<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User Poll: Experience with VSX machines and R81.20 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230695#M44404</link>
    <description>&lt;P&gt;Hey Jan,&lt;/P&gt;
&lt;P&gt;We have the exact same experience - many times wondering why we are the first to get hit by this 'new issue'.&lt;/P&gt;
&lt;P&gt;We have a very large environment based on many Lenovo Open Servers all running VSX.&lt;/P&gt;
&lt;P&gt;Some issues we have seen - not all VSX specific;&lt;/P&gt;
&lt;P&gt;- corexl dynamic balancing causing spontaneous reboots on appliance&lt;/P&gt;
&lt;P&gt;- high load on large VSX clusters (sk181891)&lt;/P&gt;
&lt;P&gt;- CPD using 100% cpu on gateways, destroying SIC, blocking any policy install (lasted for 3-4 months before a fix)&lt;/P&gt;
&lt;P&gt;- changing funny ip range to a /20 causing all VS to lose ip addresses - that was a fun night &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;- very very long reboot times (better now in the newer jumbos)&lt;/P&gt;
&lt;P&gt;- deleting an interface in SMC causes *another* interface to be deleted.&lt;/P&gt;
&lt;P&gt;- installing policy causing high load with packet loss on VS (until another policy push is done)&lt;/P&gt;
&lt;P&gt;- FEC causing interfaces not coming online&lt;/P&gt;
&lt;P&gt;- VPNs stops working if passing another VS with securexl enabled.&lt;/P&gt;
&lt;P&gt;- deleting (non monitored) vlans causing failovers&lt;/P&gt;
&lt;P&gt;- Hit counter not returning correct values.&lt;/P&gt;
&lt;P&gt;- running cpinfo causing reboots&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some issues mentioned was never seen again, some were folded into JHF, others we have private fixes for having continously portfixed to newer JHFs for I do not know how long and lastly some items we no longer perform - ie changing VSX Private IP range, we rather spin up a new VS or buy a new cluster than risking a full cluster down.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All of the above have in general eroded a lot of trust in the platform across the organisation.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/Henrik&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 24 Oct 2024 11:24:09 GMT</pubDate>
    <dc:creator>Henrik_Noerr1</dc:creator>
    <dc:date>2024-10-24T11:24:09Z</dc:date>
    <item>
      <title>User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230538#M44354</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;We are running 2 VSX clusters under R81.20 on Checkpoint Applications (originally 15600/23800, now 19200). One of them with almost all blades on, the other one only FW,IPS,IA,VPN. We actually have new problems with every single JHF. Sometimes VPN no longer works properly, sometimes there are problems with HTTPS inspection, sometimes clustering no longer works correctly, sometimes packets are lost (without log entry) etc.. There have now been around 25 different cases in the last 2 years. Nearly all of them are problems which needed a hotfix.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;To the VSX users: What is your experience with VSX under R81.20? Are we the only ones who get almost every bug?&lt;/P&gt;
&lt;P&gt;Jan&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2024 06:40:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230538#M44354</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2024-10-23T06:40:06Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230594#M44365</link>
      <description>&lt;P&gt;That's certainly not the rate of VSX specific issues I'm accustomed to hearing from my customers.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For context how early did you adopt R81.20, from which JHF?&lt;/P&gt;
&lt;P&gt;Has the environment been reviewed by Check Point Professional Services at all?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2024 13:48:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230594#M44365</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-10-23T13:48:03Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230600#M44366</link>
      <description>&lt;P&gt;We started with T41&lt;/P&gt;
&lt;P&gt;Yes PS has checked the environment several times. Last time 3 weeks ago. Everything is fine.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As I mentioned, all problems have been fixed by a hotfix after a while. As anybody can see every JHF cotins a ton of bugfixes. And we seem to catch one of the problems that will be fixed later nearly in every JHF.&lt;BR /&gt;For example:&lt;/P&gt;
&lt;P&gt;PRHF-31092&lt;BR /&gt;sk182494&lt;BR /&gt;&lt;BR /&gt;At the moment we cannot install policy because every time we do it we have distortions in MS Teams communication.&amp;nbsp;&lt;BR /&gt;Because of that we updated one member to T89 bacause all debugs didn't help. In T89 we have a new problem that one VS doesn't check all vlan interfaces anymore an says that it has fever cluster interfaces. So we cannot check if T89 fixes the Teams problem.&lt;BR /&gt;The funny thing is, that the Teams policy install problem occurs on 2 VSX Clusters with different configuration. One of them only has FW/IPS enabled.&lt;BR /&gt;But these are problems we have. I wanted to start this thread to figure out if other customers or partners experience similar problem count.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Jan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2024 14:18:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230600#M44366</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2024-10-23T14:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230610#M44368</link>
