<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R81.10 and BGP in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/143604#M22326</link>
    <description>&lt;P&gt;From an external view point 400,000 in iBGP seems high for most environments.&lt;/P&gt;
&lt;P&gt;Has TAC provide guidance on if the situation would be improved by reducing this with employing route optimization strategies downstream?&lt;/P&gt;
&lt;P&gt;Which model gateway appliances are used here out of interest?&lt;/P&gt;</description>
    <pubDate>Mon, 14 Mar 2022 01:02:46 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2022-03-14T01:02:46Z</dc:date>
    <item>
      <title>R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/143597#M22322</link>
      <description>&lt;P&gt;I have upgraded from R80.20 to R81.10 .&amp;nbsp; I currently have 2 eBGP peers and 1 iBGP&amp;nbsp; peer.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When switching from active to standby the (old active) now standby cluster member goes into down status briefly.&amp;nbsp; ROUTED on the now standby member uses high (CPU 65% one cpu)&amp;nbsp; for over 60 minutes.&lt;/P&gt;&lt;P&gt;Status so far,&amp;nbsp;&lt;/P&gt;&lt;P&gt;- lots of debugs and cpinfo&lt;/P&gt;&lt;P&gt;- Checkpoint TAC's (ticket open 2 weeks) solution was to remove graceful restart which on causes all connections to be dropped and high CPU.&amp;nbsp; I will continue to work with TAC .&lt;/P&gt;&lt;P&gt;FYI (&lt;SPAN&gt;In R80.20 the cluster lost all connections for 30 seconds when going from active to standby. Checkpoint said the solution was to turn on graceful restart. I turned on graceful restart and it resolved the dropping of all connections for 30 seconds in R80.20.)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But now Checkpoint TAC claims removing graceful restart will fix the issue.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is anyone else using iBGP and R81.10?&amp;nbsp; DO you have any ideas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Leo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 13 Mar 2022 17:07:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/143597#M22322</guid>
      <dc:creator>pce17</dc:creator>
      <dc:date>2022-03-13T17:07:48Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/143601#M22324</link>
      <description>&lt;P&gt;How many routes are in the BGP table and do the adjacent peer/s have GR configured on their side?&lt;/P&gt;
&lt;P&gt;Which JHF take is used on this gateway/cluster?&lt;/P&gt;</description>
      <pubDate>Sun, 13 Mar 2022 22:51:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/143601#M22324</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-03-13T22:51:22Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/143603#M22325</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;400,000+ routes, GR is on both sides&amp;nbsp;(see below)&amp;nbsp; &amp;nbsp;Members at JHF 30&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;PeerID&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; AS Routes ActRts&amp;nbsp; &amp;nbsp; &amp;nbsp;State&amp;nbsp; &amp;nbsp; &amp;nbsp;InUpds OutUpds Uptime&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;12.122.NNN.NNN 7018 46809 40356&amp;nbsp; &amp;nbsp; Established&amp;nbsp; 11888&amp;nbsp; &amp;nbsp; 3&amp;nbsp; &amp;nbsp; &amp;nbsp; 06:57:37&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;50.220.NNN.NNN 7922 7222 5110&amp;nbsp; &amp;nbsp; &amp;nbsp;Established&amp;nbsp; &amp;nbsp; 1936&amp;nbsp; &amp;nbsp; 3&amp;nbsp; &amp;nbsp; &amp;nbsp; 06:57:01&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;4.53.NNN.NNN 21NNN 408564 392414&amp;nbsp; &amp;nbsp;Established 126974&amp;nbsp; &amp;nbsp; 2&amp;nbsp; &amp;nbsp; &amp;nbsp; 06:56:33&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;----- Peer 12.122&lt;BR /&gt;State Established (Uptime: 07:00:38)&lt;BR /&gt;Peer Type eBGP Peer&lt;BR /&gt;Remote AS 7018&lt;BR /&gt;Peer Capabilities IPv4 Unicast,Route Refresh,Cisco Route Refresh,Graceful Restart,4-Byte AS Extension&lt;BR /&gt;Our Capabilities IPv4 Unicast,Route Refresh,Graceful Restart,4-Byte AS Extension,Enhanced Route Refresh&lt;/P&gt;&lt;P&gt;----- Peer 50.220&lt;BR /&gt;State Established (Uptime: 07:00:02)&lt;BR /&gt;Peer Type eBGP Peer&lt;BR /&gt;Remote AS 7922&lt;BR /&gt;Peer Capabilities IPv4 Unicast,Route Refresh,Cisco Route Refresh,Graceful Restart,4-Byte AS Extension&lt;BR /&gt;Our Capabilities IPv4 Unicast,Route Refresh,Graceful Restart,4-Byte AS Extension,Enhanced Route Refresh&lt;/P&gt;&lt;P&gt;----- Peer 4.53&lt;BR /&gt;State Established (Uptime: 06:59:40)&lt;BR /&gt;Peer Type iBGP Peer&lt;BR /&gt;Remote AS 21NNN&lt;BR /&gt;Peer Capabilities IPv4 Unicast,Route Refresh,Cisco Route Refresh,Graceful Restart,4-Byte AS Extension,Enhanced Route Refresh&lt;BR /&gt;Our Capabilities IPv4 Unicast,Route Refresh,Graceful Restart,4-Byte AS Extension,Enhanced Route Refresh&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 00:38:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/143603#M22325</guid>
