<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ClusterXL Different Subnet Configuration in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8035#M413</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Got it working! (: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Aleksei, I set the settings like you recommended. Removed the "eth0" from the default route 111.111.251.25, removed "scopelocal" from 111.111.74.0/24 and added scopelocal on the external 111.111.251.24/29. Failed over a few times between gateways and everything worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The one thing that I did notice and did differently to every other time I've tried this was a reboot after route changes. Changing the default route without a reboot sometimes broke the local network responses from the gateways. Not sure why it would do that but it's definitely something I noticed on multiple occasions while testing and was quite confusing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maarten, the reason I'm using /29 is because that's the configuration I was given twelve years ago for the netmask on the firewall gateway. I think they allocated more IP's for me in case I needed them. Perhaps I could have just requested another IP for the gateway and have the upstream guys configure the rest instead of messing with this but when it worked last time I just let it run.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Mar 2018 01:26:03 GMT</pubDate>
    <dc:creator>Alex_Birkovsky</dc:creator>
    <dc:date>2018-03-28T01:26:03Z</dc:date>
    <item>
      <title>ClusterXL Different Subnet Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8020#M398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm trying to do a test upgrade from a Cluster XL R77 Secure Platform to R80.10 GAIA . I've upgraded the Managment Server and setup two new Gateway servers with R80.10. The Management Server imported all the old rules and pushes them successfully to the new Gateways. My problem seems to be that I can't get routing to work properly once I make the test platform live. My network config is as follows, some IP's are changed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall IP from provider:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 111.111.251.26&lt;/P&gt;&lt;P&gt;Firewall Gateway from provider:&amp;nbsp;&amp;nbsp; 111.111.251.25&lt;/P&gt;&lt;P&gt;Internal Network:&amp;nbsp;&amp;nbsp;&amp;nbsp; 111.111.74.0/24&lt;/P&gt;&lt;P&gt;Internal Gateway IP: 111.111.74.1&lt;/P&gt;&lt;P&gt;Sync: 10.0.0.1 and 10.0.0.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've setup the Firewall IP (111.111.251.26) as a Virtual IP between the two Clusters Members on the 10.10.10.1 and 10.10.10.2 IP's. I've setup the Internal Gateway as a Virtual IP (111.111.74.1) on 111.111.74.3 and 111.111.74.4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On both Gateway Servers in the GUI I set the IPv4 routing as follows:&lt;/P&gt;&lt;P&gt;Default&amp;nbsp;&amp;nbsp; 111.111.251.25 eth0&lt;/P&gt;&lt;P&gt;Static 111.111.74.0/24 LOCAL eth1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without clustering, the firewall works fine but with Cluster XL enabled the routing fails and I'm not sure where. I tried copying the routing tables from the R77 but they're still not working when I turn the old stuff off and plug the new stuff in. I thought it could be ARP cache and I tried clearing everything on the main switch and firewall but that didn't resolve it. I tried spoofing MAC addreses from the old servers to the new ones.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any clues on where I'm going wrong with this would be apperciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2018 14:47:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8020#M398</guid>
      <dc:creator>Alex_Birkovsky</dc:creator>
      <dc:date>2018-03-22T14:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Different Subnet Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8021#M399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does the output of&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;cphaprob -a if&lt;/STRONG&gt;&lt;/EM&gt; reveal any issues where it thinks certain interfaces are down?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, how does&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;cphaprob stat&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;report the cluster health when the issue arises?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Is the topology defined correctly in R80.10 where the ISP LAN and Internal LAN Interfaces are defined as Cluster Interfaces and the Sync is explicitly defined as a Sync interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2018 16:35:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8021#M399</guid>
      <dc:creator>Daniel_Taney</dc:creator>
      <dc:date>2018-03-22T16:35:30Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Different Subnet Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8022#M400</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;cphaprob -a if&lt;/STRONG&gt; shows all interfaces as up on both Gateways and Virtuals&lt;/P&gt;&lt;P&gt;eth0 UP non sync(non secured), multicast&lt;/P&gt;&lt;P&gt;eth1 UP non sync(non secured), multicast&lt;/P&gt;&lt;P&gt;eth2 UP sync(secured), multicast&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Virtuals&lt;/P&gt;&lt;P&gt;eth0 111.111.251.26&lt;/P&gt;&lt;P&gt;eth1 111.111.74.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;cphaprob state &lt;/STRONG&gt;shows both cluster members one's Active and one's Standby (the opposite on the second Gateway)&lt;/P&gt;&lt;P&gt;1&amp;nbsp; (local) 10.0.0.1&amp;nbsp; 100% Active&lt;/P&gt;&lt;P&gt;2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.0.2&amp;nbsp; 0%&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Standby&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe the Cluster Properties in Management are setup correctly&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eth0 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; External&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 111.111.251.26/24 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.10.1/24 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.10.2/24&lt;/P&gt;&lt;P&gt;eth1 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This Network 111.111.74.1/29 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 111.111.74.3/24&amp;nbsp;&amp;nbsp; 111.111.74.4/24&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(hmm this could be wrong as I think that should be /24 not sure how it turned to be /29)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;eth2 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This Network&amp;nbsp; Sync&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.0.1/24 &amp;nbsp;&amp;nbsp; 10.0.0.2/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even though with that /29 I still think it's strange that the active gateway can't ping/reach anything out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2018 16:57:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8022#M400</guid>
