Sie sind auf Seite 1von 20

NGX R65 HFA_50

Provider-1
Release Notes
December 2009
Note - The latest available version of this document is at:
http://supportcontent.checkpoint.com/documentation_download?ID=10142

Introduction page 3
What’s New page 3
Known Limitations page 4
Supported Versions, Platforms and Builds page 6
Installation and Uninstallation page 8
Resolved Issues in NGX R65 HFA_50 page 12
Resolved Issues in NGX R65 page 19
Documentation Feedback page 20

Provider-1 NGX R65 HFA_50 Release Notes Last Update — December 6, 2009 2
Introduction

Introduction
Thank you for updating your Check Point products with Provider-1/SiteManager-1 NGX R65
HFA_50 (Hotfix Accumulator). This HFA is a recommended update that resolves various issues and
contains improvements for Provider-1/SiteManager-1 and other Check Point products on a variety of
platforms.
Please read this document carefully prior to installing this HFA. We also recommend that you refer
to the appropriate Check Point user documentation and release notes, which contain hardware
requirements, software requirements, and version recommendations.

Note - The product name Provider-1, as used in this document, refers to both Provider-1 and
SiteManager-1, unless otherwise indicated.

What’s New

• R65 HFA 50 supports the following new platforms:


• SecurePlatform 2.6
• Smart-1
• This HFA includes a large number of fixes.
• New minimum and maximum values for the time zone counter have been updated in the
SecurePlatform Web User Interface. On the Device Date and Time Setup page, the time can
now be set to minus twelve or plus thirteen hours GMT (New Zealand).

Provider-1 NGX R65 HFA_50 Release Notes Last Update — December 6, 2009 3
Known Limitations

Known Limitations

Provider-1
00427880
If this HFA is uninstalled, stored revisions that were made while it was installed cannot be viewed
or reloaded.

SecurePlatform
After installing Check_Point_NGX_R65_HFA_50.linux.tgz
http://supportcontent.checkpoint.com/file_download?id=10146 that contains a number of
packages on a SecurePlatform, the HFA package named SecurePlatform (for the Operating
System) cannot be uninstalled. Thus, SecurePlatform NGX R65 HFA_50 will be displayed after
uninstall.

Check Point NGX R65.4 is not supported for installation on top of R65 HFA 50 running on
SecurePlatform 2.6.

00466648
Uninstalling HFA 50 on SecurePlatform 2.6 is not supported as it may cause system instability.
Before installing HFA 50 on SecurePlatform 2.6, make sure to take a snapshot of the entire
system in order to enable reverting to the previous state if needed. For details refer to sk42329 at
http://supportcontent.checkpoint.com/solutions?id=sk42329

00523404
Before upgrading a SecurePlatform gateway to R70 from R65 with HFA 40 or HFA 50, you must
follow the instructions in sk43247 (http://supportcontent.checkpoint.com/solutions?id=sk43247).

SecurePlatform Web User Interface


00435874
When using SecurePlatform Web User Interface to restore a machine from a snapshot with a path
name that has spaces, the restore will fail on error: “Filename must not contain spaces.”
Workaround: Restore the machine from a path name that has no spaces.

VPN-1 Edge/Embedded
00437851, 00437914, 00438673
Installing a policy on a large number of VPN-1 UTM Edge devices managed from SmartDashboard
may not succeed.
Workaround: Install the policy on Edge devices in several batches.

4 Provider-1/SiteManager-1 NGX R65 HFA_50 Release Notes - Last Update — December 6, 2009
Known Limitations

VPN-1
00508572
L2TP connections initiated from a client located behind NAT will fail.

Database Revisions
00432491
A database version, created with the Policy Revision Control, cannot be viewed or restored if the
list of currently installed plug-ins is different from when the Revision Control version was created.

Connectra
Installation of Connectra NGX R62 Central Management plug-in is not supported on an NGX R65
MDS with certain other plug-ins. For a list of plug-in compatibility, see
http://www.checkpoint.com/ngx/upgrade/plugin/index.html

Eventia Analyzer
00467080
When changing the Database Maintenance configuration from a very large size (20 GB) to a
smaller size (2 GB) the cleaning process takes a very long time.
Workaround: In Database Maintenance, reduce the DB size gradually from 20 GB to 15 GB, then
to 10 GB, and so on.

R65.4 installation on Windows on top of HFA 50 or above is blocked. For a workaround, see
sk42965.

Provider-1 NGX R65 HFA_50 Release Notes Last Update — December 6, 2009 5
Supported Versions, Platforms and Builds

Supported Versions, Platforms and Builds


In This Section
Supported Platforms page 6
Supported Products page 6
Supported Builds page 7
Supported Builds History page 7

Supported Platforms
The following platforms are supported for Provider-1 NGX R65 HFA_50.
Platform Version
Smart-1 Models 5, 25 and 50
SecurePlatform NGX R65 on SecurePlatform 2.4 and 2.6
Solaris 5.8, 5.9, 5.10
Linux Red Hat Enterprise Linux 3.0 kernel 2.4

Supported Products
This HFA may be installed with various Check Point products.

Check Point NGX R65 Product Supports R65_HFA_50 Installation?


Check Point NGX R65 GA YES
HFA 01 YES
HFA 02 YES
HFA 30 YES
HFA 40 YES
Check Point NGX R65.4 YES
with Messaging Security (HFA 25) YES
with R65 VSX Management Update (and revision 2) YES

6 Provider-1/SiteManager-1 NGX R65 HFA_50 Release Notes - Last Update — December 6, 2009
Supported Versions, Platforms and Builds

Supported Builds
To verify you have the HFA described in this document: extract the contents of the tgz package you
downloaded and open the take_number.conf file using a text editor. Verify that it contains:
take_95.
Take 95 of Provider-1 NGX R65 HFA_50 consists of the following builds:

Component Build Number Verify Command and Output


MDS 620650023 The output of fwm mds ver should appear similar to:
This is Check Point Provider-1 Server NGX (R65) HFA_50,
Hotfix 650 - Build 023
Firewall & Kernel 620650048 The output of fw ver -k should be similar to:
This is Check Point VPN-1(TM) & Firewall(R) NGX (R65)
HFA_50, Hotfix 650 - Build 048
kernel: NGX R65 HFA_50, Hotfix 650 - Build 048
SecurePlatform 620650021
VPN-1 UTM Edge 620650004
Compatibility

Supported Builds History

MDS Firewall SecurePlatform Edge Compatibility


R65_HFA_40 620640039 620640091 620640029 620640008
R65_HFA_30 Windows: Linux/SecurePlatform: 620630036 620630018
620630014 620630049
Other OS: Other OS:
620630014 620630049

R65_HFA_02 620602004 620602008 620602004 Windows: 620602005


Solaris: 620602007
R65_HFA_01 620601030 620601019 620601008 620601004

Provider-1 NGX R65 HFA_50 Release Notes Last Update — December 6, 2009 7
Installation and Uninstallation

Installation and Uninstallation


Important:
Before installing Provider-1 NGX R65 HFA_50, run
• mdsenv
• mdsstop
If this is not done, the system will experience functionality issues.
It is also recommended to backup the system by executing mds_backup command before any
installation.

Required Disk Space


The table below shows the amount of free disk space in MB required to download, extract and
install NGX R65 HFA_50.

Platform To download and extract the HFA To install


Smart-1 576 opt = 440
SecurePlatform /var = 100
root = 100
Solaris 311 /opt = 530

Linux 576 /opt = 450


/var = 100

Installing on SecurePlatform
c

Important - The default idle timeout on SecurePlatform is ten minutes. After this time, the user is logged out. To
ensure that installation is not interrupted by this timeout, before entering expert mode, type: idle 60 in the
command line.

To install Provider-1 NGX R65 HFA_50 on SecurePlatform with CLI:


1. If this is on SecurePlatform, create a snapshot. Run snapshot and go through the options of
the CLI snapshot wizard.

2. Create a temporary directory on /var: mkdir /var/hfa


3. Verify that there is enough free disk space for the installation of the HFA packages.

4. Navigate to the new directory: cd /var/hfa


5. Download Check_Point_NGX_R65_HFA_50.linux.tgz from
http://supportcontent.checkpoint.com/file_download?id=10146
to /var/hfa and extract the packages.

