<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remove interface from ClusterXL in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186340#M34293</link>
    <description>&lt;P&gt;Personally, I never heard of something like that being possible.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Thu, 13 Jul 2023 10:56:22 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2023-07-13T10:56:22Z</dc:date>
    <item>
      <title>Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186337#M34292</link>
      <description>&lt;P&gt;Hello guys,&lt;/P&gt;&lt;P&gt;is there a way to configure ClusterXL to not failover when ccp packets are lost or an interface is down?&lt;BR /&gt;I know that is not the idea of redundancy/clustering as technique but the interface I am talking about is somekind special.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Yes, you can put an interface into private mode. But then you lose the virtual IP as well.&lt;BR /&gt;Yes, you can monitoring the link instead of the ccp packets, but we do not want to monitor the interface at all while having a virtual IP.&lt;/P&gt;&lt;P&gt;Short info about the topology:&lt;/P&gt;&lt;P&gt;- 2 appliances form a cluster&lt;BR /&gt;- several interfaces with one virtual IP connected via inhouse-cabling&lt;BR /&gt;- 1 Interface is connected to a switch (which is hosted at a external partner site) via L2.&lt;/P&gt;&lt;P&gt;This last interface or better the connection to the switch at the external site has short outages here and there. So the active gateway failsover over which does not make any difference as the passive gateway uses the same connection.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Is there any configuration where we can keep the virtual IP and but the interface has no role in ClusterXL?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jul 2023 10:22:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186337#M34292</guid>
      <dc:creator>morris</dc:creator>
      <dc:date>2023-07-13T10:22:05Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186340#M34293</link>
      <description>&lt;P&gt;Personally, I never heard of something like that being possible.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jul 2023 10:56:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186340#M34293</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-07-13T10:56:22Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186341#M34294</link>
      <description>&lt;P&gt;There are parameters to control sensitivity in some failover scenarios but those tend not to extend to specific interfaces&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your requirement has similarities to this previous discussion:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Cluster-XL-Interface-Preference/td-p/10107" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/Cluster-XL-Interface-Preference/td-p/10107&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jul 2023 11:17:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186341#M34294</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-07-13T11:17:24Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186351#M34295</link>
      <description>&lt;P&gt;Hey Chris,&lt;/P&gt;
&lt;P&gt;Thanks for that, good to know. Quick question...so say if you wanted to this, you just add interface name once that file is created?&amp;nbsp;&lt;SPAN&gt;$FWDIR/conf/discntd.if&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jul 2023 12:08:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186351#M34295</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-07-13T12:08:17Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186367#M34296</link>
      <description>&lt;P&gt;Suggest it would require testing or confirmation via TAC, reviewing some SK there are some mixed results depending on version.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jul 2023 13:43:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186367#M34296</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-07-13T13:43:30Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186375#M34297</link>
      <description>&lt;P&gt;Thats what I recall from R77.30 days, but I assume it might be different now...&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jul 2023 14:34:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186375#M34297</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-07-13T14:34:45Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186618#M34334</link>
      <description>&lt;P&gt;Hi Chris,&lt;/P&gt;&lt;P&gt;I've tested it in our lab.&lt;/P&gt;&lt;P&gt;If adding the interface name to&amp;nbsp;&lt;SPAN&gt;$FWDIR/conf/discntd.if the cluster won't failover once the link goes down.&lt;BR /&gt;But at the same time you lose your VIP (cphaprob -a if).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="css"&gt;CCP mode: Manual (Unicast)
Required interfaces: 3
Required secured interfaces: 1


Interface Name: Status:

eth1 UP
eth2 Non-Monitored
Sync (S) UP
Mgmt UP

S - sync, LM - link monitor, HA/LS - bond type

Virtual cluster interfaces: 2

eth1 192.168.1.60
Mgmt 192.168.0.60&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the moment I don't see any solution to this.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 14:41:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186618#M34334</guid>
      <dc:creator>morris</dc:creator>
      <dc:date>2023-07-17T14:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186620#M34335</link>
      <description>&lt;P&gt;Do you need things to be able to talk to the VIP, or only through the VIP?&lt;/P&gt;
&lt;P&gt;If only through, you may be able to use proxy ARP to set up a manual VIP. I'm not 100% sure it would work, but it's similar enough to how one of my major clusters works that I think it would. On both members:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;add arp proxy ipv4-address &amp;lt;VIP&amp;gt; macaddress &amp;lt;member's MAC for eth2&amp;gt; real-ipv4-address &amp;lt;member's IP for eth2&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;Be sure "Merge manual and automatic proxy ARP configuration" is checked in Global Properties. Traffic to the VIP itself (e.g, a client trying to connect to the VIP via SSH) wouldn't work. Traffic through the VIP (i.e, using the VIP as a gateway address for a route) should work.&lt;/P&gt;
&lt;P&gt;I'm not sure what would happen during failover. Traffic through that interface might fail while everything learns the new ARP entry.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 14:55:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186620#M34335</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-07-17T14:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186622#M34336</link>
      <description>&lt;P&gt;The VIP acts as a gateway.&lt;/P&gt;&lt;P&gt;I will give that proxy ARP a try.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 14:59:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186622#M34336</guid>
      <dc:creator>morris</dc:creator>
      <dc:date>2023-07-17T14:59:59Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186623#M34337</link>
      <description>&lt;P&gt;I am not sure I understand the request. Disabling CCP probing is out of the question. Are you trying to improve the cluster tolerance in case of intermittent network failures? What's the goal?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 15:08:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186623#M34337</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-07-17T15:08:34Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186626#M34338</link>
      <description>&lt;P&gt;You can try that, but I would be shocked if that worked...&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 16:53:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186626#M34338</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-07-17T16:53:32Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186631#M34339</link>
      <description>&lt;P&gt;It definitely works in general. It's basically how VSX works internally (and more generally, how off-net cluster VIPs work).&amp;nbsp;For a route without a gateway, the sender ARPs for the destination address and uses that MAC for the frame's destination. For a route with a gateway, the sender ARPs for the gateway instead and uses that MAC for the frame's destination. This is what the proxy ARP is trying to manipulate.&lt;/P&gt;
&lt;P&gt;An IP network stack doesn't care how traffic gets to it. If it owns the destination IP, it responds. If it doesn't own the destination IP and forwarding isn't enabled, it drops the packet. If it doesn't own the destination IP and forwarding is enabled, it forwards according to the routing table.&amp;nbsp;Cluster VIPs get some additional per-member NAT stuff which you can't configure manually in the rules. Traffic to the cluster VIP gets translated to instead go to the member's unique IP, so it sees the connection and responds. If we don't need the cluster VIP to accept connections, then we don't actually need that part.&lt;/P&gt;
&lt;P&gt;The part I'm not sure about is whether proxy ARP works at all on an interface marked as Non-Monitored/Private or placed in discntd.if. It &lt;EM&gt;should&lt;/EM&gt;, since those are still valid interfaces in the firewall kernel, but I haven't personally tried it.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 18:42:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186631#M34339</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-07-17T18:42:55Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186634#M34341</link>
      <description>&lt;P&gt;I agree, I know it works 100%, BUT, I dont see how it would help in&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9500"&gt;@morris&lt;/a&gt;&amp;nbsp;case, thats all.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 19:11:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186634#M34341</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-07-17T19:11:47Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186635#M34342</link>
      <description>&lt;P&gt;The idea is to let you use one consistent gateway address (the VIP in the proxy ARP entry) regardless of which member is active, just like a normal cluster VIP. As long as nothing has to talk&amp;nbsp;&lt;EM&gt;to&lt;/EM&gt; the VIP, and as long as proxy ARP entries on non-monitored interfaces work, this should work.&lt;/P&gt;
&lt;P&gt;The other potential complication is during failover. Old versions of the firewall used to flush out gratuitous ARP replies for all of the proxy ARP entries on failover. That seems to no longer happen in R80.10 and up. Without that, traffic will keep going to the now-standby member until the ARP entries time out and are relearned.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 20:20:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186635#M34342</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-07-17T20:20:07Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186646#M34343</link>
      <description>&lt;P&gt;I do not think the statement of G-ARP not being sent after a failover with R80.10+ is correct. Please refer to&amp;nbsp;&lt;SPAN&gt;sk120495, and also to the ClusterXL guide. In the latter, G-ARP is mentioned multiple times, &lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_ClusterXL_AdminGuide/Content/Topics-CXLG/Configuring-Virtual-MAC.htm?Highlight=gratuitous%20ARP" target="_self"&gt;look here&lt;/A&gt;, for example.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 07:00:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186646#M34343</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-07-18T07:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186704#M34345</link>
      <description>&lt;P&gt;It definitely is correct. I've been fighting an issue related to gratuitous ARP replies for several years across many TAC tickets. Recently built a lab environment at R80.10, R80.40, and R81.10 to try a fix for VMAC, and none of them sent out gratuitous ARP replies for any manual proxy ARP entry on failover. They only send it for the cluster VIPs. It's incredibly annoying and wasted over six months of my time.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 14:13:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186704#M34345</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-07-18T14:13:30Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186707#M34346</link>
      <description>&lt;P&gt;Im with you&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/27871"&gt;@Bob_Zimmerman&lt;/a&gt;&amp;nbsp;, I tested the same and results were exactly what you mentioned.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 14:25:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186707#M34346</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-07-18T14:25:09Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186708#M34347</link>
      <description>&lt;P&gt;Uh, I thought you referred to no G-ARPs for VIPs. Sorry I misread your post.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 14:27:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186708#M34347</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-07-18T14:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186711#M34348</link>
      <description>&lt;P&gt;I feel for you if this is a situation that you cannot solve by routing (I.e. NATs in same subnet as VIP).&lt;/P&gt;
&lt;P&gt;Proxy-arp is a horrible thing to need to rely on for many reasons based on my own personal multi-vendor experience.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 14:56:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186711#M34348</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-07-18T14:56:50Z</dc:date>
    </item>
    <item>
      <title>Re: Remove interface from ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186726#M34350</link>
      <description>&lt;P&gt;No problem! I should have been more clear. This issue has been a painful dive into the depths of how several features work internally and how they have each changed since R77.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 16:17:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remove-interface-from-ClusterXL/m-p/186726#M34350</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-07-18T16:17:30Z</dc:date>
    </item>
  </channel>
</rss>

