R81 Jumbo Hotfix Take 106
List of Resolved Issues and New Features
|
Note - This Take contains all fixes from all earlier Takes. |
ID |
Product |
Description |
---|---|---|
Take 106 Released on 22 October 2024 |
||
Take 106 - New Functionality
|
||
PRJ-36319, PRHF-21090 |
Security Gateway |
NEW: Implemented support for LDAP queries using Windows Security Identifiers (SIDs) as search criteria. |
PRJ-52384, |
Harmony Endpoint |
NEW: Threat Emulation in Endpoint Security Clients version E87.60 and higher now supports the ONE, XAR, and WSF file formats. |
Take 106 - Improvements and Resolved Issues
|
||
PRJ-51534, PRJ-56315, PMTR-106774, PMTR-97312 |
Security Gateway |
UPDATE: Apache HTTPD version was updated from 2.4.55 to 2.4.61 to fix: CVE-2023-31122, CVE-2023-43622, CVE-2024-36387, CVE-2024-38473, CVE-2024-38474, CVE-2024-38475, CVE-2024-38476, CVE-2024-38477, CVE-2024-39573. |
PRJ-54681, PMTR-104266 |
Mobile Access |
UPDATE: Resolved CVE-2024-31497. The Putty version used in the Mobile Access Portal Embedded SSL Network Extender application is upgraded from version 0.80 to version 0.81. |
PRJ-55314, |
Gaia OS |
UPDATE: A patch on top of OpenSSL 1.1.1w to fix CVE-2024-2511. Refer to sk182320. |
PRJ-56225, PMTR-106852 |
Gaia OS |
UPDATE: Added a defense mechanism against malicious code injections through special HTTP requests. Resolved CVE-2024-24914. Refer to sk182743. |
PRJ-56468, PMTR-107058 |
Gaia OS |
UPDATE: Resolved CVE-2024-3596 - Blast-RADIUS attacks. Refer to sk182516 > Login to Gaia Portal. |
PRJ-52930, |
Security Management |
UPDATE: When deleting a Secondary Multi-Domain Security Management Server, SmartConsole now shows an "After MDS '<MDS name>' is deleted, you should delete the Secondary Domain Servers from the Domains and revoke their certificates" message. |
PRJ-52402, PMTR-99617 |
Security Management |
UPDATE: Added SHA256 fingerprints to certificate objects to mitigate the risk of hash collisions and enhance trust when utilizing the fingerprint, encoded with English words, as a verification mechanism. |
PRJ-53937, |
Security Management |
UPDATE: Modified the content of the https://<ip_adress>/license_management/ page. |
PRJ-54494, |
Security Management |
UPDATE: JRE is updated from version 8.0_8.10 to version 8.0_8.21. |
PRJ-54418, PRHF-33584 |
Security Management |
UPDATE: Policy installation duration with hundreds of layers is improved by approximately 30%. |
PRJ-55659, |
Security Management |
UPDATE: The "set threat-exception" Management API command now includes the "protection-or-site" parameter. When specified, this parameter adds new values to the existing list of protections or sites, instead of overwriting the current entries. |
PRJ-50773, |
Logging |
UPDATE: Port 8211 now accepts connections with the cipher ECDHE_RSA_AES_256_GCM_SHA384. |
PRJ-47653, |
Security Gateway |
UPDATE: Added ability to increase/decrease DNS cache table size. |
PRJ-54297, |
Security Gateway |
UPDATE: Added a new environment variable "IMPLIED_RULES_SET_BEFORE_LAST". It defines if Multi-Portal implied rules should be matched as "before drop" or "before last". The default value is "0", set to "before drop". When the value is set to "1", implied rules will be matched as "before last". Refer to sk180808. |
PRJ-47653, PRHF-29103 |
Security Gateway |
UPDATE: Added ability to increase/decrease DNS cache table size. |
