<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MAC-Flapping on the same bond interface (active-standby) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MAC-Flapping-on-the-same-bond-interface-active-standby/m-p/181294#M33170</link>
    <description>&lt;P&gt;Hi, ill try to capture, BTW this is VSX not normal firewall&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 18 May 2023 01:33:50 GMT</pubDate>
    <dc:creator>andrewb</dc:creator>
    <dc:date>2023-05-18T01:33:50Z</dc:date>
    <item>
      <title>MAC-Flapping on the same bond interface (active-standby)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MAC-Flapping-on-the-same-bond-interface-active-standby/m-p/181288#M33164</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the behavior of bond interface on an "active-standby" state?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe the "standby" state does not have any traffic flowing thru right?&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have an issue here after upgrading the 15600 to R81, the switch started reporting MAC-FLAP, when we checked it was coming from the same bond port of the firewall which is set to active standby.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I did a wireshark i saw traffic on the standby port and the CPHA packet source mac-address they are using the same MAC-address&lt;/P&gt;&lt;P&gt;Do we expect the same mac-address on both ports when they are trying CPHA packet?&amp;nbsp; When i checked a 16200 - it was using 00:00:00:00:01:00 , however the 15600 was using the physical MAC of the the other interface on the same bond&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 23:02:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MAC-Flapping-on-the-same-bond-interface-active-standby/m-p/181288#M33164</guid>
      <dc:creator>andrewb</dc:creator>
      <dc:date>2023-05-17T23:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: MAC-Flapping on the same bond interface (active-standby)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MAC-Flapping-on-the-same-bond-interface-active-standby/m-p/181289#M33165</link>
      <description>&lt;P&gt;Is the 16200 also using active-standby bonds and what version &amp;amp; JHF by comparison?&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 23:52:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MAC-Flapping-on-the-same-bond-interface-active-standby/m-p/181289#M33165</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-05-17T23:52:05Z</dc:date>
    </item>
    <item>
      <title>Re: MAC-Flapping on the same bond interface (active-standby)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MAC-Flapping-on-the-same-bond-interface-active-standby/m-p/181290#M33166</link>
      <description>&lt;P&gt;Yes, the 16200 is running the same version R81 with same bond configuration (active-standby). The 15600 has the higher JHF&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2023 00:05:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MAC-Flapping-on-the-same-bond-interface-active-standby/m-p/181290#M33166</guid>
      <dc:creator>andrewb</dc:creator>
      <dc:date>2023-05-18T00:05:18Z</dc:date>
    </item>
    <item>
      <title>Re: MAC-Flapping on the same bond interface (active-standby)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MAC-Flapping-on-the-same-bond-interface-active-standby/m-p/181291#M33167</link>
      <description>&lt;P&gt;I know in the old days of CP, sometimes that would happen depending on whether virtual MAC option was checked under cluster object in smart console.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2023 00:05:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MAC-Flapping-on-the-same-bond-interface-active-standby/m-p/181291#M33167</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-05-18T00:05:42Z</dc:date>
    </item>
    <item>
      <title>Re: MAC-Flapping on the same bond interface (active-standby)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MAC-Flapping-on-the-same-bond-interface-active-standby/m-p/181292#M33168</link>
      <description>&lt;P&gt;Yes, but it is just weird - the port is only on standby state, it does not goes up and down. It should just take over when the primary fails&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2023 00:10:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MAC-Flapping-on-the-same-bond-interface-active-standby/m-p/181292#M33168</guid>
      <dc:creator>andrewb</dc:creator>
      <dc:date>2023-05-18T00:10:37Z</dc:date>
    </item>
    <item>
      <title>Re: MAC-Flapping on the same bond interface (active-standby)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MAC-Flapping-on-the-same-bond-interface-active-standby/m-p/181293#M33169</link>
      <description>&lt;P&gt;Just to verify all, can you please send output of below commands on both members? Please blur out any sensitive info.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;cphaprob roles&lt;/P&gt;
&lt;P&gt;cphaprob state&lt;/P&gt;
&lt;P&gt;cphaprob -i list&lt;/P&gt;
&lt;P&gt;cphaprob -a if&lt;/P&gt;
&lt;P&gt;cphaprob syncstat&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2023 00:30:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MAC-Flapping-on-the-same-bond-interface-active-standby/m-p/181293#M33169</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-05-18T00:30:43Z</dc:date>
    </item>
    <item>
      <title>Re: MAC-Flapping on the same bond interface (active-standby)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MAC-Flapping-on-the-same-bond-interface-active-standby/m-p/181294#M33170</link>
      <description>&lt;P&gt;Hi, ill try to capture, BTW this is VSX not normal firewall&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2023 01:33:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MAC-Flapping-on-the-same-bond-interface-active-standby/m-p/181294#M33170</guid>
      <dc:creator>andrewb</dc:creator>
      <dc:date>2023-05-18T01:33:50Z</dc:date>
    </item>
    <item>
      <title>Re: MAC-Flapping on the same bond interface (active-standby)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MAC-Flapping-on-the-same-bond-interface-active-standby/m-p/181295#M33171</link>
      <description>&lt;P&gt;I am pretty sure same commands would work on VSX as well.&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2023 01:36:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MAC-Flapping-on-the-same-bond-interface-active-standby/m-p/181295#M33171</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-05-18T01:36:45Z</dc:date>
    </item>
  </channel>
</rss>

