Support Center > Search Results > SecureKnowledge Details
Some protections may not work for specific HTTP evasions in R77.10 / R77 / R76
Symptoms
  • This recommended fix improves the following protections under specific HTTP evasions:
    • IPS
    • Application Control
    • URL Filtering
    • Anti-Virus
    • Anti-Bot
    • Threat Emulation


  • The fix is relevant to the following releases:
    • R76
    • R77
    • R77.10
    • R76SP for 61000


  • Other versions do not require this fix.
Solution

This problem was fixed. The fix is included in:

Check Point recommends to always upgrade to the most recent version (upgrade Security Gateway / upgrade VSX / upgrade Security Management Server / upgrade Multi-Domain Security Management Server).

 

For lower versions, Check Point offers a hotfix for this issue.

 

Procedure:

Note: In cluster environment, this procedure must be performed on all members of the cluster.

  • Show / Hide instructions - Gaia OS using CPUSE (Check Point Update Service Engine)

    We recommend using CPUSE to install this hotfix.

    Note: Hotfix has to be installed on Security Gateway / each cluster member.

    • In Gaia Portal:

      Important Note for VSX mode: Gaia Portal is not supported on Security Gateway in VSX mode. Users must use the Clish.

      1. Connect to the Gaia Portal on your machine.

      2. Obtain the lock over the configuration database (click on the lock icon at the top - near 'Sign Out').

      3. Navigate to the 'Software Updates' - 'Status and Actions' pane.

      4. Go to the 'Updates' tab to see the published hotfixes available for download.

      5. Select the Check_Point_Hotfix_R7X_sk98814.tgz package - right-click on it - click on 'Download' (this will download the hotfix to your machine).

      6. Right-click on the Check_Point_Hotfix_R7X_sk98814.tgz package - click on 'Install' (this will install the hotfix on the machine and display the installation status).

      7. When prompted for reboot (a pop up window appears), confirm to reboot the machine.


    • In Clish:

      Important Note for VSX mode: Gaia Portal is not supported on Security Gateway in VSX mode. Users must use the Clish.

      1. Connect to Gaia command line (over SSH, or console).

      2. Log in to Clish shell.

      3. See the list of available packages for download:

        HostName> show installer available_packages

      4. Download this hotfix:

        HostName> installer download Check_Point_Hotfix_R7X_sk98814.tgz

      5. Check the download progress by repeatedly running this command:

        HostName> show installer package_status
        Outputs for example:
        Check_Point_Hotfix_R77.10_sk98814.tgz - Downloading (2.95 MB/s)   - Progress: 6%
        Check_Point_Hotfix_R77.10_sk98814.tgz - Available for install
        
      6. See the list of available packages for install:

        HostName> show installer available_local_packages

      7. Install this hotfix:

        HostName> installer install Check_Point_Hotfix_R7X_sk98814.tgz

      8. Check the installation progress by repeatedly running this command:

        HostName> show installer package_status
        Outputs for example:
        Check_Point_Hotfix_R77.10_sk98814.tgz - Installing                - Progress: 3%
        Check_Point_Hotfix_R77.10_sk98814.tgz - installed
        
      9. Machine will be rebooted automatically.

    Contact Check Point Support for any assistance.



  • Show / Hide instructions - Gaia / SecurePlatform / Linux OS

    Contact Check Point Support for any assistance.

    1. Hotfix has to be installed on Security Gateway / each cluster member.

    2. Download the relevant hotfix package:

      Platform R76 R77 R77.10
      Gaia / SecurePlatform / Linux (TGZ) (TGZ) (TGZ)


    3. Transfer the hotfix package to the machine (into some directory, e.g., /some_path_to_fix/).

    4. Unpack the hotfix package:

      [Expert@HostName]# cd /some_path_to_fix/
      [Expert@HostName]# tar zxvf Check_Point_Hotfix_VERSION_sk98814.tgz

    5. Install the hotfix:

      [Expert@HostName]# ./fw1_wrapper_HOTFIX_NAME

      Note: The script will stop all of Check Point services (cpstop) - read the output on the screen.

    6. Reboot the machine.


  • Show / Hide instructions - IPSO OS

    Contact Check Point Support for any assistance.

    1. Hotfix has to be installed on Security Gateway / each cluster member.

    2. Download the relevant hotfix package:

      Platform R76 R77 R77.10
      IPSO (TGZ) (TGZ) (TGZ)


    3. Transfer the hotfix package to the machine (into some directory, e.g., /some_path_to_fix/).

    4. Unpack the hotfix package:

      [Expert@HostName]# cd /some_path_to_fix/
      [Expert@HostName]# tar zxvf Check_Point_Hotfix_VERSION_sk98814.tgz

    5. Install the hotfix:

      [Expert@HostName]# ./fw1_wrapper_HOTFIX_NAME

      Note: The script will stop all of Check Point services (cpstop) - read the output on the screen.

    6. Reboot the machine.


  • Show / Hide instructions - Windows OS

    Contact Check Point Support for any assistance.

    1. Hotfix has to be installed on Security Gateway / each cluster member.

    2. Download the relevant hotfix package:

      Platform R76 R77 R77.10
      Windows (EXE) (EXE) (TGZ)


    3. Transfer the hotfix package to the machine (into some directory, e.g., C:\some_path_to_fix\).

    4. Install the hotfix:

      • On R76 and R77:

        Right-click on the Check_Point_Hotfix_VERSION_Win_sk98814.exe file - click on 'Run as administrator'.

        Note: The script will stop all of Check Point services (cpstop) - read the output on the screen.

      • On R77.10:

        1. Use any archive program (WinZIP, WinRAR, 7-Zip, TUGZip, IZArc) to unpack the Check_Point_Hotfix_R77.10_Win_sk98814.tgz file.

        2. Open the Disk_Images folder.

        3. Open the Disk1 folder.

        4. Right-click on the setup.exe file - click on 'Run as administrator'.

          Note: The script will stop all of Check Point services (cpstop) - read the output on the screen.


    5. Reboot the machine.
Applies To:
  • 01371106 , 01369029 , 01373092 , 01373146 , 01373340 , 01373341 , 01374176 , 01374992 , 01375066 , 01379576 , 01380064 , 01380537 , 01380654 , 01380694 , 01380904 , 01381291 , 01407054

Give us Feedback
Please rate this document
[1=Worst,5=Best]
Comment