<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS traffic seen over SYNC interface with dummy MAC addresses? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234088#M45348</link>
    <description>&lt;P&gt;hahaha, I feel your "pain" lol&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Thu, 28 Nov 2024 17:09:46 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2024-11-28T17:09:46Z</dc:date>
    <item>
      <title>DNS traffic seen over SYNC interface with dummy MAC addresses?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234077#M45341</link>
      <description>&lt;P&gt;Hello Team,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;iam totally stunned.&lt;BR /&gt;did anybody ever did a tcpdump on the SYNC interface?&lt;/P&gt;
&lt;P&gt;today we had an outage of DHCP ... and saw this:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;15:39:35.025896&lt;/STRONG&gt; &lt;STRONG&gt;LANX1 Out&lt;/STRONG&gt; ifindex 4 &lt;STRONG&gt;00:1c:7f:b8:08:a7&lt;/STRONG&gt; ethertype IPv4 (0x0800), length 375: 10.10.227.253.67 &amp;gt; 255.255.255.255.68: BOOTP/DHCP, Reply, length 327&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;15:39:35.02594&lt;/STRONG&gt;2&lt;STRONG&gt; LANX2 In&lt;/STRONG&gt;&amp;nbsp; ifindex 5 &lt;STRONG&gt;02:0b:0c:00:00:01&lt;/STRONG&gt; ethertype IPv4 (0x0800), length 375: 10.10.227.253.67 &amp;gt; 255.255.255.255.68: BOOTP/DHCP, Reply, length 327&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;00:1c:7f:b8:08:a7 &lt;/STRONG&gt;is my lovely Appliance (Quantum Spark 1900, R81.10.15)&lt;STRONG&gt;&lt;BR /&gt;10.10.227.253.67 &amp;gt; 255.255.255.255.68&lt;/STRONG&gt; my DHCP reply as i would expect it&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;but what is&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;02:0b:0c:00:00:01 &lt;/STRONG&gt;and it sends with the IP of my FW???&lt;BR /&gt;&lt;BR /&gt;people had severe DHCP issues, no lease optained a ton of "Local Adress Spoofing" logs&lt;BR /&gt;&lt;BR /&gt;Suddenly it got better, noi idea why&lt;BR /&gt;&lt;BR /&gt;i searched for this MAC and made a tcpdump on all my inteface to find it ... and here it is .. on the SYNC!&lt;BR /&gt;&lt;BR /&gt;[Expert@NWATKOEFIRE01]# tcpdump -penni LAN18 not 8116&lt;BR /&gt;tcpdump: can't parse filter expression: syntax error&lt;BR /&gt;[Expert@XXXXX]# tcpdump -penni LAN18 not port 8116&lt;BR /&gt;tcpdump: verbose output suppressed, use -v[v]... for full protocol decode&lt;BR /&gt;listening on LAN18, link-type EN10MB (Ethernet), snapshot length 262144 bytes&lt;BR /&gt;17:13:52.872584 dc:68:0c:75:de:fb &amp;gt; 01:80:c2:00:00:00, 802.3, length 105: LLC, dsap STP (0x42) Individual, ssap STP (0x42) Command, ctrl 0x03: STP 802.1s, Rapid STP, CIST Flags [Learn, Forward, Agreement], length 102&lt;BR /&gt;17:13:53.063239 02:0b:0c:00:00:01 &amp;gt; 00:1c:7f:b8:08:a5, ethertype IPv4 (0x0800), length 85: 10.254.5.139.54191 &amp;gt; 10.10.2.23.53: 12243+ A? delivery.mp.microsoft.com. (43)&lt;BR /&gt;17:13:53.063259 02:0b:0c:00:00:01 &amp;gt; 00:1c:7f:b8:08:a5, ethertype IPv4 (0x0800), length 76: 10.254.5.139.54191 &amp;gt; 10.10.2.23.53: 57262+ A? appex-rf.msn.com. (34)&lt;BR /&gt;17:13:53.063273 02:0b:0c:00:00:01 &amp;gt; 00:1c:7f:b8:08:a5, ethertype IPv4 (0x0800), length 69: 10.254.5.139.54191 &amp;gt; 10.10.2.23.53: 30101+ A? aadrm.com. (27)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;i checked other FWs as well!&lt;BR /&gt;&lt;STRONG&gt;i see this on all FW´s&lt;/STRONG&gt;&amp;nbsp; (Ful GAiA R81.20, HFA8X) i have checked, non existing MAC´s are doing DNS, mostly DNS to the configured DNS Servers, with the SRC IP of the proper interface according the routing table ...&lt;BR /&gt;&lt;BR /&gt;for example:&lt;BR /&gt;&lt;BR /&gt;16:50:50.451160 &lt;STRONG&gt;02:0b:02:00:00:01&lt;/STRONG&gt; &amp;gt; 00:1c:7f:a1:b2:82, ethertype IPv4 (0x0800), length 74: 10.254.4.99.41885 &amp;gt; 10.10.1.22.53: 1547+ A? checkpoint.com. (32)&lt;BR /&gt;16:50:50.451186 02:0b:02:00:00:01 &amp;gt; 00:1c:7f:a1:b2:82, ethertype IPv4 (0x0800), length 74: 10.254.4.99.57458 &amp;gt; 10.10.1.23.53: 1547+ A? checkpoint.com. (32)&lt;BR /&gt;&lt;BR /&gt;could somebody enlighten me?&lt;BR /&gt;thank you!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 16:17:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234077#M45341</guid>
      <dc:creator>Thomas_Eichelbu</dc:creator>
      <dc:date>2024-11-28T16:17:24Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic seen over SYNC interface with dummy MAC addresses?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234078#M45342</link>
