<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VSX Migration 6400 → 9700 with Bond Redesign (4→2 Interfaces) – vsx_util Reconfigure Limitations in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Migration-6400-9700-with-Bond-Redesign-4-2-Interfaces-vsx/m-p/274701#M104642</link>
    <description>&lt;P&gt;Sounds like your bond IDs are not changing, which means that your interface names in SmartConsole are not changing, which means that vsx_util reconfigure will be fine because it doesn't know or care about what the underlying interfaces inside the bond are. The interface names on the VSs reflect the bond ID, not the member interfaces within the bonds.&lt;/P&gt;
&lt;P&gt;Make sure, before you start, you open the VSX Cluster object in SmartConsole, go to Physical Interfaces section, and remove any unused interfaces. Leave only the interfaces being used there. Thus when you reconfigure to the new appliances, all the required interfaces (including the VS0 mgmt and sync interfaces) will exist on the new hardware.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 02 Apr 2026 01:56:31 GMT</pubDate>
    <dc:creator>emmap</dc:creator>
    <dc:date>2026-04-02T01:56:31Z</dc:date>
    <item>
      <title>VSX Migration 6400 → 9700 with Bond Redesign (4→2 Interfaces) – vsx_util Reconfigure Limitations?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Migration-6400-9700-with-Bond-Redesign-4-2-Interfaces-vsx/m-p/274686#M104636</link>
      <description>&lt;P class=""&gt;&lt;SPAN&gt;Hi everyone.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;I’m planning a VSX hardware migration and would really appreciate your guidance on the best approach, especially regarding interface/bond reconfiguration.&lt;/SPAN&gt;&lt;/P&gt;&lt;H3&gt;&lt;SPAN&gt;Current Environment&lt;/SPAN&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;VSX Cluster with 2x 6400 appliances (Load Sharing mode)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;VSX Gateways:&lt;/SPAN&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;VS0&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;VS1&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;VS2&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;&lt;SPAN&gt;Current Bonds Configuration&lt;/SPAN&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;bond1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;: eth2, eth3, eth4, eth5 (copper)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;bond2&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;: eth6, eth7&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;bond3&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;: eth1-1, eth1-2&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;bond4&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;: eth1-3, eth1-4&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;H3&gt;&lt;SPAN&gt;Target Environment (9700 appliances)&lt;/SPAN&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;bond1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; → eth5 + eth6 (fiber) &lt;span class="lia-unicode-emoji" title=":left_arrow:"&gt;⬅️&lt;/span&gt; (change from 4 interfaces to 2 + media type change)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;bond2&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; → eth3 + eth4 &lt;span class="lia-unicode-emoji" title=":left_arrow:"&gt;⬅️&lt;/span&gt; (interface change)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;bond3&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; → same naming (eth1-1, eth1-2)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;bond4&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; → same naming (eth1-3, eth1-4)&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;H3&gt;&lt;SPAN&gt;Main Question&lt;/SPAN&gt;&lt;/H3&gt;&lt;P class=""&gt;&lt;SPAN&gt;We are considering using &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;vsx_util reconfigure&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; to adapt the configuration to the new hardware.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;However, we have concerns about:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Changing &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;bond1 from 4 interfaces to 2 interfaces&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Changing interface types (copper → fiber)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Changing interfaces in &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;bond2&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Different interface numbering on the 9700&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;H3&gt;&lt;SPAN&gt;What we would like to understand&lt;/SPAN&gt;&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN&gt;Is &lt;/SPAN&gt;&lt;CODE&gt;&lt;SPAN&gt;vsx_util reconfigure&lt;/SPAN&gt;&lt;/CODE&gt;&lt;SPAN&gt; capable of handling this kind of bond redesign (including interface reduction and reassignment)?