Software Changes in R82.10
|
|
Note - To see the list of changes starting from R80.40, see sk180180. |
This section describes behavior changes in R82.10 comparing to the previous version R82.
Gaia Operating System
-
Updated the Gaia
Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems. OS Linux kernel version to "5.14". -
Updated the OpenSSL version to "3.5.0".
-
Updated the OpenSSH version to "8.6".
-
Updated the network interface driver "
mlx" version to "24.10-0.7.0". -
Updated the Data Plane Development Kit (DPDK) version to "22.11".
-
Disabled these in the default SSH configuration (only in a Clean Install):
-
Weak Message Authentication Codes (MACs) in SSH:
-
hmac-sha1: -
hmac-sha1-etm@openssh.com -
umac-64-etm@openssh.com -
umac-64@openssh.com
-
-
Weak Public-Keys:
-
ssh-rsa -
ssh-rsa-cert-v01@openssh.com
-
-
-
These Check Point Appliance models do not support R82.10:
-
23500, 23800, 23900
-
15400, 15600
-
6500, 6800
-
5100, 5200, 5400, 5600, 5800, 5900
-
3100, 3200
-
Smart-1 5150, Smart-1 5050, Smart-1 625, Smart-1 405, Smart-1 410
-
Scalable Chassis
The container that contains the all the components of a 60000 / 40000 Appliance. Synonym: Chassis. 44000 / 64000
-
Security Gateway
-
On Check Point Appliances, Virtual Machines, and Open Servers:
-
Firewall runs only in the User Space Firewall mode (USFW).
The Kernel Space Firewall mode (KSFW) does not exist anymore.
See sk167052.
-
SecureXL
Check Point product on a Security Gateway that accelerates IPv4 and IPv6 traffic that passes through a Security Gateway. runs only in the User Mode (UPPAK).The Kernel Mode (KPPAK) does not exist anymore.
-
-
Updated the Data Plane Development Kit (DPDK) version to 22.11.
-
Added support for SecureXL in the User Mode (UPPAK) in CloudGuard Network Security Gateways in all cloud environments.
-
Log Forwarding is now enabled by default in new Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. / Cluster
Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. objects. At midnight, locally stored logs are sent to the primary Log Server
Dedicated Check Point server that runs Check Point software to store and process logs..In the new Security Gateway / Cluster object, navigate to Logs > Additional Logging and refer to the section Log Forwarding Settings.
-
By default, the Security Gateway's Multi-Portal (Web Portals for various Software Blades) is configured to use only recommended and secure TLS cipher suites.
Weak cipher suites are now disabled by default. To re-enable the necessary weak ciphers, use the
cipher_utiltool. -
Mobile Access
Check Point Software Blade on a Security Gateway that provides a Remote Access VPN access for managed and unmanaged clients. Acronym: MAB. support for Citrix is deprecated (see Mobile Access Requirements). -
Support for Hardware Security Module (HSM) from the FutureX vendor is deprecated.
-
These features are deprecated in VPN Communities:
Deprecated Feature
How to Get There in
SmartConsole R82 and lower
Next Step
IKEv1
VPN Community
A named collection of VPN domains, each protected by a VPN gateway. properties >page Encryption >
section Encryption Settings >
field Encryption Method
Use IKEv2
Wire Mode
VPN Community properties >
page Wire Mode
Disable
IP Compression
VPN Community properties >
page Advanced >
section Properties
Disable
Aggressive Mode
VPN Community properties >
page Advanced >
section Properties
Disable
Important:
-
VPN Communities continue to work as configured before an upgrade to R82.10.
-
-
Does not support the configuration of these deprecated features.
-
Shows the applicable message and the next supported step.
-
-
Scalable Platforms
The CLI syntax to configure weights for Security Group Members
Member of a Security Group in ElasticXL Cluster, Maestro, and Scalable Chassis. Acronym: SGM. changed:
|
Syntax in R82 |
Syntax in R82.10 |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Threat Prevention
-
The Zero Phishing
Check Point Software Blade on a Security Gateway (R81.20 and higher) that provides real-time phishing prevention based on URLs. Acronym: ZPH. Software Blade
Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. and the Threat Emulation
Check Point Software Blade on a Security Gateway that monitors the behavior of files in a sandbox to determine whether or not they are malicious. Acronym: TE. Software Blade are now activated by default in newly created Security Gateway and Cluster objects.This feature requires a valid license be installed on a Security Gateway and Cluster Members.
This feature helps to enhance our security measures and protect your systems from potential phishing attacks and malware attacks.
Management Server
-
Updated the PostgreSQL version to 16.4.
-
The support for SmartEndpoint GUI client will be discontinued by the end of 2025. See sk183410.
-
In the Compliance
Check Point Software Blade on a Management Server to view and apply the Security Best Practices to the managed Security Gateways. This Software Blade includes a library of Check Point-defined Security Best Practices to use as a baseline for good Security Gateway and Policy configuration. Software Blade, removed these Best Practices:-
FW202, FW203, FW204
-
IPS110, IPS111, IPS117, IPS122, IPS123, IPS124, IPS125, IPS132
-
MOB131
-
TP106
-
VPN112, VPN113, VPN120, VPN121, VPN127
-