6. Execute: ./UnixInstallScript and follow instructions.

7. Reboot the machine once the installation process completes.

8 Provider-1/SiteManager-1 NGX R65 HFA_50 Release Notes - Last Update — December 6, 2009
Installation and Uninstallation

Installing on Solaris or Linux


To install Provider-1 NGX R65 HFA_50 on Solaris or Linux:
1. Create a temporary directory on /opt: mkdir /opt/hfa

2. Navigate to the new directory: cd /opt/hfa

3. Verify that there is enough free disk space for the installation of the HFA packages.

4. Download the HFA file to /opt/hfa and extract the contents.


• Solaris: Check_Point_NGX_R65_HFA_50.solaris2.tgz from
http://supportcontent.checkpoint.com/file_download?id=10145
• Linux: Check_Point_NGX_R65_HFA_50.linux.tgz from
http://supportcontent.checkpoint.com/file_download?id=10146

5. Delete the *.tgz file to save disk space.

6. Execute: ./UnixInstallScript and follow on-screen instructions.

7. Reboot the machine.

Provider-1 NGX R65 HFA_50 Release Notes Last Update — December 6, 2009 9
Updating Customized INSPECT Files

Updating Customized INSPECT Files


The MDS contains several INSPECT (*.def) files, typically located in the $FWDIR/lib directory.
This HFA may include one or more updated INSPECT files, which replace the files currently in use.
The installation routine automatically updates INSPECT files for all CMAs only if all INSPECT files
are unmodified for that CMA.
If all CMAs were updated successfully (none had modified INSPECT files), the following message
appears:
The updated Inspect files have been installed successfully.
To complete the installation, please re-install the Security Policy on all
your gateway for the CMAs.

If any INSPECT files in a CMA were previously modified, no INSPECT files are updated for this
CMA. The following message appears:
Signature mismatches were found for some CMAs. This indicates that manual
change were made to the Inspect files. These affected CMAs are listed in:
$MSDIR/tmp/manually_modified_cmas.txt
Please note that the specified Inspect files were NOT updated for these
CMAs. If you wish to update them, execute the following command:
hf_propagate o --override_manual

If the files were not replaced (signature mismatch message displayed), you must force the
INSPECT files to be updated.

Important - You must replace the previous files. If you do not, unexpected behavior may result.
The following procedure is done on ALL CMAs at once, not just the one you are working on.

To force INSPECT files to be updated:


1. On the MDS, open $MSDIR/tmp/manually_modified_cmas.txt and note the CMAs that
have modified INSPECT files.
For each of these CMAs, do the following.

2. Go to the CMA: mdsenv <CMA_Name>

3. On the CMA, open $FWDIR/lib/update_inspect_files_50.log and note the INSPECT files


that were modified.
If the files were not replaced because of customizations, the log shows:
<filename>.def was changed by user, signature didn’t match!

4. Open the files that are listed in update_inspect_files_50.log and note the customized
lines.

5. Run: hf_propagate o --override_manual

6. Merge the customized content (that you noted in the previous steps) into the new INSPECT
file(s).

7. Re-install the Security Policy to enable the new INSPECT files.

Note - Backups of the upgraded files are saved with _pre_HFA_50 in the filename.

10 Provider-1/SiteManager-1 NGX R65 HFA_50 Release Notes - Last Update — December 6, 2009
Installation and Uninstallation

Uninstallation

Important - After uninstallation, make sure the machine reboots before attempting to run uninstall
again. A second uninstall command may cause unexpected behavior.

Before you begin this procedure, note that the order of uninstallation executes is important. You
must follow the instructions in the order provided here; otherwise, the uninstallation could have
unwanted results. In addition, uninstallation of individual packages is not supported.
To uninstall NGX R65 HFA_50 from Provider-1 MDS:
1. Execute mdsstop.

2. Run ./opt/CPUninstall/R65_HFA_50/Unixinstallscript -u

3. Reboot the machine upon completion of the uninstallation.

Note - If you reboot the machine from opt/CPUninstall/R65_HFA_50 an error message appears
that can be ignored.

Post-Uninstall Notes
After uninstalling this HFA from a SmartCenter server machine which had plug-ins installed, you
may find that policy installation is not functioning correctly. To fix this issue, execute:
plugin_reset
After uninstalling this HFA from a SecurePlatform machine, the login prompt may still display
Check Point SecurePlatform NGX (R65) HFA 50 as the installed version, because the
SecurePlatform package was not uninstalled. Use the fw ver command to see the current version.