      <dc:creator>pce17</dc:creator>
      <dc:date>2022-03-14T00:38:00Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/143604#M22326</link>
      <description>&lt;P&gt;From an external view point 400,000 in iBGP seems high for most environments.&lt;/P&gt;
&lt;P&gt;Has TAC provide guidance on if the situation would be improved by reducing this with employing route optimization strategies downstream?&lt;/P&gt;
&lt;P&gt;Which model gateway appliances are used here out of interest?&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 01:02:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/143604#M22326</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-03-14T01:02:46Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/143605#M22327</link>
      <description>&lt;P&gt;In R80.20 I demonstrated to TAC that the issue went away when I filtered the iBGP routes.&amp;nbsp; I mentioned the iBGP route size to TAC but TAC did not seem interested. I think TAC thinks it is a configuration issue.&amp;nbsp; In R80.20 a custom ROUTED was created to fix the iBGP route issue.&amp;nbsp; &amp;nbsp;We are using open hardware.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 01:13:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/143605#M22327</guid>
      <dc:creator>pce17</dc:creator>
      <dc:date>2022-03-14T01:13:56Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/143606#M22328</link>
      <description>&lt;P&gt;My issue has been open with Sirius since February&amp;nbsp; and TAC for two weeks.&amp;nbsp; You have been asking some very good questions.&amp;nbsp; &amp;nbsp;I can try to adding the route filtering tomorrow and 6 - 7pm ET .&amp;nbsp; That is our slow time during the week.&amp;nbsp; I have assumed it is an iBGP and the number of routes from the beginning.&amp;nbsp; TAC keeps on saying that was fixed in R80&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 01:27:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/143606#M22328</guid>
      <dc:creator>pce17</dc:creator>
      <dc:date>2022-03-14T01:27:29Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/143607#M22329</link>
      <description>&lt;P&gt;If you have the SR number for the same issue under R80.20 you should be able to request a portfix via TAC if a hotfix was provided.&lt;/P&gt;
&lt;P&gt;Where possible I would suggest both strategies are employed to ensure stability.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 01:28:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/143607#M22329</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-03-14T01:28:07Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144335#M22458</link>
      <description>&lt;P&gt;Checkpoint R&amp;amp;D now claims that the standby cluster member in high CPU&amp;nbsp; (ROUTED) for hours is caused by having ONLY a 1gig heartbeat interface. They said I need to upgrade to a 10 GIG heartbeat connection.....&amp;nbsp; &amp;nbsp; &amp;nbsp;Very interesting CISCO says "&lt;SPAN&gt;Cisco typically recommends a minimum of&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;512 MB&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;of RAM in the router to store a complete global BGP routing table from one BGP peer"&amp;nbsp; &amp;nbsp; &amp;nbsp;512MG needs a 10GIG connection?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2022 17:52:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144335#M22458</guid>
      <dc:creator>pce17</dc:creator>
      <dc:date>2022-03-21T17:52:29Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144336#M22459</link>
      <description>&lt;P&gt;My switch says the heartbeat interface max'ed out at 141Mbps ? 10 GIG?&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2022 17:57:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144336#M22459</guid>
      <dc:creator>pce17</dc:creator>
      <dc:date>2022-03-21T17:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144363#M22467</link>
      <description>&lt;P&gt;Can you please share your SR number for the TAC case with me in private?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(P.S. How did you go with the route filtering / summarization?)&lt;/P&gt;</description>
      <pubDate>Wed, 23 Mar 2022 01:59:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144363#M22467</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-03-23T01:59:13Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144370#M22471</link>
      <description>&lt;P&gt;holy zoinks bat scoob!&lt;/P&gt;&lt;P&gt;That is an impressive amount of routes. I'm assuming those aren't all 1918 prefixes?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2022 04:46:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144370#M22471</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2022-03-22T04:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144416#M22478</link>
