<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: r77.30 ospf drop hello in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4519#M71</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is 172.16.1.9 associated as the primary IP address of your gateway or cluster?&lt;/P&gt;&lt;P&gt;If not, you may need to explicitly add that to Rule 4.&lt;/P&gt;&lt;P&gt;On an unrelated topic, you named your firewall the name of the product 20 years ago &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 26 Jul 2017 16:57:37 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2017-07-26T16:57:37Z</dc:date>
    <item>
      <title>r77.30 ospf drop hello</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4518#M70</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Hi everyone&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are one cisco router, one cisco switch and checkpoint cluster in my infrastructure. Cisco router and cisco switch already established ospf neighborship and now I'm trying to establish ospf between between Catalyst 3650 and HA-Cluster R77.30. And it is not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Debug information&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;1. Catalyst sends hello to Cluster&lt;/STRONG&gt;&lt;BR /&gt;14:40:52.400: OSPF: Send hello to 224.0.0.5 area 0 on Vlan201 from &lt;STRONG&gt;&lt;EM&gt;172.16.1.9&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;14:41:01.645: OSPF: Send hello to 224.0.0.5 area 0 on Vlan201 from 172.16.1.9&lt;BR /&gt;&lt;STRONG&gt;2. Cluster receives it:&lt;/STRONG&gt;&lt;BR /&gt;[Expert@FIREWALL-1:0]# tcpdump -i eth7.201 ip proto ospf &lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on eth7.201, link-type EN10MB (Ethernet), capture size 96 bytes&lt;BR /&gt;17:31:58.572861 IP &lt;STRONG&gt;&lt;EM&gt;172.16.1.9&lt;/EM&gt;&lt;/STRONG&gt; &amp;gt; ospf-all.mcast.net: OSPFv2, Hello, length: 56&lt;BR /&gt;17:32:07.999643 IP 172.16.1.9 &amp;gt; ospf-all.mcast.net: OSPFv2, Hello, length: 56&lt;BR /&gt;&lt;STRONG&gt;3. But cluster drops this packets&lt;/STRONG&gt;&lt;BR /&gt;Log Server Origin: 192.168.10.204&lt;BR /&gt;Time: 2017-07-26T14:52:54Z&lt;BR /&gt;Interface Direction: inbound&lt;BR /&gt;Interface Name: eth7.201&lt;BR /&gt;Id Generated By Indexer:false&lt;BR /&gt;First: true&lt;BR /&gt;Sequencenum: 2147483647&lt;BR /&gt;Source Zone: Internal&lt;BR /&gt;Rule UID: 145130C7-F7D3-4628-B3EA-13B005CFA621&lt;BR /&gt;Source: &lt;STRONG&gt;&lt;EM&gt;172.16.1.9&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;Destination: 224.0.0.5&lt;BR /&gt;IP Protocol: 89&lt;BR /&gt;Access Rule Name: &lt;STRONG&gt;CLEAN-UP&lt;/STRONG&gt;&lt;BR /&gt;Access Rule Number: &lt;STRONG&gt;21&lt;/STRONG&gt;&lt;BR /&gt;Action: &lt;STRONG&gt;Drop&lt;/STRONG&gt;&lt;BR /&gt;Type: Log&lt;BR /&gt;Policy Management: MANAGEMENT-1&lt;BR /&gt;Blade: Firewall&lt;BR /&gt;Origin: FIREWALL-1&lt;BR /&gt;Service: 89&lt;BR /&gt;Product Family: Access&lt;BR /&gt;Layer Name: Firewall_layer&lt;BR /&gt;Interface: eth7.201&lt;BR /&gt;Description: ospf Traffic Dropped from 172.16.1.9 to 224.0.0.5&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image j-img-original" src="/legacyfs/online/checkpoint/57568_Screenshot from 2017-07-26 18-21-00.png" style="width: 620px; height: 27px;" /&gt;&lt;BR /&gt;&lt;STRONG&gt;4. However I have rule for allow ospf traffic with number 4 (which is upper than 21)&lt;/STRONG&gt;&lt;BR /&gt;SRC: Catalyst, Cluster&lt;BR /&gt;DST: multicast 224.0.0.5, 224.0.0.6, 224.0.0.1, Cluster&lt;BR /&gt;Service: OSPF, IGMP&lt;BR /&gt;Action: &lt;STRONG&gt;Accept&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;IMG alt="" class="image-2 jive-image j-img-original" src="/legacyfs/online/checkpoint/57569_Screenshot from 2017-07-26 18-19-57.png" style="width: 620px; height: 42px;" /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could somebody give any help? Trying to make it works more than two days.&lt;/P&gt;&lt;P&gt;Alexander&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Jul 2017 15:25:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4518#M70</guid>
      <dc:creator>Oleksandr_Mamen</dc:creator>
      <dc:date>2017-07-26T15:25:37Z</dc:date>
    </item>
    <item>
      <title>Re: r77.30 ospf drop hello</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4519#M71</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is 172.16.1.9 associated as the primary IP address of your gateway or cluster?&lt;/P&gt;&lt;P&gt;If not, you may need to explicitly add that to Rule 4.&lt;/P&gt;&lt;P&gt;On an unrelated topic, you named your firewall the name of the product 20 years ago &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Jul 2017 16:57:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4519#M71</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-07-26T16:57:37Z</dc:date>
    </item>
    <item>
      <title>Re: r77.30 ospf drop hello</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4520#M72</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, Dameon.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all I'd like to thank you for such quick response.&lt;/P&gt;&lt;P&gt;172.16.1.9 is IP-address of Catalyst Switch which tries to establish ospf neighborship by sending hello packets to CP on multicast address 224.0.0.5.&lt;/P&gt;&lt;P&gt;You can see part of debug ip ospf hello catalyst in my previous message. According to the log Catalyst send HELLO-packets with source 172.16.1.9 and destination 224.0.0.5.&lt;/P&gt;&lt;P&gt;Also I used tcpdump on CP and noticed that it receives packets from Catalyst (number 2 in my previous message).&lt;/P&gt;&lt;P&gt;Firewall rules for OSPF were added according to the guide (screenshot in previous message). But CP is dropping hello packets.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Jul 2017 19:56:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4520#M72</guid>
      <dc:creator>Oleksandr_Mamen</dc:creator>
      <dc:date>2017-07-26T19:56:02Z</dc:date>
    </item>
    <item>
      <title>Re: r77.30 ospf drop hello</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4521#M73</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This seems like a basic rule matching issue now that I look more closely at this.&lt;/P&gt;&lt;P&gt;Can you paste a screenshot of the objects used in the Destination for Rule 4 (not the Cluster object)?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Jul 2017 23:24:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4521#M73</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-07-26T23:24:26Z</dc:date>