Provider-1 NGX R65 HFA_50 Release Notes Last Update — December 6, 2009 11
Resolved Issues in NGX R65 HFA_50

Resolved Issues in NGX R65 HFA_50


In This Section
Eventia Analyzer page 12
Eventia Reporter page 12
Firewall page 13
HFA Installation page 14
Management Server page 14
Provider-1 page 15
Platform Specific: SecurePlatform page 17
Security Management page 17
VPN-1 Edge/Embedded page 17
VSX page 18

Eventia Analyzer
ID: 00436786, 00436755, 00436785
Description: Automatic archiving of large history files when Database Maintenance is enabled
now succeeds.
Install On: Dedicated server

ID: 00444564, 00438300, 00442123


Description: Improved stability of the Eventia Analyzer server when collecting a large amount of
debug information, in some instances as a result of a Check Point Support request.
Install On: Analyzer Server

Eventia Reporter
ID: 00432523, 00432506, 00450008
Description: The Log Consolidator process now ignores log entries with erroneous dates.
Erroneous dates are defined as later than the current date and earlier than the
current date minus a defined interval (360 days by default). These dates may be
generated by endpoint computers with date and time values incorrectly defined. The
ignored log records are stored in:
$RTDIR/log_consolidator_engine/log/<IP>/ignored_records.txt and can be
viewed by opening this file in a text editor.
For details on modifying the defined interval, refer to sk42348 at
http://supportcontent.checkpoint.com/solutions?id=sk42348
Install On: Dedicated server

ID: 00416690, 00435203


Description: New permissions have been added so that only a Provider-1 superuser and
Provider-1 Customer superuser can log into Eventia Reporter. This ensures that
when the Eventia Reporter server is configured as a global object of the MDS,
customer managers have no access to the private data of other customers.
Install On: Dedicated server

12 Provider-1/SiteManager-1 NGX R65 HFA_50 Release Notes - Last Update — December 6, 2009
Resolved Issues in NGX R65 HFA_50

ID: 00420559, 00420557, 00418195, 00428353, 00441382


Category: DNS resolving
Description: Improved stability of log consolidation when DNS resolving is enabled.
Install On: Dedicated server

ID: 00438766, 00437000, 00440736, 00493460


Description: Automatic scheduling of more than 100 reports is now supported.
Install On: Dedicated server

ID: 00414024, 00380084, 00422998, 00428436, 00450025


Description: Improved stability of the log consolidation process.
Install On: Dedicated server

ID: 00409369, 00408795, 00411164, 00428464


Description: Improved performance of the Database Automatic Maintenance process.
Install On: Dedicated server

ID: 00440732, 00431255, 00440743


Description: Improved the stability of the Database Automatic Maintenance process to recover
after a failure (for example, after a server reboot). The maintenance process will
restart automatically after a short period of time following a failure.
Install On: Dedicated server

ID: 00440731, 00431256, 00440742


Description: Improved stability of consolidation, as log files, deleted from a log server no longer
appear in the list when creating a new custom consolidation session or starting the
consolidation from a “selected file in the sequence”.
Install On: Dedicated server

ID: 00441496, 00429663


Description: Improved stability of log consolidation as references to objects that were deleted
from the management database no longer remain on the Eventia Server.
Install On: Dedicated server

Firewall
ID: 00421161, 00366470, 00416530, 00420375, 00428220, 00447035,
00447310
Category: Policy Installation
Description: Policy installation now succeeds under the following circumstances:
• Defining NAT rules for an Edge object using large groups as the source or
destination.
• Defining NAT rules for an Edge object using a dynamic object as the source or
destination.
Install On: MDS

Provider-1 NGX R65 HFA_50 Release Notes Last Update — December 6, 2009 13
HFA Installation

ID: 00426509, 00421995


Category: Policy Installation
Description: Policy Installation from R65 SmartCenter server now succeeds on R60 gateways.
Install On: MDS

