<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Switch Trunk Configuration Question on Clusters in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switch-Trunk-Configuration-Question-on-Clusters/m-p/131851#M19482</link>
    <description>&lt;P&gt;Thanks everyone for the great feedback. Much appreciated.&lt;/P&gt;</description>
    <pubDate>Fri, 15 Oct 2021 14:39:20 GMT</pubDate>
    <dc:creator>a3498881-aa5d-4</dc:creator>
    <dc:date>2021-10-15T14:39:20Z</dc:date>
    <item>
      <title>Switch Trunk Configuration Question on Clusters</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switch-Trunk-Configuration-Question-on-Clusters/m-p/131326#M19353</link>
      <description>&lt;P&gt;Hello CP community,&lt;/P&gt;&lt;P&gt;I have a question about switch trunk configurations which are connected to Check Point firewalls. I've come across a few instances where the switch trunk is set to pass all VLANs. The Check Point clusters however does not have all the VLANs defined as those missing are specific to subnets that belong to another cluster downstream. That being said, both Cluster A and Cluster B connect to the same two distribution switches. We normally hardcode the trunks on the switch port to match those on the firewall as seen below.&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;interface GigabitEthernet2/48
 description trunk to xxxxNFW01C
 switchport trunk allowed vlan 22,32,42
 switchport mode trunk&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this instance, the trunk configuration is set as follows:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;interface GigabitEthernet2/48
 switchport mode trunk
 spanning-tree portfast trunk&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not seeing any issues with the latter switch config but wondering if there is any impact. My assumption based on logic is that any traffic such as multicast/broadcast going out the trunk port for VLANs not defined on the cluster would simply be dropped due to the rulebase. The config is simply adding unnecessary noise but poses no risk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any input would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Oct 2021 21:41:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switch-Trunk-Configuration-Question-on-Clusters/m-p/131326#M19353</guid>
      <dc:creator>a3498881-aa5d-4</dc:creator>
      <dc:date>2021-10-07T21:41:06Z</dc:date>
    </item>
    <item>
      <title>Re: Switch Trunk Configuration Question on Clusters</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switch-Trunk-Configuration-Question-on-Clusters/m-p/131333#M19354</link>
      <description>&lt;P&gt;Pruning the VLANs is good practice and avoids unecessary processing.&lt;/P&gt;
&lt;P&gt;Portfast / Edge port config is also recommended to ensure ports quickly transition to their forwarding state to avoid recovery delays.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Oct 2021 23:47:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switch-Trunk-Configuration-Question-on-Clusters/m-p/131333#M19354</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2021-10-07T23:47:46Z</dc:date>
    </item>
    <item>
      <title>Re: Switch Trunk Configuration Question on Clusters</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switch-Trunk-Configuration-Question-on-Clusters/m-p/131359#M19362</link>
      <description>&lt;P&gt;The traffic received from vlans which are not defined on firewall are not dropped by rulebase. They are dropped far more earlier at OS level (Gaia). In fact, these are ethernet frames which carry dot1q tags with IDs, you do not have VLAN interfaces configured for in Gaia. The OS does not know what to do with these frames and drops them.&lt;/P&gt;
&lt;P&gt;Like Tim wrote in his books "Max Power", these kind of drops increase the RX-DRP counter on the affected firewall interface.&lt;/P&gt;
&lt;P&gt;So while this should not cause any load issues with firewall workers, traffic load on interface might be a problem depending on the amount of broadcast traffic in these not-needed vlans. And the increasing RX-DRP counter due to this misconfiguration may hide some other problems which would otherwise be visible by seeing RX-DRP increasing (like real load issues).&lt;/P&gt;
&lt;P&gt;As you and Chris already said: The vlan lists should match as best practice.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Oct 2021 11:23:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switch-Trunk-Configuration-Question-on-Clusters/m-p/131359#M19362</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2021-10-08T11:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: Switch Trunk Configuration Question on Clusters</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switch-Trunk-Configuration-Question-on-Clusters/m-p/131378#M19364</link>
      <description>&lt;P&gt;To further elaborate on Tobias's excellent post, even the output of&amp;nbsp;&lt;STRONG&gt;ethtool -S&lt;/STRONG&gt; does not have a counter indicating these types of unexpected VLAN tag drops, yet RX-DRP is still incremented.&amp;nbsp; So to determine what is actually going on with RX-DRP you have to look for the&amp;nbsp;&lt;STRONG&gt;rx_missed_errors&lt;/STRONG&gt; counter in &lt;STRONG&gt;ethtool -S&lt;/STRONG&gt;; I believe some other relevant counters might be &lt;STRONG&gt;rx_no_buffer&lt;/STRONG&gt; or &lt;STRONG&gt;rx_fifo_errors&lt;/STRONG&gt; depending on the specific NIC driver.&amp;nbsp; These counters account for frames arriving that have nowhere to go because the Gaia interface ring buffer is full; if you see a higher RX-DRP counter than all the &lt;STRONG&gt;rx_*&lt;/STRONG&gt; error counters added together in &lt;STRONG&gt;ethtool -S&lt;/STRONG&gt;, the "missing" RX drops are almost certainly invalid/unexpected VLAN tags being received due to a lack of pruning.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Oct 2021 14:49:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switch-Trunk-Configuration-Question-on-Clusters/m-p/131378#M19364</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-10-08T14:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: Switch Trunk Configuration Question on Clusters</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switch-Trunk-Configuration-Question-on-Clusters/m-p/131851#M19482</link>
      <description>&lt;P&gt;Thanks everyone for the great feedback. Much appreciated.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Oct 2021 14:39:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switch-Trunk-Configuration-Question-on-Clusters/m-p/131851#M19482</guid>
      <dc:creator>a3498881-aa5d-4</dc:creator>
      <dc:date>2021-10-15T14:39:20Z</dc:date>
    </item>
    <item>
      <title>Re: Switch Trunk Configuration Question on Clusters</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switch-Trunk-Configuration-Question-on-Clusters/m-p/132396#M19609</link>
      <description>&lt;P&gt;I just discovered that brand new for R81.10, the RX-DRP counter will not be incremented for bad VLAN tags (and some other situations) due to the Gaia sysctl variable&amp;nbsp;&lt;STRONG&gt;rx_drops_stat_enable&lt;/STRONG&gt; being set to 0 by default.&amp;nbsp; The following updated SK describes all this and also provides a debug procedure to enable logging for precisely what frames incremented the RX-DRP counter if&amp;nbsp;&lt;STRONG&gt;rx_drops_stat_enable&amp;nbsp;&lt;/STRONG&gt;is set to 1:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk166424&amp;amp;partition=Advanced&amp;amp;product=Quantum" target="_blank" rel="noopener"&gt;sk166424: Number of RX packet drops on interfaces increases on a Security Gateway R80.30 and higher with Gaia kernel 3.10&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Apparently this variable existed in Gaia 3.10 R81 and earlier but was hidden from view, now revealed in R81.10 and later.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Oct 2021 17:38:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switch-Trunk-Configuration-Question-on-Clusters/m-p/132396#M19609</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-10-21T17:38:37Z</dc:date>
    </item>
  </channel>
</rss>

