<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VSX on VMware and ACI R81.10 Take 66 virtual Switch, ARP first x replys seems to get ignored in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-on-VMware-and-ACI-R81-10-Take-66-virtual-Switch-ARP-first-x/m-p/159740#M28047</link>
    <description>&lt;P&gt;What version/JHF?&lt;BR /&gt;I recommend opening a TAC case in parallel.&lt;/P&gt;</description>
    <pubDate>Mon, 17 Oct 2022 14:54:41 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2022-10-17T14:54:41Z</dc:date>
    <item>
      <title>VSX on VMware and ACI R81.10 Take 66 virtual Switch, ARP first x replys seems to get ignored</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-on-VMware-and-ACI-R81-10-Take-66-virtual-Switch-ARP-first-x/m-p/159425#M27904</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;currently we're facing some strange behavior in one of our Checkpoint environments, We have a VSX install on VMware with ACI.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For one vlan in a virtual switch we have a strange behavior for ping and arp.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pings in the local vlan look like this:&lt;/P&gt;&lt;PRE&gt;[Expert@Firewall:3]# ping 172.26.60.222&lt;BR /&gt;PING 172.26.60.222 (172.26.60.222) 56(84) bytes of data.&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=21 ttl=64 time=1607 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=22 ttl=64 time=607 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=23 ttl=64 time=4.97 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=24 ttl=64 time=5.22 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=25 ttl=64 time=5.12 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=26 ttl=64 time=5.04 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=27 ttl=64 time=5.40 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=28 ttl=64 time=5.12 ms&lt;BR /&gt;^C&lt;BR /&gt;--- 172.26.60.222 ping statistics ---&lt;BR /&gt;28 packets transmitted, 8 received, 71% packet loss, time 27004ms&lt;BR /&gt;rtt min/avg/max/mdev = 4.977/280.735/1607.496/538.836 ms, pipe 2&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;as the ping works fine, it will work for a few mins but if you wait for a few mins and then try again you will face the same issue&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;[Expert@Firewall:3]# ping 172.26.60.222&lt;BR /&gt;PING 172.26.60.222 (172.26.60.222) 56(84) bytes of data.&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=41 ttl=64 time=2262 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=43 ttl=64 time=262 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=42 ttl=64 time=1262 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=44 ttl=64 time=5.15 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=45 ttl=64 time=5.10 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=46 ttl=64 time=5.36 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=47 ttl=64 time=5.17 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=48 ttl=64 time=5.24 ms&lt;BR /&gt;^C&lt;BR /&gt;--- 172.26.60.222 ping statistics ---&lt;BR /&gt;48 packets transmitted, 8 received, 83% packet loss, time 47005ms&lt;BR /&gt;rtt min/avg/max/mdev = 5.109/476.805/2262.779/787.822 ms, pipe 3&lt;/PRE&gt;&lt;P&gt;I also got one where the first replies were in the wrong order but i guess this is due to the differend reply times&lt;/P&gt;&lt;PRE&gt;[Expert@Firewall:3]# ping 172.26.60.222&lt;BR /&gt;PING 172.26.60.222 (172.26.60.222) 56(84) bytes of data.&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=11 ttl=64 time=929 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=10 ttl=64 time=1929 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=9 ttl=64 time=2929 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=12 ttl=64 time=5.11 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=13 ttl=64 time=5.19 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=14 ttl=64 time=5.01 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=15 ttl=64 time=5.18 ms&lt;BR /&gt;64 bytes from 172.26.60.222: icmp_seq=16 ttl=64 time=5.17 ms&lt;BR /&gt;^C&lt;BR /&gt;--- 172.26.60.222 ping statistics ---&lt;BR /&gt;16 packets transmitted, 8 received, 50% packet loss, time 15003ms&lt;BR /&gt;rtt min/avg/max/mdev = 5.015/726.724/2929.358/1057.264 ms, pipe 3&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you do a tcp dump you will see that there are a lot of arp requests and replys but they seem to be ingnored for the first xx times and then somewhen start working:&lt;/P&gt;&lt;P&gt;Ping&lt;/P&gt;&lt;PRE&gt;[Expert@Firewall:3]# ping 172.26.60.193&lt;BR /&gt;PING 172.26.60.193 (172.26.60.193) 56(84) bytes of data.