<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DHCP relay via 2nd firewall not working in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DHCP-relay-via-2nd-firewall-not-working/m-p/93102#M7204</link>
    <description>&lt;P&gt;Hi Heiko,&lt;BR /&gt;&lt;BR /&gt;I did try that but the first firewall then simply ignores the broadcast and doesn't send anything on to the 2nd firewall which has the DHCP servers.&lt;/P&gt;&lt;P&gt;I understand ClusterXL DHCP relay to require policies with the new service objects that do protocol analysis...&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;David Herselman&lt;/P&gt;</description>
    <pubDate>Sun, 02 Aug 2020 19:07:03 GMT</pubDate>
    <dc:creator>David_Herselman</dc:creator>
    <dc:date>2020-08-02T19:07:03Z</dc:date>
    <item>
      <title>DHCP relay via 2nd firewall not working</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DHCP-relay-via-2nd-firewall-not-working/m-p/93084#M7197</link>
      <description>&lt;P&gt;We configured central DHCP relaying,&amp;nbsp;&lt;SPAN&gt;using new services,&amp;nbsp;&lt;/SPAN&gt;by following SK104114 and it works perfectly if we are relaying locally&amp;nbsp; (receiving DHCP broadcasts on a locally attached VLAN and sending unicast queries to the DHCP servers).&lt;/P&gt;&lt;P&gt;We've however deployed a second firewall and the firewall that is local to the DHCP server drops the packet although the policy matches with 'Allow'.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My artwork:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dhcp_relay_via_two_firewalls.png" style="width: 797px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/7453i5E56E8CD8A5AA1C7/image-size/large?v=v2&amp;amp;px=999" role="button" title="dhcp_relay_via_two_firewalls.png" alt="dhcp_relay_via_two_firewalls.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Policy:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dhcp_relay_check_point_policy.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/7454i887497BB363F7DB0/image-size/large?v=v2&amp;amp;px=999" role="button" title="dhcp_relay_check_point_policy.png" alt="dhcp_relay_check_point_policy.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Debug information:&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;fw ctl zdebug -T -e "accept host (10.150.50.1) and host(192.168.141.220) and port(67);" -m fw + vm drop&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[-- Stateful VM inbound: Entering (1596318170) --];&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041041;[cpu_7];[fw4_0];Before VM: &amp;lt;dir 0, 192.168.141.220:67 -&amp;gt; 10.150.50.1:67 IPP 17&amp;gt; (len=337) (ifn=23) (first seen) (looked up) ;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041044;[cpu_7];[fw4_0];fw_filter_chain: fwconn_chain_conn_exists returned 1 (conn=&amp;lt;dir 0, 192.168.141.220:67 -&amp;gt; 10.150.50.1:67 IPP 17&amp;gt;, is new 0), chain 0xffffc2005afc5bc8;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041046;[cpu_7];[fw4_0];fw_cluster_ttl_anti_spoofing: conn=&amp;lt;dir 0, 192.168.141.220:67 -&amp;gt; 10.150.50.1:67 IPP 17&amp;gt;;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041049;[cpu_7];[fw4_0];fw_conn_post_inspect: Packet accepted (fast path);&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041049;[cpu_7];[fw4_0];fw_filter_chain: Final switch, action=ACCEPT;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041050;[cpu_7];[fw4_0];fw_filter_chain: packet accepted;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041052;[cpu_7];[fw4_0];After VM: &amp;lt;dir 0, 192.168.141.220:67 -&amp;gt; 10.150.50.1:67 IPP 17&amp;gt; (len=337) ;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041052;[cpu_7];[fw4_0];VM Final action=ACCEPT;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041052;[cpu_7];[fw4_0]; ----- Stateful VM inbound Completed -----&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041054;[cpu_7];[fw4_0];&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[-- Stateful POST VM inbound: Entering (1596318170) --];&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041055;[cpu_7];[fw4_0];fw_post_vm_chain_handler: (first_seen 32, new_conn 0, is_my_ip 0, is_first_packet 