRHF-38995

Security Gateway

In rare cases, failovers may occur because the FWK process unexpectedly exits.

PRJ-59156,
PRHF-37774

Security Gateway

Security Gateways with default MDPS task settings using proxy can fetch CPUSE updates and licenses successfully. On MPLANE updatable objects are not updated while everything works on DPLANE.

PRJ-61076,

PRHF-39496

Security Gateway

HTTPS traffic fails with "connection reset" errors on Security Gateways that have HyperFlow IoC feeds configured. Refer to sk183373.

PRJ-56414,

PRHF-35304

Threat Prevention

In rare scenarios, the Packet Capture field is missing from Threat Prevention logs in SmartConsole. Refer to sk182597.

PRJ-59567,
PRHF-34528

Threat Prevention

In some scenarios, external IoC feeds are not correctly fetched in VSX environments after a reboot.

PRJ-57977,
PRHF-36739

Threat Extraction

In a rare scenario, a script related to CPView may take a long time to execute and the SCRUBD process becomes unresponsive.

PRJ-60242,
PRHF-38820

Identity Awareness

PDP to PEP Identity synchronization may fail on the PDP side if an alternative IP address for PEP communication is configured, as described in sk60701.

PRJ-56047,

PRHF-35030

Identity Awareness

Identity Broker Subscriber configured with local Access Role recalculation incorrectly deletes external groups during new Identity publishing, causing missing access roles and improper enforcement for CISCO ISE identity sessions.

PRJ-60939,
PRHF-38863

IPS

The FWK process may unexpectedly exit during HTTPS inspection flow which requires the RAD service categorization.

PRJ-60821,

PMTR-114946

Anti-Virus

False threat alerts may appear in Anti-Virus logs for benign traffic (action: accept). This is a cosmetic issue with no security impact.

PRJ-58004,

PRHF-36322

Anti-Virus

In rare scenarios, Security Gateways with Content Awareness Blade enabled may fail to properly process certain .zip file formats, resulting in "Failed to process files" errors during Anti-Virus inspection.

PRJ-59856,
PRHF-38565

Anti-Virus

In some failure scenarios, the Anti-Virus blade does not report the failure in a SmartConsole log.

PRJ-60662,

PMTR-114734

Anti-Bot

In rare scenarios, the RAD process may unexpectedly exit.

PRJ-60615,
PRHF-39184

Mobile Access

The Mobile Access Portal hosted on a Security Gateway R81.20 or lower becomes unresponsive, and CVPND core files are generated after the Security Management Server is upgraded to version R82.

PRJ-59765,
PRHF-38539

ClusterXL

If both bond subordinate interfaces are down, the output of "cphaprob show_bond bond" command is corrupted.

PRJ-57368,
PRHF-36165

ClusterXL

In VSX environments, deleting a Virtual System interface through SmartConsole fails to remove certain bindings, causing the interface to be automatically re-added.

PRJ-60779,
PMTR-110618

ClusterXL

The ROUTED daemon may incorrectly initialize as Subordinate rather than Master after a "cpstop;cpstart" command when executed on the sole Active member in a cluster configuration.

PRJ-60958,
PMTR-107209

ClusterXL

Cluster member state queries return non-unique or irrelevant state codes, making it impossible to distinguish between different cluster member states.

PRJ-51585,
PMTR-98639

ClusterXL

ClusterXL Standby member stays down with a message "Reason for state change: FULLSYNC PNOTE - Connection terminated by remote member". Refer to sk182660.

PRJ-58335,
PRHF-36801

ClusterXL

A Multi-Version Cluster (MVC) member with VPN enabled may crash when performing an upgrade from R80.40.

PRJ-60532,
PRHF-38566,

PRJ-60544,
PRHF-38704

ClusterXL

In ClusterXL High Availability setup, a crash may occur on both the primary and secondary members, causing network outages.

PRJ-59212,
HEC-1195

ClusterXL

In High Availability Bridge Mode ClusterXL environments, the management interface of a Standby member becomes inaccessible. Refer to sk183124.

PRJ-59502,
PRHF-38095

ClusterXL

In rare scenarios, after enabling Bridge Mode, a cluster member may stuck in a boot loop.

PRJ-60292,

PRHF-38847

ClusterXL

A race condition may occur during startup when the ROUTED daemon does not receive all cluster Virtual IP addresses, causing static routes to disappear.

PRJ-61466,
PMTR-111760

SecureXL

The USIM process to exit during error logging.

PRJ-60591,
PMTR-113834

SecureXL

In a rare scenario, no traffic is passed in the 6in4 tunnel and the two hosts cannot reach each other. The output for the "tcpdump" command in the tunnel shows "ip: unknown ip 0".

PRJ-62357,

PRHF-40869

SecureXL

Maestro Gateways running Kernel Space Mode SecureXL (KPPACK) may automatically switch to User Space Mode SecureXL (UPPAK) during Jumbo Hotfix Accumulator installation if the platform supports UPPAK.

See the Critical Information section.

