Important Installation Information

Integrity Checks

Each TOS version comes encrypted with two SHA values. You can verify the integrity of the TOS installation package by running an integrity check before you install it on your servers. If the output is identical to the SHA values for the relevant TOS version, you can safely install the TOS package.

To verify the integrity, run the following commands:

[<ADMIN> ~]$ sha256sum tos-xxxx-xxxxxxxx-final-xxxx.run.tgz
sha256sum tos-xxxx-xxxxxxxx-final-xxxx.run.tgz
[<ADMIN> ~]$ sha1sum tos-xxxx-xxxxxxxx-final-xxxx.run.tgz
sha1sum tos-xxxx-xxxxxxxx-final-xxxx.run.tgz

R23-2 PHF3.2.0

Item

Details

Run file name tos_23-2-phf3.2.0-final-19226.run.tgz
sha256 297fa231ecca2ccaae624ebe42673138a9906e91a7d43ea9b6a8cd6a3be8fd56
sha1sum adaddad12f4954300ef097d682413c5956dd23e4

R23-2 PHF3.0.0

Item

Details

Run file name tos_23-2-phf3.0.0-final-18506.run.tgz
sha256 a9f4d958eb1b2891b191e79a2eeef5e2d0783d54c8ee67374167b935748a9ba1
sha1sum 45a733a9a6e0cd800cda1a2ad44df8343ce7e06c

R23-2 PHF2.0.0

Item

Details

Run file name tos_23-2-phf2.0.0-final-17476.run.tgz
sha256 7eaadd318a522d7be7f4653423dbc526299a1a0697b7c70e08d3cc0baeec66e7
sha1sum 9976e0f471c4b0f02e45f819e022edeb6750aeeb

R23-2 PHF1.0.0

Item

Details

Run file name tos_23-2-phf1.0.0-final-16418.run.tgz
sha256 0aa7a9528a2780efedc8676927a23f6b7d3cdd707f9c6b265ecaa4dabcdbb27d
sha1sum de5def9b04ecb463930cdf60f6bcccdf94477153

R23-2 PGA.1.0

Item

Details

Run file name tos_23-2-pga.1.0-final-15507.run.tgz
sha256 31dbc13135154ab9fbacd8d0c29a5762c24855843c17bba857c899e9b1dee882
sha1sum 17996221e7e4135f5625b250c28f064d91810a1c

R23-2 PRC1.0.0

Item

Details

Run file name tos_23-2-prc1.0.0-final-13978.run.tgz
sha256 a200fe4ccc387e8ccbe2c8abcef686fd427ef28fda56c63bfb9d063886741d87
sha1sum 8adbbc604335fd2c756cf18e6bb13692e0c1059d

Before Installing or Upgrading

  • After installing or upgrading R23-2, license usage data will be automatically collected from TOS. All TOS users will need to be able to access aus.tufin.com from the browsers on their work stations. For more information, see Send Reports Automatically.

  • From R22-2 PHF2.0.0, we require that the /opt partition storage usage not exceed 70% of the available space to ensure proper TOS functionality.

  • From R22-2, we improved several backup components. Backups will take longer to complete, but will be compressed and more reliable.

  • After upgrading to R23-1 PRC1.0.0, you are going to have to regenerate the client certificates for any OPM device connected to TOS.

  • When installing or upgrading to R23-1, all SNMP inbound queries (such as walk, get, and getNext) will be disabled by default.

    To enable SNMP v2 walk and get queries, after the installation/upgrade, run the following CLI command on the initial data node as a user with root privileges.

    tos config set -p snmp.inboundMonitoringEnabled=true -s monitor-tower
    tos config set -p snmp.inboundMonitoringEnabled=true -s monitor-tower
  • If you have FortiManager devices in SecureTrack, after upgrading you are going to need to add a SAN signed certificate to each device

  • If you are upgrading from R21-3 or R21-2, after the upgrade, the legacy license enforcement accuracy of management devices (such as Panorama and FortiManager) will be improved: the license status of the management devices is going to be determined according to the accumulated license statuses of their managed firewalls. As a result, if there is at least one managed firewall with the license status Expired or Unlicensed, the management device will also have the license status Expired or Unlicensed.

    To resolve this, you can:

    • Ensure that a valid license is attached to all managed firewalls.

    • Disable the unlicensed firewalls

    • Remove the unlicensed firewalls from SecureTrack monitoring.

    This does not apply to Check Point Management Devices.

Additional Information

  • Starting from R23-1 PHF1.0.0, ICMP is considered both a service and an application when creating or editing the security policy of a USP zone. To differentiate:

    • ICMP = application

    • ICMP-proto = service

    This is also true when defining a specific service. For example: ICMP-proto 8.

    As a result, when importing old USP CSV files to R23-1 PHF1.0.0 and later, ICMP will be considered an application and not a service. For ICMP to be considered a service, you are going to need to change it to ICMP-proto.

  • Starting from R22-2 PHF2.0.0, the Tufin Marketplace has been renamed Tufin extensions.

  • Starting from R22-1 PHF2.0.0, for Cisco ASA devices, in order to prevent unnecessary ticket dependencies, Designer creates groups using the timestamp as the suffix of the group name. For example:

    • NetworkGroup_1657713531

  • If you want to change back to the previous naming convention, in stconf set the Designer_ASA_Index_Group_Name flag as True.

    For more information, see Changing The Naming Convention of Cisco ASA Group Names Created by Designer

  • Tufin Orchestration Suite enforces maximum session duration settings for SecureTrack and SecureChange, including for the REST APIs.

  • To ensure that SecureChange and SecureApp have full functionality, the dedicated account used to define integration with SecureTrack (SecureChange/SecureApp > Settings > General > SecureTrack) should have Super Admin permissions configured in SecureTrack.

  • For Check Point R80 devices, a new revision is automatically retrieved when you upgrade, and therefore Compare Revisions may show changes for all the existing network objects.

    Before you upgrade, make sure you have a recent (from ≤ 3 months) Check Point Jumbo Hotfix version installed on your device. See the relevant Check Point Support Center article for more information on how to verify which Jumbo Hotfix version is installed.

  • SAML Login Authentication and Google Chrome browsers: Google recently introduced a change to their SameSite cookie policy that enhances browser security. As a result of this change, users will be unable to log in to SecureTrack using SAML authentication on old browsers. SAML authentication is supported only for browser versions starting from:

    • Chrome: versions 79 and 80.

    • Firefox: version 72

    We strongly recommend upgrading the browsers to these versions. For more information on the SameSite cookie policy change, see the following posts: