<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ElasticXL Bond/Aggregate Behavior in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ElasticXL-Bond-Aggregate-Behavior/m-p/249556#M48744</link>
    <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I’m hoping someone with experience in ElasticXL clustering can shed some light on how bonding/aggregation works in this setup.&lt;/P&gt;&lt;P&gt;Let’s say we have a two-member cluster, and each member has a bond configured on a single port (e.g., eth1) using 802.3ad (LACP). Both eth1 interfaces are then connected to a single switch, with the corresponding two switch ports also configured for LACP.&lt;/P&gt;&lt;P&gt;However, this setup is causing an error on the switch—one of the LACP ports gets disabled. I initially assumed that since the SMO for the cluster was configured to bond on eth1, it would sync across the cluster nodes, effectively creating a shared bond using both eth1 interfaces.&lt;/P&gt;&lt;P&gt;This is our first time working with cluster technology, so apologies if this is a basic question. Any clarification or insights on the correct bonding approach in this scenario would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
    <pubDate>Thu, 22 May 2025 02:14:02 GMT</pubDate>
    <dc:creator>Kit_E</dc:creator>
    <dc:date>2025-05-22T02:14:02Z</dc:date>
    <item>
      <title>ElasticXL Bond/Aggregate Behavior</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ElasticXL-Bond-Aggregate-Behavior/m-p/249556#M48744</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I’m hoping someone with experience in ElasticXL clustering can shed some light on how bonding/aggregation works in this setup.&lt;/P&gt;&lt;P&gt;Let’s say we have a two-member cluster, and each member has a bond configured on a single port (e.g., eth1) using 802.3ad (LACP). Both eth1 interfaces are then connected to a single switch, with the corresponding two switch ports also configured for LACP.&lt;/P&gt;&lt;P&gt;However, this setup is causing an error on the switch—one of the LACP ports gets disabled. I initially assumed that since the SMO for the cluster was configured to bond on eth1, it would sync across the cluster nodes, effectively creating a shared bond using both eth1 interfaces.&lt;/P&gt;&lt;P&gt;This is our first time working with cluster technology, so apologies if this is a basic question. Any clarification or insights on the correct bonding approach in this scenario would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Thu, 22 May 2025 02:14:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ElasticXL-Bond-Aggregate-Behavior/m-p/249556#M48744</guid>
      <dc:creator>Kit_E</dc:creator>
      <dc:date>2025-05-22T02:14:02Z</dc:date>
    </item>
    <item>
      <title>Re: ElasticXL Bond/Aggregate Behavior</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ElasticXL-Bond-Aggregate-Behavior/m-p/249557#M48745</link>
      <description>&lt;P&gt;The bond configuration is sync'd to each cluster member, but the bonds on each cluster member are individual bonds. So in your case, you have two separate LACP bonds with one interface in each, and your switch configuration needs to change to reflect this.&lt;/P&gt;</description>
      <pubDate>Thu, 22 May 2025 02:53:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ElasticXL-Bond-Aggregate-Behavior/m-p/249557#M48745</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2025-05-22T02:53:43Z</dc:date>
    </item>
  </channel>
</rss>

