<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CheckPoint appliances behind other CheckPoint firewall in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11418#M730</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Finally solved it...&lt;/P&gt;&lt;P&gt;These 2 gateways were joined into 'active-active' cluster with 'multcast' load sharing. I changed it to 'unicast' and set 'use virtual mac' option and everything started to work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 03 Dec 2018 08:04:14 GMT</pubDate>
    <dc:creator>Ilya_Avetisyan</dc:creator>
    <dc:date>2018-12-03T08:04:14Z</dc:date>
    <item>
      <title>CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11412#M724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello everybody&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Faced with strange issue. In our company we use 2 CheckPoint appliances (a cluster) as gateway to Internet. Now we purchased 2 more gateways (they also joined to a cluster) to protect our servers network segment. So, these gateways are behind our Internet gateway. To allow them to get updates, check licenses, etc., I added rules to Internet gateways and everything is working. The gateways for servers able to see Internet but when I install policy for them they stop to see anything. If I unload policy (fw unloadlocal) they start to see the Internet again. I tried to enable proxy server on 'internet' gateway in hope that these servers gateways will contact with Internet through that proxy but no luck...&lt;/P&gt;&lt;P&gt;Still googling to solve the problem but no ideas at all.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Dec 2018 17:49:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11412#M724</guid>
      <dc:creator>Ilya_Avetisyan</dc:creator>
      <dc:date>2018-12-02T17:49:32Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11413#M725</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds like your drop rule is doing it. Have you checked logs for dropped traffic originating from server gateways? Or adding specific rule to permit this traffic?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Dec 2018 19:14:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11413#M725</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-12-02T19:14:53Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11414#M726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kasparas,&lt;/P&gt;&lt;P&gt;Thank you for fast reply. There are 2 permit rules were created - one installed on 'internet' gateway to allow access to Internet for 'servers' gateway and one 'allow all to all' which is installed onto 'servers' gateway. When I check logs I see that 'internet' gateway allows all for 'servers' gateway.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2018 05:55:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11414#M726</guid>
      <dc:creator>Ilya_Avetisyan</dc:creator>
      <dc:date>2018-12-03T05:55:44Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11415#M727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But do you see a log for unsuccessful case for "server" firewall? Have you tried packet capture to see if traffic actually leaves "server" firewall when it does not work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2018 06:32:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11415#M727</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-12-03T06:32:26Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11416#M728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here the log. Traffic from 'server' gateway is allowed but it can not reach requested destination.&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/76130_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;P&gt;Here what I see if I perform 'fw unloadlocal' command at 'server' gateway&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/76131_pastedImage_3.png" /&gt;&lt;/P&gt;&lt;P&gt;As you may see traffic is always allowed. The problem is in 'server' gateways themselves.&lt;/P&gt;&lt;P&gt;I did not try to capture the packets yet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2018 06:45:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11416#M728</guid>
      <dc:creator>Ilya_Avetisyan</dc:creator>
      <dc:date>2018-12-03T06:45:31Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11417#M729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please make sure those "internal GWs" are NAT-ed properly. They should be either using NAT Hide on the external GW with other elements of the internal networks or be statically NAT-ed on the external GW with automatic NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, make sure they are defined with main IPs that are mentioned in your NAT rules.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Finally, putting traces with fw monitor would help to see where the internet packets are going, after policy installation&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2018 07:46:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11417#M729</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-12-03T07:46:17Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11418#M730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Finally solved it...&lt;/P&gt;&lt;P&gt;These 2 gateways were joined into 'active-active' cluster with 'multcast' load sharing. I changed it to 'unicast' and set 'use virtual mac' option and everything started to work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2018 08:04:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11418#M730</guid>
      <dc:creator>Ilya_Avetisyan</dc:creator>
      <dc:date>2018-12-03T08:04:14Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11419#M731</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Why oh why Russian guys always want LS clustering??? It creates more issues than resolves&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2018 08:14:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11419#M731</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-12-03T08:14:32Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11420#M732</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do we? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Is&amp;nbsp;LS bad feature?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2018 08:30:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11420#M732</guid>
      <dc:creator>Ilya_Avetisyan</dc:creator>