PRJ-61883

SecureXL

Installing R81.20 Jumbo Hotfix Accumulator Take 96 and higher on Maestro Gateways with SecureXL working in User Mode (UPPAK) may cause an outage.

See the Critical Information section.

PRJ-60377,
PMTR-114234

SecureXL

When printing the Deny list on a Security Gateway during Threat Prevention policy installation after deleting a large IoC feed from Security Management, an uninformative IOCTL error is displayed instead of a proper error message. The issue is cosmetic only.

PRJ-61020,
PMTR-115089

SecureXL

In rare scenarios, when SecureXL works in User Mode, running the "reset_gw" or "vsx_util reconfigure" commands may cause the Security Gateway to crash.

PRJ-61107,

PMTR-108077

SecureXL

SecureXL in User Mode (UPPAK) may be incorrectly enabled or disabled during runtime or Jumbo Hotfix Accumulator installation.

SecureXL in User Mode (UPPAK) can be enabled with PPPoE enabled although this configuration combination is not supported.

PRJ-61216,

PRHF-39512

SecureXL

The Security Gateway with SecureXL in UPPAK mode may crash under load during bond interface state flapping.

PRJ-60069,
PMTR-111505

SecureXL

Running the "tcpdump" command on all interfaces (for example, "tcpdump -peni any") on machines with SecureXL in User mode while under heavy traffic load may cause the system to hang. Refer to sk183222.

PRJ-61180,
PRHF-39695

SecureXL

Multicast traffic is dropped when the Packet-Broker operates in Monitor Mode with Promiscuous Mode disabled.

PRJ-61915,
PMTR-116506

SecureXL

The USIM process may crash during route updates when the Hardware Acceleration offloading connection is active.

PRJ-60720,
PMTR-114790

SecureXL

The Security Gateway may crash when connected to the Smart-1 Cloud Management Server and a maas_tunnel interface is repeatedly added and deleted.

PRJ-60999,

PMTR-115074

SecureXL

After MTU for Jumbo Frames is configured on a physical interface for the first time, until the Security Gateway is rebooted, there may be potential packet drops.

PRJ-60161,
PRHF-38736

Routing

The ROUTED daemon core dump file may be generated because of an assertion failure in the OSPF code.

PRJ-58774,
PRHF-37444

Routing

The ROUTED daemon may exit when processing OSPF network updates in a cluster environment. This occurs because of a timing issue in the routing protocol synchronization process.

PRJ-61330,
PMTR-115613

Routing

When working in User Mode (UPPAK), SecureXL may crash when multiple SND cores perform simultaneous next hop lookup for the same next hop.

PRJ-60775,
PMTR-114870

Routing

In some scenarios, the ROUTED daemon may exit with a core dump file.

PRJ-62595,

PMTR-117551

Routing

DHCP broadcast packets are not visible on the intended VLAN when working in SecureXL User Mode (UPPAK). Refer to sk183675.

See the Critical Information section.

PRJ-60834,

PMTR-114670

Routing

When obtaining a new IP address using the "dhclient -r" command turning off and on the interface configured as Dynamic Address IP (DAIP), the interface loses its IP address and fails to acquire a new one from the DHCP Server.

PRJ-61213,
PMTR-115308

Routing

If BFD (Bidirectional Forwarding Detection) timing parameters, such as "min-rx-interval", are modified during an active BFD session deletion process, and a new BFD session is established before the deletion fully completes (deletion typically requires up to 2 hours), the newly created session inherits the previous timing configuration rather than applying the updated timing settings.

PRJ-60744,
PMTR-114835

Routing

In some scenarios, BGP routing updates may not be processed properly.

PRJ-61419,
PMTR-114871

Routing

In a rare scenario, a Security Gateway crash and temporary loss of routing adjacency occur when the cluster messaging system attempts to process a deletion request for a BFD session that no longer exists.

PRJ-62110,

PRHF-40540

Routing

A memory leak occurs in the ROUTED daemon when CoreXL is running OSPF and handling large numbers of LSAs combined with frequent route flaps.

PRJ-61224,
PRHF-39785

VPN

In a rare scenario, the FWK process may exit during VPN traffic decryption and routing when the PPPoE interface is enabled.

PRJ-57349,
PRHF-36278

VSX

A static route to 0.0.0.0, regardless of the subnet mask, is incorrectly treated as the default route (0.0.0.0/0) and does not appear in the VSX Gateway's routing table. Refer to sk182742.

PRJ-53236,
PMTR-97794

VSX

Policy installation fails after converting VSX ClusterXL from High Availability to Load Sharing Mode using the "vsx_util convert_cluster" command.

PRJ-48007,
PRHF-29605

VSX

In a VSX High Availability Cluster, ns_relay core dumps may be generated and multiple TCP errors are printed in ns_relay.elg logs, such as: "<TCP ERROR> receive_buffer: recv returned -1", "<TCP ERROR> tcp_srv_connect_aux: connect failed".