    </item>
    <item>
      <title>Re: r77.30 ospf drop hello</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4522#M74</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dameon, screenshots of destination objects&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;1) OSPF-MULTICAST-ADDRESS (range 224.0.0.5-224.0.0.6)&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image j-img-original" src="/legacyfs/online/checkpoint/57610_Screenshot from 2017-07-27 14-24-44.png" style="width: 620px; height: 203px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) ALLSYSTEMS.MCAST.NET (224.0.0.1)&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-2 jive-image j-img-original" src="/legacyfs/online/checkpoint/57614_Screenshot from 2017-07-27 14-25-15.png" style="width: 620px; height: 189px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) C3650_1-SWITCH (172.16.1.9)&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-3 jive-image j-img-original" src="/legacyfs/online/checkpoint/57615_Screenshot from 2017-07-27 14-25-51.png" style="width: 620px; height: 148px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also there are no matches in rule 4 and traffic is dropped according to the Clean-up rule 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-4 jive-image j-img-original" src="/legacyfs/online/checkpoint/57616_Screenshot from 2017-07-27 14-37-49.png" style="width: 620px; height: 339px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Jul 2017 11:41:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4522#M74</guid>
      <dc:creator>Oleksandr_Mamen</dc:creator>
      <dc:date>2017-07-27T11:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: r77.30 ospf drop hello</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4523#M75</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a feeling using "Multicast Range" objects may be the issue, which I have to admit, I've never seen before now.&lt;/P&gt;&lt;P&gt;Try creating the multicast addresses as Host objects instead and use those in the policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Jul 2017 15:01:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4523#M75</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-07-27T15:01:49Z</dc:date>
    </item>
    <item>
      <title>Re: r77.30 ospf drop hello</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4524#M76</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;IT WORKS!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My previous post was in "MODERATING" state to long and I started testing in changing firewall rules.&lt;/P&gt;&lt;P&gt;I have added a lot of new objects to OSPF-RULE: new objects for EVERY cluster link, new objects for multicast addresses and I was very surprised when CP established ospf neighborship after adding new object to the destination field, objects type was HOST and address 224.0.0.5. And after my all-day testing I received message about your answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, thanks, you were right and issue was with object type MULTICAST-RANGE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But for what should I use that multicast-range obj?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jul 2017 06:06:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4524#M76</guid>
      <dc:creator>Oleksandr_Mamen</dc:creator>
      <dc:date>2017-07-28T06:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: r77.30 ospf drop hello</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4525#M77</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They are explained in the following sk:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk93944" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk93944"&gt;Multicast address ranges are not supported for use in the rulebase&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Basically they are used only in gateway topology, not in the rulebase.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jul 2017 06:14:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4525#M77</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-07-28T06:14:32Z</dc:date>
    </item>
    <item>
      <title>Re: r77.30 ospf drop hello</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4526#M78</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;BR /&gt;I have the same problem.&lt;BR /&gt;1.- configure ospf of area 0&lt;BR /&gt;2.- Create object for multicast address.&lt;BR /&gt;3.- create a rule in the firewall.&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62669_pastedImage_1.png" style="width: 620px; height: 55px;" /&gt;&lt;/P&gt;&lt;P&gt;4.- Install Policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration is successful. I have adjacency with ospf neighbors and I have end-to-end connectivity. But in the smart log I still see drop connections for address 224.0.0.5 in the ospf 89 service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62670_pastedImage_2.png" style="width: 620px; height: 70px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;detail of the drop connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62671_pastedImage_3.png" style="width: 620px; height: 423px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could somebody give any help?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2018 03:17:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4526#M78</guid>
      <dc:creator>Gary_Torrico1</dc:creator>
      <dc:date>2018-01-30T03:17:44Z</dc:date>
    </item>
    <item>
      <title>Re: r77.30 ospf drop hello</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4527#M79</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Refer to the following SK:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115276" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115276"&gt;How to troubleshoot "Local interface address spoofing" issues&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2018 14:51:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/r77-30-ospf-drop-hello/m-p/4527#M79</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-30T14:51:34Z</dc:date>
    </item>
  </channel>
</rss>