0);&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041057;[cpu_7];[fw4_0];Before POST VM: &amp;lt;dir 0, 192.168.141.220:67 -&amp;gt; 10.150.50.1:67 IPP 17&amp;gt; (len=337) (ifn=23) (first seen) (looked up) ;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041058;[cpu_7];[fw4_0];fw_post_vm_chain_handler: executing handler function dhcp_reply_code;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041064;[cpu_7];[fw4_0];fw_post_vm_chain_handler: handler function returned action DROP;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041066;[cpu_7];[fw4_0];fw_log_drop_ex: Packet proto=17 192.168.141.220:67 -&amp;gt; 10.150.50.1:67 dropped by fw_post_vm_chain_handler Reason: Handler 'dhcp_reply_code' drop;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041068;[cpu_7];[fw4_0];After POST VM: &amp;lt;dir 0, 192.168.141.220:67 -&amp;gt; 10.150.50.1:67 IPP 17&amp;gt; (len=337) ;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041068;[cpu_7];[fw4_0];POST VM Final action=DROP;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;@;1931295932; 1Aug2020 23:42:51.041069;[cpu_7];[fw4_0]; ----- Stateful POST VM inbound Completed -----&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;fw monitor -TP -e "accept dport=67 and host(10.150.50.1) and host(192.168.141.220);" -p all&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;in chain (23):&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;0: -7fffffff (0000000000000000) (00000000) SecureXL inbound (sxl_in)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;1: -7ffffffe (0000000000000000) (00000000) SecureXL inbound CT (sxl_ct)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;2: -7ffffff0 (ffffffff89bb93f0) (00000001) tcpt inbound (tcp_tun)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;3: -7f800000 (ffffffff8a3db810) (ffffffff) IP Options Strip (in) (ipopt_strip)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;4: -7d000000 (ffffffff89bda870) (00000003) vpn multik forward in&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;5: - 2000000 (ffffffff89be6120) (00000003) vpn decrypt (vpn)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;6: - 1fffffa (ffffffff89bbb0d0) (00000001) l2tp inbound (l2tp)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;7: - 1fffff8 (ffffffff8a3d95d0) (00000001) Stateless verifications (in) (asm)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;8: - 1fffff7 (ffffffff8a3d90f0) (00000001) fw multik misc proto forwarding&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;9: - 1fffff2 (ffffffff89a390e0) (00000003) vpn tagging inbound (tagging)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;10: - 1fffff0 (ffffffff89bd6020) (00000003) vpn decrypt verify (vpn_ver)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;11: - 1ff (ffffffff89f9b510) (00000001) NAC Packet Inbound (nac_tag)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;12: 0 (ffffffff8a4c88d0) (00000001) fw VM inbound (fw)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;13: 1 (ffffffff89bdb750) (00000003) vpn policy inbound (vpn_pol)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;14: 2 (ffffffff8a3dbc60) (00000001) fw SCV inbound (scv)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;15: 3 (ffffffff89bd3990) (00000003) vpn before offload (vpn_in)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;16: 5 (ffffffff8a032830) (00000003) fw offload inbound (offload_in)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;17: 10 (ffffffff8a4ba610) (00000001) fw post VM inbound (post_vm)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;18: 100000 (ffffffff8a470f20) (00000001) fw accounting inbound (acct)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;19: 7f730000 (ffffffff896bb4f0) (00000001) passive streaming (in) (pass_str)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;20: 7f750000 (ffffffff8a20fdc0) (00000001) TCP streaming (in) (cpas)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;21: 7f800000 (ffffffff8a3db7c0) (ffffffff) IP Options Restore (in) (ipopt_res)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;22: 7fb00000 (ffffffff898f5bd0) (00000001) Cluster Late Correction (ha_for)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;out chain (20):&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;0: -7f800000 (ffffffff8a3db810) (ffffffff) IP Options Strip (out) (ipopt_strip)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;1: -78000000 (ffffffff89bda850) (00000003) vpn multik forward out&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;2: - 1ffffff (ffffffff89bce5c0) (00000003) vpn nat outbound (vpn_nat)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;3: - 1fffff0 (ffffffff8a206e50) (00000001) TCP streaming (out) (cpas)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;4: - 1ffff50 (ffffffff896bb4f0) (00000001) passive streaming (out) (pass_str)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;5: - 1ff0000 (ffffffff89a390e0) (00000003) vpn tagging outbound (tagging)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;6: - 1f00000 (ffffffff8a3d95d0) (00000001) Stateless verifications (out) (asm)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;7: - 1ff (ffffffff89f40400) (00000001) NAC Packet Outbound (nac_tag)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;8: 0 (ffffffff8a4c88d0) (00000001) fw VM outbound (fw)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;9: 10 (ffffffff8a4ba610) (00000001) fw post VM outbound (post_vm)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;10: 2000000 (ffffffff89bd1330) (00000003) vpn policy outbound (vpn_pol)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;11: 1ffffff0 (ffffffff89bb98b0) (00000001) l2tp outbound (l2tp)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;12: 20000000 (ffffffff89be15a0) (00000003) vpn encrypt (vpn)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;13: 60000000 (ffffffff89bb9170) (00000001) tcpt outbound (tcp_tun)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;14: 7f000000 (ffffffff8a470f20) (00000001) fw accounting outbound (acct)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;15: 7f700000 (ffffffff8a2077f0) (00000001) TCP streaming post VM (cpas)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;16: 7f800000 (ffffffff8a3db7c0) (ffffffff) IP Options Restore (out) (ipopt_res)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;17: 7f850000 (ffffffff898f4e10) (00000001) Cluster Local Correction (ccl_out)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;18: 7f900000 (0000000000000000) (00000000) SecureXL outbound (sxl_out)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;19: 7fa00000 (0000000000000000) (00000000) SecureXL deliver (sxl_deliver)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;monitor: monitoring (control-C to stop)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[vs_0][fw_4] 2Aug2020 0:16:09.083304 bond2.4:id2 (tcpt inbound)[337]: 192.168.141.220 -&amp;gt; 10.150.50.1 (UDP) len=337 id=26608&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;UDP: 67 -&amp;gt; 67&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[vs_0][fw_4] 2Aug2020 0:16:09.083309 bond2.4:id3 (IP Options Strip (in))[337]: 192.168.141.220 -&amp;gt; 10.150.50.1 (UDP) len=337 id=26608&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;UDP: 67 -&amp;gt; 67&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[vs_0][fw_4] 2Aug2020 0:16:09.083310 bond2.4:id4 (vpn multik forward in)[337]: 192.168.141.220 -&amp;gt; 10.150.50.1 (UDP) len=337 id=26608&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;UDP: 67 -&amp;gt; 67&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[vs_0][fw_4] 2Aug2020 0:16:09.083314 bond2.4:id5 (vpn decrypt)[337]: 192.168.141.220 -&amp;gt; 10.150.50.1 (UDP) len=337 id=26608&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;UDP: 67 -&amp;gt; 67&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[vs_0][fw_4] 2Aug2020 0:16:09.083316 bond2.4:iD6 (l2tp inbound)[337]: 192.168.141.220 -&amp;gt; 10.150.50.1 (UDP) len=337 id=26608&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;UDP: 67 -&amp;gt; 67&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[vs_0][fw_4] 2Aug2020 0:16:09.083317 bond2.4:iD7 (Stateless verifications (in))[337]: 192.168.141.220 -&amp;gt; 10.150.50.1 (UDP) len=337 id=26608&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;UDP: 67 -&amp;gt; 67&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[vs_0][fw_4] 2Aug2020 0:16:09.083319 bond2.4:iD8 (fw