You are on page 1of 31

R76

Release Notes

24 April 2013

Protected

2013 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. TRADEMARKS: Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks. Refer to the Third Party copyright notices (http://www.checkpoint.com/3rd_party_copyright.html) for a list of relevant copyrights and third-party licenses.

Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date with the latest functional improvements, stability fixes, security enhancements and protection against new and evolving attacks.

Latest Documentation
The latest version of this document is at: (http://supportcontent.checkpoint.com/documentation_download?ID=22933) For additional technical information, visit the Check Point Support Center (Check Point Support Center http://supportcenter.checkpoint.com). For more about this release, see the R76 home page (http://supportcontent.checkpoint.com/solutions?id=sk91140).

Revision History
Date 24 April 2013 Description Added Gaia open server system requirements for Security Management Server ("Security Management Open Server Hardware Requirements" on page 19) and Multi-Domain Server ("Multi-Domain Security Management Requirements" on page 19) R76 supports Crossbeam ("Other Platforms and Operating Systems" on page 14) 06 March 2013 Added Bypass Card Support to New Appliance and Hardware Support (on page 9) Reformatted Security Gateway Software Blades ("Security Gateway Software Blades on Check Point OS" on page 25)for clarity Added R70.50 to Compatibility with Gateways (on page 30) 27 February 2013 Updated IPv6 Support (on page 7) Updated Gaia Enhancements (on page 10) Updated Build Numbers (on page 11) Updated IPSO (on page 18) Updated Compatibility with Gateways (on page 30) Added Advanced Networking - Dynamic Routing to Important Notes on Security Gateway Software Blades ("Important Notes on Gateway Blades on Check Point Platforms" on page 25) Improved formatting and document layout 24 February 2013 First release of this document

Feedback
Check Point is engaged in a continuous effort to improve its documentation. Please help us by sending your comments (mailto:cp_techpub_feedback@checkpoint.com?subject=Feedback on R76 Release Notes).

Contents
Important Information .............................................................................................3 Introduction .............................................................................................................6 Important Solutions.............................................................................................. 6 Licensing ............................................................................................................. 6 What's New ..............................................................................................................7 IPv6 Support........................................................................................................ 7 Check Point Mobile for iOS.................................................................................. 8 Mobile Access Enhancements ............................................................................. 8 DLP Enhancements............................................................................................. 8 New Appliance and Hardware Support ................................................................ 9 Endpoint Security Blade ...................................................................................... 9 Application and URL Filtering Enhancements ...................................................... 9 SmartLog and SmartEvent .................................................................................. 9 Anti-Bot and Anti-Virus ........................................................................................ 9 VPN ....................................................................................................................10 DDoS/DoS Protection Enhancements ................................................................10 More Software Blade Enhancements .................................................................10 Gaia Enhancements ...........................................................................................10 Build Numbers ......................................................................................................11 System Requirements ..........................................................................................12 Check Point Appliance Naming Conventions ......................................................12 Check Point Appliances ......................................................................................13 Check Point Appliances in Virtual System Mode ............................................13 VPN Acceleration for Check Point 21000 Appliances with SAM Cards ..........14 Check Point Operating Systems .........................................................................14 Other Platforms and Operating Systems ............................................................14 Operating System Versions ...........................................................................15 Appliance Hardware Health Monitoring...............................................................15 Dedicated Gateways ..........................................................................................16 Platform Requirements .......................................................................................16 Gaia ...............................................................................................................16 SecurePlatform ..............................................................................................18 Linux ..............................................................................................................18 IPSO ..............................................................................................................18 Microsoft Windows .........................................................................................18 Maximum Number of Interfaces Supported by Platform .................................19 Security Management Open Server Hardware Requirements ........................19 Multi-Domain Security Management Requirements .......................................19 Security Gateway Open Server Hardware Requirements ..............................20 Virtual System Open Server Hardware Requirements ...................................20 Maximum Number of Gateway Cluster Members ...........................................20 Mobile Access Blade Requirements...............................................................21 SmartLog Requirements ................................................................................22 SmartEvent Requirements .............................................................................22 SmartReporter Requirements ........................................................................22 Console Requirements ..................................................................................23 UserCheck Client Requirements ....................................................................23 Legacy Hardware Platforms ...........................................................................23 Security Management Software Blades ..............................................................24 Security Gateway Software Blades .....................................................................24 Security Gateway Software Blades on Check Point OS .................................25 Important Notes on Gateway Blades on Check Point Platforms .....................25

Security Gateway Software Blades on Other OS ...........................................27 Important Notes on Gateway Blades on Microsoft Windows ..........................27 Security Gateway Bridge Mode ..........................................................................28 Clients and Consoles by Windows Platform .......................................................28 Clients and Consoles by Mac Platform ...............................................................28 Check Point GO Secure Portable Workspace.....................................................28 Upgrade Paths and Interoperability .....................................................................29 Upgrading to R76 ...............................................................................................29 Supported Upgrade Paths ..................................................................................29 Compatibility with Gateways ...............................................................................30 61000 Security System Management ............................................................30 Compatibility with Clients ....................................................................................31 Updating IPS Patterns ........................................................................................31 Uninstalling ...........................................................................................................31

Introduction

Introduction
Thank you for choosing Check Point R76. Please read this document carefully before installing.