&lt;BR /&gt;64 bytes from 172.26.60.193: icmp_seq=26 ttl=64 time=107 ms&lt;BR /&gt;64 bytes from 172.26.60.193: icmp_seq=25 ttl=64 time=1107 ms&lt;BR /&gt;64 bytes from 172.26.60.193: icmp_seq=27 ttl=64 time=0.825 ms&lt;BR /&gt;64 bytes from 172.26.60.193: icmp_seq=28 ttl=64 time=0.858 ms&lt;BR /&gt;64 bytes from 172.26.60.193: icmp_seq=29 ttl=64 time=0.958 ms&lt;BR /&gt;^C&lt;BR /&gt;--- 172.26.60.193 ping statistics ---&lt;BR /&gt;29 packets transmitted, 5 received, 82% packet loss, time 28001ms&lt;BR /&gt;rtt min/avg/max/mdev = 0.825/243.623/1107.759/434.044 ms, pipe 2&lt;/PRE&gt;&lt;P&gt;And the tcpdump&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;PRE&gt;[Expert@Firewall:1]# tcpdump -i bond1.2375 -vvv -s 0 host 172.26.60.193&lt;BR /&gt;tcpdump: listening on bond1.2375, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;09:38:10.665343 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:10.665401 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:10.665507 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:11.666644 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:11.666826 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:11.666987 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:12.668645 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:12.668733 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:12.668888 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:14.664678 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:14.664816 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:14.664926 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:15.666646 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:15.666720 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:15.666915 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:16.668651 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:16.668715 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:16.668814 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:18.664716 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:18.664945 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:18.665030 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:19.666627 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:19.666689 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:19.666837 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:20.668723 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:20.668838 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:20.669003 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:22.664719 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:22.664957 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:22.665023 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:23.666635 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:23.666851 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:23.666861 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:24.668653 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:24.668862 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:24.668870 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:26.664678 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:26.664734 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:26.665210 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:27.666649 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:27.666701 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:27.666922 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:28.668641 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:28.668804 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:28.668816 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:30.664697 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:30.664966 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:30.664975 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:31.666644 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:31.666889 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:31.666903 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:32.668666 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:32.668716 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:32.668873 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:34.664699 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:34.664838 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:34.664937 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:35.666644 