0% found this document useful (0 votes)
404 views30 pages

CP R80.20 GA ReleaseNotes

Release Notes R80.20 Check Point

Uploaded by

garytj21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
404 views30 pages

CP R80.20 GA ReleaseNotes

Release Notes R80.20 Check Point

Uploaded by

garytj21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

15 January 2019

R80.20

Release Notes
[Protected]
Classification:
CHAPTER 1

2019 Check Point Software Technologies Ltd.


All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No part
of this product or related documentation may be reproduced in any form or by any means without
prior written authorization of Check Point. While every precaution has been taken in the
preparation of this book, Check Point assumes no responsibility for errors or omissions. This
publication and features described herein are subject to change without notice.
RESTRICTEDRIGHTSLEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in
subparagraph (c)(1)(ii)of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Refer to the Copyright page https://www.checkpoint.com/copyright/ for a list of our trademarks.
Refer to the Third Party copyright notices
https://www.checkpoint.com/about -us/third -party-trademarks -and-copyrights/ for a list of
relevant copyrights and third -party licenses.

R80.20 Release Notes | 2


Important Information

Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date
with the latest functional improvements, stability fixes, security enhancements and
protection against new and evolving attacks.

Certifications
For third party independent certification of Check Point products, see the Check Point
Certifications page
https://www.checkpoint.com/products -solutions/certified -check-point-solutions/ .

CheckPoint R80.20
For more about this release, see the R80.20 home page
http://supportcontent.ch eckpoint.com/solutions?id=sk122485.

More Information
Visit the Check Point Support Center https://supportcenter.checkpoint.com .

Latest Version of this Document


Open the latest version of this document in a Web browser
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_
RN/html_frameset.htm .
Download the latest version of this document in PDF format
http://supportcontent.checkpoint.com/documentation_download?ID=65044 .
To learn more, visit the Check Point Support Center
https://supportcenter.checkpoint.com .

Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
mailto:cp_techpub_feedback@checkpoint.com?subject=Feedbackon R80.20 Release
Notes.

RevisionHistory
Date Description
15-January-2019 R80.20 becomes the default version (on page 8)
18 November 2018 Updated: R80.10 Security Management Server can manage R80.20
Security Gateway (on page 16)
17 October 2018 Updated: Advanced Threat Prevention (on page 10) - added "Threat
Emulation is fully supported."

R80.20 Release Notes | 3


Important Information

Date Description
08 October 2018 Updated: Supported Upgrade Paths (on page 16) - Added a note "New
Early Availability program with our new Linux kernel version 3.10 based
on R80.20 is now available for Security Gateway (see sk137854
http://supportcontent.checkpoint.com/solutions?id=sk137854 )"
04 October 2018 Improved formatting and document layout for the HTML guide
26 September 2018 First release of this document

R80.20 Release Notes | 4


Contents
Important Information .................................................................................................................. 3
Important Links ............................................................................................................................7
Introduction ..................................................................................................................................
8
What's New ...................................................................................................................................
9
Performance Enhancements ................................................................................................... 9
Performance Enhancements .............................................................................................. 9
VSXGateways...................................................................................................................... 9
Significant Improvements & New Features ............................................................................10
Advanced Threat Prevention ..............................................................................................10
CloudGuard IaaS Enhancements .......................................................................................11
Access Policy ......................................................................................................................11
Identity Awareness .............................................................................................................11
HTTPSInspection ...............................................................................................................12
Mirror and Decrypt .............................................................................................................12
Clustering ...........................................................................................................................12
Gaia OS...............................................................................................................................12
Advanced Routing...............................................................................................................13
ICAP Client .........................................................................................................................13
Security Management Enhancements ....................................................................................13
SmartConsole.....................................................................................................................13
Logging and Monitoring .....................................................................................................13
SmartProvisioning ..............................................................................................................14
Mobile Access.....................................................................................................................14
Endpoint Security Management Server .............................................................................14
Compliance.........................................................................................................................14
Licensing......................................................................................................................................15
Supported Upgrade Paths ...........................................................................................................16
Maintaining Security Management Server Version ................................................................17
Required Disk Space....................................................................................................................17
Check Point Appliances ...............................................................................................................18
Hardware Health Monitoring .......................................................................................................19
Open Server Minimal Hardware Requirements ..........................................................................20
Maximum Supported Physical Memory.......................................................................................20
Supported Platforms ...................................................................................................................20
Build Numbers ............................................................................................................................21
Supported Backward Compatibility Gateways............................................................................21
Maximum Supported Number of Interfaces on Security Gateway..............................................22
Maximum Supported Number of Cluster Members ....................................................................22
Logging Requirements ................................................................................................................22
Storing Logs ............................................................................................................................22
SmartEvent Requirements .....................................................................................................23
SmartConsole Requirements ......................................................................................................23
Hardware Requirements.........................................................................................................23
Software Requirements ..........................................................................................................23
Gaia Portal Requirements ...........................................................................................................24
Threat Emulation Requirements ................................................................................................. 24
Mobile Access Requirements ......................................................................................................25
Identity Awareness Requirements ..............................................................................................26
Endpoint Security Requirements ................................................................................................. 27
Check Point Clients and Agents Support ....................................................................................28
Multiple Login Option Support ................................................................................................28
Clients and Agents Support by Windows Platform ................................................................. 29
Clients and Agents Support by Mac Platform .........................................................................30
DLP Exchange Agent Support .................................................................................................
30
CHAPTER 2

