<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: After standby SIC initialized  CLUSTERXL showing down in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/132980#M19758</link>
    <description>&lt;P&gt;TCP DUMP output it seems ARP not getting , but HA interface is connected properly externally&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TCP DUMP&lt;/P&gt;&lt;P&gt;tcpdump -nni eth1-03&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on eth1-03, link-type EN10MB (Ethernet), capture size 96 bytes&lt;BR /&gt;11:59:01.319908 IP 0.0.0.0.8116 &amp;gt; 10.X.X.128.8116: UDP, length 34&lt;BR /&gt;11:59:01.382188 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.382221 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 34&lt;BR /&gt;11:59:01.382233 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 32&lt;BR /&gt;11:59:01.382234 arp who-has 1.1.1.4 tell 1.1.1.1&lt;BR /&gt;11:59:01.382236 arp who-has 1.1.1.2 tell 1.1.1.1&lt;BR /&gt;11:59:01.382237 arp who-has 1.1.1.3 tell 1.1.1.1&lt;BR /&gt;11:59:01.382238 arp who-has 1.1.1.4 tell 1.1.1.1&lt;BR /&gt;11:59:01.382240 IP 1.1.1.1 &amp;gt; 0.0.0.0: ICMP echo request, id 0, seq 7, length 16&lt;BR /&gt;11:59:01.382242 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.382249 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.382257 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.482111 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.482150 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 32&lt;BR /&gt;11:59:01.482152 arp who-has 1.1.1.2 tell 1.1.1.1&lt;BR /&gt;11:59:01.482155 arp who-has 1.1.1.3 tell 1.1.1.1&lt;BR /&gt;11:59:01.482157 arp who-has 1.1.1.4 tell 1.1.1.1&lt;BR /&gt;11:59:01.482162 IP 1.1.1.1 &amp;gt; 0.0.0.0: ICMP echo request, id 0, seq 7, length 16&lt;BR /&gt;11:59:01.482164 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.482172 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 96&lt;BR /&gt;11:59:01.482180 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.519826 IP 0.0.0.0.8116 &amp;gt; 10.X.X.128.8116: UDP, length 34&lt;BR /&gt;11:59:01.582148 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.582191 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 34&lt;BR /&gt;11:59:01.582204 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 32&lt;BR /&gt;11:59:01.582207 arp who-has 1.1.1.2 tell 1.1.1.1&lt;BR /&gt;11:59:01.582208 arp who-has 1.1.1.3 tell 1.1.1.1&lt;BR /&gt;11:59:01.582211 arp who-has 1.1.1.4 tell 1.1.1.1&lt;BR /&gt;11:59:01.582212 arp who-has 1.1.1.2 tell 1.1.1.1&lt;BR /&gt;11:59:01.582214 IP 1.1.1.1 &amp;gt; 0.0.0.0: ICMP echo request, id 0, seq 7, length 16&lt;BR /&gt;11:59:01.582216 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.582227 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.582235 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.619817 IP 0.0.0.0.8116 &amp;gt; 10.X.X.128.8116: UDP, length 50&lt;BR /&gt;11:59:01.682084 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.682143 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 50&lt;BR /&gt;11:59:01.682154 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.682162 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.682169 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.719812 IP 0.0.0.0.8116 &amp;gt; 10.X.X.128.8116: UDP, length 34&lt;BR /&gt;11:59:01.782122 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.782157 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 34&lt;BR /&gt;11:59:01.782168 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.782176 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.782184 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.882130 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.882155 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 32&lt;/P&gt;</description>
    <pubDate>Mon, 01 Nov 2021 04:23:36 GMT</pubDate>
    <dc:creator>praveend</dc:creator>
    <dc:date>2021-11-01T04:23:36Z</dc:date>
    <item>
      <title>After standby SIC initialized  CLUSTERXL showing down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/132863#M19733</link>
      <description>&lt;P&gt;its working setup - using ClusterXL Active/Standby mode .&lt;/P&gt;&lt;P&gt;Standby SIC was down&lt;/P&gt;&lt;P&gt;i reinitialized&amp;nbsp; SIC after that on the SMS i can see both Gateways are up - But ClusterXL is down .&lt;/P&gt;&lt;P&gt;i started HA service - cphastart&lt;/P&gt;&lt;P&gt;Sync interface connection&lt;/P&gt;&lt;P&gt;FW1----eth1-03------eth1-03------FW2&lt;/P&gt;&lt;P&gt;FW1-Eth1-03&amp;nbsp; - ipaddress 1.1.1.1/30&lt;/P&gt;&lt;P&gt;FW2-Eth1-03&amp;nbsp; - ipaddress 1.1.1.2/30&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After SIC initialized do i require any re-configuration for the ClusterXL .&lt;/P&gt;&lt;P&gt;when i did tcpdump on sync interface i can see that ARP is not resolving&lt;/P&gt;&lt;P&gt;arp who-has 1.1.1.1 tell 1.1.1.2 same for the FW2 also .&lt;/P&gt;&lt;P&gt;am not able to ping both sync ip address from respective Firewalls .&lt;/P&gt;&lt;P&gt;on the working/production Firewall i can see below output&lt;/P&gt;&lt;P&gt;Output of the cphaprob -a if command shows "Inbound: UP , Outbound: DOWN"&lt;/P&gt;&lt;P&gt;as per SK65560&amp;nbsp;&amp;nbsp; communication issue related to outside , but switch side every think seems to good .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do i need to do any more configuration or steps .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Oct 2021 12:33:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/132863#M19733</guid>
