<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.40 Cluster-Interfaces down in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Cluster-Interfaces-down/m-p/94200#M7322</link>
    <description>&lt;P&gt;I know that this suggestion is a pain to implement, but it should conclusively show where the problem is: mirror the VLAN in question on the CIsco connected to the cluster member that is not seeing replies and perform packet capture on the span port.&lt;/P&gt;
&lt;P&gt;I have seen situations where performing TCPDUMP on cluster members result in incomplete or misleading conclusions, whereas the problems were in redundant L2/3 Cisco segments.&lt;/P&gt;
&lt;P&gt;The replies may be forwarded to the incorrect cluster member. You may also run TCPDUMP on it to see if my theory is correct.&lt;/P&gt;</description>
    <pubDate>Sun, 16 Aug 2020 01:54:35 GMT</pubDate>
    <dc:creator>Vladimir</dc:creator>
    <dc:date>2020-08-16T01:54:35Z</dc:date>
    <item>
      <title>R80.40 Cluster-Interfaces down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Cluster-Interfaces-down/m-p/94182#M7319</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;We've configured 5600 cluster (HA) and we see 4 bond VLAN subinterfaces are down on both Active and Standby firewall. Besides these four VLAN subinterfaces we have external eth1 interface UP, directly connected bond10 as a sync also UP (these are direct cables between two members) and bond1 as inside also UP.&lt;/P&gt;&lt;DIV&gt;&lt;FONT color="#009000"&gt;[Expert@CP1:0]# cphaprob -a if&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#009000"&gt;CCP mode: Manual (Unicast)&lt;BR /&gt;Required interfaces: 3&lt;BR /&gt;Required secured interfaces: 1&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#009000"&gt;&lt;BR /&gt;Interface Name:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status:&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#009000"&gt;eth1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; UP&lt;BR /&gt;Mgmt&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Non-Monitored&lt;BR /&gt;bond1 (LS)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; UP&lt;BR /&gt;bond10 (S-LS)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; UP&lt;BR /&gt;bond4.5 (LS)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DOWN (58713 secs)&lt;BR /&gt;bond4.42 (LS)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DOWN (58713 secs)&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#009000"&gt;S - sync, LM - link monitor, HA/LS - bond type&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#009000"&gt;Virtual cluster interfaces: 6&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#009000"&gt;eth1 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;lt;public_ip1&amp;gt;&lt;BR /&gt;bond1 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; x.y.4.254&lt;BR /&gt;bond4.6 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;FONT color="#009000"&gt;x.y&lt;/FONT&gt;.6.254&lt;BR /&gt;bond4.5 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;FONT color="#009000"&gt;x.y&lt;/FONT&gt;.5.254&lt;BR /&gt;bond4.42 &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; &lt;FONT color="#009000"&gt;x.y&lt;/FONT&gt;.42.254&lt;BR /&gt;bond4.41 &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; &lt;FONT color="#009000"&gt;x.y&lt;/FONT&gt;.41.254&lt;BR /&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#009000"&gt;We have the same output for the second cluster member. We have the same software release on both cluster members:&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;FONT color="#b01400"&gt;[Expert@CP1:0]# cphaprob release&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#b01400"&gt;Release:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; R80.40 T294&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#b01400"&gt;Kernel build:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 994000089&lt;BR /&gt;FW1 build:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 994000101&lt;BR /&gt;FW1 private fixes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; HOTFIX_TEX_ENGINE_R8040_AUTOUPDATE&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; HOTFIX_R80_40_JUMBO_HF_MAIN&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#b01400"&gt;ID&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SW release&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#b01400"&gt;1 (local)&amp;nbsp; R80.40 T294&lt;BR /&gt;2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; R80.40 T294&lt;BR /&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#009000"&gt;bond1 and bond4 interfaces are interconnected over two Cisco Nexus 9300 switches. We double checked the cables and VLAN configuration and everything is fine. One more strange thing that we noticed is that bond interfaces are sending ARPs targeting whole X.Y.5.0/24 subnet, for example:&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#009000"&gt;&lt;FONT