PRJ-51172, PMTR-97400 |
Security Gateway |
UPDATE: Deprecated RC2-CBC cipher for SIC in OpenSSL. |
PRJ-55745, PMTR-104855 |
Threat Prevention |
UPDATE: Added the "trackSettings.forensics" parameter to the "threat-rule" Management API command to enable and disable the "forensics" option in the "Track" column. Syntax example: "mgmt_cli add threat-rule layer 'Standard Threat Prevention' position 1 track-settings.forensics false -r true". |
PRJ-48029, |
Threat Emulation |
UPDATE: The maximum size for files uploaded to Threat Emulation can now be configured using the Threat Emulation API. Set the "max_api_request_data_size" attribute to specify the new limit. |
PRJ-53917, |
URL Filtering |
UPDATE: When URL Filtering operates in Background Mode and encounters an unclassified connection, instead of being approved automatically, such connection is now accepted or rejected based on Access Rule Base execution, and listed under the "unknown" category. |
PRJ-54136, PMTR-103001 |
SSL Inspection |
UPDATE: Added a log for connections rejected because of short Server certificate public key size (RSA 1024 bits or less, ECDSA 256 bits or less). |
PRJ-54339, |
SSL Network Extender |
UPDATE: SSL Network Extender is updated to version 80008409. |
PRJ-51530, |
Mobile Access |
UPDATE: The Mobile Access Portal is no longer compatible with the Chrome browser on iOS and Android mobile devices. |
PRJ-55727, |
VPN |
UPDATE: VPN connections are now synchronized to all members of the Security Group by default. The default value of the "vpn_sync_to_all" kernel parameter is set to "1". |
PRJ-54670, |
VoIP |
UPDATE: SIP over UDP requests and responses may be dispatched to different firewall instances when a single-direction rule is defined in the Rule Base, potentially causing returned SIP traffic to be dropped as an unknown connection. To address this, a new global parameter "sip_forward_if_needed" is introduced (disabled by default). When enabled, the Security Gateway forwards responses to the appropriate request instances. Refer to sk182667. |
PRJ-55915, |
CloudGuard Network |
UPDATE: Added Take 21 of Public Cloud CA Bundle. Refer to sk172188. |
PRJ-56191, PRJ-55685, PRJ-55299, PRJ-56681, PRJ-57027, PRJ-57261, ODU-2035, ODU-2019, ODU-1955, ODU-1755, ODU-1779, ODU-1787 |
Automatic Updates - Web SmartConsole |
UPDATE: New features and improvements are released in Take 104, Take 111, Take 114, Take 118, Take 119, Take 120 via self-updatable package. Refer to sk170314. |
PRJ-56055, PRJ-55580, PRJ-57329, ODU-1979, ODU-1803, ODU-1923 |
Automatic Updates - HCP |
UPDATE: Added Update 18 and Update 19 of HealthCheck Point (HCP) Release. Refer to sk171436. |
PRJ-55912, |
Automatic Updates - CPView |
UPDATE: Added Take 97 of CPotelcol (OpenTelemetry Collector) Release Updates. Refer to sk180522. |
PRJ-50934, |
Security Management |
SmartConsole may freeze when selecting a client under Security Gateway object > Identity Awareness tab > RADIUS Accounting Settings.
|
PRJ-53452, |
Security Management |
Upgrade of the Multi-Domain Security Management Server may fail with the error "Folder object not found".
|
PRJ-54003, |
Security Management |
In rare scenarios, the Management Server upgrade fails during the import stage with "an eclipse error has occurred enable logging on EclipseLinkExceptionHandler to see full error".