multik misc proto forwarding)[337]: 192.168.141.220 -&amp;gt; 10.150.50.1 (UDP) len=337 id=26608&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;UDP: 67 -&amp;gt; 67&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[vs_0][fw_4] 2Aug2020 0:16:09.083321 bond2.4:iD9 (vpn tagging inbound)[337]: 192.168.141.220 -&amp;gt; 10.150.50.1 (UDP) len=337 id=26608&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;UDP: 67 -&amp;gt; 67&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[vs_0][fw_4] 2Aug2020 0:16:09.083328 bond2.4:iD10 (vpn decrypt verify)[337]: 192.168.141.220 -&amp;gt; 10.150.50.1 (UDP) len=337 id=26608&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;UDP: 67 -&amp;gt; 67&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[vs_0][fw_4] 2Aug2020 0:16:09.083329 bond2.4:iD11 (NAC Packet Inbound)[337]: 192.168.141.220 -&amp;gt; 10.150.50.1 (UDP) len=337 id=26608&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;UDP: 67 -&amp;gt; 67&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[vs_0][fw_4] 2Aug2020 0:16:09.083330 bond2.4:iD12 (fw VM inbound )[337]: 192.168.141.220 -&amp;gt; 10.150.50.1 (UDP) len=337 id=26608&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;UDP: 67 -&amp;gt; 67&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[vs_0][fw_4] 2Aug2020 0:16:09.083663 bond2.4:ID13 (vpn policy inbound)[337]: 192.168.141.220 -&amp;gt; 10.150.50.1 (UDP) len=337 id=26608&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;UDP: 67 -&amp;gt; 67&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[vs_0][fw_4] 2Aug2020 0:16:09.083666 bond2.4:ID14 (fw SCV inbound)[337]: 192.168.141.220 -&amp;gt; 10.150.50.1 (UDP) len=337 id=26608&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;UDP: 67 -&amp;gt; 67&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[vs_0][fw_4] 2Aug2020 0:16:09.083668 bond2.4:ID15 (vpn before offload)[337]: 192.168.141.220 -&amp;gt; 10.150.50.1 (UDP) len=337 id=26608&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;UDP: 67 -&amp;gt; 67&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[vs_0][fw_4] 2Aug2020 0:16:09.083669 bond2.4:ID16 (fw offload inbound)[337]: 192.168.141.220 -&amp;gt; 10.150.50.1 (UDP) len=337 id=26608&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;UDP: 67 -&amp;gt; 67&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;[vs_0][fw_4] 2Aug2020 0:16:09.083675 bond2.4:ID17 (fw post VM inbound )[337]: 192.168.141.220 -&amp;gt; 10.150.50.1 (UDP) len=337 id=26608&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;UDP: 67 -&amp;gt; 67&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I edit the default objects 'dhcp-request' and 'dhcp-reply' to remove the 'Match' strings, as shown here, it breaks DHCP relaying altogether:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dhcp_relay_edit_default_objects.png" style="width: 592px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/7455i8DD2101B0A63A9B2/image-size/large?v=v2&amp;amp;px=999" role="button" title="dhcp_relay_edit_default_objects.png" alt="dhcp_relay_edit_default_objects.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I presume this is a bug?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;David Herselman&lt;/P&gt;</description>
      <pubDate>Sun, 02 Aug 2020 09:18:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DHCP-relay-via-2nd-firewall-not-working/m-p/93084#M7197</guid>
      <dc:creator>David_Herselman</dc:creator>
      <dc:date>2020-08-02T09:18:53Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP relay via 2nd firewall not working</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DHCP-relay-via-2nd-firewall-not-working/m-p/93092#M7200</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9832"&gt;@David_Herselman&lt;/a&gt;;&lt;/P&gt;
&lt;P&gt;You have unicast dhcp traffic from the first gateway (dhcp helper) through the second gateway. You must create a dhcp rule in both directions from dhcp helper to the dhcp server&amp;nbsp;and in the reverse direction.&lt;BR /&gt;&lt;BR /&gt;In your case:&lt;/P&gt;
&lt;P&gt;Source&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Destination&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Service&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Instal on&lt;/P&gt;
&lt;P&gt;DHCP Server&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;DHCP Helper IP&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;dhcp-replay&amp;nbsp; &amp;nbsp; &amp;nbsp; jb1-cluster&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Aug 2020 13:53:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DHCP-relay-via-2nd-firewall-not-working/m-p/93092#M7200</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-08-02T13:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP relay via 2nd firewall not working</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DHCP-relay-via-2nd-firewall-not-working/m-p/93093#M7201</link>
      <description>&lt;P&gt;Which is covered by the above rules 'from internal to DHCP servers' and 'from dhcp servers to internal'. The packet is accepted according to the policy but it appears the 2nd gateway receiving the DHCP unicast response back from the DHCP servers doesn't find a DHCP relay request it initiated (as 1st security gateway generated it) and subsequently invalidates the packet although the policy accepts it. The dhcp request however was relayed through the 2nd firewall so it should accept the reply back so that the 1st security gateway can receive the offer for the relayed request.&lt;BR /&gt;fw_filter_chain: Final switch, action=ACCEPT;&lt;BR /&gt;POST VM Final action=DROP;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried adding a policy rule, installed exclusively on 'jb1-cluster', to allow udp:67 without protocol analysis from the dhcp servers towards the 1st security gateway but this then breaks dhcp relay on both security devices as one should only use the new service objects. Using 'dhcp-replay' is an older protocol definition which immediately breaks dhcp-request and dhcp-reply objects...&lt;/P&gt;</description>
      <pubDate>Sun, 02 Aug 2020 14:00:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DHCP-relay-via-2nd-firewall-not-working/m-p/93093#M7201</guid>
      <dc:creator>David_Herselman</dc:creator>
      <dc:date>2020-08-02T14:00:37Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP relay via 2nd firewall not working</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DHCP-relay-via-2nd-firewall-not-working/m-p/93101#M7203</link>
      <description>&lt;P&gt;Use the same rule and create a service.&lt;/P&gt;
&lt;P&gt;Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Instal on&lt;BR /&gt;DHCP Server&amp;nbsp; DHCP Helper IP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; new_dhcp_replay&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; jb1-cluster&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Create the new udp service for DHCP without protocol settings. Therefore, no protocol analysis should be used and the connection should not be blocked via "POST VM Final action=DROP".&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dhcp_r1.JPG" style="width: 540px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/7456i383ECBAD0A378F7A/image-size/large?v=v2&amp;amp;px=999" role="button" title="dhcp_r1.JPG" alt="dhcp_r1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Aug 2020 19:04:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DHCP-relay-via-2nd-firewall-not-working/m-p/93101#M7203</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-08-02T19:04:51Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP relay via 2nd firewall not working</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DHCP-relay-via-2nd-firewall-not-working/m-p/93102#M7204</link>
      <description>&lt;P&gt;Hi Heiko,&lt;BR /&gt;&lt;BR /&gt;I did try that but the first firewall then simply ignores the broadcast and doesn't send anything on to the 2nd firewall which has the DHCP servers.&lt;/P&gt;&lt;P&gt;I understand ClusterXL DHCP relay to require policies with the new service objects that do protocol analysis...&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;David Herselman&lt;/P&gt;</description>
      <pubDate>Sun, 02 Aug 2020 19:07:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DHCP-relay-via-2nd-firewall-not-working/m-p/93102#M7204</guid>
      <dc:creator>David_Herselman</dc:creator>
      <dc:date>2020-08-02T19:07:03Z</dc:date>
    </item>
  </channel>
</rss>