      <description>&lt;P&gt;Thanks for your insights, sk182494 &amp;amp; PRHF-31092 as examples are not specific to VSX.&lt;/P&gt;
&lt;P&gt;How is the connection persistence configured for both systems as a point of interest?&lt;/P&gt;
&lt;P&gt;In some rare scenarios sk182653 might be relevant.&lt;/P&gt;
&lt;P&gt;For the cluster interface issue are there differences in fwkern.conf parameters (sk92826) between members?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2024 15:12:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230610#M44368</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-10-23T15:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230668#M44390</link>
      <description>&lt;P&gt;It have not to be VSX related but we "feel" that VSX makes problems often more complicated. Maybe we would have the same issues if all machines would be native.&lt;/P&gt;
&lt;P&gt;It's keep all connections.&amp;nbsp;&lt;SPAN&gt;sk182653&amp;nbsp;was not known. I will have an eye on it. The funny thing is, that the packet loss in the MSTeams stream starts after SmartConsole already says policy installation finished.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;There are no differences in fwkern.conf. Both machines worked till the T89. There has been a fix in T85 which has something to do with interfaces. Maybe this fix causes our issue. ( PRHF-27989 After modifying a bond, the Monitored VLANs may disappear.)&lt;BR /&gt;I already gave this clue to the supporter in our case.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks for your support.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 07:25:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230668#M44390</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2024-10-24T07:25:24Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230673#M44392</link>
      <description>&lt;P&gt;Hello Jan,&lt;BR /&gt;&lt;BR /&gt;I cannot really attest to R81.20, but we are running 5 VSX clusters on R81.10.&lt;BR /&gt;I do not think we have had as many as 25 different cases in the almost three years they have been running, but it is somewhere up there.&lt;BR /&gt;&lt;BR /&gt;Many of the issues we encountered, I remember seeing in the SKs that it was fixed for both R81.10 and R81.20.&lt;BR /&gt;&lt;BR /&gt;When you mention "sometimes VPN no longer works properly", I immediately think of&amp;nbsp;&lt;SPAN&gt;sk182648 that we were affected by quite recently, when we installed JHF 156 on one of the clusters. It would break all IKEv2 tunnels on every VS, because every phase 2 renegotiation would initially fail causing downtime. I can see from the SK that R81 through R81.20 was affected by this.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;I remember that we were about a year in on our first 3 clusters, before we came onto the first JHF that truly felt stable (think it was Take 78 or maybe 95).&lt;BR /&gt;&lt;BR /&gt;So it felt like R81.10 was maybe like 1,5 years old (or somewhere around that), before it had matured?&lt;BR /&gt;Even so we have had several cases since the first stable JHF, were we upgraded to a later JHF that contained bugs that needed a hotfix.&lt;BR /&gt;&lt;BR /&gt;Unfortunately it has become quite regular for us to have to uninstall a custom hotfix every time we deploy a new JHF, because we almost always have custom hotfixes installed.&lt;BR /&gt;&lt;BR /&gt;Once TAC even had to create a custom hotfix that would integrate with another hotfix we already had installed, because a JHF introduced multiple bugs that were business-breaking for us.&lt;BR /&gt;&lt;BR /&gt;I don't remember many exact cases where only VSX was affected though - most of the issues were for all Quantum Gateways.&lt;BR /&gt;&lt;BR /&gt;I don't know though - to us it seems like people who run VSX are just more affected by bugs? In all fairness though, it may just be the fact that we sometime service larger environments, because we run many VS as opposed to single GWs.&lt;BR /&gt;&lt;BR /&gt;We are actually looking to upgrade to R81.20, due to the EOS of R81.10 in the summer of 2025, so your insights on R81.20 are greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 08:29:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230673#M44392</guid>
      <dc:creator>VSX_Bernie</dc:creator>
      <dc:date>2024-10-24T08:29:03Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230677#M44395</link>