Important Links
For more about R80.20 and to download the software, see the R80.20 Home Page: sk122485
http://supportcontent.checkpoint.com/solutions?id=sk122485 .
Read the Known Limitations: sk122486
http://supp ortcontent.checkpoint.com/solutions?id=sk122486 .
See issues resolved in this release: sk122488
http://supportcontent.checkpoint.com/solutions?id=sk122488 .
Visit the Check Point Checkmates Community https://community.checkpoint.com/ :
 Start discussions
 Get answers from experts
 Join the API community to get code samples and share yours
Visit http://www.checkpoint.com/architecture/infinity/ to learn more about R80.20.

R80.20 Release Notes | 7


CHAPTER 3

Introduction
R80.20, part of the Check Point Infinity architecture, delivers the most innovative and effective
security that keeps our customers protected against large scale, fifth generation cyber threats.
The release contains innovations and significant improvements in:
 Gateway performance
 Advanced Threat Prevention
 Cloud Security
 Access policy
 Consolidated network and endpoint management capabilities
 And much more
R80.20 was released on September 26, 2018. Starting January 15th 2019, R80.20 take 101 with
Jumbo Hotfix Accumulator take_17 (see sk137592) is considered as Check Point's default version
(widely recommended for all deployments)

R80.20 Release Notes | 8


What's New

What's New
R80.20 creates a breakthrough in Check Point Security Gateway,matching the R80 security
management innovations.
R80.20 is part of CheckPoint Infinity, a consolidated cyber security architecture that spans
networks, cloud, and mobile. It provides the highest level of Threat Prevention against both known
and unknown targeted attacks to keep you protected now and in the future.

Performance Enhancements
Performance Enhancements
 HTTPSInspection performance improvements
 Session rate improvements on high- end appliances (13000,15000, 21000 & 23000 Security
Gateway models).
 Acceleration remains active during policy installation, no impact on Security Gateway
performance.

VSX Gateways
 Significant boost to Virtual Systems performance, utilizing up to 32 CoreXL FW instances for
each Virtual System.
 Dynamic Dispatcher - Packets are processed by different FW worker (FWK) instances based on
the current instance load.
 Changes in the number of FW worker instances (FWK) in a VSLSsetup do not require
downtime.
 SecureXL Penalty Box supports the contexts of each Virtual System, see sk74520
http://supportcontent.checkpoint.com/solutions?id=sk74520 .

R80.20 Release Notes | 9


What's New

Significant Improvements & New Features


Advanced Threat Prevention
 Threat Emulation is fully supported.
 Enhanced configurati on and monitor abilities for Mail Transfer Agent (MTA) in SmartConsole
for handling malicious mails.
 Configuration of ICAP Server with Threat Emulation and Anti-Virus Deep Scan in
SmartConsole.
 Automatic download of IPS updates by the Security Gateway.
 SmartConsole support for multiple Threat Emulation Private Cloud Appliances.
 SmartConsole support for blocking archives containing prohibited file types.
 Threat Extraction
 Full ClusterXL HA synchronization, access to the original files is available after a failover.
 Support for external storage.
 Advanced Threat Prevention Indicators (IoC) API
 Management API support for Advanced Threat Prevention Indicators (IoC).
 Add, delete, and view indicators through the management API.
 Advanced Threat Prevention Layers
 Support layer sharing within Advanced Threat Prevention policy.
 Support setting different administrator permissions per Advanced Threat Prevention layer.
 MTA (Mail Transfer Agent)
 MTA monitoring, e-mails history views and statistics, current e-mails queue status and
actions performed on e-mails in queue.
 MTA configuration enhancements
 Setting a domain object as next hop.
 Ability to create an access rule to allow SMTP traffic to a Security Gateway.
 Create a dedicated Advanced Threat Prevention rule for MTA.
 MTA enforcement enhancements
 Replacing malicious links in an email with a configurable template.
 Configurable format for textual attachments replacement.
 Ability to add a customized text to malicious e-mails' body or subject.
 Tagging malicious-mails using X-header
 Sending a copy of the malicious e-mail to a predefined recipients list
 Improvements in policy installation performance on R80.10 and above Security Gateways with
IPS
 Performance impact of "Suspicious Mail Activity" protection in Anti-Bot was changed to "High"
and is now off by default

