<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic interconnection of both cluster members though Internal VLAN used for virtual switch in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/interconnection-of-both-cluster-members-though-Internal-VLAN/m-p/227268#M43701</link>
    <description>&lt;P&gt;Hello, I have one doubt about VSX and the internal VLAN used on Virtual Switches for interconnecting VSX clusters: I thought it only need to exist inside the virtual system, but taking into account that it is monitored by CCP:&lt;/P&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_VSX_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_VSX_AdminGuide/150950" target="_blank"&gt;https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_VSX_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_VSX_AdminGuide/150950&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I suppose CCP packets are being send from one appliance to the other also for this internal VLAN and, in this case, we need to connect by some way (by physical wire or physical switch) this VLAN on one of the appliance with this same vlan in the oher appliance. could someone please confirm this?&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;</description>
    <pubDate>Thu, 19 Sep 2024 16:33:49 GMT</pubDate>
    <dc:creator>Diego_dg</dc:creator>
    <dc:date>2024-09-19T16:33:49Z</dc:date>
    <item>
      <title>interconnection of both cluster members though Internal VLAN used for virtual switch</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/interconnection-of-both-cluster-members-though-Internal-VLAN/m-p/227268#M43701</link>
      <description>&lt;P&gt;Hello, I have one doubt about VSX and the internal VLAN used on Virtual Switches for interconnecting VSX clusters: I thought it only need to exist inside the virtual system, but taking into account that it is monitored by CCP:&lt;/P&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_VSX_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_VSX_AdminGuide/150950" target="_blank"&gt;https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_VSX_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_VSX_AdminGuide/150950&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I suppose CCP packets are being send from one appliance to the other also for this internal VLAN and, in this case, we need to connect by some way (by physical wire or physical switch) this VLAN on one of the appliance with this same vlan in the oher appliance. could someone please confirm this?&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2024 16:33:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/interconnection-of-both-cluster-members-though-Internal-VLAN/m-p/227268#M43701</guid>
      <dc:creator>Diego_dg</dc:creator>
      <dc:date>2024-09-19T16:33:49Z</dc:date>
    </item>
    <item>
      <title>Re: interconnection of both cluster members though Internal VLAN used for virtual switch</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/interconnection-of-both-cluster-members-though-Internal-VLAN/m-p/227301#M43706</link>
      <description>&lt;P&gt;Individual Virtual Systems can be active on different cluster members so for communication via a vswitch to work between VS the vlan needs to be present in the adjacent network fabric, sync interfaces aren't used for this traffic flow.&lt;/P&gt;
&lt;P&gt;Are you certain you need a virtual switch in your scenario, over the journey we've seen many deployments that have had unnecessary virtual routers or virtual switches.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2024 23:49:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/interconnection-of-both-cluster-members-though-Internal-VLAN/m-p/227301#M43706</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-09-19T23:49:35Z</dc:date>
    </item>
    <item>
      <title>Re: interconnection of both cluster members though Internal VLAN used for virtual switch</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/interconnection-of-both-cluster-members-though-Internal-VLAN/m-p/227321#M43717</link>
      <description>&lt;P&gt;Thanks, for your help, we will review our scenario according to you recomendations. We configured the virtual switches without configuring the VLAN on the adjacent network fabric and everyting works but the clusters are in state Active Attention/DOWN because CCP packets are not received on the warp interfaces, so I think this is the expected behaviour if the VLAN is not present on the&amp;nbsp;&lt;SPAN&gt;adjacent network fabric, we will fix this as suggested. Thanks!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 05:37:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/interconnection-of-both-cluster-members-though-Internal-VLAN/m-p/227321#M43717</guid>
      <dc:creator>Diego_dg</dc:creator>
      <dc:date>2024-09-20T05:37:20Z</dc:date>
    </item>
  </channel>
</rss>