      <description>&lt;P&gt;From my experience, the industry as a whole struggles more with bugs and quality assurance, than before. I don't think there is an easy answer to why it has become like this, but one thing to keep in mind is how fast everything is moving these days compared to just a few years ago. And its not only the vendors fault, as everything surrounding the firewall is also constantly moving and evolving. Suddenly Microsoft releases a Windows Server patch with some RADIUS hardening, causing firewall vendors having to release patches to ensure RADIUS traffic keeps working, etc.&lt;/P&gt;
&lt;P&gt;Just take a look at the Palo Alto and Fortinet communities. People telling to stay far away from PanOS 11.x.x releases, stay on 10.1 originally released back in 2021. Fortinet is the same, stay far away from FortiOS 7.6.0, if you are cutting-edge you might attempt 7.4.x, but otherwise stay with 7.0.x, also originally released back in 2021.&lt;/P&gt;
&lt;P&gt;Fortinet is actively supporting three versions of FortiOS, Palo Alto is actively supporting five versions of PanOS (!), Check Point is actively supporting four versions of Gaia, soon to be three.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When it comes to VSX, things are changing quite a bit with R82 and VSnext.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 08:59:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230677#M44395</guid>
      <dc:creator>RamGuy239</dc:creator>
      <dc:date>2024-10-24T08:59:59Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230681#M44396</link>
      <description>&lt;P&gt;We had also many issues with R81.10 before. I think R81.10 and R81.20 share many code so that the issues are happening on both versions.&lt;BR /&gt;Thank you for your experience. I see that we seem to have similar problems. As our cases often take a long time to be solved we sometimes think that we are the only ones with such problems.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Jan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 09:14:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230681#M44396</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2024-10-24T09:14:24Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230682#M44397</link>
      <description>&lt;P&gt;From my experience deploying a lot of Check Point installations, R80.40, R81, R81.10 and R81.20 all share much of the same code. The difference are the new features introduced with each new version, which of course, will be specific for that version and every version coming after.&lt;/P&gt;
&lt;P&gt;If you look at the changelog for various Jumbo Hotfix Accumulator releases, you will notice they all share most of the same fixes. The same fixes will be showing up in JHF notes for R80.40, R81, R81.10 and R81.20, attesting to how they share similar code, and receive the same fixes. Which also means if fix A introduces problem B, this will most likely happen across all versions as they share such similar code. Unless the fix and the introduced bug is isolated to a feature existing only in a later version.&lt;/P&gt;
&lt;P&gt;R80.40, R81 and R81.10 all share the same kernel, and are all based on the same main Red Hat Enterprise version. There is a slight iteration with R81.20, but just a small one.&lt;/P&gt;
&lt;P&gt;R82 is a new leap in kernel version, and is based on a new main Red Hat Enterprise version.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 09:22:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230682#M44397</guid>
      <dc:creator>RamGuy239</dc:creator>
      <dc:date>2024-10-24T09:22:48Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230695#M44404</link>
      <description>&lt;P&gt;Hey Jan,&lt;/P&gt;
&lt;P&gt;We have the exact same experience - many times wondering why we are the first to get hit by this 'new issue'.&lt;/P&gt;
&lt;P&gt;We have a very large environment based on many Lenovo Open Servers all running VSX.&lt;/P&gt;
&lt;P&gt;Some issues we have seen - not all VSX specific;&lt;/P&gt;
&lt;P&gt;- corexl dynamic balancing causing spontaneous reboots on appliance&lt;/P&gt;
&lt;P&gt;- high load on large VSX clusters (sk181891)&lt;/P&gt;
&lt;P&gt;- CPD using 100% cpu on gateways, destroying SIC, blocking any policy install (lasted for 3-4 months before a fix)&lt;/P&gt;
&lt;P&gt;- changing funny ip range to a /20 causing all VS to lose ip addresses - that was a fun night &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;- very very long reboot times (better now in the newer jumbos)&lt;/P&gt;
&lt;P&gt;- deleting an interface in SMC causes *another* interface to be deleted.&lt;/P&gt;
&lt;P&gt;- installing policy causing high load with packet loss on VS (until another policy push is done)&lt;/P&gt;
&lt;P&gt;- FEC causing interfaces not coming online&lt;/P&gt;
&lt;P&gt;- VPNs stops working if passing another VS with securexl enabled.&lt;/P&gt;
&lt;P&gt;- deleting (non monitored) vlans causing failovers&lt;/P&gt;
&lt;P&gt;- Hit counter not returning correct values.&lt;/P&gt;
&lt;P&gt;- running cpinfo causing reboots&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some issues mentioned was never seen again, some were folded into JHF, others we have private fixes for having continously portfixed to newer JHFs for I do not know how long and lastly some items we no longer perform - ie changing VSX Private IP range, we rather spin up a new VS or buy a new cluster than risking a full cluster down.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All of the above have in general eroded a lot of trust in the platform across the organisation.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/Henrik&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 11:24:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230695#M44404</guid>