      <description>&lt;P&gt;Hm...that is odd. I just tested in the lab and when I initiate traffic on windows 11 PC behind my cluster, dont see any of this. Below is all I get.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;[Expert@CP-FW-01:0]# tcpdump -enni eth3 not port 8116&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on eth3, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;11:27:27.901405 e8:1c:ba:4e:89:87 &amp;gt; ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 172.16.10.69 tell 172.16.10.1, length 46&lt;BR /&gt;11:27:28.901550 e8:1c:ba:4e:89:87 &amp;gt; ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 172.16.10.69 tell 172.16.10.1, length 46&lt;BR /&gt;11:27:28.938840 8c:85:c1:a6:23:31 &amp;gt; 01:80:c2:00:00:00, 802.3, length 105: LLC, dsap STP (0x42) Individual, ssap STP (0x42) Command, ctrl 0x03: STP 802.1s, Rapid STP, CIST Flags [Learn, Forward, Agreement], length 102&lt;BR /&gt;11:27:28.981573 e8:1c:ba:4e:89:87 &amp;gt; ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 172.16.10.21 tell 172.16.10.1, length 46&lt;BR /&gt;11:27:29.216280 ac:71:2e:70:39:c9 &amp;gt; ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 172.16.10.69 tell 172.16.10.68, length 46&lt;BR /&gt;^C&lt;BR /&gt;5 packets captured&lt;BR /&gt;5 packets received by filter&lt;BR /&gt;0 packets dropped by kernel&lt;BR /&gt;[Expert@CP-FW-01:0]#&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 16:31:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234078#M45342</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-28T16:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic seen over SYNC interface with dummy MAC addresses?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234080#M45343</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/24246"&gt;@Thomas_Eichelbu&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FWIW, not sure if this might be related, but this is how I always set it up in topology for the sync.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28586i4F90BF3FEB5C7BF5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 16:33:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234080#M45343</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-28T16:33:59Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic seen over SYNC interface with dummy MAC addresses?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234081#M45344</link>
      <description>&lt;P&gt;Hello&lt;BR /&gt;&lt;BR /&gt;This is exactly what all my customers ask, "Are we the only one with this problem?"&lt;BR /&gt;i just say,&amp;nbsp; Yes you are.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 16:34:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234081#M45344</guid>
      <dc:creator>Thomas_Eichelbu</dc:creator>
      <dc:date>2024-11-28T16:34:34Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic seen over SYNC interface with dummy MAC addresses?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234083#M45345</link>
      <description>&lt;P&gt;ok ok, why defined by routing table, i do&amp;nbsp;&lt;/P&gt;
&lt;P&gt;+ if its not a transfer link, nor any other Anti Spoofing groups etc.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Leads to This Network (Internal)&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Sync.PNG" style="width: 442px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28587iC67B2F1B385F1BC5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Sync.PNG" alt="Sync.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 16:37:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234083#M45345</guid>
      <dc:creator>Thomas_Eichelbu</dc:creator>
      <dc:date>2024-11-28T16:37:23Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic seen over SYNC interface with dummy MAC addresses?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234084#M45346</link>
      <description>&lt;P&gt;Ahhh maybe its this:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Traffic from the Standby member to any other host goes through the SYNC interface&lt;/STRONG&gt;&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk167453" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk167453&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;it caused&amp;nbsp; so much panic ..&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 16:45:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234084#M45346</guid>
      <dc:creator>Thomas_Eichelbu</dc:creator>
      <dc:date>2024-11-28T16:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic seen over SYNC interface with dummy MAC addresses?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234087#M45347</link>
      <description>&lt;P&gt;Yea, that should work as well, but I found with setting I have works the best.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 17:09:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234087#M45347</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-28T17:09:27Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic seen over SYNC interface with dummy MAC addresses?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234088#M45348</link>
      <description>&lt;P&gt;hahaha, I feel your "pain" lol&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 17:09:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234088#M45348</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-28T17:09:46Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic seen over SYNC interface with dummy MAC addresses?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234089#M45349</link>