Important Solutions
For more about R76 and to download the software, see the R76 Home Page (http://supportcontent.checkpoint.com/solutions?id=sk91140). For a list of open issues, see the Known Limitations: sk91141 (http://supportcontent.checkpoint.com/solutions?id=sk91141) For a list of fixes, see the Resolved Issues: sk91142 (http://supportcontent.checkpoint.com/solutions?id=sk91142)

Content from Earlier Versions


R76 includes all R75.45, R75.40VS, and E80.40 server content. Any issues that are not listed as Resolved, and that are in earlier Known Limitations, are still open. See: R75.45 Known Limitations (http://supportcontent.checkpoint.com/solutions?id=sk82741) R75.40VS Known Limitations (http://supportcontent.checkpoint.com/solutions?id=sk76541) E80.40 Known Limitations (http://supportcontent.checkpoint.com/solutions?id=sk82101)

Licensing
Important - Check Point software versions R75.10 or higher must have a valid Software Blades license. Users with NGX licenses cannot install the software. To migrate NGX licenses to Software Blades licenses, see Software Blade Migration (http://www.checkpoint.com/products/promo/software-blades/upgrade/index.html) or contact Account Services. If you manage GX gateways from a Security Management Server, you must regenerate your GX licenses in the User Center to be compliant with Software Blades. This procedure is optional for Multi-Domain Servers and Domain Management Servers.

IPS Software Blade License


Virtual Systems with IPS Software Blades must have a current, valid IPS contract that is renewed annually. To manage your contracts, go to your UserCenter account or contact your reseller. IPS service contracts notifications show in these places: SmartDashboard > IPS SmartUpdate Product reports in your Check Point UserCenter account

If your service contract expired, IPS continues to operate using the R70 (Q1/2009) signature set. Renew your IPS service contract to download and use the current signature set.

For more about IPS contract enforcement, see sk44175 (http://supportcontent.checkpoint.com/solutions?id=sk44175).

R76 Release Notes | 6

What's New

What's New
New Features IPv6 Support Check Point Mobile for iOS Mobile Access Enhancements DLP Enhancements New Appliance and Hardware Support Endpoint Security Blade Application and URL Filtering Enhancements SmartLog and SmartEvent Anti-Bot and Anti-Virus VPN DDoS/DoS Protection Enhancements More Software Blade Enhancements Gaia Enhancements 7 8 8 8 9 9 9 9 9 10 10 10 10

IPv6 Support
R76 extended support for IPv6 includes: Gaia operating system: Interface configuration SNMP RADIUS First Time Configuration Wizard OSPFv3 BGP with multiprotocol extensions VRRPv3 Firewall support, including dynamic objects and time objects Full Stateful Inspection for IPv6 connections NAT66 IPv6 support for all communications between Security Gateways, Security Management Servers, and SmartDashboard Dual-stack definition support for all network objects IPv6 address support in all IP containers Multiple IPv6 range support for objects IPv4 and IPv6 support in Get Topology Network Policy Management SmartView Monitor SmartEvent SmartLog Security Gateway Identity Awareness
R76 Release Notes | 7

Access Policy:

Central Management:

Management Software Blade IPv6 Support:

Security Gateway Software Blade IPv6 Support:

What's New

IPS, Application and URL Filtering, Acceleration & Clustering HA Anti-Bot and Anti-Virus

Virtual System (VSX) IPv6 support Support for IPv6-only Security Gateway and IPv6-only Security Management Server Site-to-Site IPsec VPN for fully meshed communities Authentication - RADIUS and LDAP UserCheck (for all Software Blades that support IPv6)

Note: Every fw command has a corresponding fw6 command for CLI control in IPv6.

Check Point Mobile for iOS


Secure container for mail, calendar, contacts, documents, and web applications Protects business data while providing an easy end-user experience on managed and unmanaged devices (BYOD) Seamless access to Document Security protected documents in the secure container Passcode for the secure container protects access to your organizational resources without requiring a device passcode More supported authentication methods: User/Password, personal certificate, RSA, RADIUS, DynamicID SMS Online only option - Prevents storing any business data on the device Offline mode option - Encrypts business data stored on the device

Mobile Access Enhancements


New SmartDashboard windows for internal certificate management Easier search Batch key generation for groups and OUs

Certificate management Mass distribution of client applications to users with UserCheck Email templates Unified, easy-to-read, comprehensive remote access login logs Mobile Access wizard for easy connection to Exchange server

DLP Enhancements
Fingerprinting: Protect files residing in network repositories. The gateway scans repositories and prevents files or parts of files from leaving the organization Whitelist policy easily define files that will not be matched by the DLP engine. Upload specific files to the Security Management server, or create a network repository User Access Roles in DLP rule base DLP email notifications to end-users for violations on all protocols DLP is now fully user aware for all protocols

UserCheck client single sign on UserCheck notification configuration and multi-language support SMTP Mirror mode for easy DLP Proof of Concept

R76 Release Notes | 8

What's New

New Appliance and Hardware Support


New 21600 appliances New 21700 appliances Support for DDoS Protector appliances Security Acceleration Module (supported for IPv4 and Security Gateway Mode only) Support for Bypass Card (FONIC) on 4000 and 12000 appliances. See sk85560 (http://supportcontent.checkpoint.com/solutions?id=sk85560) for more information.

Endpoint Security Blade


The Endpoint Policy Management Blade lets you manage and enforce Endpoint Security policies on Windows and Mac computers. Endpoint Security Software Blades include: Media Encryption Full Disk Encryption Firewall Compliance WebCheck Application Control

When the Endpoint Policy Management blade is enabled, the Security Management Server also becomes an E80.40 Endpoint Security Management Server that manages E80.40 and earlier Endpoint Security clients, with R76 SmartEndpoint.