      <dc:creator>praveend</dc:creator>
      <dc:date>2021-10-29T12:33:41Z</dc:date>
    </item>
    <item>
      <title>Re: After standby SIC initialized  CLUSTERXL showing down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/132944#M19751</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I recall having a similar issue when I received those routes from a routing protocol (eBGP)&lt;/P&gt;
&lt;P&gt;Had to configure a route-map and deny/drop the routes from being installed in the RIB.&lt;/P&gt;
&lt;P&gt;Can you check and see if you have any routes for them in the routing table ?&lt;/P&gt;</description>
      <pubDate>Sun, 31 Oct 2021 14:25:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/132944#M19751</guid>
      <dc:creator>funkylicious</dc:creator>
      <dc:date>2021-10-31T14:25:48Z</dc:date>
    </item>
    <item>
      <title>Re: After standby SIC initialized  CLUSTERXL showing down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/132977#M19757</link>
      <description>&lt;P&gt;If you do a tcpdump on eth1-03, do you see traffic coming to/from the nodes?&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 02:43:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/132977#M19757</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-11-01T02:43:21Z</dc:date>
    </item>
    <item>
      <title>Re: After standby SIC initialized  CLUSTERXL showing down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/132980#M19758</link>
      <description>&lt;P&gt;TCP DUMP output it seems ARP not getting , but HA interface is connected properly externally&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TCP DUMP&lt;/P&gt;&lt;P&gt;tcpdump -nni eth1-03&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on eth1-03, link-type EN10MB (Ethernet), capture size 96 bytes&lt;BR /&gt;11:59:01.319908 IP 0.0.0.0.8116 &amp;gt; 10.X.X.128.8116: UDP, length 34&lt;BR /&gt;11:59:01.382188 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.382221 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 34&lt;BR /&gt;11:59:01.382233 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 32&lt;BR /&gt;11:59:01.382234 arp who-has 1.1.1.4 tell 1.1.1.1&lt;BR /&gt;11:59:01.382236 arp who-has 1.1.1.2 tell 1.1.1.1&lt;BR /&gt;11:59:01.382237 arp who-has 1.1.1.3 tell 1.1.1.1&lt;BR /&gt;11:59:01.382238 arp who-has 1.1.1.4 tell 1.1.1.1&lt;BR /&gt;11:59:01.382240 IP 1.1.1.1 &amp;gt; 0.0.0.0: ICMP echo request, id 0, seq 7, length 16&lt;BR /&gt;11:59:01.382242 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.382249 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.382257 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.482111 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.482150 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 32&lt;BR /&gt;11:59:01.482152 arp who-has 1.1.1.2 tell 1.1.1.1&lt;BR /&gt;11:59:01.482155 arp who-has 1.1.1.3 tell 1.1.1.1&lt;BR /&gt;11:59:01.482157 arp who-has 1.1.1.4 tell 1.1.1.1&lt;BR /&gt;11:59:01.482162 IP 1.1.1.1 &amp;gt; 0.0.0.0: ICMP echo request, id 0, seq 7, length 16&lt;BR /&gt;11:59:01.482164 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.482172 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 96&lt;BR /&gt;11:59:01.482180 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.519826 IP 0.0.0.0.8116 &amp;gt; 10.X.X.128.8116: UDP, length 34&lt;BR /&gt;11:59:01.582148 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.582191 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 34&lt;BR /&gt;11:59:01.582204 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 32&lt;BR /&gt;11:59:01.582207 arp who-has 1.1.1.2 tell 1.1.1.1&lt;BR /&gt;11:59:01.582208 arp who-has 1.1.1.3 tell 1.1.1.1&lt;BR /&gt;11:59:01.582211 arp who-has 1.1.1.4 tell 1.1.1.1&lt;BR /&gt;11:59:01.582212 arp who-has 1.1.1.2 tell 1.1.1.1&lt;BR /&gt;11:59:01.582214 IP 1.1.1.1 &amp;gt; 0.0.0.0: ICMP echo request, id 0, seq 7, length 16&lt;BR /&gt;11:59:01.582216 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.582227 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.582235 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.619817 IP 0.0.0.0.8116 &amp;gt; 10.X.X.128.8116: UDP, length 50&lt;BR /&gt;11:59:01.682084 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.682143 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 50&lt;BR /&gt;11:59:01.682154 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.682162 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.682169 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.719812 IP 0.0.0.0.8116 &amp;gt; 10.X.X.128.8116: UDP, length 34&lt;BR /&gt;11:59:01.782122 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.782157 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 34&lt;BR /&gt;11:59:01.782168 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.782176 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.782184 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.882130 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 40&lt;BR /&gt;11:59:01.882155 IP 0.0.0.0.8116 &amp;gt; 1.1.1.0.8116: UDP, length 32&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 04:23:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/132980#M19758</guid>