R80.20 Release Notes | 10


What's New

CloudGuard IaaS Enhancements


 Automated Security Transit VPCin Amazon Web Services (AWS)- Automatically deploy and
maintain secured scalable architecture in Amazon Web Services.
 Integration with Google Cloud Platform.
 Integration with Cisco ISE.
 Integration with Nuage Networks.
 Automatic license management with the CloudGuard IaaS Central Licensing utility.
 Monitoring capabilities integrated into SmartView.
 Data center objects can now be used in access policy rules installed on 41000, 44000, 61000
and 64000 Scalable Platforms.

Access Policy
 Updatable Objects – a new type of network objects that represent an external service such as
Office 365, Amazon Web Services, Azure GEOlocations and more, and can be used in the
Source and Destination columns of an Access Control policy. These objects are dynamically
updated and kept up-to-date by the Security Gateway without the need to install a policy.
 Wildcard network object in Access Control that represents a series of IP addresses that are
not sequential.
 Only for Multi -Domain Server: Support for scheduled policy installation with cross-Domain
installation targets (Security Gateways or Policy Packages).
 Rule Base performance improvements, for enhanced Rule Base navigation and scrolling.
 Global VPN Communities (previously supported in R77.30).
 Support for using NAT64 and NAT46 objects in Access Control policy.

Identity Awareness
 Identity Tags support the use of tags defined by an external source to enforce users, groups or
machines in Access Roles matching.
 Improved SSOTransparent Kerberos Authentication for Identity Agent, LDAP groups are
extracted from the Kerberos ticket.
 Two Factor Authentication for Browser- Based Authentication (support for RADIUS
challenge/respons e in Captive Portal and RSA SecurID next Token/Next PIN mode).
 Identity Collector
 Support for Syslog Messages - ability to extract identities from syslog notifications.
 Support for NetIQ eDirectory LDAP Servers.
 Additional filter options - "Filter per Security Gateway" and "Filter by domain".
 Improvements and stability fixes related to Identity Collector and Web API.
 New configuration container for Terminal Servers Identity Agents.
 Active Directory cross-forest trust support for Terminal Servers Agent.
 Identity Agent automatic reconnection to prioritized PDP gateways.

R80.20 Release Notes | 11


What's New

 Security Management Server can securely connect to Active Directory through a Security
Gateway,if the Security Management Server has no connectivity to the Active Directory
environment and the Security Gateway does.

HTTPSInspection
 Hardware Security Module (HSM) support – outbound HTTPSInspection stores the SSL keys
and certificates on a third party dedicated appliance.
 Additional ciphers support for HTTPSInspection (for more information see sk104562
http://supportcontent.checkpoint.com/solutions?id=sk104562 ).

Mirror and Decrypt


 Decryption and clone of HTTP and HTTPStraffic.
 Forwarding traffic to a designated interface for mirroring purposes.

Clustering
 New CCP Unicast mode - a new mode in which a cluster member sends the CCP packets to the
unicast address of a peer member.
 New Automatic CCP mode - CCP mode is adaptive to network changes, Unicast, Multicast or
Broadcast modes are automatically applied according to network state.
 Enhanced cluster monitoring capabilities.
 Enhanced cluster statistics and debugging capabilities.
 Enhanced Active/Backup Bond.
 Support for more topologies for Synchronization Network over Bond interfaces.
 Improved cluster synchronization and policy installation mechanism.
 New grace mechanism for cluster failover for improved stability.
 New cluster commands in Gaia Clish.
 Improved clustering infrastructure for RouteD (Dynamic Routing) communication.

Gaia OS
Upgraded Linux kernel (3.10) - applies to Security Management Server only.
 New file system (xfs)
 More than 2TB support per a single storage device.
 Enlarged systems storage (up to 48TB).
 I/O-related performance improvements.
 Support of new system tools for debugging, monitoring and configuring the system
 iotop (provides I/O runtime statistics).
 lsusb (provides information about all devices connected to USB).
 lshw (provides detailed information about all hardware).
 lsscsi (provides information about storage).
 ps (new version, more counters).
 top (new version, more counters).
R80.20 Release Notes | 12
What's New

 iostat (new version, more counters).