      <dc:date>2018-12-03T08:30:04Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11421#M733</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes you do. I rarely see LS in production in Europe while it is all over Russia for some reason. LS is not "bad" per se, but it needs to be used with caution and understanding of all implications. It is definitely should not be the default clustering mode for physical gateways, and it does not really boost performance of a two GW cluster on a level that would "compensate" all inconveniences and limitations.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Mind all above is my private opinion, and it is off-topic here &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2018 08:41:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11421#M733</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-12-03T08:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11422#M734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We love challenges and something interesting to fix!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But usually it's just difficult to explain to managers or engineers of customers why active-active is not recommended, why it causes more issues than adds performance. Because "if&amp;nbsp;vendor makes it available in configuration, then why it is not recommended"? Active-active adds some more performance, so for them it is seen as a good thing. And if customer really wants it, integrators will implement it in that way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can Check Point provide an official statement that active-active is not recommended (although supported) for a cluster with two gateways?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2018 08:54:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11422#M734</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-12-03T08:54:42Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11423#M735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the misconception:&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;EM&gt;Active-active adds some more performance, so for them it is seen as a good thing.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #333333;"&gt;LS in Multicast mode&amp;nbsp;does add some throughput in sterile conditions without any significant&amp;nbsp;load, but it also introduces some other limitations and caveats, such as SDF, Flash&amp;amp;ACK Sync requirements, loss of SecureXL acceleration, etc.&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #333333;"&gt;Unicast mode with two members means 70% of traffic being forwarded to the second member, so once more, increased performance here is questionable.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #333333;"&gt;&lt;BR /&gt;There is actually a document describing the limitations of LS mode:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101539&amp;amp;partition=General&amp;amp;product=ClusterXL%22" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101539&amp;amp;partition=General&amp;amp;product=ClusterXL%22"&gt;ClusterXL Load Sharing mode limitations and important notes&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;In addition, you can always refer to&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal/role/supportcenterUser/page/default.psml/media-type/html?action=portlets.DCFileAction&amp;amp;eventSubmit_doGetdcdetails=&amp;amp;fileid=25321" title="https://supportcenter.checkpoint.com/supportcenter/portal/role/supportcenterUser/page/default.psml/media-type/html?action=portlets.DCFileAction&amp;amp;eventSubmit_doGetdcdetails=&amp;amp;fileid=25321"&gt;ClusterXL ATRG&lt;/A&gt;&amp;nbsp; to the relevant chapters.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #333333;"&gt;As for the official recommendations, you may have mentioned Check Point is very cautious about calling supported features as "non recommended" in any general sense. Each functionality can be required and productive in specific scenarios. For example, using unicast LS mode might help to cope with outdated switches and routers that cannot handle multicast traffic and gratuitous ARPs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #333333;"&gt; In my personal experience, however, the usual justification of using LS mode specifically in your region is usually "why the second box does not pass any traffic if we paid for it". It is not a proper engineering argument, in my book.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2018 11:18:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11423#M735</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-12-03T11:18:48Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11424#M736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree with &lt;A href="https://community.checkpoint.com/migrated-users/2138"&gt;Valeri&lt;/A&gt; here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unicast mode with two members means 70% of traffic being forwarded to the second member, so once more, increased performance here is questionable.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I already had the following problem with LS Unicast mode:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In unicast mode I already had problems with sync interface. For example, if the firewall has 10x1GBit network interface, it must transmit the flash and ACK trafic over the sync interface. This can overload the sync interface in special cases. Here RX-DRP errors occurred. Then the cluster didn't work properly anymore and I had many side effects.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I wouldn't use LS Unicast mode and it doesn't look likes any better with LS Multicast mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2018 21:45:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11424#M736</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-12-03T21:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11425#M737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #333333;"&gt;"why the second box does not pass any traffic if we paid for it".&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Exactly. And don't forget "if the vendor&amp;nbsp;put a checkbox for this setting, then it must work well".&lt;/P&gt;&lt;P&gt;So, as you noticed, all technical explanations go away. And that's the answer to your question about why it is popular in Russia.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2018 22:09:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11425#M737</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-12-03T22:09:45Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11426#M738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;...which is personally find not compelling enough...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2018 07:55:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11426#M738</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-12-04T07:55:36Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11427#M739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;gt;&amp;gt;&amp;gt;&lt;EM&gt;&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;it must transmit the trafic over the sync interface&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;This is incorrect. Forwarding is done on the interface that receives a packet. You sync issue most probably is caused by excessive Flash&amp;amp;Ack.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2018 07:57:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11427#M739</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-12-04T07:57:51Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11428#M740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have been mispronouncing here. Your statement is correct.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2018 08:19:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11428#M740</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-12-04T08:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint appliances behind other CheckPoint firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11429#M741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;no prob.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2018 09:34:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-appliances-behind-other-CheckPoint-firewall/m-p/11429#M741</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-12-04T09:34:03Z</dc:date>
    </item>
  </channel>
</rss>