Application and URL Filtering Enhancements


Enhanced options to filter HTTPS without SSL inspection Enhanced options for search engine results: Enforce search engine safe-search Filter cached and translated pages from search engine results Detailed user activity reports Filter reports by user group Web browsing time shown in logs, events, and reports Dedicated permission to generate SmartEvent reports

Enhanced reporting:

SmartLog and SmartEvent


New Timeline view in SmartLog for better understanding and orientation of search results. Reporting enhancements for Application and URL Filtering SmartEvent tripled scale. See the SmartEvent Sizing Guide http://supportcontent.checkpoint.com/solutions?id=sk87263.

Anti-Bot and Anti-Virus


Improved scanning and recognition of bots and viruses UserCheck support Rulebase exceptions can be based on URLs
R76 Release Notes | 9

What's New

VPN
AES performance enhancements for high end appliances (12400, 12600, and 21000 series): Increased Site to Site VPN and Remote Access throughput HTTPS Inspection blacklist automatic updates Increased session rate for Identity Awareness Captive Portal

DDoS/DoS Protection Enhancements


During a DoS or DDoS attack, these SecureXL features can be activated to mitigate the attack: Penalty box - Early drop of packets arriving from suspected sources, for better performance under heavy load, such as caused by a DDoS attack. See sk74520 (http://supportcontent.checkpoint.com/solutions?id=sk74520). Optimized drops under heavy load - Dropped traffic is accelerated by SecureXL, reducing gateway resource consumption during heavy load. See sk90861 (http://supportcontent.checkpoint.com/solutions?id=sk90861) and sk90941 (http://supportcontent.checkpoint.com/solutions?id=sk90941) for advanced configurations. Rate Limiting for DoS Mitigation - Policy limits traffic from specific sources and services. See the R76 Security Gateway Technical Administration Guide.

More Software Blade Enhancements


Identity Awareness - New, rich log-on logs IPS: Automatic updates through an authenticated proxy Major improvements of Snort conversion tool (see the R76 IPS Administration Guide)

Monitoring - Netflow service support to collect data on traffic patterns and volume

Gaia Enhancements
WebUI and CLI configuration for Multi-Queue and CoreXL WebUI and CLI support for IPv6 addresses RADIUS, SNMP, NTP and Proxy support for IPv6 Dynamic Routing protocol support for IPv6: OSPFv3 and BGP with multiprotocol extensions VRRPv3 support for IPv6 Database engine optimization that improves administrative command performance by 80% Extended support for maximum physical memory for open servers running Multi-Domain Security Management up to 128GB Manage Proxy ARP entries Manage the behavior of Core Dumps Netflow support Password policy Multiple TACACS servers

R76 Release Notes | 10

Build Numbers

Build Numbers
`This table shows the R76 software products and their build numbers as included on the product DVD. Software Blade / Product Gaia SecurePlatform Security Gateway IPSO 6.2 MR4 Security Management SmartConsole Applications Mobile Access Multi-Domain Server SmartDomain Manager Acceleration (Performance Pack) Advanced Networking (Routing) Build Number OS build 265 Build 468 Build 380 Build 83 Build 082 989000365 Build 217 Build 205 988000155 Build 259 Verifying Build Number* show version all ver fw ver show version fwm ver Help > About Check Point <Application name> cvpn_ver fwm mds ver Help > About Check Point SmartDomain Manager sim ver -k

SecurePlatform: Build 012 Gaia: routed-0.1cp989000090 Build 201 989000028

SecurePlatform: gated_ver Gaia: rpm -qf /bin/routed (in expert mode)

Server Monitoring (SVM Server) Management Portal

rtm ver cpvinfo /opt/CPportalR76/portal/bin/smartportalstart SVRServer ver cpvinfo /opt/CPda/bin/DAService|grep 'Build number'

SmartReporter Deployment Agent

Build 259 Build 332

Compatibility Packages** CPNGXCMP-R76-00 CPV40VSCmp-R76-00 Build 006 986000007 /opt/CPNGXCMP-R76/bin/fw_loader ver cpvinfo /opt/CPV40CmpR76/bin/fw_loader | grep Build /opt/CPEdgecmp-R76/bin/fw ver /opt/CPR71CMP-R76/bin/fw_loader ver /opt/CPR75CMP-R76/bin/fw_loader ver /opt/CPSG80R75CMP-R7600/bin/fw_loader ver
R76 Release Notes | 11

CPEdgecmp-R76-00 CPR71CMP-R76-00 CPR75CMP-R76-00 CPSG80R75CMP-R76-00

989000004 Build 012 Build 008 Build 021

System Requirements

Software Blade / Product CPSG80CMP-R76-00 CPR7520CMP-R76-00 CPCON66CMP-R76-00

Build Number Build 006 Build 011 Build 5

Verifying Build Number* /opt/CPSG80CMP-R76/bin/fw_loader ver /opt/CPR7520CMP-R76/bin/fw_loader ver /opt/CPCON66CMP-R76/bin/fw_loader ver

* Some of the commands to see the installed build show only the last three digits of the build number. ** To see build numbers on Windows, look at C:\Program Files\CheckPoint\R76 instead of /opt/../R76

System Requirements
Important - Resource consumption is dependent on the scale of your deployment. The larger the deployment, the more disk space, memory, and CPU are required. In This Section Check Point Appliance Naming Conventions Check Point Appliances Check Point Operating Systems Other Platforms and Operating Systems Appliance Hardware Health Monitoring Dedicated Gateways Platform Requirements Security Management Software Blades Security Gateway Software Blades Security Gateway Bridge Mode Clients and Consoles by Windows Platform Clients and Consoles by Mac Platform Check Point GO Secure Portable Workspace 12 13 14 14 15 16 16 24 24 28 28 28 28

Check Point Appliance Naming Conventions


An appliance model name that ends with 00 (two zeros) is the generic name of the model. Any other number shows the number of Software Blades on the appliance. Some model names end with one zero. This document uses the generic appliance names. For example: Check Point 4800 is the generic name of the model. Check Point 4810 is the model with 10 Software Blades. Check Point IP2450 is the generic name of the model. Check Point IP2457 has 7 Software Blades.