Advanced Routing
 Allow AS-in-count.
 IPv6 MD5 for BGP.
 IPv4 and IPv6 OSPFmultiple instances.
 Bidirectional Forwarding Detection (BFD) for gateways and VSX,including IP Reachability
detection and BFD Multihop.
 OSPFv2HMAC-SHA authentication (in addition to OSPFv2MD5 authentication).

ICAP Client
 Integrated ICAP Client functionality.

Security Management Enhancements


SmartConsole
 Multiple simultaneous sessions in SmartConsole - One administrator can publish or discard
several SmartConsole private sessions, independently of the other sessions
 SmartConsole Accessibility features
 Keyboard navigation - ability to use the keyboard alone to navigate between the different
SmartConsole fields.
 Improved experience for the visually impaired, color invert for all SmartConsole windows.
 Required fields are highlighted.

Logging and Monitoring


 Log Exporter - an easy and secure method to export Check Point logs over Syslog to any SIEM
vendor using standard protocols and formats.
 Ability to export logs directly from a Security Gateway (previously supported in R77.30).
 Unified logs for Security Gateway,SandBlast Agent and SandBlast Mobile for simplified log
investigation.
 Enhanced SmartView in browser:
 Log viewer with log card, column profile and statistics.
 Export logs with custom or all fields.
 Automatic-refresh for views.
 Relative time frame support.
 Improved log-viewer with cards, profiles, statistics and filters.
 I18N support for 6 languages (English, French, Spanish, Japanese, Chinese, Russian).
 Accessibility support - keyboard navigation and high contrast theme.

R80.20 Release Notes | 13


What's New

SmartProvisioning
 Integration with SmartProvisioning (previously supported in R77.30).
 Support for the 1400 series appliances.
 Administrators can now use SmartProvisioning in parallel with SmartConsole.

Mobile Access
 Support for reCAPTCHA,keep abusive automated software activities from interfering with
regular portal operations.
 Support for One Time Password (OTP)without any hardware tokens.

Endpoint Security Management Server


Endpoint Security Server is now part of the main train.
 Support for SandBlast Agent, Anti-Exploit and Behavioral Guard policies.
 SandBlast Agent push operation to move/restore files from quarantine.
 Directory Scanner initial scan and full rescan takes significantly less time.
 Stability and performance enhancements for Online Automatic Synchronization (High
Availability).
These features from the Endpoint Security Management R77.30.03release are included:
 Management of new Software Blades:
 SandBlast Agent Anti-Bot.
 SandBlast Agent Threat Emulation and Anti-Exploit.
 SandBlast Agent Forensics and Anti-Ransomware.
 Capsule Docs.
 New features in existing Software Blades:
 Full Disk Encryption
* Offline Mode.
* Self Help Portal.
* XTS-AES Encryption.
* New options for the Trusted Platform Module (TPM).
* New options for managing Pre- boot Users.
 Media Encryption & Port Protection
* New options to configure encrypted container.
* Optical Media Scan.
 Anti- Malware
* Web Protection.
* Advanced Disinfection.

Compliance
 User can create custom best practices based on scripts.
 Support for 35 regulations including General Data Protection Regulation (GDPR).

R80.20 Release Notes | 14


Licensing

Licensing
For all licenses issues contact Account Services
mailto:accountservices@checkpoint.com?subject=Licensing Issues.

R80.20 Release Notes | 15


Supported Upgrade Paths

Supported Upgrade Paths


CPUSEis the installat ion and upgrade method supported for this release. To learn more about
CPUSE,see sk92449 http://supportcontent.checkpoint.com/solutions?id=sk92449 .
R80.20 Security Management Server supports Linux 3.10 kernel. When you perform a Clean
Install, or Advanced Upgrade to R80.20,it uses the xfs file system. After an in- place upgrade
(using CPUSE),the file system remains ext3 except for Smart-1 525, 5050, 5150 appliances, which
use the xfs file system.
New Early Availability program with our new Linux kernel version 3.10 based on R80.20 is now
available for Security Gateway.This version is for customers who are looking to try R80.20
Security Gateway on Open Servers with latest CPUs. For more information, see sk137854
http://supportcontent.checkpoint.com/solutions?id=sk137854 .
Upgrade with the Supported Methods for your current installation.