|
PRJ-51119, |
Security Management |
In rare scenarios, if a Star VPN Community object is created, publish operations may fail. |
PRJ-50842, |
Security Management |
Export of a list of objects from the Global Object Explorer fails with the "Export policy is not supported when rule name is in a format of UUID" error message. |
PRJ-53505, |
Security Management |
After upgrading, administrators with read/write permissions to edit Security Gateways and Clusters may lack IPS permissions and are unable to perform certain management tasks, such as enabling or disabling blades. |
PRJ-52898, PRHF-30884 |
Security Management |
Log queries fail with the error "Problems have occurred during search" when Domain migration is in progress. This occurs specifically during the execution of "export-management" or "import-management" Management API commands. |
PRJ-53500, |
Security Management |
In some scenarios, SmartConsole may unexpectedly disconnect. |
PRJ-52887, |
Security Management |
"Mapping of Data Center [xxxx] failed. Next mapping is in 300 seconds" errors in the CME logs show failed attempts to scan deleted data centers. |
PRJ-56148, PRHF-35183 |
Security Management |
When Compliance is enabled, the FWM process may unexpectedly exit and generate a core dump. Refer to sk182507. See the Important Notes section. |
PRJ-56854, PRHF-34283 |
Security Management |
In some scenarios, the FWM process may unexpectedly exit and generate a core dump every few days, when Compliance is enabled and the scheduled full scan is not configured according to sk182507. |
PRJ-52432, |
Security Management |
When Global Domain Assignment fails with the "More than one object named 'XXX' exists" error, not all duplicate objects are listed. |
PRJ-53893, |
Security Management |
In rare scenarios, the API status shows "Automatic Start: Disabled" even though the automatic start was not disabled manually. |
PRJ-53339, |
Security Management |
When a Domain object in a policy is set with a backslash in the suffix, policy installation fails with the "Unterminated string&CURRENTVERCMP" error. |
PRJ-49581, |
Security Management |
In some scenarios, when searching objects in SmartConsole, not all relevant results are highlighted. |
PRJ-48935, |
Security Management |
The "set simple-cluster" Management API command with the "vpn-settings.vpn-domain" parameter succeeds, but the VPN Domain is not set. |
PRJ-55333, PRHF-33993 |
Security Management |
In rare scenarios, login to SmartView web application using the Domain IP address or Domain name fails. |
PRJ-55521, |
Security Management |
In rare scenarios, the CPD process may exit with core dumps. |
PRJ-55330, PRHF-34049 |
Security Management |
If the $FWDIR/conf/fwm.adtlog file is not valid, the FWM process leaves unused file descriptors, which may affect the Security Management Server performance. |
PRJ-56163, |
Security Management |
In some scenarios, the "set-exception-group applied-threat-rules.position" Management API command may add the exception group to an incorrect position. |
PRJ-53258, |
Security Management |
When exporting a policy to a CSV file, the process fails silently if any rule within the policy has a name or comment in UID format. No clear error message is provided to indicate the cause of the failure. |
PRJ-55479, |
Security Management |
In rare scenarios, when Application Control is enabled, cloning a policy may fail due to timeout. |
PRJ-54657, |
Security Management |
Several Management API commands, such as "show-package" and "install-policy", may fail if running them after the deletion of a cluster member. |
PRJ-56710, |
Multi-Domain Security Management |
In some scenarios, cpmiquerybin core files may appear in /var/log/dump/usermode/ on the Security Management Server. |
PRJ-53550, |
Multi-Domain Security Management |
When a Domain name (for example, "XXX") is a subset of another Domain name (for example, "XXX-YYY"), the "mdsstop" command may fail to stop a Domain named "XXX-YYY". |