      <dc:creator>Alex_Birkovsky</dc:creator>
      <dc:date>2018-03-22T16:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Different Subnet Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8023#M401</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree. I think the /29 should be fixed if it is supposed to be a /24.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're using the same Policy for R77 and R80.10, right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you try to ping something upstream of the Firewall, do you see ARP complete? That would help rule out whether this is somehow a Layer 2 issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2018 18:29:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8023#M401</guid>
      <dc:creator>Daniel_Taney</dc:creator>
      <dc:date>2018-03-22T18:29:28Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Different Subnet Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8024#M402</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I changed the /29 to /24 but that didn't help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The orignal cluster was imported from the R77 export. I'm using all the policies from it. dThey're very basic. I tried removing and recreating the Cluster in the Mangement console and installed the policy but still no go.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure how I can check to see if ARP completes. I can ping the firewall gateway and everything on the local network but that's it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2018 02:20:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8024#M402</guid>
      <dc:creator>Alex_Birkovsky</dc:creator>
      <dc:date>2018-03-23T02:20:06Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Different Subnet Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8025#M403</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;check on your active member if you get anything whit the command:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;fw ctl arp&lt;/P&gt;&lt;P&gt;This should give you the proxy arp for the VIP.&lt;/P&gt;&lt;P&gt;Did you enable VMAC on the ClusterXL page as well? this will always improve the failover when it occurs as there is no need for gratuitous arps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regads, Maarten.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Mar 2018 11:57:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8025#M403</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-03-25T11:57:57Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Different Subnet Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8026#M404</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you read&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk32073" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk32073"&gt;Configuring Cluster Addresses on Different Subnets&lt;/A&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to create a scopelocal route for external interface.&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;In CLI:&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; padding: 0px 0px 0px 30px;"&gt;&lt;SPAN style="border: 0px; font-weight: inherit; font-size: 13px;"&gt;set static-route 111.111.251.26 nexthop gateway logical&amp;nbsp;eth0 on&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="border: 0px; font-weight: inherit; font-size: 13px;"&gt;set static-route &lt;SPAN style="background-color: #ffffff;"&gt;111.111.251.26&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG style="border: 0px; font-weight: bold; font-size: 13px;"&gt;scopelocal&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;on&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;The same can be done in web-interface, there is a checkbox for scopelocal.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Mar 2018 20:27:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8026#M404</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-03-25T20:27:23Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Different Subnet Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8027#M405</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Aleksei! I've seen that document mentioned in a few places, including R80 manual. Unfortunately our license only has access to software updates and we do not have access to that solution. We are considering renewing the license with support at the end of the year but until then I'm stuck. Though I've managed to in-place upgrade from R65 to R77 through some hoops.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried adding the external interface with scopelocal as you suggested and it looked to have started working. The command requires a subnetmask on GAIA so I set it to /31. It took a few minutes for some of the external IP's to respond and traffic to get routed properly from the outside. But it did work! So I decided to try a failover. It never worked again, on either cluster member.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm a bit at a loss here on how that's even possible as I didn't change any settings. I tried rebooting both cluster members, pushing the policies but I could never get it to work again. I could only get as far as pinging my 111.111.251.25 gateway from either cluster member or any internal host as previously.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2018 04:04:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8027#M405</guid>
      <dc:creator>Alex_Birkovsky</dc:creator>