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 28&lt;BR /&gt;09:38:35.666848 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 tell 172.26.60.220, length 46&lt;BR /&gt;09:38:35.666917 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.26.60.193 is-at b4:0c:25:e0:40:12 (oui Unknown), length 46&lt;BR /&gt;09:38:35.771198 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.214 (Broadcast) tell 172.26.60.193, length 46&lt;BR /&gt;09:38:35.771214 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.214 (Broadcast) tell 172.26.60.193, length 46&lt;BR /&gt;09:38:35.771339 IP (tos 0x0, ttl 64, id 27013, offset 0, flags [DF], proto ICMP (1), length 84)&lt;BR /&gt;172.26.60.220 &amp;gt; 172.26.60.193: ICMP echo request, id 10466, seq 25, length 64&lt;BR /&gt;09:38:35.771343 IP (tos 0x0, ttl 64, id 27894, offset 0, flags [DF], proto ICMP (1), length 84)&lt;BR /&gt;172.26.60.220 &amp;gt; 172.26.60.193: ICMP echo request, id 10466, seq 26, length 64&lt;BR /&gt;09:38:35.772285 IP (tos 0x0, ttl 64, id 50960, offset 0, flags [none], proto ICMP (1), length 84)&lt;BR /&gt;172.26.60.193 &amp;gt; 172.26.60.220: ICMP echo reply, id 10466, seq 26, length 64&lt;BR /&gt;09:38:35.772310 IP (tos 0x0, ttl 64, id 50961, offset 0, flags [none], proto ICMP (1), length 84)&lt;BR /&gt;172.26.60.193 &amp;gt; 172.26.60.220: ICMP echo reply, id 10466, seq 25, length 64&lt;BR /&gt;09:38:36.666424 IP (tos 0x0, ttl 64, id 28484, offset 0, flags [DF], proto ICMP (1), length 84)&lt;BR /&gt;172.26.60.220 &amp;gt; 172.26.60.193: ICMP echo request, id 10466, seq 27, length 64&lt;BR /&gt;09:38:36.667166 IP (tos 0x0, ttl 64, id 51105, offset 0, flags [none], proto ICMP (1), length 84)&lt;BR /&gt;172.26.60.193 &amp;gt; 172.26.60.220: ICMP echo reply, id 10466, seq 27, length 64&lt;BR /&gt;09:38:37.666602 IP (tos 0x0, ttl 64, id 28843, offset 0, flags [DF], proto ICMP (1), length 84)&lt;BR /&gt;172.26.60.220 &amp;gt; 172.26.60.193: ICMP echo request, id 10466, seq 28, length 64&lt;BR /&gt;09:38:37.667411 IP (tos 0x0, ttl 64, id 51274, offset 0, flags [none], proto ICMP (1), length 84)&lt;BR /&gt;172.26.60.193 &amp;gt; 172.26.60.220: ICMP echo reply, id 10466, seq 28, length 64&lt;BR /&gt;09:38:38.666610 IP (tos 0x0, ttl 64, id 29408, offset 0, flags [DF], proto ICMP (1), length 84)&lt;BR /&gt;172.26.60.220 &amp;gt; 172.26.60.193: ICMP echo request, id 10466, seq 29, length 64&lt;BR /&gt;09:38:38.667511 IP (tos 0x0, ttl 64, id 52115, offset 0, flags [none], proto ICMP (1), length 84)&lt;BR /&gt;172.26.60.193 &amp;gt; 172.26.60.220: ICMP echo reply, id 10466, seq 29, length 64&lt;BR /&gt;09:38:50.287621 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 (Broadcast) tell 172.26.60.193, length 46&lt;BR /&gt;09:38:50.287631 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.26.60.193 (Broadcast) tell 172.26.60.193, length 46&lt;/PRE&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;We've already tried the solution described in&amp;nbsp;&lt;SPAN&gt;sk94564 and here&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Cloud-Network-Security/Incompatibility-between-CISCO-ACI-and-VSX-Cluster-in-ClusterXL/td-p/50274" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Cloud-Network-Security/Incompatibility-between-CISCO-ACI-and-VSX-Cluster-in-ClusterXL/td-p/50274&lt;/A&gt;&amp;nbsp;but both did not work for us.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The fact that we have a second vlan in a second virtual switch with a similar setup and everything works fine makes it a lot more confusing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any further ideas or hints to test?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2022 08:50:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-on-VMware-and-ACI-R81-10-Take-66-virtual-Switch-ARP-first-x/m-p/159425#M27904</guid>
      <dc:creator>Felix_Burs</dc:creator>
      <dc:date>2022-10-13T08:50:38Z</dc:date>
    </item>
    <item>
      <title>Re: VSX on VMware and ACI R81.10 Take 66 virtual Switch, ARP first x replys seems to get ignored</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-on-VMware-and-ACI-R81-10-Take-66-virtual-Switch-ARP-first-x/m-p/159740#M28047</link>
      <description>&lt;P&gt;What version/JHF?&lt;BR /&gt;I recommend opening a TAC case in parallel.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Oct 2022 14:54:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-on-VMware-and-ACI-R81-10-Take-66-virtual-Switch-ARP-first-x/m-p/159740#M28047</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-10-17T14:54:41Z</dc:date>
    </item>
  </channel>
</rss>