ID: 00403311, 00117492, 00326603, 00326769, 00326770, 00336963,


00339662, 00352317, 00380458, 00442510, 00445070
Category: Policy Installation
Description: Policy verification and installation now displays a warning when DNS verification is
disabled and NAT for DNS payload is enabled. Refer to sk34295 at
http://supportcontent.checkpoint.com/solutions?id=sk34295 for details regarding
these DNS features and their configuration.
Install On: MDS

HFA Installation
ID: 00440838, 00439588
Category: Installation
Description: It is now possible to install an HFA on top of an installation if the path with the
FWDIR variable contains a space character.
Install On: MDS

Management Server
ID: 00366985, 00366122, 00366986, 00371289, 00415251, 00449365
Description: Debug messages (as a result of an error or just informatory) now only appear in
Debug mode.
Install On: MDS

ID: 00444877, 00444646, 00466573, 00466574


Category: Logging
Description: The command line function fwm was improved to recognize the correct database for
Log Export, when running from a gateway or on a Provider-1 MDS.
Install On: MDS/MLM

ID: 00428382, 00428005, 00428383, 00428420


Category: Management
Description: Users can successfully connect to a SmartCenter server. The "Too many open files"
error message no longer appears when opening SmartDashboard.
Install On: MDS

14 Provider-1/SiteManager-1 NGX R65 HFA_50 Release Notes - Last Update — December 6, 2009
Resolved Issues in NGX R65 HFA_50

ID: 00407978, 00404910


Category: Connectra
Description: SmartCenter server license handling has been updated to recognize the Connectra
Load Sharing Cluster built-in license. Previously, license verification on Connectra
SmartCenter server failed.
Install On: MDS

ID: 00426664, 00330893, 00338991, 00339561, 00339562, 00339563,


00343846, 00343921, 00423359, 00427446, 00347004, 00348232,
00351744, 00418285, 00354264, 00368370, 00426082, 00426857,
00427657, 00442407, 00444266
Category: Certificates
Description: Improved certificate handling ensures that certificates are reloaded as needed, and
not renewed when not needed.
Install On: MDS

ID: 00374515, 00367426, 00370082, 00371721, 00372406, 00408429,


00430716, 00406346, 00422740
Category: SmartCenter Server
Description: Improved resource allocations on the SmartCenter server prevent memory leaks from
being created if cpmistat is run in a script on the SmartCenter server to query for
status.
Install On: MDS

ID: 00440324, 00433157, 00494111


Category: Installation
Description: New gtar copies can now be placed in $CPDIR/bin/ to be utilized for Database
revisions, while leaving $CPDIR/util/gtar intact, preserving the integrity of HFA
installations.
Implementation: To obtain a new gtar file, contact your Sales representative or Check Point
Technical Services. Place the new gtar file in $CPDIR/bin/
Install On: MDS

ID: 00445927, 00445813, 00445928


Category: Logging
Description: Log forwarding has been enhanced in R65_HFA_50. This can correct the issue on
SmartCenter servers with R65_HFA_30 on Windows platforms where the forwarding
of log files sometimes failed.
Install On: MDS

Provider-1
ID: 00419740, 00417955, 00420956, 00430201, 00439136, 00464270
Category: Authentication
Description: All TCP sockets now close properly so that no file descriptor leaks occur when
connecting to a CMA via RADIUS server authentication.
Install On: MDS

Provider-1 NGX R65 HFA_50 Release Notes Last Update — December 6, 2009 15
Provider-1

ID: 00420177, 00415445


Category: Configuration
Description: Improved MDS stability when attempting to delete a customer from the MDG or CLI.
Install On: MDS

ID: 00433976, 00433667, 00433974


Description: Improved SmartMap configuration enables connection via SmartDashboard to a
CMA while SmartMap is loading.
Install On: MDS

ID: 00410441, 00404966, 00419946, 00428266, 00432878, 00438356


Description: Improved stability on the CMA when the MDS is down and the administrator
authenticates through a RADIUS server due to changes made in the fwm process.
Install On: MDS

ID: 00406630, 00403254


Category: Global Policy
Issue: Enhancements made to the fwm process ensure successful assignment of Global
Policy in Provider-1.
Install On: MDS

ID: 00437462, 00436817


Category: Installing Policy
Description: Enhancements were made to the allocating and releasing memory process.
Install On: MDS