PRJ-50779, |
Multi-Domain Security Management |
In a Multi-Domain Security Management environment, there may be synchronization timeout errors, and automatic revisions purge may fail. |
PRJ-57442, |
SmartConsole |
In some scenarios, opening new tab in SmartConsole Logging & Monitoring tab fails with "HTTP error 500 - problem accessing smartview/embedded. Reason: Server Error". Refer to sk182732. |
PRJ-42133, PRHF-25935 |
CPView |
In a rare scenario, when running the CPView utility, the Security Gateway may crash. |
PRJ-55951, |
Logging |
In rare scenarios, CPU consumption on the Security Management Server is high and logs are not displayed. |
PRJ-46847, PRJ-46579 |
Logging |
RAD error messages may be printed to the fwk.elg file during cpstop:cpstart on the Security Gateway. The issue is cosmetic only. |
PRJ-51442, |
Logging |
The traffic field in the SmartEvent "Application and URL Filtering" report, specifically in the "High Bandwidth Applications" section, is incorrectly displaying data in petabytes (PB) instead of the expected gigabytes (GB). |
PRJ-50693, |
Logging |
In some scenarios, viewing a Forensics report in Threat Hunting fails with the "Unable to load report" error. Refer to sk181800. |
PRJ-51428, |
Logging |
In some scenarios, in Multi-Domain Management environments with over 300,000 network objects, the LOG_INDEXER process repeatedly exits if the procedure from sk164452 is not applied. |
PRJ-51515, |
Logging |
Log searches for the same time period may return more results in SmartConsole compared to SmartView. |
PRJ-51274, PRHF-31323, PRJ-53217, PRHF-32587 |
Logging |
When adding a table widget to a SmartView report:
|
PRJ-51692, |
Logging |
In some scenarios, after removing an existing Log Exporter instance, the creation of a new instance appears successful in SmartConsole. However, the new Log Exporter object is not actually generated. |
PRJ-52462, |
Logging |
In SmartView, filtering logs by "event_type" may fail with the "Query failed" error. |
PRJ-54059, |
Logging |
In rare scenarios, empty log list may be displayed when selecting a log file to view in SmartConsole. |
PRJ-50260, |
Logging |
In SmartView, some countries are not displayed in the countries picker. |
PRJ-33619, |
Logging |
Log Exporter may unexpectedly exit when using a non-RSA certificate. |
PRJ-44793, |
Logging |
In rare scenarios, the FWD process on the Security Gateway may reach out of memory and produce a core dump file of around 3GB. |
PRJ-52939, PRHF-32194 |
Logging |
In the Logs view, the "TCP-other" and "UDP-other" services are displayed as generic service IDs, for example, "cp_tcp_A936BBAC_EBC3_4F18_B3CC_A63365F07477". |
PRJ-54062, |
Logging |
In rare scenarios, the CPSEMD process on the SmartEvent Server may unexpectedly exit, creating a core dump file. |
PRJ-48770, |
Logging |
The "show logs" Management API command may show partial information for the fields with multiple values. |
PRJ-50614, |
Logging |
The FWD process may exit and cause issues with opening packet capture files on remote members. |
PRJ-51968, |
Security Gateway |
The CPWD daemon does not restart automatically. |
PRJ-53073, |
Security Gateway |
In some occasions, redundant errors appear in logs: "fw_inspect_ghtab_bl_ld_sync: invalid FW_INSPECT_GHTAB_BL_LD_SYNC_TABLE_ID". |
PRJ-48815, |
Security Gateway |
After deploying a new license to a Multi-Domain Log Module (MLM), all Customer Log Modules (CLMs) generate alert logs about missing license/contracts stating "No valid license was found". |
PRJ-46888, |
Security Gateway |
Incorrect value in the "fwisusfw" register causes improper CPU affinity and dynamic balancing initialization in User Space Firewall mode after an upgrade. Refer to sk182004. |
PRJ-52677, |
Security Gateway |
Running GTP traffic may cause a crash on a Security Gateway without a GTP license. |