From R75.4x, R75.40VS,R76, R77.x, R77.20 EP6.0/EP6.1/EP6.2, R77.30.01, R77.30.02,


R77.30.03, R80, R80.10 and R80.20.M1 to R80.20*:
Check Point Product Supported Methods
Security Gateway  CPUSEUpgrade
Security Management Server
 CPUSEClean Install
Multi -Domain Server
 Advanced Upgrade
CloudGuard Controller

* To upgrade from R80.20.M1to R80.20,see sk137677


http://supportcontent.checkpoint.com/solutions?id=sk137677 .
Notes:
 To upgrade from R77.20 or R77.30 with the Add-on: It is not necessary to uninstall the
Add-on. Remove these unsupported features: Modbus support with the Application Control
Software Blade, "SAML" Cloud Connector for web based single sign on.
 Downgrade: On Smart -1 525, Smart-1 5050, and Smart-1 5150 appliances (sk120453
http://supportcontent.checkpoint.com/solutions?id=sk120453 ) that run the Dedicated R80.10
image -
Before upgrading to R80.20,take a Gaia OS Snapshot. If in the future you decide to downgrade
the appliance back to the Dedicated R80.10 image, revert to that Gaia OS Snapshot.
 When upgrading from R80 only, User Defined reports will be migrated during the upgrade to
the SmartConsole reports. Report Scheduling and email server definitions will not be migrated
and need to be defined.

R80.20 Release Notes | 16


Required Disk Space

Maintaining Security Management Server Version


You can manage R80.20 Gateways with your existing R80.10 Security Management Server or
Multi -Domain Server.

To enable this:
 Install R80.10 Jumbo Hotfix Accumulator Take 167 and higher (Refer to sk116380
http://supportcontent.checkpoint.com/solutions?id=sk116380 ).
 Install R80.10 SmartConsole build 89 and higher (Refer to sk119612
http://supportcontent.checkpoin t.com/solutions?id=s119612).
Note that if you choose to not upgrade to R80.20 Security Management Server or Multi -Domain
Server, the new features will not be supported.

Required Disk Space


RequiredDisk Spacefor SecurityManagementServer:
Before installation or upgrade, CPUSEverifies that enough free disk space is available. If the
amount of available disk space is not sufficient, a message shows what is required.
This table shows the free disk space required for some packages:

R80.20Installatio n, Required Disk Space


or Upgrade Type
The minimum required unpartitioned disk space is the
highest value of one of these:
Clean Install
 Size of the current root partition.
 The used space in the current root partition plus 3 GB.
Major Upgrade
 If the used space is more than 90% of the root partition,
then 110% of the size of the current root partition.
If you do not have enough free disk space, you can use the Logical Volume Manager (LVM) to
increase the disk space of logical volumes on Gaia. This space is taken from the unallocated disk
space, which is usually used for snapshots and upgrades. For more details see sk95566
http://supportcontent.checkpoint.com/solutions?id=sk95566 .

Required Disk Spacefor R80.20 Server:


Before you run a clean install of R80.20 Multi -Domain Servers, make sure that at least 10 GB of
free disk space in the root partition is available. For an environment with many Domain
Management Servers, more than 10 GB of free disk space is often required.

R80.20 Release Notes | 17


Check Point Appliances

Check Point Appliances


Standalone and Management Servers boot by default with 64-bit Gaia kernel after a clean install
or upgrade to R80.20.
Note - If you revert an R80.20 upgrade, the appliance will still boot with 64-bit Gaia kernel, even if
it was originally 32-bit.

ManagementServers
Check Point Product Smart-1 Smart-1
25b, 205, 210, 225, 405, 410, 525 50, 150, 3050, 3150, 5050, 5150
Security Management * *
Log Server * *
SmartEvent Server * *
Multi-Domain Security
*
Management
Multi-Domain Log Server *

* Smart -1 25B, 205, and 210 appliances with default memory can run Security Management OR
Log Server OR SmartEvent.
** We recommend that you upgrade the memory of Smart-1 205 to 16GB as part of the upgrade to
R80.20.
*** Smart -1 210 with memory extension to 16GB can run Security Management AND/OR Log
Server AND/OR SmartEvent.

R80.20 Release Notes | 18


Hardware Health Monitoring

Security Gatewayand Standalone(Gateway+ Management)


The model numbers in this table are for the series of appliances that support R80.20.

Appliance Series Security Gateway Standalone (Gateway+


Management)
2200 *

3000 * *

4000 * *, **
5000 * *

12000 * **
13000 * *

15000 * *

21000 * *

23000 * *

* The 4200 appliance does not support a Standalone deployment.


** These appliance models do not support a Standalone deployment with their default RAM (4GB):
4400, 4600, 4800, 12200, and 12400. Upgrade these models to at least 8 GB RAM to support a
Standalone deployment.