      <dc:date>2018-03-27T04:04:05Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Different Subnet Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8028#M406</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Maarten! Running "fw ctl arp" always says "No proxy ARP entries". I tried the command even when everything started to work as I mentioned to Aleksei in the thread.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ran the command when the firewall was working (for some reason) and it also said "No proxy ARP entries". I didn't have the VMAC enabled but I tried enabling it after it stopped working and it didn't make a difference.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2018 04:08:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8028#M406</guid>
      <dc:creator>Alex_Birkovsky</dc:creator>
      <dc:date>2018-03-27T04:08:10Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Different Subnet Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8029#M407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;try adding this command to both members in clish:&lt;/P&gt;&lt;P&gt;Member 1&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;add arp proxy ipv4-address 111.111.251.26 macaddress&amp;nbsp;&amp;lt;vmac (get it with cpahprob -a if) or real mac of node&amp;gt; real-ipv4-address 10.10.10.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #3d3d3d;"&gt;Member 2&lt;/P&gt;&lt;P style="color: #3d3d3d;"&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;add arp proxy ipv4-address 111.111.251.26 macaddress&amp;nbsp;&amp;lt;vmac (get it with cpahprob -a if) or real mac of node&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;real-ipv4-address 10.10.10.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #3d3d3d;"&gt;&lt;/P&gt;&lt;P style="color: #3d3d3d;"&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;This will make sure the arp for the IP will be set anyway.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2018 06:23:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8029#M407</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-03-27T06:23:20Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Different Subnet Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8030#M408</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, I didn't check the exact commands now, but previously for sure I used scopelocal route for the same case.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suppose then you have to use the same network for scopelocal as you defined in policy:&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;eth0 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; External&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;111.111.251.26/24&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;10.10.10.1/24&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;10.10.10.2/24&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;I don't think you can really use /31 mask for that, at least /30.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Here is a part from the sk:&lt;/SPAN&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Configure the relevant static route for the cluster network via member's interface:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;CODE&gt;HostName:0&amp;gt; set static-route 172.16.6.0/24 nexthop gateway logical &amp;lt;Name_of_Relevant_Interface_on_Side_A&amp;gt; on&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;CODE&gt;HostName:0&amp;gt; save config&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Set the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;scopelocal&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;attribute on the new static route for the cluster network via member's interface:&lt;/P&gt;&lt;P&gt;Note: Currently setting this attribute is supported only via Clish.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;CODE&gt;HostName:0&amp;gt; set static-route 172.16.6.0/24 scopelocal on&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;CODE&gt;HostName:0&amp;gt; save config&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Verify that the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;scopelocal&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;attribute was set:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;CODE&gt;[Expert@HostName]# cat /etc/routed.conf&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Now, it will be possible to route traffic using the new static route for the cluster network via member's interface.&lt;/P&gt;&lt;P&gt;User should define the desired static route in the following way:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;CODE&gt;HostName:0&amp;gt; set static-route &amp;lt;DESIRED_NETWORK_ADDRESS/MASK&amp;gt; nexthop gateway address &amp;lt;IP_ADDRESS_OF_NEXT_HOP_ON_CLUSTER_VIP_NETWORK&amp;gt; on&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;CODE&gt;HostName:0&amp;gt; save config&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Verify that the static route to cluster VIP was added to Gaia OS kernel:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;CODE&gt;HostName:0&amp;gt; show route&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;CODE&gt;[Expert@HostName:0]# netstat -rn&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;As I understand, you should have the following routes for it to work (on both nodes of the cluster, of course):&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; padding-left: 30px;"&gt;&lt;SPAN&gt;111.111.251.26/24 via eth0 (scopelocal)&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; padding-left: 30px;"&gt;111.111.74.0/24 connected to eth1&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; padding-left: 30px;"&gt;default&amp;nbsp;via 111.111.251.25 (not via eth0)&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;And don't forget to save config.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2018 07:55:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8030#M408</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-03-27T07:55:40Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Different Subnet Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8031#M409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the suggestions, I'll give them a try! I'm also going to try a fresh install of management server and gateways without importing the R77 export just to see if it makes a difference. Though the firewall/routing work fine with the rules imported and just a single gateway without clustering. My biggest issue is that I can't test this during business hours and have so little time to play with when I make the switch for testing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't seem to set the 111.111.251.26/24 gateway, it only allows a /31 or /32 otherwise the GUI and clish complain that the subnet doesn't match the IP. &lt;/P&gt;&lt;P&gt;"IPv4 unicast netmask check fails: Host bits are not set to zero in 111.111.251.26/24"&lt;/P&gt;&lt;P&gt;If I try without specifying a subnet in clish it asks for a "valid IPv4 address/netmask pair".