<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IS-IS protocol in FW CP. in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IS-IS-protocol-in-FW-CP/m-p/244518#M47589</link>
    <description>&lt;P&gt;Hm, thats a bit tricky, since IS-IS does not use specific port number/protocol, so might be little tough to do any captures to discover if fw is dropping it. If you check the logs when you are testing it, do you see anything at all?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Sun, 23 Mar 2025 17:20:21 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-03-23T17:20:21Z</dc:date>
    <item>
      <title>IS-IS protocol in FW CP.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IS-IS-protocol-in-FW-CP/m-p/244504#M47588</link>
      <description>&lt;P&gt;Hello, Mates.&lt;/P&gt;
&lt;P&gt;I have a problem with a FW CP which is working in bridge mode with 2 of its interfaces. I currently have 2 Routers.&lt;/P&gt;
&lt;P&gt;R1 - - -- - R2&lt;/P&gt;
&lt;P&gt;These 2 Routers are working with IS-IS and BGP. The problem is that when you put the FW in the middle, something like this:&lt;/P&gt;
&lt;P&gt;R1 - - - - FW CP L2 - - -- - R2&lt;/P&gt;
&lt;P&gt;IS-IS and BGP adjacency is dropping as well. I have a free policy to avoid drops, but still the session of these protocols is not up, and everything indicates that it is the CP, because the only thing I can do is a Rollback to get it working again.&lt;/P&gt;
&lt;P&gt;Is there any way to confirm if the CP is voting IS IS sessions? I have used TCPdump, FW Ctl Zdebug, but I can't see anything relevant. Is it possible to filter the IS-IS or related traffic in some traffic capture?&lt;/P&gt;
&lt;P&gt;Maybe concentrating on the interfaces which are part of the flow like Eth1-1 and Eth1-2?&lt;/P&gt;
&lt;P&gt;Thanks for your comments.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Mar 2025 15:27:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IS-IS-protocol-in-FW-CP/m-p/244504#M47588</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-23T15:27:44Z</dc:date>
    </item>
    <item>
      <title>Re: IS-IS protocol in FW CP.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IS-IS-protocol-in-FW-CP/m-p/244518#M47589</link>
      <description>&lt;P&gt;Hm, thats a bit tricky, since IS-IS does not use specific port number/protocol, so might be little tough to do any captures to discover if fw is dropping it. If you check the logs when you are testing it, do you see anything at all?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 23 Mar 2025 17:20:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IS-IS-protocol-in-FW-CP/m-p/244518#M47589</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-23T17:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: IS-IS protocol in FW CP.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IS-IS-protocol-in-FW-CP/m-p/244522#M47590</link>
      <description>&lt;P&gt;Buddy.&lt;/P&gt;
&lt;P&gt;Unfortunately I have not been able to capture something ‘important’ at the moment when the CP is in the middle, for the same reason that the commands did not show me relevant data.&lt;/P&gt;
&lt;P&gt;For example, the zdebug did not show me anything, the tcpdump did not show me anything either, something quite strange.&lt;/P&gt;
&lt;P&gt;Now the SmartConsole logs do show me traffic but it is multicast traffic, and I don't understand that.&lt;/P&gt;
&lt;P&gt;R1 has IP x.x.160.161 and R2 x.x.160.162&lt;/P&gt;
&lt;P&gt;And the only thing you see in the logs is traffic from these IPs at that time of testing but the destination shows MULTICAST traffic and nothing relevant to IS-IS between both IPs.&lt;/P&gt;
&lt;P&gt;I asked ChatGPT and he sent me to capture traffic in tcpdump for a layer 2 protocol that is '0x83'&lt;/P&gt;
&lt;P&gt;I will have to try it.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 01:08:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IS-IS-protocol-in-FW-CP/m-p/244522#M47590</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-24T01:08:24Z</dc:date>
    </item>
    <item>
      <title>Re: IS-IS protocol in FW CP.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IS-IS-protocol-in-FW-CP/m-p/244523#M47591</link>
      <description>&lt;P&gt;Hm, that is indeed odd. Let me do some tests tomorrow in my lab as well.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 01:31:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IS-IS-protocol-in-FW-CP/m-p/244523#M47591</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-24T01:31:20Z</dc:date>
    </item>
    <item>
      <title>Re: IS-IS protocol in FW CP.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IS-IS-protocol-in-FW-CP/m-p/244626#M47605</link>
      <description>&lt;P&gt;Unless you've enabled and configured IS-IS routing on the gateway, I doubt we're doing anything.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 21:37:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IS-IS-protocol-in-FW-CP/m-p/244626#M47605</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-03-24T21:37:15Z</dc:date>
    </item>
    <item>
      <title>Re: IS-IS protocol in FW CP.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IS-IS-protocol-in-FW-CP/m-p/244628#M47606</link>
      <description>&lt;P&gt;See if you can run some of below commands in clish?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;R82&amp;gt; show isis&lt;BR /&gt;database - Show the contents of the IS-IS link-state database&lt;BR /&gt;errors - Show IS-IS errors&lt;BR /&gt;export-routemap - Show all routemaps for IS-IS export policy&lt;BR /&gt;hostnames - Show the IS-IS dynamic hostname list&lt;BR /&gt;interface - Show an IS-IS interface&lt;BR /&gt;interfaces - Show all IS-IS interfaces&lt;BR /&gt;ipv6 - Show IS-IS IPv6 multi-topology information&lt;BR /&gt;neighbor - Show an IS-IS neighbor&lt;BR /&gt;neighbors - Show all IS-IS neighbors&lt;BR /&gt;packets - Show IS-IS packets sent / received&lt;BR /&gt;summary - Show a brief summary of IS-IS running state&lt;BR /&gt;topology - Show IS-IS paths to other intermediate systems&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 21:40:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IS-IS-protocol-in-FW-CP/m-p/244628#M47606</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-24T21:40:08Z</dc:date>
    </item>
    <item>
      <title>Re: IS-IS protocol in FW CP.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IS-IS-protocol-in-FW-CP/m-p/244633#M47609</link>
      <description>&lt;P&gt;We are only supposed to be working the CP as L2.&lt;BR /&gt;It has only 2 interfaces in bridge mode, 1 of them goes to R1 and the other to R2.&lt;BR /&gt;So, it does not make sense that when we put the device it is downloading the IS-IS session if it is acting as a L2.&lt;BR /&gt;It does not make sense to me.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 22:12:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IS-IS-protocol-in-FW-CP/m-p/244633#M47609</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-24T22:12:08Z</dc:date>
    </item>
    <item>
      <title>Re: IS-IS protocol in FW CP.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IS-IS-protocol-in-FW-CP/m-p/244638#M47613</link>
      <description>&lt;P&gt;Hey bro,&lt;/P&gt;
&lt;P&gt;So, if thats the case, fw itself would not be doing any IS-IS traffic, it would be more of a "pass-through", for the lack of better term. Just run those commands I sent before from clish and send them over.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 23:22:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IS-IS-protocol-in-FW-CP/m-p/244638#M47613</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-24T23:22:07Z</dc:date>
    </item>
  </channel>
</rss>