Threat EmulationPrivate CloudAppliance


These appliances are fully supported with R80.20:
TEX100X,TEX250X,TEX1000Xand TEX2000X.

Hardware Health Monitoring


R80.20 supports these Hardware Health Monitoring features for Gaia Check Point appliances:
 RAID Health:Use SNMP to monitor the health of the disks in the RAID array, and be notified of
volume and disk states.
 Hardware Sensors:Use the Gaia Portal or SNMP to monitor fan speed, motherboard voltages,
power supply health, and temperatures. Some open servers are supported with an IPMI
interface card that requires an IPMI card.

Check Point Appliances Smart-1


SNMP Hardware sensor monitoring (polling and traps) *
Gaia Portal hardware sensor monitoring *
RAID monitoring with SNMP *

R80.20 Release Notes | 19


CHAPTER 4

Open Server Minimal Hardware


Requirements
R80.20 servers are designed to utilize available hardware resources efficiently to maximize
performance and scalability. We recommend that you leverage this advantage and use the most
powerful hardware available to get the best performance.

Component Security Gateway VSXGateway Security Management Multi -Domain


Server/Standalone Server
Processor Intel Pentium IV, Intel Pentium IV, 2 Intel Pentium IV, 2.6 Dual Socket 2x
2 GHz or GHz or equivalent GHz or equivalent Xeon E5-2609v2
equivalent 4 cores, 2.5 GHz
or equivalent
Total CPU 2 2 2 8
Cores
Memory 4 GB RAM 4 GB RAM 6 GB RAM 32 GB RAM
Free Disk 15 GB 12 GB + 1 GB per VS 500 GB (Installation 1 TB (Installation
Space includes OS) includes OS)

Note - The above numbers do not apply to SmartEvent & SmartLog.

Maximum Supported Physical Memory


Check Point Product Physical RAM Limit
Security Management Server, or 512 GB
Multi -Domain Security Management Server
Security Gateway or Cluster Member 256 GB

Supported Platforms
Check Point Product Red Hat Enterprise VMware ESXi Microsoft
Linux Hyper-V**
Windows 2012 R2,
Security Management Server 7.3 or higher 5.x, 6.x
2016 (64-bit only)*
Multi -Domain Security Windows 2012 R2,
7.3 or higher 5.x, 6.x
Management Server 2016 (64-bit only)*
Windows 2016 (64
Security Gateway Not Supported 5.x, 6.x
bit only)

* For the most up-to-date information about Microsoft Hyper-V, see the Virtual Machines section
of the Hardware Compatibility List https://www.checkpoint.com/support -services/hcl/ .
R80.20 Release Notes | 20
Build Numbers

Build Numbers
Software Blade / Product Build Number Verifying Build Number
Gaia OS build 101 show version all

Security Gateway 255 fw ver

Security Management 081 fwm ver

Multi -Domain Server 084 fwm mds ver

SmartConsole 992000164 Menu > About Check Point SmartConsole

Supported Backward Compatibility


Gateways
R80.20 Management Servers can manage Security Gateways of these versions:

GatewayType Release Version


R75.20, R75.30, R75.40,R75.45,R75.46, R75.47,
R76,
Security Gateway
R77, R77.10, R77.20,R77.30,
R80.10

R76, R77, R77.10, R77.20,R77.30,


VSX
R80.10

R80.20 Management Servers can manage appliance Security Gateways that run these versions:

Appliance Release Version


Security Gateway 80 R75.20.x

UTM-1 Edge N 8.1 and higher

1100 Appliances R75.20.x,R77.20.x

1200R Appliances R77.20.x

1400 Appliances R77.20.x

60000/40000Scalable R76SP,R76SP.10,R76SP.20,R76SP.30,R76SP.40for 61000/41000


Platforms R76SP.50for 61000/41000and 64000/44000

R80.20 Release Notes | 21


Maximum Supported Number of Interfaces on Security Gateway

Maximum Supported Number of


Interfaces on Security Gateway
The maximum number of interfaces supported (physical and virtual) is shown in this table.

Mode Max # of Interfaces Notes


Security Gateway 1024 Non-VSX
VSXGateway 4096 Includes VLANs and Warp Interfaces
Virtual System 256 Includes VLANs and Warp Interfaces

Note - This table applies to Check Point Appliances and Open Servers.

Maximum Supported Number of


Cluster Members
Cluster Type Maximum Supported Number
of Cluster Members
ClusterXL 5
Virtual System Load Sharing 13

Logging Requirements
Storing Logs
Logs can be stored on:
 A Security Management Server that collects logs from the Security Gateways.This is the
default.
 A Log Server on a dedicated machine. This is recommended for organizations that generate
many logs.
A dedicated Log Server has greater capacity and performance than a Security Management Server
with an activated logging service. On dedicated Log Servers, the Log Server must be the same
version as the Management Server.