      <dc:creator>praveend</dc:creator>
      <dc:date>2021-11-01T04:23:36Z</dc:date>
    </item>
    <item>
      <title>Re: After standby SIC initialized  CLUSTERXL showing down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/132981#M19759</link>
      <description>&lt;P&gt;What version/JHF level?&lt;BR /&gt;Did you actually push policy to the gateways?&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 04:29:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/132981#M19759</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-11-01T04:29:43Z</dc:date>
    </item>
    <item>
      <title>Re: After standby SIC initialized  CLUSTERXL showing down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/132982#M19760</link>
      <description>&lt;P&gt;R77.20&lt;/P&gt;&lt;P&gt;no i didn't push policy - because ClusterXL status was showing Down&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 05:12:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/132982#M19760</guid>
      <dc:creator>praveend</dc:creator>
      <dc:date>2021-11-01T05:12:29Z</dc:date>
    </item>
    <item>
      <title>Re: After standby SIC initialized  CLUSTERXL showing down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/132988#M19764</link>
      <description>&lt;P&gt;On what appliances?&lt;BR /&gt;Because unless you're running Embedded Gaia, R77.20 is End of Support.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 06:04:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/132988#M19764</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-11-01T06:04:54Z</dc:date>
    </item>
    <item>
      <title>Re: After standby SIC initialized  CLUSTERXL showing down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/133026#M19772</link>
      <description>&lt;P&gt;Push policy, and check cluster status again.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 16:16:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/133026#M19772</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-11-01T16:16:37Z</dc:date>
    </item>
    <item>
      <title>Re: After standby SIC initialized  CLUSTERXL showing down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/133038#M19774</link>
      <description>&lt;P&gt;yes firewall is end of support and without checkpoint support .&lt;/P&gt;</description>
      <pubDate>Tue, 02 Nov 2021 01:33:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/133038#M19774</guid>
      <dc:creator>praveend</dc:creator>
      <dc:date>2021-11-02T01:33:01Z</dc:date>
    </item>
    <item>
      <title>Re: After standby SIC initialized  CLUSTERXL showing down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/133039#M19775</link>
      <description>&lt;P&gt;Cluster Status is showing down that's why i didn't push policy .&lt;/P&gt;&lt;P&gt;my doubt is below&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Firewall Cluster is working properly&lt;/P&gt;&lt;P&gt;2. Standby Firewall SIC is reset&lt;/P&gt;&lt;P&gt;3.After SIC reset do we require to unload policy ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Nov 2021 01:41:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/133039#M19775</guid>
      <dc:creator>praveend</dc:creator>
      <dc:date>2021-11-02T01:41:28Z</dc:date>
    </item>
    <item>
      <title>Re: After standby SIC initialized  CLUSTERXL showing down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/133983#M20010</link>
      <description>&lt;P&gt;After SIC reset no need to unload policy ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;please check below command and you will come to know the status of critical service&lt;/P&gt;&lt;P&gt;cphaprob list , cphaprob -l list&amp;nbsp; and cpstat ha -f all&lt;/P&gt;</description>
      <pubDate>Sun, 14 Nov 2021 04:44:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/133983#M20010</guid>
      <dc:creator>network360</dc:creator>
      <dc:date>2021-11-14T04:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: After standby SIC initialized  CLUSTERXL showing down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/135075#M20330</link>
      <description>&lt;P&gt;HI ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you Issue is fixed , cpstat ha -f all is very good command , in this command i got exact interface - which is failed ,&amp;nbsp; i can see that 3 interface down .&lt;/P&gt;&lt;P&gt;issue was in the core switch VLAN tagging was wrong .&lt;/P&gt;&lt;P&gt;once VLAN tagging is fixed and Sync Interface connected directly using straight UTP cable .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank You&lt;/P&gt;</description>
      <pubDate>Sun, 28 Nov 2021 02:56:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/After-standby-SIC-initialized-CLUSTERXL-showing-down/m-p/135075#M20330</guid>
      <dc:creator>praveend</dc:creator>
      <dc:date>2021-11-28T02:56:08Z</dc:date>
    </item>
  </channel>
</rss>