PRJ-54413, |
Security Gateway |
In a VSX Cluster environment, the CPVIEWD daemon may cause a high CPU. |
PRJ-56166, PMTR-98475 |
Security Gateway |
The RAD process exits and creates a core file on the Security Gateway. |
PRJ-45949, PRHF-28371 |
Security Gateway |
During policy installation, Rule Base internal error drops may be shown in the SmartConsole logs. Logs related to "dynobjs" may be printed in Messages. |
PRJ-48103, PRHF-29616 |
Security Gateway |
Outages may occur when the FWD process exits or restarts and Security Group member goes down triggering Scalable Chassis failover. |
PRJ-55938, |
Security Gateway |
A minor memory leak in a process related to the Unified Access Policy Rule Base. |
PRJ-52772, |
Security Gateway |
In rare scenarios, the FWK process may unexpectedly exit. |
PRJ-49900, |
Security Gateway |
Kernel Memory usage increases persistently each day on a Security Gateway/Security Group when CGNAT is enabled. Refer to sk182140. |
PRJ-53626, |
Security Gateway |
A memory issue may occur in a cluster environment, when SIP inspection is enabled. |
PRJ-51437, |
Security Gateway |
A rare race condition may be triggered by the timing and packet patterns of VoIP traffic, and, as a result, the FWK process may restart. |
PRJ-55516, PMTR-105145 |
Security Gateway |
See the Important Notes section. |
PRJ-54527, |
Security Gateway |
In some scenarios, the Security Gateway offloads connections to SecureXL in error when the initial route lookup could not find a route for it. |
PRJ-54626, |
Security Gateway |
In some scenarios, adding sequential IP addresses as MDPS task addresses may fail. |
PRJ-55577, PMTR-104837 |
Security Gateway |
A buffer overflow may occur in the HTTP flow, affecting the FWK process. |
PRJ-57106, PRHF-36116 |
Security Gateway |
Memory leak may occur in SecureXL templates. Refer to sk182648. See the Important Notes section. |
PRJ-53808, |
Security Gateway |
The Security Gateway may crash after a failure in policy installation. |
PRJ-56642, |
Security Gateway |
In rare scenarios, the FWK process may unexpectedly exit when the IPS / Application Control / Anti-Virus / Anti-Bot is active and the HyperFlow feature is enabled. |
PRJ-52645, |
Internal CA |
CRL fetch may fail when passing through a Security Gateway with deep inspection, even if the connection hold is quickly released. CPCA closes the connection prematurely. |
PRJ-48308, |
Threat Prevention |
In rare scenarios, when Anti-Virus, Threat Extraction and Threat Emulation are enabled, some connections that were on hold are dropped. |
PRJ-53910, |
Threat Prevention |
SSH DPI may not work because of incorrect parsing of the client hello from a non-standard SSH client. |
PRJ-56094, PMTR-106568 |
Threat Prevention |
SSH Deep Packet Inspection (SSH DPI) fails to start inspection if IPS is enabled while all other Threat Prevention products are disabled. |
PRJ-50699, |
Threat Prevention |
Anti-Virus fails to parse IoC feeds that contain IPv6 addresses. |
PRJ-51055, |
Threat Prevention |
Threat Prevention policy installation may fail because of invalid JSON format in the IoC feed feature configuration file. Refer to sk181650. |
PRJ-55765, PMTR-104381 |
Threat Prevention |
In rare scenarios, policy installation may fail after an upgrade of a VSX Gateway. |
PRJ-55987, PMTR-104285 |
Threat Prevention |
In a rare scenario, Threat Prevention policy installation may fail after an over-the-air (OTA) package update of TP_CONF_SERVICE. Refer to sk182572. |
PRJ-53199, |
Threat Prevention |
In some scenarios, policy installation and IPS package updates may take a very long time to finish and cause traffic drops. |
PRJ-56330, |
Threat Prevention |
In a rare scenario, the Security Gateway may crash during traffic inspection when holding a connection. |
PRJ-51490, PRHF-31582 |
Threat Emulation |