R76 Release Notes | 12

System Requirements

Check Point Appliances


Note - R76 IP Appliances support only Disk-based configurations on Gaia. Appliance Security Management Security Gateway Disk-based Only Standalone Deployment Disk-based Only Full Standalone High Availability Deployment Multi-Domain Security Management

2200 Appliance 4000 Appliances 12000 Appliances 21000 Appliance IP Appliances

Smart-1 5 Smart-1 25 Smart-1 50 Smart-1 150 Power-1 UTM-1

* IP Appliances (IP150, IP280, IP290, IP390, IP560, IP690, IP1280, IP2450) can run R76 with IPSO 6.2 (MR4 and earlier MRs) or Gaia OS. IPSO systems are available in diskless flash-based and hybrid (flashbased systems with a supplemental hard disk for local logging). Gaia only supports disk-based IP-Systems. Standalone deployment is only supported on disk-based (IPSO or Gaia) systems. On Flash-based IPSO Appliances, 1G of RAM is sufficient to run Firewall, IPS, and VPN blades only. To activate more blades, 2G of RAM is required on IP290, IP390, and IP560 Flash-based Appliances.

Check Point Appliances in Virtual System Mode


Can be converted to, or used in, Virtual System mode:
21000 Appliance 12000 Appliances 4000 Appliances 2200 Appliances Power-1 11000 and 9070 UTM-1 3070 IP 2450 and 1280 (Gaia only)

Can only be used in Virtual System mode:


21000 VSX Appliances 12000 VSX Appliances VSX-1 11000 series VSX-1 9000 series VSX-1 3070

R76 Release Notes | 13

System Requirements

VPN Acceleration for Check Point 21000 Appliances with SAM Cards
These algorithms are hardware accelerated by SAM cards: AES 128 with MD5 AES 128 with SHA-1 AES 256 with SHA-1 AES 256 with MD5 DES with MD5 DES with SHA-1 3DES with MD5 3DES with SHA-1 NULL with MD5 NULL with SHA-1

Other combinations are software accelerated by SecureXL.

Check Point Operating Systems


Software Blade Containers Security Management Security Gateway Multi-Domain Security Management VSX Gateway Gaia SecurePlatform IPSO (Requires IPSO 6.2 MR4)

Other Platforms and Operating Systems


Software Blade Containers Security Management Security Gateway Multi-Domain Security Management VSX Gateway Microsoft Windows Server 2003, 2008 & 2008 R2 2003, 2008 Microsoft Windows Red Hat Enterprise Linux 5.0, 5.4 Crossbeam VMware X-series ESX VMware ESXi

XP, 7

4.0, 4.1

4.0, 4.1, 5.0, 5.1

5.0, 5.4

4.0, 4.1

4.1, 5.0, 5.1

R76 Release Notes | 14

System Requirements

Operating System Versions


These are the supported versions of Microsoft and Red Hat operating systems. For Windows 2003 SP1, you must install the hotfix specified in Microsoft KB 906469 (http://support.microsoft.com/kb/906469). Windows 2008 Server 64-bit is supported for Security Management only. Operating System Windows XP Windows 2003 Server Microsoft Windows 2008 Server Windows 7 RHEL 5.0 Red Hat RHEL 5.4 kernel 2.6.18 N/A 32-bit N/A SP1, SP2 32-bit, 64-bit 32-bit, 64-bit 32-bit Editions Professional N/A Service Pack SP3 SP1, SP2 32/64-bit 32-bit 32-bit

Professional, Enterprise, Ultimate N/A N/A

Appliance Hardware Health Monitoring


R76 supports these Hardware Health Monitoring features for Gaia and SecurePlatform: RAID Health: Use SNMP to monitor the health of the disks in the RAID array, and be notified of volume and disk states. Hardware Sensors: Use the WebUI or SNMP to monitor fan speed, motherboard voltages, power supply health, and temperatures. Open Servers are only supported with an IPMI card. 21000 12000 4000 and 2200 Power-1
(2)

Check Point Appliances


SNMP Hardware sensor monitoring (polling and traps) WebUI ardware sensor monitoring RAID monitoring with SNMP

UTM-1
(1)

Smart-1

(1)

1. Hardware sensors monitoring is supported on all UTM-1 models other than the xx50 series. 2. RAID Monitoring with SNMP is supported on Power-1 servers with RAID card (Power-1 9070 and Power-1 11070).

Open Servers
Hardware Sensors Monitoring: Use SNMP (polling and traps) or the WebUI to monitor hardware on IBM, HP, Dell, and Sun certified servers with an Intelligent Platform Management Interface (IPMI) card. The IPMI standard defines a set of interfaces to monitor system health. Note - IPMI is an open standard. We cannot guarantee the Hardware Health Monitoring performance on all systems and configurations. RAID Monitoring with SNMP: Use SNMP to monitor RAID on HP servers with HP Smart Array P400 Controller. The HP Smart Array P400i Controller is a different controller, not supported for hardware monitoring.

R76 Release Notes | 15

System Requirements

Dedicated Gateways
To install R76 on an R71 DLP-1 appliance or an R71 DLP open server, do a clean installation of R76. Note - To upgrade from DLP-1 9571 of version R71.x DLP, you must upgrade the BIOS. Then do a clean installation of R76. See sk62903 (http://supportcontent.checkpoint.com/solutions?id=sk62903) for details.