      <description>&lt;P&gt;They are all Internet routes. I have been filtering out the RFC1918 routes out since R77.30 (the good old days)&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2022 13:06:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144416#M22478</guid>
      <dc:creator>pce17</dc:creator>
      <dc:date>2022-03-22T13:06:43Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144418#M22479</link>
      <description>&lt;P&gt;Todays update is that ROUTED crashed on the active cluster member (HA1) and the&amp;nbsp; (now standby member HA1)&amp;nbsp; CUL'ed non-stop for 4 hours and 20 minutes.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2022 13:14:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144418#M22479</guid>
      <dc:creator>pce17</dc:creator>
      <dc:date>2022-03-22T13:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144426#M22480</link>
      <description>&lt;P&gt;Message me privately if you need more help with this...I have BGP running in my lab with R81.10 and I had not seen these issues at all. Personally, I dont see logic in why you were asked to remove graceful restart option, that can only help in situation like yours.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2022 14:20:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144426#M22480</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-03-22T14:20:02Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144446#M22484</link>
      <description>&lt;P&gt;Can you setup your lab to have one Peer configured as iBGP and then send in the full BGP route table?&amp;nbsp; &amp;nbsp;In R80.20 if I restricted the routes (only default) from my iBGP peer the issue went away.&amp;nbsp; Never had any issues with R77.30.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2022 16:20:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144446#M22484</guid>
      <dc:creator>pce17</dc:creator>
      <dc:date>2022-03-22T16:20:14Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144450#M22485</link>
      <description>&lt;P&gt;I can, but might take some time, since I gave lab access to lots of my colleagues, as its very good setup. I will try do it some time this week. In the meantime, be free to message me privately and we can do remote tomorrow if you have time. Im in EST time zone (GMT -4 currently).&lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2022 17:19:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144450#M22485</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-03-22T17:19:40Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144475#M22495</link>
      <description>&lt;P&gt;Despite this occurrence, I want to come back to your original statement briefly.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"When switching from active to standby the (old active) now &lt;U&gt;standby&lt;/U&gt; cluster member goes into down status briefly.&amp;nbsp; ROUTED on the now &lt;U&gt;standby&lt;/U&gt; member uses high (&lt;U&gt;CPU 65% one cpu&lt;/U&gt;)&amp;nbsp; for over 60 minutes."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What operational problem is this creating for you, how many cores/CPUs are assigned to the machine?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Mar 2022 02:35:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144475#M22495</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-03-23T02:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144477#M22496</link>
      <description>&lt;P&gt;I see what you are saying...tested it in R81.10, same issue. I wonder if its some kind of bug...&lt;/P&gt;</description>
      <pubDate>Wed, 23 Mar 2022 01:35:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144477#M22496</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-03-23T01:35:34Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144478#M22497</link>
      <description>&lt;P&gt;Out of interest what about your internal topology needs the full routing table versus fewer summarized routes?&lt;/P&gt;
&lt;P&gt;Perhaps cBit is an alternate to GR that may assist per&amp;nbsp;sk175923.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Mar 2022 01:52:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/144478#M22497</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-03-23T01:52:15Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 and BGP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/145127#M22730</link>
      <description>&lt;P&gt;we need the full touting table or else the data is not routed correctly .&amp;nbsp; Do to the usage of BGP the same subnets are used by many carriers&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 12:33:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-and-BGP/m-p/145127#M22730</guid>
      <dc:creator>pce17</dc:creator>
      <dc:date>2022-03-31T12:33:13Z</dc:date>
    </item>
  </channel>
</rss>