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried 111.111.251.0/24 (local) and the routing didn't work but I wasn't able to get it to work again after the failover test. I also have to set 111.111.74.0/24 as a scopelocal or it stops routing traffic internally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When it did work for a short time, I had the following routes on the gateway. I wrote these down when I thought I could always go back if I made any changes but they didn't work again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default 111.111.251.25 eth0&lt;/P&gt;&lt;P&gt;111.111.74.0/24&amp;nbsp;&amp;nbsp; eth1 scopelocal&lt;/P&gt;&lt;P&gt;111.111.251.26/31 eth0 scopelocal&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the current R77 ClusterXL that's working I'm seeing the following route:&lt;/P&gt;&lt;P&gt;Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Gateway&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Genmask&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;111.111.251.24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.248&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I'm unable to add that manually to the cluster gateways. This route shows up in the R80 non-clustered gateway automatically when I set the IP's through the installation process.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for taking the time to help!!! &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2018 19:46:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8031#M409</guid>
      <dc:creator>Alex_Birkovsky</dc:creator>
      <dc:date>2018-03-27T19:46:53Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Different Subnet Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8032#M410</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just added the route from the old firewall scopelocal and it worked. Now just have to try it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set static-route 111.111.251.24/29 nexthop gateay logical eth0 on&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2018 19:53:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8032#M410</guid>
      <dc:creator>Alex_Birkovsky</dc:creator>
      <dc:date>2018-03-27T19:53:37Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Different Subnet Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8033#M411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In my previous comment I wrote:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P style="border: 0px;"&gt;As I understand, you should have the following routes for it to work (on both nodes of the cluster, of course):&lt;/P&gt;&lt;P style="border: 0px; padding: 0px 0px 0px 30px;"&gt;&lt;SPAN style="border: 0px; font-weight: inherit;"&gt;111.111.251.26/24 via eth0 (scopelocal)&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;and in the SK it is said:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P style="color: #333333; border: 0px; margin: 0px; padding: 0px;"&gt;Set the&lt;SPAN style="border: 0px; font-weight: inherit; margin: 0px; padding: 0px;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM style="border: 0px; font-weight: inherit; margin: 0px; padding: 0px;"&gt;&lt;STRONG style="border: 0px; font-weight: bold; margin: 0px; padding: 0px;"&gt;scopelocal&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN style="border: 0px; font-weight: inherit; margin: 0px; padding: 0px;"&gt;&amp;nbsp;&lt;/SPAN&gt;attribute on the new static route for &lt;SPAN style="font-size: 15px; color: #ff6600;"&gt;&lt;STRONG&gt;the cluster network&lt;/STRONG&gt;&lt;/SPAN&gt; via member's interface:&lt;/P&gt;&lt;P style="color: #333333; border: 0px; margin: 0px; padding: 0px;"&gt;Note: Currently setting this attribute is supported only via Clish.&lt;/P&gt;&lt;P style="color: #333333; border: 0px; margin: 0px; padding: 0px;"&gt;&lt;STRONG style="border: 0px; font-weight: bold; margin: 0px; padding: 0px;"&gt;&lt;CODE style="border: 0px; font-weight: inherit; margin: 0px; padding: 0px;"&gt;HostName:0&amp;gt; set static-route &lt;SPAN style="color: #ff6600;"&gt;172.16.6.0/24&lt;/SPAN&gt; scopelocal on&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;and the error in your case says:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;"IPv4 unicast netmask check fails: Host bits are not set to zero in 111.111.251.26/24"&lt;/SPAN&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;So, it seems like there must be a proper network address throught this scopelocal route. I strongly recommend to use the same mask on the extetrnal interface, in cluster object settings in policy, and in the scopelocal route.&lt;/P&gt;&lt;P&gt;My mistake when copying or just not carefully checking. I don't have a possibility to test it for now. But you can try the same on virtual machines before switching production devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the same time you should not have any reason to configure scopelocal route for internal interface, as I see from your explanations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you share the following information (censoring IP addresses and names):&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Screenshot of cluster topology from SmartDashboard&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: terminal, monaco, monospace; font-size: 13px;"&gt;cphaprob stat&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: terminal, monaco, monospace; font-size: 13px;"&gt;cphaprob -a if&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;Routing and interfaces settings from &lt;SPAN style="font-family: terminal, monaco, monospace; font-size: 13px;"&gt;show configuration&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: terminal, monaco, monospace; font-size: 13px;"&gt;route -n&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;Part of &lt;SPAN style="font-family: terminal, monaco, monospace; font-size: 13px;"&gt;cat /etc/routed.conf&lt;/SPAN&gt; with your static routes&lt;/LI&gt;&lt;LI&gt;Can you ping external gateway and internal host from the active gateway of the cluster?