<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ClusterXL Virtual MAC in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Virtual-MAC/m-p/154536#M26213</link>
    <description>&lt;P&gt;You still need to have one IP address for the cluster in each network you want it to handle, unless you intend to run in bridge mode.&lt;/P&gt;
&lt;P&gt;Each cluster member also needs its own unique IP address in the same network as all other cluster members. The members send heartbeats to each other using these addresses. These per-member IPs don't need to be in the same networks you plan to actually use for traffic. You need to use a separate network per interface. That is, you can't use 10.20.30.1/24 for eth1, 10.20.30.2/24 for eth2, and so on.&lt;/P&gt;
&lt;P&gt;Configuring VMAC is pretty easy. It's a checkbox in the cluster settings (same place where you pick between HA and load-sharing clustering modes). When you can take an outage, check the box and push policy. The cluster members will start using the virtual MAC. You &lt;EM&gt;do&lt;/EM&gt; need an outage window, because other endpoints on the networks may not see the MAC change until their ARP entries time out.&lt;/P&gt;</description>
    <pubDate>Thu, 04 Aug 2022 14:23:11 GMT</pubDate>
    <dc:creator>Bob_Zimmerman</dc:creator>
    <dc:date>2022-08-04T14:23:11Z</dc:date>
    <item>
      <title>ClusterXL Virtual MAC</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Virtual-MAC/m-p/154535#M26212</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We having 6200 appliance with us and want to configure ClusterXL VMAC.&lt;/P&gt;&lt;P&gt;Due to shortage of IP Addresses we are not able to configure cluster via Cluster IP (VIP).&lt;/P&gt;&lt;P&gt;For Virtual MAC (VMAC) what will be the requirement &amp;amp; how to can configure the same.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Aug 2022 14:08:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Virtual-MAC/m-p/154535#M26212</guid>
      <dc:creator>Mitesh</dc:creator>
      <dc:date>2022-08-04T14:08:16Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Virtual MAC</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Virtual-MAC/m-p/154536#M26213</link>
      <description>&lt;P&gt;You still need to have one IP address for the cluster in each network you want it to handle, unless you intend to run in bridge mode.&lt;/P&gt;
&lt;P&gt;Each cluster member also needs its own unique IP address in the same network as all other cluster members. The members send heartbeats to each other using these addresses. These per-member IPs don't need to be in the same networks you plan to actually use for traffic. You need to use a separate network per interface. That is, you can't use 10.20.30.1/24 for eth1, 10.20.30.2/24 for eth2, and so on.&lt;/P&gt;
&lt;P&gt;Configuring VMAC is pretty easy. It's a checkbox in the cluster settings (same place where you pick between HA and load-sharing clustering modes). When you can take an outage, check the box and push policy. The cluster members will start using the virtual MAC. You &lt;EM&gt;do&lt;/EM&gt; need an outage window, because other endpoints on the networks may not see the MAC change until their ARP entries time out.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Aug 2022 14:23:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Virtual-MAC/m-p/154536#M26213</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2022-08-04T14:23:11Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Virtual MAC</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Virtual-MAC/m-p/154537#M26214</link>
      <description>&lt;P&gt;sk32073 and ClusterXL admin guide describe the configuration.&lt;/P&gt;
&lt;P&gt;Note there are some ARP requirements you may need to be aware of, please refer:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ClusterXL_AdminGuide/Topics-CXLG/Limitations-of-cluster-IP-addresses-on-different-subnets.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ClusterXL_AdminGuide/Topics-CXLG/Limitations-of-cluster-IP-addresses-on-different-subnets.htm&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Aug 2022 14:42:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Virtual-MAC/m-p/154537#M26214</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-08-04T14:42:46Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Virtual MAC</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Virtual-MAC/m-p/154551#M26218</link>
      <description>&lt;P&gt;Thanks Bob for the reply....&lt;/P&gt;&lt;P&gt;What i understand from reply is that we have to assign IP Addresses to each appliances interfaces.&lt;/P&gt;&lt;TABLE width="335"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="80"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD width="124"&gt;FW-A&lt;/TD&gt;&lt;TD width="131"&gt;FW-B&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;eth1 (WAN)&lt;/TD&gt;&lt;TD&gt;113.10.40.50&lt;/TD&gt;&lt;TD&gt;113.10.40.51&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;eth2 (LAN)&lt;/TD&gt;&lt;TD&gt;192.168.0.1&lt;/TD&gt;&lt;TD&gt;192.168.0.2&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is the above understanding is right.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Aug 2022 16:01:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Virtual-MAC/m-p/154551#M26218</guid>
      <dc:creator>Mitesh</dc:creator>
      <dc:date>2022-08-04T16:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Virtual MAC</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Virtual-MAC/m-p/154569#M26224</link>
      <description>&lt;P&gt;Remember that you do have an option to have VIP in one subnet (say your real public IP) and cluster members can be configured using "dummy" private IPs. If you have shortage of IPs. It's described in ClusterXL admin guide, i.e.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ClusterXL_AdminGuide/Topics-CXLG/Cluster-IP-addresses-on-different-subnets.htm" target="_self"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ClusterXL_AdminGuide/Topics-CXLG/Cluster-IP-addresses-on-different-subnets.htm&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Bear in mind that the feature has its limitations and you need to consider those before proceeding.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not too sure if it helps with your VMAC dillema though&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Aug 2022 20:39:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Virtual-MAC/m-p/154569#M26224</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2022-08-04T20:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Virtual MAC</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Virtual-MAC/m-p/154571#M26226</link>
      <description>&lt;P&gt;For ClusterXL you need minimum of 3 IPs to be reserved from one subnet, example 10.0.0.0/24:&lt;/P&gt;
&lt;P&gt;1. VIP (10.0.0.1/24)&lt;/P&gt;
&lt;P&gt;2. 1st node IP&amp;nbsp;(10.0.0.2/24)&lt;/P&gt;
&lt;P&gt;3. 2nd node IP&amp;nbsp;(10.0.0.3/24)&lt;/P&gt;
&lt;P&gt;If you are running out of free IPs, your next option can be to convert to VSX where you will need only VIP IP to be reserved for the Virtual System (10.0.0.1/24). Remaining 2 IPs&amp;nbsp;(10.0.0.2/24 and 10.0.0 3/24) are not needed anymore and can be used for end devices instead.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Aug 2022 20:52:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Virtual-MAC/m-p/154571#M26226</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2022-08-04T20:52:51Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Virtual MAC</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Virtual-MAC/m-p/154576#M26229</link>
      <description>&lt;P&gt;Yep. That’s why I said “&lt;SPAN&gt;These per-member IPs don't need to be in the same networks you plan to actually use for traffic.” &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Off-net member IPs aren’t commonly used outside of VSX (where they are mandatory, but automatically handled). They work well, though. I have a firewall in production which works like a more extreme version of that. I manually fake all the normal layer-3-to-2 stuff. It was built to deal with some absolutely nightmarish requirements.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Aug 2022 22:37:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Virtual-MAC/m-p/154576#M26229</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2022-08-04T22:37:53Z</dc:date>
    </item>
  </channel>
</rss>