color="#b01400"&gt;[Expert@CP1:0]# tcpdump -i bond4.5&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on bond4.5, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;16:23:32.485524 ARP, Request who-has X.Y.5.66 tell X.Y.5.251, length 28&lt;BR /&gt;16:23:32.485529 ARP, Request who-has X.Y.5.67 tell X.Y.5.251, length 28&lt;BR /&gt;16:23:32.485530 ARP, Request who-has X.Y.5.68 tell X.Y.5.251, length 28&lt;BR /&gt;16:23:32.485531 ARP, Request who-has X.Y.5.69 tell X.Y.5.251, length 28&lt;BR /&gt;16:23:32.485532 ARP, Request who-has X.Y.5.70 tell X.Y.5.251, length 28&lt;BR /&gt;16:23:32.485551 ARP, Request who-has X.Y.5.252 tell X.Y.5.251, length 28&lt;BR /&gt;16:23:32.585510 ARP, Request who-has X.Y.5.71 tell X.Y.5.251, length 28&lt;BR /&gt;16:23:32.585513 ARP, Request who-has X.Y.5.72 tell X.Y.5.251, length 28&lt;BR /&gt;...&lt;/FONT&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT color="#009000"&gt;&lt;FONT color="#b01400"&gt;What could be the reason why is this happening? We are pretty sure that interconnecting switches are properly configured.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Sat, 15 Aug 2020 14:27:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Cluster-Interfaces-down/m-p/94182#M7319</guid>
      <dc:creator>MladenAntesevic</dc:creator>
      <dc:date>2020-08-15T14:27:33Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 Cluster-Interfaces down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Cluster-Interfaces-down/m-p/94183#M7320</link>
      <description>&lt;P&gt;Do you have at least one other responding IP address (such as a switch or router) on interfaces&amp;nbsp;&lt;SPAN&gt;bond4.5&amp;nbsp; &amp;amp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;bond4.42?&amp;nbsp; If not the interfaces will be declared down by ClusterXL even though connectivity&amp;nbsp;between the cluster members on those interfaces is working.&amp;nbsp; The traffic you are seeing in your tcpdump is the cluster desperately trying to determine if anything else is alive on those interfaces, sounds like it is not finding anything thus the down state.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Aug 2020 15:02:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Cluster-Interfaces-down/m-p/94183#M7320</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-08-15T15:02:41Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 Cluster-Interfaces down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Cluster-Interfaces-down/m-p/94185#M7321</link>
      <description>&lt;P&gt;I have a Centos8 server in bond4.5 subnet (Centos8 address is .248) and it is replying to ARP destined to his address, I have just check it on my Centos8 server and I see it replies to both cluster members:&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;[root@Centos8 ~]# tcpdump -nn -i enp0s20f0u1.5 | grep 248&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on enp0s20f0u1.5, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;17:20:54.626647 ARP, Request who-has 10.100.5.248 tell 10.100.5.252, length 42&lt;BR /&gt;17:20:54.626654 ARP, Reply 10.100.5.248 is-at 00:e0:4c:36:01:e4, length 28&lt;BR /&gt;17:20:56.507907 ARP, Request who-has 10.100.5.248 tell 10.100.5.251, length 42&lt;BR /&gt;17:20:56.507923 ARP, Reply 10.100.5.248 is-at 00:e0:4c:36:01:e4, length 28&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;I am trying to see if reply is coming back to cluster member, but there i no reply on my cluster (although I am pretty sure interconnecting Cisco switch is properly configured), so just requests going out, no reply is seen on a firewall:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;&amp;nbsp;tcpdump -nn -i bond4.5 | grep 248&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on bond4.5, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;17:20:10.704519 ARP, Request who-has 10.100.5.248 tell 10.100.5.251, length 28&lt;BR /&gt;17:20:15.804511 ARP, Request who-has 10.100.5.248 tell 10.100.5.251, length 28&lt;BR /&gt;17:20:20.904513 ARP, Request who-has 10.100.5.248 tell 10.100.5.251, length 28&lt;BR /&gt;17:20:26.004509 ARP, Request who-has 10.100.5.248 tell 10.100.5.251, length 28&lt;BR /&gt;17:20:31.105515 ARP, Request who-has 10.100.5.248 tell 10.100.5.251, length 28&lt;BR /&gt;17:20:36.106517 ARP, Request who-has 10.100.5.248 tell 10.100.5.251, length 28&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;One more thing, I have no security policy defined for bond4.5 subnet, but anyway I believe ARP reply should be seen on tcpdump capture.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Aug 2020 15:37:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Cluster-Interfaces-down/m-p/94185#M7321</guid>
      <dc:creator>MladenAntesevic</dc:creator>
      <dc:date>2020-08-15T15:37:20Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 Cluster-Interfaces down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Cluster-Interfaces-down/m-p/94200#M7322</link>
