<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SmartConsole R81.10 lost connectivity to one of my firewalls in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199471#M37393</link>
    <description>&lt;P&gt;I am new to Checkpoint, came from Palo Alto.&amp;nbsp; I was trying to verify that, I found the admin guide for R81.10 but it shows me how to set it up.&amp;nbsp; How do I verify if it is work if you know off the top of your head otherwise still trying to find docs.&lt;/P&gt;</description>
    <pubDate>Fri, 01 Dec 2023 14:43:44 GMT</pubDate>
    <dc:creator>gurowar</dc:creator>
    <dc:date>2023-12-01T14:43:44Z</dc:date>
    <item>
      <title>SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199388#M37386</link>
      <description>&lt;P&gt;Good day All;&lt;/P&gt;&lt;P&gt;I already am talking to TAC about this, but before the Thanksgiving weekend I have a cluster of two 16K firewalls.&amp;nbsp; Both working as usual but after we came back from the long weekend I was trying to put in a temporary block an a suspicious IP.&amp;nbsp; When I received the following message: " Unable to fetch Suspicious Activity Rule from Firewall02"&amp;nbsp; Long story short TAC had me reboot the management server and now firewall02 I am unable to ping&amp;nbsp; its IP address(10.1.32.12) or connect to it via the management server.&amp;nbsp; I can ping the management IP from firewall02 and can ping firewall02 from anywhere else in the network, just not from the management server.&amp;nbsp; I also see the that the management PC is learning the MAC of firewall02.&amp;nbsp; Not sure what happened, anyone experience this?&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Warren&lt;/P&gt;</description>
      <pubDate>Thu, 30 Nov 2023 20:42:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199388#M37386</guid>
      <dc:creator>gurowar</dc:creator>
      <dc:date>2023-11-30T20:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199454#M37387</link>
      <description>&lt;P&gt;Does anything show in the logs?&lt;BR /&gt;Have you confirmed the packets are being received on the gateway with tcpdump?&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 13:54:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199454#M37387</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-12-01T13:54:33Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199455#M37388</link>
      <description>&lt;P&gt;Does SIC even work? If not, then you may need to reset it via cpconfig and smart console object itself.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 13:57:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199455#M37388</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-01T13:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199470#M37392</link>
      <description>&lt;P&gt;I will have to do that still, but I have 7 other interfaces on firewall02 and I am able to ping all of them its just eth1-01 that I am not able to ping. Let me run tcpdump.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 14:40:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199470#M37392</guid>
      <dc:creator>gurowar</dc:creator>
      <dc:date>2023-12-01T14:40:43Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199471#M37393</link>
      <description>&lt;P&gt;I am new to Checkpoint, came from Palo Alto.&amp;nbsp; I was trying to verify that, I found the admin guide for R81.10 but it shows me how to set it up.&amp;nbsp; How do I verify if it is work if you know off the top of your head otherwise still trying to find docs.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 14:43:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199471#M37393</guid>
      <dc:creator>gurowar</dc:creator>
      <dc:date>2023-12-01T14:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199478#M37396</link>
      <description>&lt;P&gt;Palo Alto, you are fine brother...when you know one fw vendor, its not that hard to learn another, trust me. One thing that ALWAYS trips me with PAN is inbound nat, I will never undertand it, though I know how it works lol. Check from below in smart console&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23495iB81ADF1A11F35DE5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 14:54:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199478#M37396</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-01T14:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199482#M37399</link>
      <description>&lt;P&gt;Thank you sir for the information!!!&amp;nbsp; I am still learning PAN!!! I keep finding out that there is more to learn....lol!!&amp;nbsp; But now my focus is on Checkpoint.&amp;nbsp; Looks like I might need to reestablish SIC on firewall02:&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SIC.PNG" style="width: 919px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23496iDF1797A53F0B0992/image-size/large?v=v2&amp;amp;px=999" role="button" title="SIC.PNG" alt="SIC.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 15:02:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199482#M37399</guid>