      <dc:creator>Henrik_Noerr1</dc:creator>
      <dc:date>2024-10-24T11:24:09Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230696#M44405</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/43255"&gt;@RamGuy239&lt;/a&gt;&amp;nbsp; - I just want to say that I am fully with you there. I also do not think that it is entirely the vendors fault. There is a high number of different circumstances causing this - but I also think a lot of it has to do with how fast things are moving. If R&amp;amp;D divisions of the vendors are forced to more frequently release updates than they would actually like, to fix different CVEs and implement important security features, then inevitably there will also be more bugs.&lt;BR /&gt;&lt;BR /&gt;Also you mentioned the RADIUS thing - just recently (i think it was the start of this month) Microsoft released a major update to Windows 11, which broke Endpoint VPN for many users:&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182749" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk182749&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;So yeah - these sort of things happen quite frequently, which must make it hard for firewall vendors to keep up.&lt;BR /&gt;&lt;BR /&gt;I concur - I have tried looking through the different versions Take notes, and it is plain to see that the same&amp;nbsp;&lt;SPAN&gt;PRHF are mentioned across the board.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21737"&gt;@Jan_Kleinhans&lt;/a&gt;&amp;nbsp; - You are most certainly welcome. We have the exact same feeling sometimes, that we are the only ones really affected with both bugs and long-drawn TAC cases. It is nice to know we are not alone in this.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 11:26:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230696#M44405</guid>
      <dc:creator>VSX_Bernie</dc:creator>
      <dc:date>2024-10-24T11:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230698#M44406</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/25808"&gt;@Henrik_Noerr1&lt;/a&gt;&amp;nbsp; - You probably already have somthing for the FEC - but just in case:&lt;BR /&gt;&lt;BR /&gt;We had the same issue when we tried to update to Take 110 of R81.10.&lt;BR /&gt;We found that the only viable solution was to change to FEC108 on the switches connecting GWs.&lt;BR /&gt;&lt;BR /&gt;We have not had issues since.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 11:32:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/230698#M44406</guid>
      <dc:creator>VSX_Bernie</dc:creator>
      <dc:date>2024-10-24T11:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/231302#M44573</link>
      <description>&lt;P&gt;Hi Henrik,&amp;nbsp;&lt;SPAN&gt;Dynamic Balancing is not supported on Open Servers, how come it causes&amp;nbsp;spontaneous reboots?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2024 22:00:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/231302#M44573</guid>
      <dc:creator>AmitShmuel</dc:creator>
      <dc:date>2024-10-30T22:00:18Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/231307#M44577</link>
      <description>&lt;P&gt;VSX was selected as "future" due to the costs / flexibility / scalability. Upper management wanted to save some money, so logical move was migrate XY physical clusters into 1 VSX box with dozens of VSs. You dont need to maintain and pay support for XY physical clusters, just one VSX cluster. Great move, you say ...&lt;/P&gt;
&lt;P&gt;Well, we regret that now. There were/are huge issues with VSX on R81.10 and R81.20. Some were integrated into JHFs after months of troubleshooting, some are still investigating and for some we got private portfixes.&lt;/P&gt;
&lt;P&gt;One of the most ridiculous issue related to VSX is that according to the Release Notes for R81.10 and R81.20, maximum supported interfaces on VSX is 4096. This is proven to be wrong and in reality the maximum supported number of interfaces on VSX is 1023. Every interface (VLAN) on VSX which has index higher than 1023 gets only funny IP and not real cluster IP.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2024 23:05:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/231307#M44577</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2024-10-30T23:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/231328#M44586</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;
&lt;P&gt;This specific issue was on an appliance (6500)&lt;/P&gt;
&lt;P&gt;/Henrik&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2024 07:29:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/231328#M44586</guid>
      <dc:creator>Henrik_Noerr1</dc:creator>
      <dc:date>2024-10-31T07:29:16Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/231357#M44591</link>
