<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VSX arp debuging in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27109#M2115</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ouch, not even funny. But hey, one step forward! &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 30 May 2018 10:01:09 GMT</pubDate>
    <dc:creator>Kaspars_Zibarts</dc:creator>
    <dc:date>2018-05-30T10:01:09Z</dc:date>
    <item>
      <title>VSX arp debuging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27102#M2108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have 2 VSs on the VSX which are sharing the same external subnet (connected to the same vSwitch)&lt;/P&gt;&lt;P&gt;in addition each VS has it's own public subnet, meaning the upstream router has route to network X to VS1 and route to network Y to VS2.&lt;/P&gt;&lt;P&gt;i have internal client on VS1 that i hide behind ip from subnet X. this client fails to access the internet. i can see only icmp request , without reply.&lt;/P&gt;&lt;P&gt;when i hide it behind the VS1 ip it has internet.&lt;/P&gt;&lt;P&gt;further checks revealed that the upstream router has a lot of logs of arp flapping for the public ip of VS1.&lt;/P&gt;&lt;P&gt;when i have checked those MAC address it seams that they match to the wrp interface of VS1 and VS2 which faces the upstream router, which is weird.&lt;/P&gt;&lt;P&gt;checking tcpdump on VS2 for arp packets, i could see that for some reason VS2 sends arp reply for VS1 public ip with it's public interface MAC address..&lt;/P&gt;&lt;P&gt;this situation can be caused by&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;VS2 has interface with this IP&lt;/LI&gt;&lt;LI&gt;NAT is configured on VS2 with this IP&lt;/LI&gt;&lt;LI&gt;local.arp was configured manually with this IP and MAC&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;non of the above is configured on this environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;anyone has direction?&lt;/LI&gt;&lt;LI&gt;which service is responsible for ARP?&lt;/LI&gt;&lt;LI&gt;how do i debug the FW to get the reason for it?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;i am using R80.10&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 May 2018 18:56:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27102#M2108</guid>
      <dc:creator>Dor_Marcovitch</dc:creator>
      <dc:date>2018-05-29T18:56:43Z</dc:date>
    </item>
    <item>
      <title>Re: VSX arp debuging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27103#M2109</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The only thing that comes to my mind is local.arp (static ARP) on VSX that could do such thing (or a bug?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you search for all local.arp files, i.e. from expert shell&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;find / -name local.arp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you definitely don't see anything for CTX2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;/var/opt/CPsuite-R80/fw1/CTX/CTX00002/conf/local.arp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif;"&gt;And GAIA config (check instance 2 of course)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;grep ip:arp:entry:static:instance /config/active&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif;"&gt;I trust it cannot be interface as you said that subnets are different nor "automatic ARP for manual NAT in R80.10" is used (&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk114395" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk114395"&gt;Automatic creation of Proxy ARP for Manual NAT rules on Security Gateway R80.10&lt;/A&gt;&amp;nbsp;)&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2018 06:34:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27103#M2109</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-05-30T06:34:49Z</dc:date>
    </item>
    <item>
      <title>Re: VSX arp debuging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27104#M2110</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;no results for "&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;find / -name local.arp"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;no results for "&lt;/SPAN&gt;&lt;SPAN style="border: 0px; font-weight: inherit;"&gt;grep ip:arp:entry:static:instance /config/active"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="border: 0px; font-weight: inherit;"&gt;no file "&lt;/SPAN&gt;&lt;SPAN style="border: 0px; font-weight: inherit;"&gt;/var/opt/CPsuite-R80/fw1/CTX/CTX00002/conf/local.arp"&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2018 07:26:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27104#M2110</guid>
      <dc:creator>Dor_Marcovitch</dc:creator>
      <dc:date>2018-05-30T07:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: VSX arp debuging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27105#M2111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;any chances you could provide interface info for both VS and all four interfaces so we can have full picture?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also tcpdump with -e option to see MACs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I understand if you&amp;nbsp;want to replace public IPs with dummy &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;as long as subnets are the same length&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2018 07:45:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27105#M2111</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-05-30T07:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: VSX arp debuging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27106#M2112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;this should be good&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;02:10:28.276365 00:CC:c1:AA:BB:CC &amp;gt; ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 1.1.1.130 tell 1.1.1.130&lt;BR /&gt;02:10:28.276582 00:CC:c1:AA:BB:DD &amp;gt; 