      <dc:creator>gurowar</dc:creator>
      <dc:date>2023-12-01T15:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199484#M37400</link>
      <description>&lt;P&gt;You do...so run cpconfig, then option for secure int. communication, reset it...can be any password, 1234, password, anything...its one time encrypted key anyway that does not get saved. BUT, be mindful, this will restart CP services and load whats called initial policy, which literally blocks most things, but then you can use that key to establish SIC on smart console, once done, try install policy.&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 15:04:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199484#M37400</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-01T15:04:43Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199486#M37401</link>
      <description>&lt;P&gt;So I have a quick question, I have 2 firewalls that are in a cluster, Firewall02 is the standby and Firewall01 is the active one.&amp;nbsp; When I run cpconfig on Firewall02 will this by any chance affect my active Firewall because they are in a cluster?&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 15:08:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199486#M37401</guid>
      <dc:creator>gurowar</dc:creator>
      <dc:date>2023-12-01T15:08:56Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199488#M37402</link>
      <description>&lt;P&gt;Correct, does not affect anything, as you are not touching current active fw. To be 100% sure, you can run cphaprob roles command from fw01 and if it shows master, you are good. Like below in my lab:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;[Expert@CP-FW-02:0]# cphaprob roles&lt;/P&gt;
&lt;P&gt;ID Role&lt;/P&gt;
&lt;P&gt;1 Non-Master&lt;BR /&gt;2 (local) Master&lt;/P&gt;
&lt;P&gt;[Expert@CP-FW-02:0]#&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 15:12:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199488#M37402</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-01T15:12:34Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199490#M37403</link>
      <description>&lt;P&gt;Awesome!!! Thank you sir!!!&amp;nbsp; I will try that and let you know....I guess that is why they call you the_rock, cause you ROCK!!!!&amp;nbsp; Sorry corney but couldn't help it&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 15:13:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199490#M37403</guid>
      <dc:creator>gurowar</dc:creator>
      <dc:date>2023-12-01T15:13:08Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199491#M37404</link>
      <description>&lt;P&gt;Thats what SHE said brother...just kidding, no one ever said that : - )&lt;/P&gt;
&lt;P&gt;Anyway, happy to help!&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 15:18:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199491#M37404</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-01T15:18:06Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199495#M37405</link>
      <description>&lt;P&gt;Did it work&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/99693"&gt;@gurowar&lt;/a&gt;&amp;nbsp;?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 16:00:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199495#M37405</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-01T16:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199496#M37406</link>
      <description>&lt;P&gt;Ufortuanatly, I have to jump through hoops first in order to do this cause they want to make sure it doesn't interrupt production. So it more than likely will be later today.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 16:02:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199496#M37406</guid>
      <dc:creator>gurowar</dc:creator>
      <dc:date>2023-12-01T16:02:50Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199503#M37407</link>
      <description>&lt;P&gt;I get it, definitely better to do after hours, just to be on the safe side brother. Keep us posted how it goes. Now, here is something to keep in mind. In case this process fails, meaning say sic works, but after policy install you get the same issue, what I would do is actually examine the routing. I hope it works fine, but something to keep in mind if there is a problem after you push the policy to the cluster.&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 16:59:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199503#M37407</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-01T16:59:51Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199513#M37408</link>