You cannot upgrade these dedicated gateways to R76:


Open Server - IPS-1 Sensor Appliances - Security Gateway 80, UTM-1 Edge, IPS-1 Sensor

Platform Requirements
In This Section Gaia SecurePlatform Linux IPSO Microsoft Windows Maximum Number of Interfaces Supported by Platform Security Management Open Server Hardware Requirements Multi-Domain Security Management Requirements Security Gateway Open Server Hardware Requirements Virtual System Open Server Hardware Requirements Maximum Number of Gateway Cluster Members Mobile Access Blade Requirements SmartLog Requirements SmartEvent Requirements SmartReporter Requirements Console Requirements UserCheck Client Requirements Legacy Hardware Platforms 16 18 18 18 18 19 19 19 20 20 20 21 22 22 22 23 23 23

Gaia
This release is shipped with the Gaia operating system, which supports most Check Point appliance platforms, selected open servers, and selected network interface cards. If a 64-bit compatible open server has at least 6GB RAM, it can run in 64-bit mode. If it has less, it can run in 32-bit mode only. Gaia Open Servers - All open servers in the Hardware Compatibility List are supported (http://www.checkpoint.com/services/techsupport/hcl/all.html). Gaia and Performance Tuning - Performance Tuning is supported on all Gaia platforms.

R76 Release Notes | 16

System Requirements

Gaia on Check Point Security Appliances


Appliances 2200 4200 4600 4800 12000 21000 32-bit / 64-bit 32 32 32 32, 64 32, 64 32, 64 64-bit is available with at least 6GB RAM Notes

Gaia on IP Appliances
Important - Gaia is not supported on Flash-Based or Hybrid platforms at this time. IP Appliance Disk Based Platform IP150 IP280 IP290 IP390 IP560 IP690 IP1280 IP2450 32-bit / 64-bit 32 32 32 32 32 32 32, 64 32, 64 64-bit is available on appliances with at least 4GB RAM. If the appliance is set to 32-bit, it needs at least 6GB to reconfigure to 64-bit.

Gaia on Power-1, UTM-1 and Smart-1 Appliances


Platform Power-1 11000 Power-1 9070 and 5070 UTM-1 3070, 2070, 1070, 570, 270, 130 Smart-1 150, 50, 25, 5 32-bit / 64-bit 32, 64 32, 64 32, 64 32, 64 Notes default is 64

Gaia WebUI
The Gaia WebUI (also known as the Gaia Portal) is supported on these browsers: Internet Explorer 8 or higher Chrome 14 or higher Firefox 6 or higher Safari 5 or higher

Note - Gaia WebUI is not supported for VSX Gateway.


R76 Release Notes | 17

System Requirements

SecurePlatform
This release is shipped with the latest SecurePlatform operating system, which supports a variety of appliances and open servers. See the list of certified hardware (http://www.checkpoint.com/services/techsupport/hcl/index.html) before installing SecurePlatform on the target hardware.

Linux
Note - Cross-platform High Availability is not supported with a mix of Windows and non-Windows platforms. Before you install Security Management on Red Hat Enterprise Linux 5: 1. Install the sharutils-4.6.1-2 package. a) Make sure that you have the sharutils-4.6.1-2 package installed by running: rpm -qa | grep sharutils-4.6.1-2 b) If the package is not already installed, install it by running: rpm i sharutils-4.6.1-2.i386.rpm This package can be found on CD 3 of RHEL 5. 2. Install the compat-libstdc++-33-3.2.3-61 package. a) Make sure that you have the compat-libstdc++-33-3.2.3-61 package by running: rpm qa | grep compat-libstdc++-33-3.2.3-61 b) If the package is not already installed, install it by running: rpm i compat-libstdc++-33-3.2.3-61.i386.rpm This package can be found on CD 2 of RHEL 5. 3. Disable SeLinux. a) Make sure that SeLinux is disabled by running: getenforce b) If SeLinux is enabled, disable it by setting SELINUX=disabled in the /etc/selinux/config file and rebooting the computer.

IPSO
R76 is supported only on IPSO 6.2 MR4. For installation and upgrade instructions, see the IPSO 6.2 MR4 Release Notes http://supportcenter.checkpoint.com/documentation_download?ID=23661. Only clean installation of R76 is supported on IPSO flash-based models: IP290 IP390 IP560

Features: Advanced Routing and SecureXL are included by default. IPSO supports VRRP and IP Clusters. All currently available IPSO platform types (Disk-based, Flash-based, and Hybrid) are supported. Limitations: You cannot manage UTM-1 Edge devices from a Security Management Server on an IPSO platform.

Microsoft Windows
Note - Cross-platform High Availability is not supported with a mix of Windows and non-Windows platforms. High Availability Legacy mode is not supported on Windows.

R76 Release Notes | 18

System Requirements

Maximum Number of Interfaces Supported by Platform


The maximum number of interfaces supported (physical and virtual) is shown by platform in this table. Platform Gaia SecurePlatform Max Interfaces 1024 1015 255 virtual interfaces per physical interface, or 200 virtual interfaces per physical interface with Dynamic Routing Notes

Windows Virtual System VSX Gateway

32 64 4096 Includes VLANs and Warp Interfaces Includes VLANs and Warp Interfaces

Security Management Open Server Hardware Requirements


The minimum recommended hardware requirements for open server Security Management Servers are: Component Processor Free Disk Space Memory Optical Drive Network Adapter Windows Linux Gaia & SecurePlatform

Intel Pentium Processor E2140 or 2 GHz equivalent processor 1GB 1GB Yes One or more 1.4GB 1GB Yes One or more 10GB (installation includes OS) 1GB Yes (bootable) One or more

Multi-Domain Security Management Requirements


The minimum recommended system requirements for Multi-Domain Security Management are: Component CPU Memory Disk Space Optical Drive Linux Gaia & SecurePlatform

Intel Pentium Processor E2140 or 2 GHz equivalent processor 4GB 2GB Yes 4GB 10GB (install includes OS) Yes (bootable)

Multi-Domain Security Management Resource Consumption


Resource consumption is dependent on the scale of your deployment. The larger the deployment, the more disk space, memory, and CPU are required. The Multi-Domain Security Management disk space requirements are: For basic Multi-Domain Server installations: 2GB (1GB /opt, 1GB /var/opt). For each Domain Management Server: 400MB (for the Domain Management Server directory located in /var/opt)

R76 Release Notes | 19

System Requirements

Security Gateway Open Server Hardware Requirements


Component Processor Free Disk Space Memory Optical Drive Network Adapter Windows Intel Pentium IV or 1.5 GHz equivalent 1GB 512MB Yes One or more SecurePlatform on Open Servers Intel Pentium IV or 2 GHz equivalent 10GB 512MB Yes One or more supported cards

Virtual System Open Server Hardware Requirements


Component Processor Free Disk Space Memory Gaia on Open Servers Intel Pentium IV or 2 GHz equivalent 12 GB 2 GB

Maximum Number of Gateway Cluster Members


These are the maximum number of supported cluster members for each type of cluster: ClusterXL - 5 Third-party - 8 VSLS (Virtual System Load Sharing) - 13

R76 Release Notes | 20

System Requirements

Mobile Access Blade Requirements


Endpoint OS Compatibility Mobile Access Portal Clientless access to web applications (Link Translation) Endpoint Security on Demand SecureWorkspace SSL Network Extender - Network Mode SSL Network Extender - Application Mode Downloaded from Mobile Access applications Clientless Citrix File Shares - Windows File Explorer viewer (WebDAV) File Shares - Web-based file viewer (HTML) Web mail Endpoint Browser Compatibility Mobile Access Portal Clientless access to web applications (Link Translation) Endpoint Security on Demand SecureWorkspace SSL Network Extender - Network Mode SSL Network Extender - Application Mode Downloaded from Mobile Access applications Clientless Citrix File Shares - Windows File Explorer viewer (WebDAV) File Shares - Web- based file viewer (HTML) Web mail Windows Internet Explorer IE6 only Google Chrome Mozilla Firefox Linux Mac iOS Android

Macintosh Opera for Safari Windows

R76 Release Notes | 21

System Requirements

SmartLog Requirements
SmartLog collects log entries from Security Management Server and log servers that are R75.40 or higher, on Gaia, SecurePlatform, or Windows. Component CPU Memory Disk Space Recommended Intel Pentium IV 2.0 GHz 1GB 20GB

SmartEvent Requirements
You can install SmartEvent on a Security Management Server or on a different, dedicated computer. These are the requirements for the SmartEvent Server and for the SmartEvent Correlation Unit: Component CPU Memory Disk Space Windows/Linux/SecurePlatform Celeron-M 1.5 GHz 2GB 25GB

To optimize SmartEvent performance:


Use a disk available high RPM, and a large buffer size. Increase the server memory.

SmartReporter Requirements
These hardware requirements are for a SmartReporter server that monitors at least 15GB of logs each day and generates many reports. For deployments that monitor fewer logs, you can use a computer with less CPU or memory. SmartReporter can be installed on a Security Management Server or on a dedicated machine. Component CPU Memory Windows & Linux Minimum Intel Pentium IV 2.0 GHz 1GB Windows & Linux Recommended Dual CPU 3.0 GHz 2GB (on 2 physical disks) Disk Space Installation: Database: 80MB 60GB (40GB for database, 20GB for temp directory) Yes 80MB 100GB (60GB for database, 40GB for temp directory) Yes

DVD Drive

Optimizing SmartReporter Performance


We recommend these tips to optimize SmartReporter performance: Disable DNS resolution. This can increase consolidation performance to as much as 32GB of logs for each day. Configure the network connection between the SmartReporter server and the Security Management Server to the optimal speed.
R76 Release Notes | 22

System Requirements

Install a disk with high RPM (revolutions per minute) and a large buffer size. Use UpdateMySQLConfig to adjust the database configuration and adjust the consolidation memory buffers to use the more memory. Increase memory for better performance.

Console Requirements
This table shows the minimum hardware requirements for console applications: SmartDashboard, SmartView Tracker, SmartView Monitor, SmartProvisioning, SmartReporter, SmartEvent, SmartLog, SecureClient Packaging Tool, SmartUpdate, SmartDomain Manager. Component CPU Memory Windows Intel Pentium Processor E2140 or 2 GHz equivalent processor 1024MB

Available Disk Space 900MB Video Adapter Minimum resolution: 1024 x 768

UserCheck Client Requirements


The UserCheck client can be installed on endpoint computers running Windows. UserCheck client notifications are supported for these blade and gateway combinations: Gateway Gaia, SecurePlatform Gaia, SecurePlatform Gaia, SecurePlatform, IPSO

Blade DLP Anti-Bot and Anti-Virus Application Control and URL Filtering

Note: UserCheck is not supported on a Windows gateway. The UserCheck client is not compatible with Check Point GO or Secure Workspace. If a UserCheck client is installed on a machine and a violation occurs, the UserCheck client notification shows outside the Check Point GO or Secure Workspace environment. We recommend that you not install the UserCheck client on a machine that usually runs the Check Point GO or Secure Workspace environment. The UserCheck client is not supported on clusters in a load sharing environment.