      <description>&lt;P&gt;I found that same sk before, but forgot to send.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 17:10:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234089#M45349</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-28T17:10:04Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic seen over SYNC interface with dummy MAC addresses?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234108#M45353</link>
      <description>&lt;P&gt;Are you sure MAC of SYNC interface is really&amp;nbsp;&lt;STRONG&gt;02:0b:0c:00:00:01&amp;nbsp;&lt;/STRONG&gt;? Looks very strange, maybe you have enabled Virtual MAC (VMAC) feature ?&lt;/P&gt;
&lt;P&gt;EDIT: Looks like that "unknown" MAC is forwarding MAC from standby member. Have a look on &lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Unknown-MAC-address-used-by-Standby-node-in-Cluster/td-p/166994" target="_blank" rel="noopener"&gt;this thread&lt;/A&gt;. Not documented at all...&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 20:36:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234108#M45353</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2024-11-28T20:36:26Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic seen over SYNC interface with dummy MAC addresses?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234112#M45354</link>
      <description>&lt;P&gt;Great point!&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 00:17:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234112#M45354</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-29T00:17:17Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic seen over SYNC interface with dummy MAC addresses?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234154#M45358</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;yes valid question, but no, &lt;STRONG&gt;no VMAC enabled&lt;/STRONG&gt;.&lt;BR /&gt;but yes the Standby Member sends his self originating traffic though the Active Member. Thats really a nice gesture &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;let me dive into your linked thread ...&amp;nbsp;&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Unknown-MAC-address-used-by-Standby-node-in-Cluster/td-p/166994" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Security-Gateways/Unknown-MAC-address-used-by-Standby-node-in-Cluster/td-p/166994&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;it just caused a lot of headache, the customer is highly unrelaxed .. .&lt;BR /&gt;&lt;BR /&gt;Also it doesnt explain why DHCP did stop suddenly, and worked again after a cluster fail over.&lt;BR /&gt;And i see permanent drops for Local Address Spoofing&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;@@;206019184;[cpu_3];[fw4_3];fw_log_drop_ex: Packet proto=17 10.10.227.253:67 -&amp;gt; 255.255.255.255:68 dropped by fw_local_anti_spoofing Reason: local interface spoof&lt;BR /&gt;&lt;BR /&gt;also interesting, but my MAC is different, ok Quantum Spark. On Full GAiA its&amp;nbsp;00:01:00:00:fd:01&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;STRONG&gt;"Returning traffic from the active to the standby uses the MAC address 00:01:00:00:fd:01 or 00:01:00:00:fd:00"&lt;/STRONG&gt;&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk178664" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk178664&lt;/A&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 09:28:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234154#M45358</guid>
      <dc:creator>Thomas_Eichelbu</dc:creator>
      <dc:date>2024-11-29T09:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic seen over SYNC interface with dummy MAC addresses?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234170#M45360</link>
      <description>&lt;P&gt;Speaking of VMAC, Im curious what you guys think about it. I always get mixed results/answers and it all depends who you ask, if you will.&lt;/P&gt;
&lt;P&gt;I mean, to me, logically, it all depends of type of switch used, but I had seen issues where enabling it can cause lots of issues.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_ClusterXL_AdminGuide/Topics-CXLG/Configuring-Virtual-MAC.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_ClusterXL_AdminGuide/Topics-CXLG/Configuring-Virtual-MAC.htm&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 11:58:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234170#M45360</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-29T11:58:49Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic seen over SYNC interface with dummy MAC addresses?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234171#M45361</link>
      <description>&lt;P&gt;Below link explains it well though...&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/VMAC-disadvantages/td-p/109171" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/VMAC-disadvantages/td-p/109171&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 12:02:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-seen-over-SYNC-interface-with-dummy-MAC-addresses/m-p/234171#M45361</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-29T12:02:22Z</dc:date>
    </item>
  </channel>
</rss>