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, from the SK:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;H3 style="color: #333333; background-color: #ffffff; font-weight: bold; font-size: 16px;"&gt;(2) Procedure&lt;/H3&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;There are two major steps required in order for ClusterXL to function correctly with cluster IPs on different subnets:&lt;/P&gt;&lt;OL style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;LI&gt;&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;first&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;step is to create static routes on each cluster member, which determine the interface connected to the cluster's network (the subnet, to which the cluster IP belongs). Unless these entries are created, the OS cannot route packets to the cluster's network. No additional configuration is required for the cluster members. It is, however, important to note that the unique IP addresses given to the members must share common subnets on each "side" of the cluster (meaning, each interface on each machine must have an interface on every other machine using the same subnet).&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Configuring the static route is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;not&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;needed in these cases:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;On&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;SecurePlatform OS&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Security Gateway with&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;enabled&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Advanced Dynamic Routing (GateD daemon will add the route to cluster VIP network when the member's interface comes up).&lt;/LI&gt;&lt;LI&gt;On&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Gaia OS&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Security Gateway&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;in VSX mode&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(this is done automatically when configuring routes in SmartDashboard).&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;second&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;step relates to the configuration of the cluster topology (followed by the policy installation). Here, the cluster IP addresses are determined, and associated with the interfaces of the cluster members (each member must have an interface responding to each cluster IP address). Normally, cluster IP addresses are associated with an interface based on a common subnet. In this case, these subnets are&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;not&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;the same. It must be explicitly specified, which member subnet is associated with the cluster IP address.&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/BLOCKQUOTE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2018 20:31:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8033#M411</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-03-27T20:31:14Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Different Subnet Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8034#M412</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What I still do not understand is when you do have a /29, why do you need this trick? Are there other hosts in this network that you cannot move anywhere else?&lt;/P&gt;&lt;P&gt;A /29 has 6 available addresses 3 for the FW's and 1 or for your routers, so I really don't understand.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2018 20:41:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8034#M412</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-03-27T20:41:23Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Different Subnet Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8035#M413</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Got it working! (: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Aleksei, I set the settings like you recommended. Removed the "eth0" from the default route 111.111.251.25, removed "scopelocal" from 111.111.74.0/24 and added scopelocal on the external 111.111.251.24/29. Failed over a few times between gateways and everything worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The one thing that I did notice and did differently to every other time I've tried this was a reboot after route changes. Changing the default route without a reboot sometimes broke the local network responses from the gateways. Not sure why it would do that but it's definitely something I noticed on multiple occasions while testing and was quite confusing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maarten, the reason I'm using /29 is because that's the configuration I was given twelve years ago for the netmask on the firewall gateway. I think they allocated more IP's for me in case I needed them. Perhaps I could have just requested another IP for the gateway and have the upstream guys configure the rest instead of messing with this but when it worked last time I just let it run.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2018 01:26:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8035#M413</guid>
      <dc:creator>Alex_Birkovsky</dc:creator>
      <dc:date>2018-03-28T01:26:03Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL Different Subnet Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8036#M414</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hiii &lt;A href="https://community.checkpoint.com/migrated-users/56838"&gt;Alex Birkovsky&lt;/A&gt;‌&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please explain&amp;nbsp;in details.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I see on your last update that you removed the "eth0" interface which is your external interface so what is the default gateway now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You remove the scope local&amp;nbsp;for the internal interface&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;111.111.74.0/24 that is OK.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;#Chinmaya Naik&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 13:31:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-Different-Subnet-Configuration/m-p/8036#M414</guid>
      <dc:creator>Chinmaya_Naik</dc:creator>
      <dc:date>2019-02-21T13:31:16Z</dc:date>
    </item>
  </channel>
</rss>