R80.20 Release Notes | 22


SmartConsole Requirements

SmartEvent Requirements
You can enable the SmartEvent Blade on a Security Management Server, or install a dedicated
SmartEvent Server. SmartEvent R80.20 can connect to a different version of Log Server - R77.xx
or lower.
SmartEvent and a SmartEvent Correlation Unit are usually installed on the same server. You can
also install them on separate servers, for example, to balance the load in large logging
environments. The SmartEvent Correlation Unit must be the same version as SmartEvent Server.
To deploy SmartEvent and to generate reports, a valid license or contract is required.

SmartConsole Requirements
Hardware Requirements
This table shows the minimum hardware requirements for SmartConsole applications:

Component Minimal Requirement


CPU Intel Pentium Processor E2140, or 2 GHz equivalent processor
Memory 4 GB
Available Disk Space 2 GB
Video Adapter Minimum resolution: 1024 x 768

Software Requirements
SmartConsole is supported on:
 Windows 10 (all editions), Windows 8.1 (Pro), and Windows 7 (SP1, Ultimate, Professional, and
Enterprise)
 Windows Server 2016, 2012, 2008 (SP2),and 2008 R2 (SP1)

R80.20 Release Notes | 23


Gaia Portal Requirements

Gaia Portal Requirements


The Gaia Portal supports these web browsers:

Browser Supported Versions


Google Chrome 14 and higher

8 and higher
Microsoft Internet Explorer (If you use Internet Explorer 8, file uploads through the Gaia
Portal are limited to 2 GB)

Microsoft Edge Any


Mozilla Firefox 6 and higher
Apple Safari 5 and higher

Threat Emulation Requirements


The Threat Emulation requirements are different based on the emulation location:
 ThreatCloud - Gaia operating system (64 or 32-bit)
 Local or Remote emulation - Threat Emulation Private Cloud Appliance on the Gaia
operating system (64-bit only)

R80.20 Release Notes | 24


Mobile Access Requirements

Mobile Access Requirements


OSCompatibility
Endpoint OS Compatibility Windows Linux Mac iOS Android
Mobile Access Portal * * * * *

Clientless access to web applications * * * * *


(Link Translation)
Compliance Scanner * * *

Secure Workspace *

SSL Network Extender - Network * * *


Mode
SSL Network Extender - Application *
Mode
Downloaded from Mobile Access * * *
applications
Clientless Citrix * * *

File Shares - Web-based file viewer * * * * *


(HTML)
Web mail * * * * *

R80.20 Release Notes | 25


Identity Awareness Requirements

Browser Compatibility
Endpoint Microsoft Microsoft Google Mozilla Apple Opera
Browser Internet Edge Chrome(1) Firefox Safari for
Compatibility Explorer Windows

Mobile Access Portal * * * * * *

Clientless access to web * * * * *


applications (Link
Translation)
* * * *
Compliance Scanner(2)
* * *
Secure Workspace(3)

SSL Network Extender - * * * *


Network Mode
SSL Network Extender - * * * *
Application Mode(3)

Downloaded from Mobile * * * *


Access applications
Clientless Citrix * *

File Shares - Web- based * * * * * Limited


file viewer (HTML) support
Web mail * * * * *

1. Google Chrome support for Mobile Access Portal on-demand clients, such as SSL Network
Extender Network Mode, SSL Network Extender Application Mode, Secure Workspace, and
Endpoint Security on Demand, requires Java JRE 32-bit installed on the end-user's computer.
2. Running Compliance Scanner on Windows platforms requires Java Runtime Environment (JRE
or JDK) 32-bit installed on the end-user's computer.
3. Secure Workspace and SSL Network Extender Application Mode are available for Windows
platforms only.

Identity Awareness Requirements


 Identity Agents
See Clients and Agents Support by Windows Platform (on page 28) and Clients and Agents
Support by Mac Platform (on page 29) for:
 Identity Agent (Light and Full)
 Identity Agent for Terminal Servers
 Identity Collector
 AD Query
Active Directory for AD Query is supported on:
Microsoft Windows Server 2008 R2, 2012, 2012 R2, and 2016.