00:CC:c1:AA:BB:CC, ethertype ARP (0x0806), length 42: arp reply 1.1.1.130 is-at 00:CC:c1:AA:BB:DD &amp;lt;&amp;lt;&amp;lt;&amp;lt; VS3 MAC&lt;BR /&gt;02:11:02.565CC9 00:CC:c1:AA:BB:DD &amp;gt; ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 1.1.1.130 tell 1.1.1.130&lt;BR /&gt;02:11:02.565186 00:CC:c1:AA:BB:CC &amp;gt; 00:CC:c1:AA:BB:DD, ethertype ARP (0x0806), length 42: arp reply 1.1.1.130 is-at 00:CC:c1:AA:BB:CC &amp;lt;&amp;lt;&amp;lt;&amp;lt; VS4 MAC&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;wrp193 Link encap:Ethernet HWaddr 00:CC:C1:AA:BB:DD&lt;BR /&gt;inet addr:1.1.1.130 Bcast:1.1.1.143 Mask:255.255.255.240&lt;BR /&gt;UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1&lt;BR /&gt;RX packets:1134008 errors:0 dropped:0 overruns:0 frame:0&lt;BR /&gt;TX packets:33559CC errors:0 dropped:0 overruns:0 carrier:0&lt;BR /&gt;collisions:0 txqueuelen:0&lt;BR /&gt;RX bytes:75381018 (71.8 MiB) TX bytes:320265716 (305.4 MiB)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;wrp257 Link encap:Ethernet HWaddr 00:CC:C1:AA:BB:CC&lt;BR /&gt;inet addr:1.1.1.132 Bcast:1.1.1.143 Mask:255.255.255.240&lt;BR /&gt;UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1&lt;BR /&gt;RX packets:1140005 errors:0 dropped:0 overruns:0 frame:0&lt;BR /&gt;TX packets:451113 errors:0 dropped:0 overruns:0 carrier:0&lt;BR /&gt;collisions:0 txqueuelen:0&lt;BR /&gt;RX bytes:75194768 (71.7 MiB) TX bytes:58062241 (55.3 MiB)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2018 08:15:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27106#M2112</guid>
      <dc:creator>Dor_Marcovitch</dc:creator>
      <dc:date>2018-05-30T08:15:46Z</dc:date>
    </item>
    <item>
      <title>Re: VSX arp debuging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27107#M2113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Obviously this gratuitous ARP below has&amp;nbsp;wrong&amp;nbsp;IP on wrp257 / VS4, should have been .132&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;02:10:28.276365 00:CC:c1:AA:BB:CC &amp;gt; ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 1.1.1.&lt;SPAN style="color: #ff0000;"&gt;130&lt;/SPAN&gt; tell 1.1.1.&lt;SPAN style="color: #ff0000;"&gt;130&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Are you in a position to delete this interface (since it does not work anyways)? Then just check with tcpdump that this G-ARP above is gone, and then re-create interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2018 08:43:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27107#M2113</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-05-30T08:43:41Z</dc:date>
    </item>
    <item>
      <title>Re: VSX arp debuging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27108#M2114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;re-adding this interface on VS4 stopped this wrong arp reply for now, i will go ahead and check with the upstream router for why we dont see the reply of the ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2018 09:29:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27108#M2114</guid>
      <dc:creator>Dor_Marcovitch</dc:creator>
      <dc:date>2018-05-30T09:29:55Z</dc:date>
    </item>
    <item>
      <title>Re: VSX arp debuging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27109#M2115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ouch, not even funny. But hey, one step forward! &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2018 10:01:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27109#M2115</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-05-30T10:01:09Z</dc:date>
    </item>
    <item>
      <title>Re: VSX arp debuging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27110#M2116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the Fat Lady did not sing yet... those arp came back.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2018 13:33:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27110#M2116</guid>
      <dc:creator>Dor_Marcovitch</dc:creator>
      <dc:date>2018-05-30T13:33:32Z</dc:date>
    </item>
    <item>
      <title>Re: VSX arp debuging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27111#M2117</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm - did it appear after topology or policy push? Did you notice? Did you see correct GARPs at some point? Feels like something configured in the policy..&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2018 14:40:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27111#M2117</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-05-30T14:40:13Z</dc:date>
    </item>
    <item>
      <title>Re: VSX arp debuging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27112#M2118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Keep in mind that on a Cisco router the default ARP cache is 4 hours.&lt;/P&gt;&lt;P&gt;That said, you can force a gratuitous ARP by using this command:&lt;/P&gt;&lt;P&gt;# arping -c 4 -A -I eth1 1.1.1.130&lt;/P&gt;&lt;P&gt;with this command you can see which ARP's are created for NAT:&lt;/P&gt;&lt;P&gt;fw ctl arp&lt;/P&gt;&lt;P&gt;You can also use ifconfig in each VS to see what the MAC should be on that interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2018 20:39:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27112#M2118</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-05-30T20:39:51Z</dc:date>
    </item>
    <item>
      <title>Re: VSX arp debuging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27113#M2119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;this command helped me "fw ctl arp" locate the reason it came back after i re-added the switch or something else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;dor&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2018 22:39:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-arp-debuging/m-p/27113#M2119</guid>
      <dc:creator>Dor_Marcovitch</dc:creator>
      <dc:date>2018-05-30T22:39:13Z</dc:date>
    </item>
  </channel>
</rss>

