There's a CheckPoint protocol identified as "FIBMGR" which uses TCP port
2010 and is exchanged between the two gateways in our cluster.  The
majority of these packets are exchanged between the two clusters without
a problem, however, several times per hour SmartDefence will block an
exchange claiming it detected an Instant Messaging Attack as "Skype
protocol was detected on the connection".  

The cluster appears to be operating ok and we've not experienced an
interruption in service so far, but this is something we'd like to
resolve.  Anyone dealt with this issue before or have any ideas ?

We're Running NGX R60 and I've updated to the latest SmartDefence
signature.  

> Craig Doyle
> Network Infrastructure Team, ISD
> Export Development Canada
> (613) 598-6853
> www.edc.ca
> 

=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================

Reply via email to