R80.20 Release Notes | 26


Endpoint Security Requirements

Endpoint Security Requirements


 Endpoint Security Management Servers are supported on Management-only appliances or
open servers. Endpoint Security Management Servers do not support Standalone (Security
Gateway + Management Server) and Multi -Domain Security Management deployments.
 Endpoint Security Management Servers do not support on Red Hat Enterprise Linux releases.
 R80.20 Endpoint Security Management Server can manage:
 E80.64 and higher versions of Endpoint Security Clients for Windows
 E80.64 Endpoint Security Client for Mac

Anti- Malware signature updates:


 To allow Endpoint clients to get Anti-Malware signature updates from a cleanly installed
R80.20 Primary Endpoint Security Management Server or cleanly installed R80.20 Endpoint
Policy Server, you must follow sk127074
http://supportcontent.checkpoint.com/solutions?id=sk127074 . No additional steps are
required, if you upgraded the Primary Endpoint Security Management Server to R80.20.
 Endpoint Security Clients can still acquire their Anti-Malware signature updates directly from
an external Check Point signature server or other external Anti-Malware signature resources,
if your organization's Endpoint Anti-Malware policy allows it.

Post-Upgrade Requirement:
If you upgraded the Endpoint Security Management Server to R80.20, then to keep visibility of
Endpoint client events in the SmartConsole, you must perform these steps:
1. Connect with SmartConsole to the Security Management Server.
2. In the top left corner, click Menu > Install database.
3. Select all objects.
4. Click Install.
5. Click OK.
For more information, see the R80.20 Endpoint Security Management Server Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_EndpointSe
curity_AdminGuide/html_frameset.htm .

R80.20 Release Notes | 27


Check Point Clients and Agents Support

Check Point Clients and Agents Support


Multiple Login Option Support
R80.10 introduced multiple login options per gateway with multi -factor authentication schemes,
for users of different clients and the Mobile Access portal. For example, configure an option to
authenticate with Personal Certificate and Password, or Password and DynamicID for SMS or
email.
These features are supported when connected to an R80.20 gateway that has IPsec VPN or Mobile
Access enabled.

Supported Client or Portal Lowest Supported Version


Mobile Access Portal R80.10
Capsule Workspace for iOS 1002.2
Capsule Workspace for Android 7.1
Remote Access clients for Windows - Standalone clients E80.65
Remote Access VPN Blade of the Endpoint Security Suite for E80.65
Windows

See the R80.30 Mobile Access Administration Guide


https://sc1.checkpoint.com/documents/R80.30_GA/WebAdminGuides/EN/CP_R80.30_MobileAcce
ss_AdminGuide/html_frameset.htm or the R80.30 Remote Access VPN Administration Guide
https://sc1.checkpoint. com/documents/R80.30_GA/WebAdminGuides/EN/CP_R80.30_RemoteAcc
essVPN_AdminGuide/html_frameset.htm for details.

R80.20 Release Notes | 28


Check Point Clients and Agents Support

Clients and Agents Support by Windows Platform


Microsoft Windows
In this table, Windows 7 support is true for Ultimate, Professional, and Enterprise editions.
Windows 8 support is true for Pro and Enterprise editions. All the marked consoles and clients
support Windows 32-bit and 64-bit.

Check Point Product Windows 7 (+SP1) Windows 8.1 Windows 10 *


* *
Remote Access clients E80.x * (with 8.1 (E80.62
Update 1) and higher)

Capsule VPN Plug-in * *

SSL Network Extender * * *

UserCheck Client * * *

Identity Agent (Light and Full) * * *

Identity Agent for Terminal


*
Servers

* Supported Windows 10 versions: 1703, 1709, 1803 for more information see the Detailed Client
Releases Information section in sk117536
http://supportcontent.checkpoint.com/solutions?id=sk117536

Microsoft WindowsServer

Check Point Product Server Server Server Server


2008R2 2012 2012 R2 2016
(+SP1) 64-bit
UserCheck Client * * *
Identity Agent for Terminal
* * * *
Servers
Identity Collector * * * *

Note - Identity Agent for Terminal Servers is also supported on XenApp 6.

R80.20 Release Notes | 29


Check Point Clients and Agents Support

Clients and Agents Support by Mac Platform


All support is for Macintosh OS 64-bit.

Check Point Product OS X 10.11 macOS 10.12 OS X 10.13

Identity Agent * * *
SSL Network Extender * * *
* *
Endpoint Security VPN E80.x or higher (E80.62 (E80.64 *
and higher) and higher)

DLP Exchange Agent Support


The R80.20 DLP Exchange Agent is supported on:

Windows Server Exchange Server


2012 R2 64-bit 2010, 2013
2016 64-bit 2016

For earlier server versions, use the R77.30 DLP Exchange Agent.

R80.20 Release Notes | 30

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy