<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cluster failover in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-failover/m-p/239024#M46385</link>
    <description>&lt;P&gt;VMAC is a good option here as posted before. Easy to enable / disable no config required&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 19 Jan 2025 12:35:14 GMT</pubDate>
    <dc:creator>Lesley</dc:creator>
    <dc:date>2025-01-19T12:35:14Z</dc:date>
    <item>
      <title>Cluster failover</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-failover/m-p/239003#M46371</link>
      <description>&lt;P&gt;Having a problem with failover between a pair of 5800 gateways, setup in the same way as other customers so I'm at a loss as to why this is happening.&lt;/P&gt;&lt;P&gt;So, each gateway has a single connection WAN port connected to a Cisco switch. There's no fancy config on the switch. The ISP router is also connected to the switch providing the connection to the internet.&lt;/P&gt;&lt;P&gt;When you fail over the gateways, all outbound traffic is fine but anything incoming fails (eg remote access, web portals etc).&lt;/P&gt;&lt;P&gt;I've traced this to what I believe is an arp issue as the ISP router has the MAC address of the primary gateway, and the arp entries have a 4 hour TTL, that the ISP won't change.&lt;/P&gt;&lt;P&gt;In the advanced settings for the cluster there is a tick box to use virtual MAC, which I thought was ticked by default but in this site it's not. I know this site started out as a single gateway and was upgraded to a cluster quite some time ago (before we were involved) so I wondered if it was something that was legacy and not set during the upgrade back then. So I checked a couple of other customers with similar configurations, where I know for sure that the failover works perfectly and instantaneously, but they also have the use virtual MAC box unticked, so this must be the default setting.&lt;/P&gt;&lt;P&gt;So now I'm at a loss as to what the root cause of this issue is. I'm thinking that possibly the ISP router is outdated plus the 4 hour TTL, could well be the issue, and setting the option to use virtual MAC would be the best way forward.&lt;/P&gt;&lt;P&gt;Has anyone else encountered this type of issue?&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jan 2025 00:43:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-failover/m-p/239003#M46371</guid>
      <dc:creator>StevePearson</dc:creator>
      <dc:date>2025-01-19T00:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster failover</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-failover/m-p/239005#M46373</link>
      <description>&lt;P&gt;VMAC is not default but worth trying based on what you've described.&lt;/P&gt;
&lt;P&gt;If it wasn't for the stale mac-observation i'd also be checking route next-hops &amp;amp; port-fast settings.&lt;/P&gt;
&lt;P&gt;Which version/JHF are involved?&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jan 2025 01:08:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-failover/m-p/239005#M46373</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-01-19T01:08:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster failover</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-failover/m-p/239022#M46383</link>
      <description>&lt;P&gt;Hi Chris,&lt;/P&gt;&lt;P&gt;This is currently running R81.20 take 84, but the issue has been around for a while, even going back to R81.10 with take around 130, but probably earlier.&lt;/P&gt;&lt;P&gt;When you say about next hop and port fast, are you referring to the switch?&lt;/P&gt;&lt;P&gt;Thanks,&lt;SPAN&gt;Steve&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jan 2025 11:07:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-failover/m-p/239022#M46383</guid>
      <dc:creator>StevePearson</dc:creator>
      <dc:date>2025-01-19T11:07:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster failover</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-failover/m-p/239023#M46384</link>
      <description>&lt;P&gt;Yes portfast enabled on the switchports connecting the firewalls.&lt;/P&gt;
&lt;P&gt;Double check that the router is pointing route next-hops to the cluster VIP rather than the physical interface IP.&lt;/P&gt;
&lt;P&gt;But again the stale mac is a valid reason to investigate VMAC.&lt;/P&gt;
&lt;P&gt;(Likely the ISP router is ignoring G-ARP messages as a potential security risk)&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jan 2025 12:20:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-failover/m-p/239023#M46384</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-01-19T12:20:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster failover</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-failover/m-p/239024#M46385</link>
      <description>&lt;P&gt;VMAC is a good option here as posted before. Easy to enable / disable no config required&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jan 2025 12:35:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-failover/m-p/239024#M46385</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-01-19T12:35:14Z</dc:date>
    </item>
  </channel>
</rss>