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;If not, what would be the recommended approach?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Are there any known risks when modifying bonds after reconfigure in a VSX cluster?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Any best practices for minimizing downtime and avoiding sync issues?&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;H3&gt;&lt;SPAN&gt;Additional Context&lt;/SPAN&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Both cluster members will be replaced&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Maintenance window is limited, so we are trying to balance safety vs speed&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;We want to avoid issues with cluster state, sync, or VS connectivity&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;SPAN&gt;Any recommendations, field experience, or best practices would be highly appreciated.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks in advance!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 19:44:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Migration-6400-9700-with-Bond-Redesign-4-2-Interfaces-vsx/m-p/274686#M104636</guid>
      <dc:creator>jennyado</dc:creator>
      <dc:date>2026-04-01T19:44:30Z</dc:date>
    </item>
    <item>
      <title>Re: VSX Migration 6400 → 9700 with Bond Redesign (4→2 Interfaces) – vsx_util Reconfigure Limitations</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Migration-6400-9700-with-Bond-Redesign-4-2-Interfaces-vsx/m-p/274701#M104642</link>
      <description>&lt;P&gt;Sounds like your bond IDs are not changing, which means that your interface names in SmartConsole are not changing, which means that vsx_util reconfigure will be fine because it doesn't know or care about what the underlying interfaces inside the bond are. The interface names on the VSs reflect the bond ID, not the member interfaces within the bonds.&lt;/P&gt;
&lt;P&gt;Make sure, before you start, you open the VSX Cluster object in SmartConsole, go to Physical Interfaces section, and remove any unused interfaces. Leave only the interfaces being used there. Thus when you reconfigure to the new appliances, all the required interfaces (including the VS0 mgmt and sync interfaces) will exist on the new hardware.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2026 01:56:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Migration-6400-9700-with-Bond-Redesign-4-2-Interfaces-vsx/m-p/274701#M104642</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2026-04-02T01:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: VSX Migration 6400 → 9700 with Bond Redesign (4→2 Interfaces) – vsx_util Reconfigure Limitations</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Migration-6400-9700-with-Bond-Redesign-4-2-Interfaces-vsx/m-p/276345#M105169</link>
      <description>&lt;DIV&gt;Are interfaces eth1–eth8 preserved and equivalent when migrating from 6700 to 9700 appliances, even if the underlying hardware ports differ?&lt;/DIV&gt;</description>
      <pubDate>Thu, 30 Apr 2026 23:26:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Migration-6400-9700-with-Bond-Redesign-4-2-Interfaces-vsx/m-p/276345#M105169</guid>
      <dc:creator>jennyado</dc:creator>
      <dc:date>2026-04-30T23:26:21Z</dc:date>
    </item>
    <item>
      <title>Re: VSX Migration 6400 → 9700 with Bond Redesign (4→2 Interfaces) – vsx_util Reconfigure Limitations</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Migration-6400-9700-with-Bond-Redesign-4-2-Interfaces-vsx/m-p/276350#M105171</link>
      <description>&lt;P&gt;I don't understand what you're asking here sorry. The base OS and interface/bonding configuration should be manually redone when you are setting up the new appliances ready for the vsx_util reconfigure procedure, if you are only using bonds for data links then the member interface names are not relevant to the reconfigure procedure.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2026 01:50:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Migration-6400-9700-with-Bond-Redesign-4-2-Interfaces-vsx/m-p/276350#M105171</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2026-05-01T01:50:54Z</dc:date>
    </item>
    <item>
      <title>Re: VSX Migration 6400 → 9700 with Bond Redesign (4→2 Interfaces) – vsx_util Reconfigure Limitations</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Migration-6400-9700-with-Bond-Redesign-4-2-Interfaces-vsx/m-p/276367#M105178</link>
      <description>&lt;P&gt;Also of note: remove the bond members from the Physical Interfaces section of the VSX cluster object, too. They can't be used by VSs (only the bond can be), and &lt;A href="https://community.checkpoint.com/t5/Firewall-and-Security-Management/unable-to-delete-VS-firewalls-when-VSX-members-are-offline/m-p/149037/highlight/true#M23856" target="_self"&gt;having them there may break the reconfigure&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Keep these management debugs handy. They allow you to make changes to the VSX cluster object without requiring the management to provision the changes to the firewall. You will always need to do a 'vsx_util reconfigure' after making changes like that, but if you're already trying to reconfigure and it's failing, these may let you fix the problem:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;fw debug fwm on TDERROR_ALL_VSXM_DBG_SKIP_PING=INFO