Legacy Hardware Platforms


Solaris
Solaris is a legacy platform, unsupported for new installations. You can migrate the Solaris database to Windows, SecurePlatform, and Gaia, from Check Point versions in the Supported Upgrade Paths (on page 29). Security Management Server - The database migration procedure for Solaris is the same as for SecurePlatform and Gaia as described in the chapter on Advanced Upgrade and Database Migration in the R76 Installation and Upgrade guide. Multi-Domain Security Management - To export the Multi-Domain Security Management database from a legacy platform, use the R76 SecurePlatform CD. Only two menu options are available: Pre-upgrade verification mds export

R76 Release Notes | 23

System Requirements

Security Management Software Blades


Check Point OS Software Blade Network Policy Management Endpoint Policy Management Logging & Status Monitoring SmartProvisioning Management Portal User Directory SmartWorkflow SmartEvent SmartReporter Gaia SecurePlatform IPSO 6.2 Disk- based Microsoft Windows Server 2003 Server 2008 XP, 7 RedHat Linux RHEL 5.0, 5.4

Management Portal is supported on: Internet Explorer 7 and Firefox 1.5 - 3.0. SmartEvent on Windows Server 2008 is supported on 32-bit only.

Security Gateway Software Blades


In This Section: Security Gateway Software Blades on Check Point OS Important Notes on Gateway Blades on Check Point Platforms Security Gateway Software Blades on Other OS Important Notes on Gateway Blades on Microsoft Windows 25 25 27 27

R76 Release Notes | 24

System Requirements

Security Gateway Software Blades on Check Point OS


Software Blade Gaia Virtual Systems Mode Gaia Security Gateway Mode SecurePlatform IPSO 6.2 (Disk / Flash)

Firewall Identity Awareness IPsec VPN IPS URL Filtering Application Control Advanced Networking - Dynamic Routing and Multicast Support Acceleration & Clustering Mobile Access Anti-Bot Anti-Virus Web Security Advanced Networking - QoS Data Loss Prevention Anti-Spam & Email Security

* *

Important Notes on Gateway Blades on Check Point Platforms


DLP Software Blade
DLP supports High-Availability clusters, including Full High Availability, on SecurePlatform and Gaia. DLP supports Load Sharing clusters in Detect and Prevent mode. On UTM-1 130/270, you can use DLP with Firewall and other Security Gateway software blades, or with Firewall and Security Management software blades. The DLP portal supports Internet Explorer 6, 7, 8, 9; Firefox 3, 4; Chrome 8; and Safari 5. DLP does not support VRRP on Gaia.

Advanced Networking - Dynamic Routing


To use Security Gateways as IPv6 BGP peers, you cannot configure the BGP peers in passive mode.

Advanced Networking - QoS Software Blade


VSX has native QoS support. It does not use the QoS Software Blade.

R76 Release Notes | 25

System Requirements

Mobile Access Software Blade


Mobile Access support of Virtual System (VSX) mode is partial. These are the clients and their support of Virtual Systems: Client Endpoint Security Suite Check Point Mobile for Windows Endpoint Security VPN for Windows Endpoint Security VPN for MacOS IPSec VPN SSL Network Extender mode Mobile VPN for iOS Check Point GO SecureRemote These clients are not supported in Virtual System mode: Mobile Access Portal Check Point Mobile for iOS and Android Support in Virtual System Mode R73, E80.x E75 and higher E75 and higher E75 and higher R76: Windows, Linux, and Mac E75 and higher R75 and higher E75 and higher

R76 Release Notes | 26

System Requirements

Security Gateway Software Blades on Other OS


Software Blade Microsoft Windows Server 2003 Firewall Identity Awareness IPSec VPN IPS URL Filtering Application Control Advanced Networking - Dynamic Routing and Multicast Support Acceleration & Clustering Mobile Access Anti-Bot Anti-Virus Web Security Advanced Networking - QoS DLP Anti-Spam & Email Security Server 2008 Crossbeam X-Series

Important Notes on Gateway Blades on Microsoft Windows


Notes for Software Blades on Check Point operating systems ("Important Notes on Gateway Blades on Check Point Platforms" on page 25), where the operating system is not named, are relevant also for other operating systems.

Acceleration & Clustering Software Blade


Clustering is supported on Windows, but Acceleration is not. Only third-party clustering is supported on Crossbeam.

Anti-Bot, Anti-Virus, IPS, Application and URL Filtering Software Blades


HTTPS Inspection is not supported on Windows. Anti-Virus Archive Scanning and Suspicious Mail engines are not supported on Windows.

Application and URL Filtering, Identity Awareness, DLP Software Blades


UserCheck notifications are not supported on Windows.

R76 Release Notes | 27

System Requirements

Security Gateway Bridge Mode


Bridge mode is supported on Gaia, SecurePlatform, Crossbeam, and IPSO. See the R76 Security Gateway Technical Administration Guide (http://supportcontent.checkpoint.com/solutions?id=sk91140) and How To Set Up Bridge Mode on IPSO (http://supportcontent.checkpoint.com/documentation_download?ID=15361).

Clients and Consoles by Windows Platform


Check Point Product XP Home (SP3) 32-bit XP Pro (SP3) 32-bit
*

Server 2003 (SP2) 32-bit

Server 2008 (SP1-2) 32 / 64

Server 2008R2 (+SP1)

Vista (SP2) 32-bit

Vista (SP1) 64-bit

Windows 7 Ult, Pro, Ent (+SP1) 32 / 64 (32-bit only)

SmartConsole SmartDomain Manager SecureClient

Endpoint Security VPN Remote Access Clients E75.x SSL Network Extender DLP UserCheck DLP Exchange Agent Identity Agent

* DLP Exchange Agent supports Exchange Server 2007 and Exchange Server 2010 on Windows Server 2003 64-bit (SP1-2) and Windows Server 2008 64-bit (SP1-2). A 32-bit version is available for demo or educational purposes.

Clients and Consoles by Mac Platform


Check Point Product Identity Agent SecureClient Endpoint Security VPN E75 for Mac Mac OS X 10.6 32-bit / 64-bit 32-bit 32-bit / 64-bit Mac OS X 10.7 32-bit / 64-bit 32-bit 32-bit / 64-bit

Check Point GO Secure Portable Workspace


R76 Security Gateways only support Check Point GO Secure Portable Workspace R75. Check Point GO R70.1 and R70 (formerly known as Check Point Abra) are not supported.

R76 Release Notes | 28

Upgrade Paths and Interoperability

Upgrade Paths and Interoperability


R76 supports upgrading from lower software versions and management of lower Security Gateway versions.

Upgrading to R76
You can upgrade SecurePlatform and IPSO Security Management servers and Security Gateways to Gaia R76, for supported upgrade paths. Note: Upgrade is not supported in an ISDN configuration.

Supported Upgrade Paths


You can upgrade these Security Management Server and Security Gateway versions to R76: R71.50 R75 , R75.10, R75.20, R75.30, R75.40, R75.45, R75.40VS E80.40, E80.41

You can upgrade IP appliances to R76: Disk-based and Flash-based on IPSO 6.2 MR4, for physical gateways (not Virtual Systems). Disk-based appliances on Gaia, for physical gateways or Virtual Systems. To learn more about upgrading IPSO to Gaia, see sk69640 (http://supportcontent.checkpoint.com/solutions?id=sk69640).

You can upgrade these versions of SecurePlatform VSX gateways to R76 Security Gateways in VSX mode: VSX R65, VSX R65.10, VSX R65.20 VSX R67, VSX R67.10

See the VSX upgrade instructions in the R76 Installation and Upgrade Guide. Important - To upgrade to R76 Gaia, make sure there is enough free disk space in /var/log. See the R76 Release Notes (http://supportcontent.checkpoint.com/solutions?id=sk91140).

To upgrade a Security Gateway on a 32-bit appliance to 64-bit Virtual System mode:


1. Upgrade to the Gaia OS. 2. Run: set edition default 64-bit 3. Reboot.

To upgrade a Security Management Server on a 32-bit appliance to 64-bit Virtual System mode:
1. Install the SecurePlatform OS. 2. Change the configuration in cpconfig. 3. Reboot.

R76 Release Notes | 29

Upgrade Paths and Interoperability

Compatibility with Gateways


When this release is installed on the Security Management Server, it can manage gateways of these versions. Release Security Gateway Version NGX R65 R70, R70.1, R70.20, R70.30, R70.40, R70.50 R71, R71.10, R71.20, R71.30, R71.40, R71.50 R75, R75.10, R75.20, R75.30, R75.40, R75.45, R75.40VS, R75.46 Security Gateway 80 61000 Security System R71.45 61000 R75.035, 61000 R75.050, 61000 R75.051, R75.40VS for 61000 R71 and higher R71 VSX R65, VSX R65.10, VSX R65.20, VSX R67, VSX R67.10 Centrally Managed NGX R66 7.5.x and higher* 4.0, 5.0 * UTM-1 Edge and Safe@ devices that use locally configured VPN connections with download configuration settings, may experience VPN connectivity failure with R76 Security Gateways. To enable this configuration with R76, see sk65369 (http://supportcontent.checkpoint.com/solutions?id=sk65369).

DLP-1 IPS-1 VSX Connectra UTM-1 Edge GX

61000 Security System Management


These Security Management Server versions can manage the 61000 Security System of these releases. Security Management Server Version R75, R75.10, R75.20, R75.30, R75.40, R75.45, R75.40VS, R76 R75.40VS, R76 61000 Security System Release 61000 R75.035, 61000 R75.050, 61000 R75.051

R75.40VS for 61000

R76 Release Notes | 30

Uninstalling

Compatibility with Clients


Gateways of this release can support these endpoint clients. Endpoint Client SecureRemote Check Point Mobile for Windows Endpoint Security VPN Endpoint Security VPN for Mac IPSec VPN SSL Network Extender Mobile VPN for iOS Check Point GO Mobile Access Web Portal Check Point Mobile for iOS / Android Mobile Access SSL Network Extender Portal E75 and higher E75 and higher E75 and higher Version E75 and higher E75 and higher Virtual System Yes Yes Yes Yes Yes Yes Yes No No No Security Gateway Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

Updating IPS Patterns


IPS pattern granularity (converting patterns into protections) is installed during the first IPS update: online update, offline update, or scheduled update. This first update after installation can take a few minutes longer than usual, if R76 is: a new installation an upgrade from R75.30, R75.20, R75.10, R75, R71.30 or earlier an upgrade from R75.40 or higher, or R71.40 or higher, without an online update before the upgrade

Uninstallation of IPS pattern granularity is not supported. If you uninstall R76, the patterns remain, converted to protections.

Uninstalling
To uninstall R76, see the R76 Installation and Upgrade Guide (http://supportcontent.checkpoint.com/solutions?id=sk91140).

R76 Release Notes | 31

You might also like