When using ICAP, filename handling occasionally fails. As a result Threat Emulation may not be able to process this specific file. |
PRJ-46347, PRHF-27721 |
Threat Emulation |
The ICAP client may send the file name under "Content-Disposition" in an unsupported format written as "filename*=" instead of "filename=", and the Threat Emulation does not process such files. |
PRJ-46488, |
Identity Awareness |
Policy Enforcement Point (PEP) logs show a username after the user session is expired. Refer to sk181553. |
PRJ-53588, |
Identity Awareness |
In Azure Active Directory, access role assignment only considers a user's first 100 group memberships. Any groups beyond this limit are disregarded when determining user access roles. |
PRJ-51339, |
Identity Awareness |
In some scenarios, the PEPD process may consume a high CPU because of a high rate of identity propagation. |
PRJ-35859, |
Identity Awareness |
Microsoft Azure Active Directory does not fetch users in the Access Role object and shows "The user directory is still initializing". Refer to sk175983. |
PRJ-56512, |
Application Control |
The fwk.elg file may be flooded with the "DNS_DATA_SOURCE failed on context 201, executing context 366 exception" messages. Refer to sk182606. |
PRJ-55458, PRHF-34098 |
URL Filtering |
In scenarios where there is a heavy load on the machine, the RAD queue can fill up and get clogged by unhandled requests, causing an outage and traffic disruption. |
PRJ-56622, PMTR-107215 |
IPS |
IPS may drop an IPv6 TCP local connection. |
PRJ-54429, |
IPS |
In a rare scenario, when IPS is enabled and logging on a rule that involves IPS is enabled, physical memory usage may rapidly increase. |
PRJ-43102, |
DLP |
Multiple internal errors, including file metadata retrieval failures and parsing errors, may be printed in the DLPDA logs. |
PRJ-50979, |
Anti-Virus |
Anti-Virus may enforce observables from IoC feeds although they were deactivated in SmartConsole. |
PRJ-53126, |
Anti-Virus |
The DLPU process may unexpectedly exit due to uninitialized memory when Anti-Virus scans files. Refer to sk182030. |
PRJ-56040, |
Anti-Virus |
In some scenarios, the Anti-Virus logs on a VSX Gateway may display an incorrect origin IP address. |
PRJ-54194, PRHF-31001 |
Anti-Bot |
Anti-Bot may generate error logs with the "Failed to Decrypt CP Site Response" reason. Refer to sk182494. |
PRJ-52977, |
Mobile Access |
Enabling the "cvpnd" debug causes the reverseproxy_ssl_debug.log file size to continue growing even after the "reverse proxy" debug is off. |
PRJ-51152, |
Mobile Access |
Web Application names column width is too narrow to fit in the Mobile Access Portal. Refer to sk181774. |
PRJ-54443, PMTR-103889 |
Mobile Access |
HTTPS access to the Mobile Access Portal may be down. |
PRJ-54639, |
Mobile Access |
The HTTPD process of the Mobile Access Portal may exit with a core dump file. |
PRJ-56220, PRHF-35271 |
Mobile Access |
The "citrixStrictTicketEnforcement" parameter set in the configuration file may not work as expected. |
PRJ-42807, |
ClusterXL |
Cluster members may crash, generating vmcores in /var/log/crash. |
PRJ-54168, |
ClusterXL |
In rare scenarios, in a cluster environment, the CPDiag tool may crash. |
PRJ-55632, PRHF-27989 |
ClusterXL |
After modifying a bond, the Monitored VLANs may disappear. Refer to sk180724. |
PRJ-54329, |
SecureXL |
In rare scenarios, the Security Gateway crashes when the interface goes down right before it transmits packets out. |
PRJ-54426, |
SecureXL |
In some scenarios, the VSX Gateway does not initialize the Virtual System correctly when connected to a Virtual Router or Virtual Switch. |
PRJ-54321, |
SecureXL |
In some scenarios, traffic with Passive or Active Streaming configuration may not correctly pass through a Virtual Router on a VSXGateway. |
PRJ-53059, |
SecureXL |
During the deny list update process, there is a temporary gap where no IP addresses are blocked, allowing unwanted traffic to pass through the Security Gateway unfiltered. |