PRJ-58319,
PRHF-37066

VSX

Virtual Router advanced routes may be assigned incorrect priorities in policy-based routing configurations.

PRJ-58333,
PRHF-37228

VSX

The "fw stat" command output may not display the correct policy name for a Virtual System.

PRJ-58790,

PRHF-37719

VSX

The "vsx_util view_vs_conf" command output may show "N/A" for a Gateway when an object in the Domain shares the same name as the Virtual System object.

PRJ-62064,
PRHF-40577

Gaia OS

Stability issue on Quantum Force appliances 9300 and 9400. Refer to sk183438.

PRJ-59136,
PMTR-110490

Gaia OS

When deleting a bond interface with slaves still attached while maintaining both WebUI and SSH sessions, the deletion succeeds but generates "unregister_netdevice" syslog messages and terminates the WebUI session. The issue occurs because local connections to the Gateway cause slow bond interface deletion, leading to WebUI timeout.

PRJ-61661,

ODU-2714

Gaia OS

The Redis Server does not start after installing the Gaia API Build 299. Refer to sk143612.

PRJ-57174,
PRHF-36109

Gaia OS

In rare scenarios, when using IP Aliasing, deleting an interface by IP address reference may incorrectly delete the wrong IP address because of incorrect error handling.

PRJ-59987,

PRHF-38501

Gaia OS

Multiple SNMP OIDs return incorrect data types. Refer to sk183166.

PRJ-58039,

PRHF-36803

Gaia OS

SNMP OID .1.3.6.1.4.1.2620.1.6.7.5.1.5.X falsely reports high CPU because of incorrect calculation. Refer to sk182784.

PRJ-58412,
PRHF-37416

Gaia OS

Exporting logs using the "backup -l" command may fail.

PRJ-50472,
PRHF-30581

Gaia OS

In rare scenarios, a Security Gateway may unexpectedly restart when deleting interfaces of an 802.3ad bond interface.

PRJ-62607,

PRHF-41064

CloudGuard Network

After an upgrade to R81.20 Jumbo Hotfix Accumulator Take 99, AWS CloudGuard Gateway may crash with a vmcore. Collecting the CPInfo statistics also triggers a crash with a reboot.

PRJ-60962,

PMTR-115016

SD-WAN

SD-WAN fails to obtain next hop address automatically from the DHCP Server.

PRJ-59426,

PRHF-38271

SD-WAN

SD-WAN policy installation may fail during the configuration of MDPS on the Security Gateway.

PRJ-60747,

PMTR-114442

SD-WAN

In rare scenarios, SD-WAN policy installation hangs indefinitely.

PRJ-60260,

PMTR-101578

SD-WAN

Policy installation may fail after an upgrade of the Security Gateway with enabled SD-WAN.

PRJ-61503,
PRHF-39967

Scalable Platforms

A cluster member may crash when performing a manual site failover and the deployment is using "Interface Active Check" with IPv6 enabled.

PRJ-60449,
HEC-914

Scalable Platforms

After a reboot, IPv6 addresses configured on data interfaces disappear from the "ifconfig" output when the Same VMAC feature is enabled in SmartConsole.

PRJ-56585,
PRHF-35421

Scalable Platforms

Connections with fragmented packets drop with the "Virt Defrag Timeout" error. Refer to sk182559.

PRJ-60475,

PMTR-110389

Scalable Platforms

The "asg_dr_verifier" script fails when OSPF Graceful Restart is configured with a grace period.

PRJ-59876,

PMTR-113194

Scalable Platforms

A reboot loop with a generated configuration pnote may be triggered when Security Group hostname contains strings with "mq" or "otlp".

PRJ-60674,

PRHF-38834

Scalable Platforms

Running "cpstop" on a specific Virtual System may cause traffic interruption in dual site deployments.

PRJ-44777,

PMTR-90651

Scalable Platforms

Incorrect entry order in the /etc/passwd file (admin user entry appearing after root user entry) causes adding Security Group Member with the "member / m" command to hang/fail. Refer to sk180183.

PRJ-60051,

PRHF-38689

Scalable Platforms

One member in a Maestro Security Group may be reported as down and inaccessible, the /var/log/messages and fwk.elg logs indicate:

  • "State change: ACTIVE -> DOWN | Reason: VSX PNOTE due to problem in Virtual System X",

  • "<x> used greatest stack depth: 9544 bytes left",

  • Errors related to unknown/invalid parameters and kernel policy copy failures.

PRJ-54699,
PMTR-104415

Scalable Platforms

Local connections from members at a standby site may fail when using the Same VMAC feature and a VPN Tunnel Interface (VTI) is configured.

PRJ-59844,
PRHF-38430

Scalable Platforms

In a Security Group in VSX mode, if an interface's link state changes during boot, there may be a delay in updating the link state. This delay can cause traffic interruption on that interface.

PRJ-62386,

PRHF-40338

Scalable Platforms

The CPD process may exit during policy installation on a Scalable Platforms cluster on Quantum Force 29000 appliances.