      <description>&lt;P&gt;That message is saying it can't tell whether SIC is established or not, because there's a TCP connectivity problem. That's lower-level than SIC.&amp;nbsp;&lt;STRONG&gt;I would not reset SIC yet&lt;/STRONG&gt;. Resetting SIC with cpconfig will take the member down until you reestablish SIC and push policy. The other member will probably be okay, so this shouldn't cause a traffic outage. If the problem is lower level, like the error message says it is, you won't be able to reestablish SIC after resetting it on the member.&lt;/P&gt;
&lt;P&gt;If you are able to connect to the problem member, check the normal traffic things:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Is the member active, standby, or something else? (cphaprob state)&lt;/LI&gt;
&lt;LI&gt;Is the traffic received? (tcpdump -ennvi &amp;lt;interface&amp;gt; host &amp;lt;remote IP&amp;gt;)&lt;/LI&gt;
&lt;LI&gt;Is the traffic dropped? (fw ctl zdebug drop -F "&amp;lt;remote IP&amp;gt;,0,0,0,0" -F "0,0,&amp;lt;remote IP&amp;gt;,0,0")&lt;/LI&gt;
&lt;LI&gt;Where does the reply traffic go? (fw monitor -F "&amp;lt;remote IP&amp;gt;,0,0,0,0" -F "0,0,&amp;lt;remote IP&amp;gt;,0,0")&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 01 Dec 2023 20:14:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199513#M37408</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-12-01T20:14:55Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199525#M37411</link>
      <description>&lt;P&gt;Is it maybe related to this&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk97587" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk97587&lt;/A&gt; - standby is not reachable because active is answering?&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 21:48:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199525#M37411</guid>
      <dc:creator>D_W</dc:creator>
      <dc:date>2023-12-01T21:48:42Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199526#M37412</link>
      <description>&lt;P&gt;I see ok will hold off on this&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is the member active, standby, or something else? (cphaprob state)&amp;nbsp; Firewall02 currenty on standby&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@Firewall02:0]# cphaprob state&lt;/P&gt;&lt;P&gt;Cluster Mode: High Availability (Active Up) with IGMP Membership&lt;/P&gt;&lt;P&gt;ID Unique Address Assigned Load State Name&lt;/P&gt;&lt;P&gt;1 192.168.255.253 100% ACTIVE FireWall01&lt;BR /&gt;2 (local) 192.168.255.254 0% STANDBY FireWall02&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is the traffic received? (tcpdump -ennvi &amp;lt;interface&amp;gt; host &amp;lt;remote IP&amp;gt;)&amp;nbsp; Yes receiving traffic&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;[Expert@Firewall02:0]# tcpdump -ennvi eth2-01 host 10.1.32.13&lt;BR /&gt;tcpdump: listening on eth2-01, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;15:50:19.056148 00:1c:7f:a5:09:2e &amp;gt; 00:50:56:8f:f4:6e, ethertype IPv4 (0x0800), length 204: (tos 0x0, ttl 64, id 44749, offset 0, flags [DF], proto TCP (6), length 190)&lt;BR /&gt;10.1.32.12.54484 &amp;gt; 10.1.32.13.257: Flags [P.], cksum 0x70fd (correct), seq 2067075409:2067075547, ack 948068494, win 40, options [nop,nop,TS val 2049325344 ecr 104931060], length 138&lt;BR /&gt;15:50:19.056224 00:50:56:8f:f4:6e &amp;gt; 00:1c:7f:a5:09:2e, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 29308, offset 0, flags [DF], proto TCP (6), length 52)&lt;BR /&gt;10.1.32.13.257 &amp;gt; 10.1.32.12.54484: Flags [.], cksum 0x41ca (correct), ack 138, win 174, options [nop,nop,TS val 104934060 ecr 2049325344], length 0&lt;BR /&gt;15:50:19.725269 00:50:56:8f:f4:6e &amp;gt; 00:1c:7f:a5:09:2e, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 44940, offset 0, flags [DF], proto TCP (6), length 60)&lt;BR /&gt;10.1.32.13.42829 &amp;gt; 10.1.32.12.18192: Flags [S], cksum 0x6f4a (correct), seq 1843036869, win 29200, options [mss 1460,sackOK,TS val 104934729 ecr 0,nop,wscale 10], length 0&lt;BR /&gt;15:50:20.727336 00:50:56:8f:f4:6e &amp;gt; 00:1c:7f:a5:09:2e, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 44941, offset 0, flags [DF], proto TCP (6), length 60)&lt;BR /&gt;10.1.32.13.42829 &amp;gt; 10.1.32.12.18192: Flags [S], cksum 0x6b5f (correct), seq 1843036869, win 29200, options [mss 1460,sackOK,TS val 104935732 ecr 0,nop,wscale 10], length 0&lt;BR /&gt;15:50:21.056277 00:1c:7f:a5:09:2e &amp;gt; 00:50:56:8f:f4:6e, ethertype IPv4 (0x0800), length 320: (tos 0x0, ttl 64, id 44750, offset 0, flags [DF], proto TCP (6), length 306)&lt;BR /&gt;10.1.32.12.54484 &amp;gt; 10.1.32.13.257: Flags [P.], cksum 0xe06c (correct), seq 138:392, ack 1, win 40, options [nop,nop,TS val 2049327344 ecr 104934060], length 254&lt;BR /&gt;15:50:21.056547 00:50:56:8f:f4:6e &amp;gt; 00:1c:7f:a5:09:2e, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 29309, offset 0, flags [DF], proto TCP (6), length 52)&lt;BR /&gt;10.1.32.13.257 &amp;gt; 10.1.32.12.54484: Flags [.], cksum 0x312b (correct), ack 392, win 174, options [nop,nop,TS val 104936061 ecr 2049327344], length 0&lt;BR /&gt;15:50:22.731312 00:50:56:8f:f4:6e &amp;gt; 00:1c:7f:a5:09:2e, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 