fw debug fwm on TDERROR_ALL_VSXM_DBG_SKIP_INSTALL=INFO
fw debug fwm on TDERROR_ALL_VSXM_DBG_SKIP_PULL_SIC=INFO&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 01 May 2026 14:35:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Migration-6400-9700-with-Bond-Redesign-4-2-Interfaces-vsx/m-p/276367#M105178</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-05-01T14:35:09Z</dc:date>
    </item>
    <item>
      <title>Re: VSX Migration 6400 → 9700 with Bond Redesign (4→2 Interfaces) – vsx_util Reconfigure Limitations</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Migration-6400-9700-with-Bond-Redesign-4-2-Interfaces-vsx/m-p/276381#M105190</link>
      <description>&lt;P data-end="294" data-start="131"&gt;What I’m trying to understand is whether there is any guaranteed consistency in interface naming between platforms.&lt;/P&gt;
&lt;P data-end="554" data-start="301"&gt;Specifically, when moving from a 6700 to a 9700 appliance, should I expect interfaces eth1–eth8 to keep the same naming and physical port association, or is the mapping platform-dependent and therefore needs to be validated manually on the new hardware?&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2026 18:52:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Migration-6400-9700-with-Bond-Redesign-4-2-Interfaces-vsx/m-p/276381#M105190</guid>
      <dc:creator>jennyado</dc:creator>
      <dc:date>2026-05-01T18:52:37Z</dc:date>
    </item>
    <item>
      <title>Re: VSX Migration 6400 → 9700 with Bond Redesign (4→2 Interfaces) – vsx_util Reconfigure Limitations</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Migration-6400-9700-with-Bond-Redesign-4-2-Interfaces-vsx/m-p/276382#M105191</link>
      <description>&lt;P&gt;Both have an eth1 through eth8, but on the 6700 eth1 through eth4 are 1g copper while on the 9700 eth1 through eth4 are SFP+ slots.&lt;/P&gt;
&lt;P&gt;The bonds abstract all that away, though. Just make sure the physical ports aren't in the VSX cluster object's Physical Interfaces section, and create the bonds with whatever new physical ports you want. As long as your config only references bonds, you should be able to move from hardware to hardware with little effort.&lt;/P&gt;
&lt;P&gt;If your Physical Interfaces section contains real ports like eth2 or eth1-04 and you're using them in VSs, you should look into 'vsx_util change_interfaces'. It lets you replace all references to an interface with references to another interface. Both must exist, and there will be an outage as the configuration is changed.&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2026 19:00:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Migration-6400-9700-with-Bond-Redesign-4-2-Interfaces-vsx/m-p/276382#M105191</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-05-01T19:00:43Z</dc:date>
    </item>
    <item>
      <title>Re: VSX Migration 6400 → 9700 with Bond Redesign (4→2 Interfaces) – vsx_util Reconfigure Limitations</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Migration-6400-9700-with-Bond-Redesign-4-2-Interfaces-vsx/m-p/276394#M105198</link>
      <description>&lt;P&gt;I would install it in paralell using vsx provisioning&lt;BR /&gt;Have the new appliances bond interfaces carrying production traffic in shutdown in the switches.&lt;BR /&gt;&lt;BR /&gt;New VSX Cluster name&lt;BR /&gt;New VS names&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Add it to the current CMA / Domains.&lt;BR /&gt;Policys can be installed on new VS in parallell.&lt;BR /&gt;&lt;BR /&gt;Before cutover, Flipp the VPN config to the new VS, install policy again.&lt;BR /&gt;During cutover, Shutdown interfaces in the switches to old appliance and open it to the new appliance boxes.&lt;BR /&gt;&lt;BR /&gt;Benifit of this approch is that you can do changes to the enviroment you would like to do, for clean-up.&lt;BR /&gt;You do have a very easy rollback if needed, where u have not touched the old enviroment,.&lt;BR /&gt;You can do VS per VS migration.&lt;BR /&gt;As its VSX, its controlled via VS0, allowing you to prepp all in advance.&lt;BR /&gt;&lt;BR /&gt;Drawback, it will require some new IP:s, may require the use of some demo licenses in the CMA / Domains during the buildup.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Magnus&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 03 May 2026 05:25:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Migration-6400-9700-with-Bond-Redesign-4-2-Interfaces-vsx/m-p/276394#M105198</guid>
      <dc:creator>Magnus-Holmberg</dc:creator>
      <dc:date>2026-05-03T05:25:41Z</dc:date>
    </item>
  </channel>
</rss>