PRJ-54423, |
SecureXL |
In some scenarios, the VSX Gateway may fail to properly reroute traffic originating from a Virtual Switch. |
PRJ-56009, PRHF-34987 |
SecureXL |
In a rare scenario, a memory leak in the adp kernel module may occur during multicast routing assert failures. |
PRJ-51109, PMTR-97788 |
SecureXL |
SYN Defender configuration in Inspection Settings on the Security Management Server may not be applied on Accelerated Policy installation. |
PRJ-56805, |
SecureXL |
When the VSX Gateway is created, the parameter that determines whether VSX mode is enabled or disabled is not set in SecureXL configuration until a reboot is performed. |
PRJ-56523, |
Routing |
In a ClusterXL environment, a race condition may occur when BGP Graceful Restart is incorrectly configured. If the feature is enabled for some peers but not others, it may lead to permanent loss of network routes. |
PRJ-55342, |
Routing |
OSPFv2 graceful restart mechanism fails on broadcast and point-to-multipoint networks due to the omission of an "IP-Address" field in the grace LSA. |
PRJ-54601, |
Routing |
Routing BFD sessions using IPv6 global addresses on single-hop interfaces fail to recover after the network interface is administratively disabled and re-enabled. |
PRJ-53826, |
Routing |
A multicast outage may occur during failovers caused by interface flaps. |
PRJ-53854, |
Routing |
ROUTED process assert failure may take place when LSA from a neighbor's retransmission list is freed if that LSA belongs to the max age hold tree that is flooded at max age. |
PRJ-54406, |
Routing |
A multicast outage may occur after a failover triggered by incomplete processing of cluster synchronization messages. |
PRJ-53170, |
Routing |
The ROUTED process may unexpectedly exit because of an OSPF assertion failure. |
PRJ-53173, PMTR-101331 |
Routing |
Graceful Restart may end prematurely in OSPF NSSA areas. |
PRJ-56431, PMTR-107256 |
Routing |
Dynamic Routing outage in a Security Group during the Zero Downtime (MVC) Upgrade to R81.20, during the Downgrade from R81.20, or during the installation / uninstall of the R81.20 Jumbo Hotfix Accumulator. Refer to sk182556. |
PRJ-56052, |
Gaia OS |
Adding multiple VPN tunnels via Clish in Transaction Mode fails, while adding them individually succeeds. |
PRJ-56119, |
Gaia OS |
The "Unable to connect to the server, Press OK to reconnect" error is displayed when opening the Network Interfaces tab in the Gaia Portal. Refer to sk182560. |
PRJ-55304, |
Gaia OS |
The "cpviewd: unable to read from gpio_nuvoton driver module. snmpd: unable to read from gpio_nuvoton driver module" messages may be printed in /var/log/messages. |
PRJ-52414, PRHF-31929 |
Gaia OS |
SNMP query for OID 1.3.6.1.4.1.2620.1.6.7.5.1.5 (CPU utilization per CPU core) and the "cpstat os -f cpu" command may return an incorrect value. Refer to sk182447. |
PRJ-54435 |
Gaia OS |
After a Jumbo Hotfix Accumulator upgrade, login notifier may be enabled, although it was disabled before the upgrade. |
PRJ-54178, |
Gaia OS |
Removing unused built-in user called "cp_ender" that may appear in Gaia OS after an upgrade. Refer to sk182185. |
PRJ-41989, |
Gaia OS |
Trap names duplications in chkpnt.mib and chkpnt-trap.mib may cause incorrect values when using SNMP traps. |
PRJ-51349, |
VPN |
Remote Access VPN connections in Maestro environments may be dropped with the "out-of-state" reason. |
PRJ-55486, |
VPN |
During high-frequency encryption of packets over a VPN tunnel, the Security Gateway may assign the same sequence number to multiple packets. This causes the receiving VPN peer to mistakenly identify these legitimate packets as replay attacks and drop them. |
PRJ-53847, |
VPN |
After an update, if in VPN if configured with Permanent Tunnels enabled, RAM utilization may increase. |
PRJ-55291, |
VPN |
Configuring a Large Scale VPN (LSV) with IPv6 and establishing a VPN tunnel may cause the FWK process to exit. |
PRJ-53011, PMTR-100991 |
VPN |
The FWK process may crash when establishing multiple VPN tunnels simultaneously at peak rates. |
PRJ-49208, PRHF-30241 |
VPN |
Remote Desktop Protocol (RDP) connections may frequently disconnect when network traffic is routed through a combination of medium path, Quality of Service (QoS) controls, and VPN. |
PRJ-50088, PMTR-90101 |
VPN |
By default, the VPN permanent tunnel is configured to use "tunnel test" instead of "DPD". This configuration may cause inaccurate permanent tunnel status reporting when connecting to third-party devices. |
PRJ-56038, PRJ-55986 |
VPN |
During high-volume VPN tunnel initiations, several packets may be dropped with "encrypted packet too big". |
PRJ-51018, |
VPN |
Duo management reports display incorrect access source locations due to Security Gateways providing inverted IP addresses during the two-factor authentication challenge response process. Refer to sk181783. |
PRJ-53713, |
VPN |
Tunnel testing fails after an upgrade. Refer to sk182267. |
PRJ-53382, |
VPN |
IPv6 non-VPN traffic may be dropped with "Clear text packet should be encrypted". |
PRJ-52828, |
VPN |
In a rare scenario, in a Maestro environment, the first packet of the VPN tunnel is lost or has a large delay. |
PRJ-50155, PMTR-93643 |
VPN |
When working with iOS devices, after establishing a VPN connection and subsequently disconnecting devices, the "vpn tu tlist" command may display an incorrect device connection status, indicating that a device is still connected. |
PRJ-54679, PMTR-104230 |
Multi-Portal |
Under a special routing configuration, an active Cluster member may accept portal traffic (on TCP ports 80 and 443) destined to a Standby member IP address. |
PRJ-55885, |
VSX |
Deleting a Virtual System ID (VSID) that does not exist may trigger the "cpstop" command. Stopping all Check Point services on VS0 can disrupt the entire VSX environment. |
PRJ-53116, |
VSX |
In a VSX Cluster with IPv6 enabled, after an upgrade, VS's without IPv6 address may fail to install the Access policy. |
PRJ-54596, |
VSX |
In rare scenarios, the CPD process of the default Virtual System on a VSX Gateway (VS0) gets stuck. |
PRJ-56671, PRHF-35637 |
VSX |
Memory corruption may occur when a bond interface is configured, leading to a Security Gateway crash with a vmcore or a boot loop. |
PRJ-57815, |
VSX |
Multi-Queue configuration does not survive reboot on VSX. Refer to sk173950. |
PRJ-47806, |
CloudGuard Network |
In the Kubernetes Data Center, the Import window may be stuck in "Initializing" state. |
PRJ-44695, |
Scalable Platforms |
When running the "asg resource" command, the SSD overall health check is displayed as "PASSED" with the "Unknown_Attribute on Member X_XX is below/getting towards low threshold (val: 0/ thresh: 0)" warning. The issue is cosmetic only. |
PRJ-55568, |
Scalable Platforms |
Traffic outage after policy installation on a Maestro Security Group in the VSX mode that works in the Dual Site configuration. Refer to sk182379. |
PRJ-53081, |
Scalable Platforms |
Redundant "MHO_stateAgent[3230]: QuidAddon: System not ready yet - attempting to re-init" messages in the /var/log/messages file. |
PRJ-29746, |
Scalable Platforms |
When configuring backup-scheduled/snapshot recurrence via gClish shell with "The <name> job already exists. Please choose another name. Backup schedule failed. The backup will not be scheduled". |
PRJ-49846, |
Scalable Platforms |
Site to Site VPN traffic may be interrupted after installing policy with VSLS. |
PRJ-57437, PRHF-36390 |
Scalable Platforms |
In a Maestro environment with the "vpn_sync_to_all" parameter enabled, connection going through a Site to Site VPN to a remote location, may be dropped with "First packet isn't SYN". See the Important Notes section. |
PRJ-50624, |
Carrier Security |
|