      <description>&lt;P&gt;I see. Is it still relevant? I am familiar with most past issues related to this feature and I've never heard of something like that. I'd be happy to assist if needed.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2024 12:41:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/231357#M44591</guid>
      <dc:creator>AmitShmuel</dc:creator>
      <dc:date>2024-10-31T12:41:19Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/231945#M44735</link>
      <description>&lt;P&gt;Hello Jozko,&lt;BR /&gt;&lt;BR /&gt;Regarding the amount of interfaces - did you remember to change the size of the cluster private net, after configuring the VSX cluster object?:&lt;BR /&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_VSX_AdminGuide/Topics-VSXG/CLI/vsx_util-change_private_net.htm" target="_blank"&gt;vsx_util change_private_net&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Default is a /22 - which would limit the subnet to 1024 addresses (not excluding network and broadcast).&lt;BR /&gt;When configuring a new cluster, we always change this to a /20 to accommodate for 4096 addresses.&lt;BR /&gt;&lt;BR /&gt;If you have not changed this, I believe you are being limited by the size of the subnet - not by the number of interfaces allowed.&lt;BR /&gt;&lt;BR /&gt;The statement that MAX is 4096 is correct - this is because it is a limit of the VLAN technology.&lt;BR /&gt;I do not think that VSX supports VXLAN yet - maybe it will in VSNext.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I have to say though - I never quite understood why the default would be /22, as this does not make sense to me.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2024 09:11:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/231945#M44735</guid>
      <dc:creator>VSX_Bernie</dc:creator>
      <dc:date>2024-11-07T09:11:48Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/232025#M44751</link>
      <description>&lt;P&gt;yes,&amp;nbsp; IPv4 funny subnet was changed to 192.168.96.0/20 to allow configure maximum possible VLANs per VS (256 VLANs). More info in sk99121.&lt;/P&gt;
&lt;P&gt;It doesnt matter if funny subnet is changed or not. If it is left by default as 192.168.196.0/22, you can create only 64 VLANs per VS. Other VS can have another maximum 64 VLANs. Funny IPs can be the same for 2 different VSs.&lt;/P&gt;
&lt;P&gt;To configure 4096 VLANs if IPv4 funny subnet is left by default (192.168.196.0/22), you will need to configure 62 VSs each having maximum 64 VLANs.&lt;/P&gt;
&lt;P&gt;To configure 4096 VLANs if IPv4 funny subnet is changed to 192.168.96.0/20, you will need to configure 15 VSs each having maximum 256 VLANs.&lt;/P&gt;
&lt;P&gt;Try to configure more than 1024 VLANs on VSX and you will see that VLANs with interface indexes higher than 1023 wont work (no cluster VIP).&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2024 16:47:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/232025#M44751</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2024-11-07T16:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/232054#M44757</link>
      <description>&lt;P&gt;Hello Jozko,&lt;BR /&gt;&lt;BR /&gt;Wow - this is a real eye opener - thank you for sharing this.&lt;BR /&gt;This with the 1024 interfaces is really concerning though - especially if there is no real documentation on this.&lt;BR /&gt;&lt;BR /&gt;I think that perhaps we've (thankfully) never hit the 1024 limit - because I sure did not know.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2024 07:18:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/232054#M44757</guid>
      <dc:creator>VSX_Bernie</dc:creator>
      <dc:date>2024-11-08T07:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: User Poll: Experience with VSX machines and R81.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/232056#M44758</link>
      <description>&lt;DIV&gt;Hello Jozko,&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;I just thought of something.&lt;/DIV&gt;&lt;DIV&gt;How many GWs do you have in your VSX Cluster?&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;I just gave the provided SK a read-through.&lt;/DIV&gt;&lt;DIV&gt;I have shortened the following:&lt;/DIV&gt;&lt;DIV&gt;"&lt;/DIV&gt;&lt;DIV&gt;maximal number of interfaces supported by a VSX Gateway / VSX Cluster Member is limited to 4096 interfaces&lt;/DIV&gt;&lt;DIV&gt;"&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;In my experience - some times Check Point formulates their documentation erroneously.&lt;/DIV&gt;&lt;DIV&gt;It happens to the best of us.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;So - I am just spit-balling here - what if the above is meant to say that an entire VSX Cluster is limited to 4096.&lt;/DIV&gt;&lt;DIV&gt;Meaning that 2 members would result in 2048 interfaces, and 4 members would result in 1024 interfaces.&lt;/DIV&gt;</description>
      <pubDate>Fri, 08 Nov 2024 08:32:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Poll-Experience-with-VSX-machines-and-R81-20/m-p/232056#M44758</guid>
      <dc:creator>VSX_Bernie</dc:creator>
      <dc:date>2024-11-08T08:32:07Z</dc:date>
    </item>
  </channel>
</rss>

