<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: multihome VIP clusterXL in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/multihome-VIP-clusterXL/m-p/145542#M24203</link>
    <description>&lt;P&gt;You mean use multiple subnets on the same physical interface with ClusterXL?&lt;BR /&gt;Pretty sure this is NOT supported.&lt;/P&gt;</description>
    <pubDate>Tue, 05 Apr 2022 21:08:10 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2022-04-05T21:08:10Z</dc:date>
    <item>
      <title>multihome VIP clusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/multihome-VIP-clusterXL/m-p/145532#M24202</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone tried to multihome a VIP in clusterXL?&amp;nbsp; It would be temporary.&amp;nbsp; We're moving a DMZ network from one firewall to another, otherwise have to change default routes &amp;amp; reboot 20 linux servers.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Apr 2022 19:13:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/multihome-VIP-clusterXL/m-p/145532#M24202</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2022-04-05T19:13:20Z</dc:date>
    </item>
    <item>
      <title>Re: multihome VIP clusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/multihome-VIP-clusterXL/m-p/145542#M24203</link>
      <description>&lt;P&gt;You mean use multiple subnets on the same physical interface with ClusterXL?&lt;BR /&gt;Pretty sure this is NOT supported.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Apr 2022 21:08:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/multihome-VIP-clusterXL/m-p/145542#M24203</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-04-05T21:08:10Z</dc:date>
    </item>
    <item>
      <title>Re: multihome VIP clusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/multihome-VIP-clusterXL/m-p/145545#M24204</link>
      <description>&lt;P&gt;Same subnet different IPs&lt;/P&gt;
&lt;P&gt;The current VIP is 192.168.10.22 and I want it to also listen on 192.168.10.26 temporarily.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Apr 2022 21:29:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/multihome-VIP-clusterXL/m-p/145545#M24204</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2022-04-05T21:29:09Z</dc:date>
    </item>
    <item>
      <title>Re: multihome VIP clusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/multihome-VIP-clusterXL/m-p/145546#M24205</link>
      <description>&lt;P&gt;Pretty sure that's not supported either (multiple VIPs on the same subnet).&lt;BR /&gt;That said, you could probably get the same effect by setting up a static ARP for .26 to give the same MAC as .22, so the packets are received by the relevant gateway.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Apr 2022 21:33:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/multihome-VIP-clusterXL/m-p/145546#M24205</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-04-05T21:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: multihome VIP clusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/multihome-VIP-clusterXL/m-p/145648#M24206</link>
      <description>&lt;P&gt;Maybe we will try that.&amp;nbsp; &amp;nbsp;I guess even if it doesn't survive a reboot, I could add it back.&amp;nbsp; Also, you'd only be able to put that on one of the cluster members I assume, so that may be a complication.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2022 19:04:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/multihome-VIP-clusterXL/m-p/145648#M24206</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2022-04-06T19:04:42Z</dc:date>
    </item>
    <item>
      <title>Re: multihome VIP clusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/multihome-VIP-clusterXL/m-p/145649#M24207</link>
      <description>&lt;P&gt;As long as you don't need the cluster to send traffic from the VIP, you can just add a proxy ARP statement for it. Be sure to add it on both members. That will cause the active member to reply to ARP requests for the IP in question using the same mechanism which causes the active member to reply to ARP requests for the VIP. As long as ARP gets the traffic to the member, you should be fine.&lt;/P&gt;
&lt;P&gt;Proxy ARP entries in clish survive reboot as long as you run 'save config'.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2022 19:44:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/multihome-VIP-clusterXL/m-p/145649#M24207</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2022-04-06T19:44:20Z</dc:date>
    </item>
    <item>
      <title>Re: multihome VIP clusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/multihome-VIP-clusterXL/m-p/146424#M24208</link>
      <description>&lt;P&gt;eth2 .25 cluster member A&lt;/P&gt;
&lt;P&gt;eth2 .24 cluster member B&lt;/P&gt;
&lt;P&gt;.26 is the new VIP and .22 is the IP on the old hardware.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, just to be clear I could add a proxy ARP for .22 in the web ui on each member.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;IPv4 Address 192.168.10.22&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Interface name eth2 or I can choose MAC and use the same MAC on the respective cluster member.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Real IP on member A will be 192.168.10.25, .24 on B&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Apr 2022 18:59:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/multihome-VIP-clusterXL/m-p/146424#M24208</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2022-04-18T18:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: multihome VIP clusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/multihome-VIP-clusterXL/m-p/146428#M24209</link>
      <description>&lt;P&gt;I would add it on the command line, but yes. That's fundamentally how the inbound leg of a ClusterXL VIP works in the first place.&lt;/P&gt;
&lt;P&gt;As long as you don't need to negotiate dynamic routing with both IPs, it will work.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Apr 2022 19:31:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/multihome-VIP-clusterXL/m-p/146428#M24209</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2022-04-18T19:31:29Z</dc:date>
    </item>
  </channel>
</rss>