44942, offset 0, flags [DF], proto TCP (6), length 60)&lt;BR /&gt;10.1.32.13.42829 &amp;gt; 10.1.32.12.18192: Flags [S], cksum 0x638b (correct), seq 1843036869, win 29200, options [mss 1460,sackOK,TS val 104937736 ecr 0,nop,wscale 10], length 0&lt;BR /&gt;^C&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is the traffic dropped? (fw ctl zdebug drop -F "&amp;lt;remote IP&amp;gt;,0,0,0,0" -F "0,0,&amp;lt;remote IP&amp;gt;,0,0")&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Not sure if I am doing this right but this is what I typed:&lt;/P&gt;&lt;P&gt;fw ctl zdebug drop -F 10.1.32.13&amp;nbsp;&amp;nbsp;-F 10.1.32.13&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Where does the reply traffic go? (fw monitor -F "&amp;lt;remote IP&amp;gt;,0,0,0,0" -F "0,0,&amp;lt;remote IP&amp;gt;,0,0")&amp;nbsp; Traffic looks like it is going out eth2-01 which is the correct interface for the 10.1.32.XX subnet&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Firewall02&amp;gt; fw monitor -F 10.1.32.13 -F 10.1.32.13&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_kiss_enable&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_off&lt;BR /&gt;PPAK 0: Get before set operation succeeded of kiss_debug_force_kdprintf_enable&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitorfreebufs&lt;BR /&gt;PPAK 0: Get before set operation succeeded of kiss_debug_force_kdprintf_enable&lt;BR /&gt;Partial debug filter, setting missing parameters to 'Any'&lt;BR /&gt;Partial debug filter, setting missing parameters to 'Any'&lt;BR /&gt;Partial debug filter, setting missing parameters to 'Any'&lt;BR /&gt;Partial debug filter, setting missing parameters to 'Any'&lt;BR /&gt;fw ctl set string simple_debug_filter_saddr_1 10.1.32.13 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_saddr_1&lt;BR /&gt;fw ctl set int simple_debug_filter_sport_1 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_sport_1&lt;BR /&gt;fw ctl set string simple_debug_filter_daddr_1 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_daddr_1&lt;BR /&gt;fw ctl set int simple_debug_filter_dport_1 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_dport_1&lt;BR /&gt;fw ctl set int simple_debug_filter_proto_1 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_proto_1&lt;BR /&gt;PPAK 0: Get before set operation succeeded of kiss_debug_force_kdprintf_enable&lt;BR /&gt;Partial debug filter, setting missing parameters to 'Any'&lt;BR /&gt;Partial debug filter, setting missing parameters to 'Any'&lt;BR /&gt;Partial debug filter, setting missing parameters to 'Any'&lt;BR /&gt;Partial debug filter, setting missing parameters to 'Any'&lt;BR /&gt;fw ctl set string simple_debug_filter_saddr_2 10.1.32.13 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_saddr_2&lt;BR /&gt;fw ctl set int simple_debug_filter_sport_2 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_sport_2&lt;BR /&gt;fw ctl set string simple_debug_filter_daddr_2 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_daddr_2&lt;BR /&gt;fw ctl set int simple_debug_filter_dport_2 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_dport_2&lt;BR /&gt;fw ctl set int simple_debug_filter_proto_2 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_proto_2&lt;BR /&gt;FW monitor will record only ip &amp;amp; transport layers in a packet&lt;BR /&gt;For capturing the whole packet please do -w&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_ppak_all_position&lt;BR /&gt;monitor: getting filter (from command line)&lt;BR /&gt;monitor: compiling&lt;BR /&gt;monitorfilter:&lt;BR /&gt;Compiled OK.&lt;BR /&gt;monitor: loading&lt;BR /&gt;monitor: monitoring (control-C to stop)&lt;BR /&gt;buffer size 8388608 is too big for 138 buffers, using 7002630&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitormaxpacket&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitormask&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitorallocbufs&lt;BR /&gt;PPAK 0: Get before set operation succeeded of printuuid&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_kiss_enable&lt;BR /&gt;[vs_0][ppak_0] eth2-01:iq[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29360&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b353f27&lt;BR /&gt;[vs_0][fw_16] eth2-01:iq[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29360&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b353f27&lt;BR /&gt;[vs_0][fw_16] eth2-01:IQ[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29360&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b353f27&lt;BR /&gt;[vs_0][ppak_0] eth2-01:iq[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29361&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b354025&lt;BR /&gt;[vs_0][fw_16] eth2-01:iq[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29361&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b354025&lt;BR /&gt;[vs_0][fw_16] eth2-01:IQ[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29361&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b354025&lt;BR /&gt;[vs_0][ppak_0] eth2-01:iq[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29362&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b3540af&lt;BR /&gt;[vs_0][fw_16] eth2-01:iq[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29362&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b3540af&lt;BR /&gt;[vs_0][fw_16] eth2-01:IQ[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29362&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b3540af&lt;BR /&gt;[vs_0][ppak_0] eth2-01:iq[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29363&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b354139&lt;BR /&gt;[vs_0][fw_16] eth2-01:iq[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29363&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b354139&lt;BR /&gt;[vs_0][fw_16] eth2-01:IQ[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29363&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b354139&lt;BR /&gt;[vs_0][ppak_0] eth2-01:iq[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29364&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b3541c3&lt;BR /&gt;[vs_0][fw_16] eth2-01:iq[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29364&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b3541c3&lt;BR /&gt;[vs_0][fw_16] eth2-01:IQ[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29364&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b3541c3&lt;BR /&gt;[vs_0][ppak_0] eth2-01:iq[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=60 id=11750&lt;BR /&gt;TCP: 44946 -&amp;gt; 18192 .S.... seq=aa2ec06c ack=00000000&lt;BR /&gt;[vs_0][fw_16] eth2-01:iq[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=60 id=11750&lt;BR /&gt;TCP: 44946 -&amp;gt; 18192 .S.... seq=aa2ec06c ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth2-01:iq[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=60 id=11751&lt;BR /&gt;TCP: 44946 -&amp;gt; 18192 .S.... seq=aa2ec06c ack=00000000&lt;BR /&gt;[vs_0][fw_23] eth2-01:iq[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=60 id=11751&lt;BR /&gt;TCP: 44946 -&amp;gt; 18192 .S.... seq=aa2ec06c ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth2-01:iq[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29365&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b35424d&lt;BR /&gt;[vs_0][fw_16] eth2-01:iq[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29365&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b35424d&lt;BR /&gt;[vs_0][fw_16] eth2-01:IQ[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=52 id=29365&lt;BR /&gt;TCP: 257 -&amp;gt; 54484 ....A. seq=3882608e ack=7b35424d&lt;BR /&gt;[vs_0][ppak_0] eth2-01:iq[44]: 10.1.32.13 -&amp;gt; 10.1.32.12 (TCP) len=60 id=11752&lt;BR /&gt;TCP: 44946 -&amp;gt; 18192 .S.... seq=aa2ec06c ack=00000000&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 22:01:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199526#M37412</guid>
      <dc:creator>gurowar</dc:creator>
      <dc:date>2023-12-01T22:01:50Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199543#M37420</link>
      <description>&lt;P&gt;Based on that, seems fine to me. Does fw2 have right policy? Can you run fw stat -b AMW command? Or just fw stat...&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 02 Dec 2023 15:22:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199543#M37420</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-02T15:22:25Z</dc:date>
    </item>
    <item>
      <title>Re: SmartConsole R81.10 lost connectivity to one of my firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199546#M37422</link>
      <description>&lt;P&gt;For the drop debug and packet capture, the filter should be like this:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;fw ctl zdebug drop -F "10.1.32.13,0,0,0,0" -F "0,0,10.1.32.13,0,0"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The filter expression is five fields separated by commas. Source IP, source port, destination IP, destination port, IP protocol number. A 0 in any field is a wildcard for that field. Note that reply traffic is not automatically caught by the filter, so be sure to specify the filter in both directions, like I did above.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Start the drop debug. Connect to your management and open the cluster member object. Test SIC in SmartConsole. See if you got anything in the drop debug.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Start the packet capture.&amp;nbsp;Connect to your management and open the cluster member object. Test SIC in SmartConsole. See if you got anything in the packet capture. Look for ports 18191 and 18192.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Dec 2023 19:56:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SmartConsole-R81-10-lost-connectivity-to-one-of-my-firewalls/m-p/199546#M37422</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-12-02T19:56:00Z</dc:date>
    </item>
  </channel>
</rss>

