<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VMAC and Automatic NAT in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/25583#M1943</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I didn't say it was exactly the same issue, but&amp;nbsp;one in a similar vein. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 10 Sep 2018 21:14:24 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-09-10T21:14:24Z</dc:date>
    <item>
      <title>VMAC and Automatic NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/25578#M1938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yesterday we were doing a migration of a cluster which has some Automatic NAT's that are using IP's in the same range as the external IP of the gateways.&lt;/P&gt;&lt;P&gt;Months ago we had issues with this customer when we had a cluster failover which was returned shortly after, around 10 minutes. After the primary member was restored the router just kept using the mac address of the backup gateway and only after the 4 hour cache of the router was flushed, it restored the proper mac address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We decided to change the cluster to use VMAC instead and setup proxy arp (for the manual NAT) to use the VMAC as well. Now you would expect the cluster to show the VMAC adresses when you see the response on 'fw ctl arp' but it will only show the manual NAT proxy arp entries with the VMAC and all automatic NAT are just using the interface mac and I really do not understand why.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As when we yesterday moved from openserver on R77.30 to Appliance with R80.10 we were really surprised to see this behavior as again we had problems with those blasted routers not picking up the gratuitous arps sent when switching the cluster (during failover tests).&lt;/P&gt;&lt;P&gt;Only by sending them manually by using arping we could get it all back to work again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This just one of the reasons why I really prefer VRRP, as there the automatic NAT just use the VMAC, as it should.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone else having similar problems or are the clusters I have checked so far (about 4 ClusterXL and 2 VRRP) the only ones with these problems or has nobody ever wondered?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Sep 2018 21:30:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/25578#M1938</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-09-09T21:30:49Z</dc:date>
    </item>
    <item>
      <title>Re: VMAC and Automatic NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/25579#M1939</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have issue like you and&amp;nbsp;fixed by remove cloning groups on Gaia.&lt;/P&gt;&lt;P&gt;refer to&amp;nbsp;&amp;nbsp;sk106592&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Sep 2018 07:00:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/25579#M1939</guid>
      <dc:creator>Kosin_Usuwanthi</dc:creator>
      <dc:date>2018-09-10T07:00:52Z</dc:date>
    </item>
    <item>
      <title>Re: VMAC and Automatic NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/25580#M1940</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You mixing things up, the thing that works fine is the Proxy ARP, the problem is that the Automatic NAT uses the wrong MAC address for proxy ARP, it uses the member interface MAC, not the VMAC.&lt;/P&gt;&lt;P&gt;Cloning group is not enabled.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Sep 2018 08:27:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/25580#M1940</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-09-10T08:27:15Z</dc:date>
    </item>
    <item>
      <title>Re: VMAC and Automatic NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/25581#M1941</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like there have been issues along these lines in the past:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92426" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92426"&gt;Automatic NAT IP addresses are assigned with a physical MAC addresses of the cluster members instead of VMAC addresses i…&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Probably worth a TAC case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Sep 2018 13:46:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/25581#M1941</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-09-10T13:46:25Z</dc:date>
    </item>
    <item>
      <title>Re: VMAC and Automatic NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/25582#M1942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That SK refers to VRRP having the same problem, which was solved in R75.45, but here we are talking about R77.30 and R80.10&lt;/P&gt;&lt;P&gt;We were already working on opening a case but&amp;nbsp;worked around the problem for now with manual NAT's and Manual Proxy ARP's.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Sep 2018 20:44:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/25582#M1942</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-09-10T20:44:31Z</dc:date>
    </item>
    <item>
      <title>Re: VMAC and Automatic NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/25583#M1943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I didn't say it was exactly the same issue, but&amp;nbsp;one in a similar vein. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Sep 2018 21:14:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/25583#M1943</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-09-10T21:14:24Z</dc:date>
    </item>
    <item>
      <title>Re: VMAC and Automatic NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/79406#M6116</link>
      <description>&lt;P&gt;Hello, could you solve the problem?&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 19:39:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/79406#M6116</guid>
      <dc:creator>bryanastudillo</dc:creator>
      <dc:date>2020-03-23T19:39:42Z</dc:date>
    </item>
    <item>
      <title>Re: VMAC and Automatic NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/79428#M6118</link>
      <description>I'm sorry, but the release that we were running 18 months ago is no longer on these boxes, I think those are running R80.30 now.&lt;BR /&gt;I also have no recollection for which customer we were facing these issues, in this case it can be about 10 different customers.</description>
      <pubDate>Mon, 23 Mar 2020 21:29:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/79428#M6118</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-03-23T21:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: VMAC and Automatic NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/79433#M6119</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for you response.&amp;nbsp;Well, I have a similar issue with vmac and automatic nat, eventually the L3 switch stopped sending traffic to the cluster, the solution was to clearing the switch arp table.&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the switch, before cleaning the arp table I saw that in its arp table the IP addresses had associated a vmac quite similar to the vmac of the cluster with the difference that the last hexadecimal value was: FF while the vmac of the cluster ended in: 02.&lt;/P&gt;&lt;P&gt;So the point is to know if the cluster is sending a wrong vmac or if the switch is saving it incorrectly&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 21:49:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/79433#M6119</guid>
      <dc:creator>bryanastudillo</dc:creator>
      <dc:date>2020-03-23T21:49:46Z</dc:date>
    </item>
    <item>
      <title>Re: VMAC and Automatic NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/79436#M6120</link>
      <description>Or if there is a reason that the cluster has changed its vmac without having made any changes.</description>
      <pubDate>Mon, 23 Mar 2020 21:51:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/79436#M6120</guid>
      <dc:creator>bryanastudillo</dc:creator>
      <dc:date>2020-03-23T21:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: VMAC and Automatic NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/79452#M6121</link>
      <description>If it happens again I would certainly open a TAC case for it.</description>
      <pubDate>Tue, 24 Mar 2020 06:13:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VMAC-and-Automatic-NAT/m-p/79452#M6121</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-03-24T06:13:05Z</dc:date>
    </item>
  </channel>
</rss>

