There's a CheckPoint protocol identified as "FIBMGR" which uses TCP port 2010 and is exchanged between the two gateways in our cluster. The majority of these packets are exchanged between the two clusters without a problem, however, several times per hour SmartDefence will block an exchange claiming it detected an Instant Messaging Attack as "Skype protocol was detected on the connection".
The cluster appears to be operating ok and we've not experienced an interruption in service so far, but this is something we'd like to resolve. Anyone dealt with this issue before or have any ideas ? We're Running NGX R60 and I've updated to the latest SmartDefence signature. > Craig Doyle > Network Infrastructure Team, ISD > Export Development Canada > (613) 598-6853 > www.edc.ca > ================================================= To set vacation, Out-Of-Office, or away messages, send an email to [EMAIL PROTECTED] in the BODY of the email add: set fw-1-mailinglist nomail ================================================= To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ================================================= If you have any questions on how to change your subscription options, email [EMAIL PROTECTED] =================================================