ID: 00404453, 00382166, 00427710, 00443484, 00464325, 00466247,


00447482
Category: Licensing
Description: The cpd process no longer terminates during certain licensing operations (adding,
printing, deleting).
Install On: CMA and MDS

ID: 00508596
Category: Licensing
Description: SNX licensing problems have been resolved. Licenses must be installed on the
MDS.
Install On: MDS

ID: 00437463, 00437463


Category: Installation
Description: A memory leak that occurred whenever a SmartCenter server’s database is loaded by
a third party has been resolved.
Install On: MDS

16 Provider-1/SiteManager-1 NGX R65 HFA_50 Release Notes - Last Update — December 6, 2009
Resolved Issues in NGX R65 HFA_50

ID: 00405221, 00380451, 00418943, 00422741, 00428074, 00430111,


00443340, 00497811
Category: Static NAT
Description: Enhancements to the SIC functionality resolve the issue of Provider-1 behind static
NAT sometimes being unable to open the MDG.
Install On: MDS

Platform Specific: SecurePlatform


ID: 00463822
Category: Installation
Description: R65 HFA 50 can be installed on both SecurePlatform 2.4 and 2.6.
Install On: MDS

Security Management
ID: 00412090, 00411259, 00466224, 00427725, 00443476, 00464269
Category: Policy Installation
Description: Enhancements made to the fwm process provide stability during policy installation.
Install On: MDS

VPN-1 Edge/Embedded
ID: 00446704, 00446709
Category: VPN-1 Edge
Description: Before installing a policy on an Edge device, it is no longer necessary to select VPN
in the products list on the General Properties page of the Edge object. Even though
VPN is not selected for the Edge object, the policy will be installed successfully.
Install On: MDS

ID: 00437851, 00437914, 00438673


Category: VPN-1 Edge
Description: Installing a policy on a large number of VPN-1 UTM Edge devices managed from
SmartDashboard succeeds consistently.
Install On: MDS

ID: 00412628, 00411722


Category: VPN-1 Edge
Description: Improved the verifier code to enable successful policy installation for a policy that
included two VPN-1 UTM Edges devices configured as backup gateways for each
other, each with two external interfaces. Previously, a verifier warning appeared:
"The VPN-1 UTM Edge object <edge_device_1> has VPN-1 UTM Edge object
<edge_device_2> selected as its backup Gateway, but they do not have the same
encryption domain.
Install On: MDS

Provider-1 NGX R65 HFA_50 Release Notes Last Update — December 6, 2009 17
VSX

VSX
ID: 00375553, 00371285, 00380532, 00403450, 00438948
Category: VSX
Description: Static routes are now automatically recreated with new interface names after
changes have been made to an interface name (normal or VLAN) and the next hop
is in the same subnet as the VS interface.
Install On: MDS

18 Provider-1/SiteManager-1 NGX R65 HFA_50 Release Notes - Last Update — December 6, 2009
Resolved Issues in NGX R65

Resolved Issues in NGX R65


For a complete list of resolved issues in NGX R65 and previous HFA versions, refer to sk42318 at
http://supportcontent.checkpoint.com/solutions?id=sk42318.

Provider-1 NGX R65 HFA_50 Release Notes Last Update — December 6, 2009 19
Documentation Feedback
Check Point is engaged in a continuous effort to improve its documentation. Please help us by sending your
comments to:
cp_techpub_feedback@checkpoint.com

© 2003-2009 Check Point Software Technologies Ltd.

All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and
decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every
precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are
subject to change without notice.

RESTRICTED RIGHTS LEGEND:

Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at
DFARS 252.227-7013 and FAR 52.227-19.

TRADEMARKS:

Refer to http://www.checkpoint.com/copyright.html for a list of Check Point trademarks

For third party notices, see http://www.checkpoint.com/3rd_party_copyright.html.

www.checkpoint.com

Worldwide Headquarters U.S. Headquarters


Check Point Software Technologies, Ltd. Check Point Software Technologies, Inc.
5 Ha’Solelim Street 800 Bridge Parkway
Tel Aviv 67897, Israel Redwood City, CA 94065
Tel: 972-3-753-4555 Tel: 800-429-4391; 650-628-2000
Fax: 972-3-624-1100 Fax: 650-654-4233
email: info@checkpoint.com

Das könnte Ihnen auch gefallen