      <description>&lt;P&gt;I know that this suggestion is a pain to implement, but it should conclusively show where the problem is: mirror the VLAN in question on the CIsco connected to the cluster member that is not seeing replies and perform packet capture on the span port.&lt;/P&gt;
&lt;P&gt;I have seen situations where performing TCPDUMP on cluster members result in incomplete or misleading conclusions, whereas the problems were in redundant L2/3 Cisco segments.&lt;/P&gt;
&lt;P&gt;The replies may be forwarded to the incorrect cluster member. You may also run TCPDUMP on it to see if my theory is correct.&lt;/P&gt;</description>
      <pubDate>Sun, 16 Aug 2020 01:54:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Cluster-Interfaces-down/m-p/94200#M7322</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2020-08-16T01:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 Cluster-Interfaces down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Cluster-Interfaces-down/m-p/94276#M7325</link>
      <description>&lt;P&gt;Hi Vladimir,&lt;/P&gt;&lt;P&gt;I was unable to do packet capture on the switch since my Cisco Nexus&amp;nbsp; does not support SPAN on egress (TX), but anyway, I found out some very interesting facts:&lt;/P&gt;&lt;P&gt;My active cluster member is definitely receiving ARP replies, I can see replies coming in if I start tcpdump on a physical port eth5:&lt;/P&gt;&lt;P&gt;[Expert@CP1:0]# tcpdump -e -i eth5 | grep 248&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on eth5, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;15:01:15.789127 00:e0:4c:36:01:e4 (oui Unknown) &amp;gt; 00:1c:7f:8d:e3:4b (oui Unknown), ethertype 802.1Q (0x8100), length 64: vlan 5, p 0, ethertype ARP, Reply 10.100.5.248 is-at 00:e0:4c:36:01:e4 (oui Unknown), length 46&lt;/P&gt;&lt;P&gt;So replies are received and everything is regularly tagged with VLAN ID 5.&lt;/P&gt;&lt;P&gt;Further on, I have check my bond settings and they are fine, physical ports eth4 and eth5 are in bond4, as you can see from the attached screenshot.&lt;/P&gt;&lt;P&gt;One more interesting fact, cluster member is sending traffic through the eth4 and receiving traffic through the eth5, as I can see from the traffic statistics:&lt;/P&gt;&lt;P&gt;[Expert@CP1:0]# ifconfig eth4 | grep RX&lt;BR /&gt;RX packets:68 errors:0 dropped:0 overruns:0 frame:0&lt;BR /&gt;RX bytes:8315 (8.1 KiB) TX bytes:615298270 (586.7 MiB)&lt;BR /&gt;[Expert@CP1:0]# ifconfig eth5 | grep RX&lt;BR /&gt;RX packets:17502724 errors:0 dropped:0 overruns:0 frame:0&lt;BR /&gt;RX bytes:980433759 (935.0 MiB) TX bytes:586396 (572.6 KiB)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Further on, if I start the tcpdump on the main bond4 interface or bond4.5 subinterface, no replies are seen, so somehow ARP replies get lost between bond member eth5 and the corresponding bond interface where eth5 belongs. Maybe because traffic is sent over eth4 and it is received over eth5 it is somehow misleading cluster bond4 interface and traffics gets lost.&lt;/P&gt;</description>
      <pubDate>Sun, 16 Aug 2020 13:29:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Cluster-Interfaces-down/m-p/94276#M7325</guid>
      <dc:creator>MladenAntesevic</dc:creator>
      <dc:date>2020-08-16T13:29:41Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 Cluster-Interfaces down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Cluster-Interfaces-down/m-p/94277#M7326</link>
      <description>&lt;P&gt;Please provide output of&amp;nbsp;&lt;STRONG&gt;cphaprob show_bond -a&lt;/STRONG&gt; to ensure ClusterXL is OK with your bond configuration.&lt;/P&gt;
&lt;P&gt;Whenever using tcpdump, pass the -p flag to disable promiscuous mode during your capture.&amp;nbsp; Promiscuous mode will still show you frames that aren't actually going to be processed by the receiving system due to a MAC address mismatch which is a classic example of the &lt;A href="https://en.wikipedia.org/wiki/Observer_effect_(information_technology)" target="_self"&gt;observer effect&lt;/A&gt;&amp;nbsp;sabotaging your troubleshooting efforts.&lt;/P&gt;
&lt;P&gt;Finally, try pulling out one physical interface from your bond (eth4 or eth5) on both the firewall and switch side so that it is a "bond of one" and see what happens.&amp;nbsp; If the problem goes away it is probably something in your bond setup on the switch.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Aug 2020 13:53:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Cluster-Interfaces-down/m-p/94277#M7326</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-08-16T13:53:34Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 Cluster-Interfaces down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Cluster-Interfaces-down/m-p/94278#M7327</link>
      <description>&lt;P&gt;Hi Timothy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;bond status is down as I described above, here is the output from cphaprob show_bond command:&lt;/P&gt;&lt;P&gt;[Expert@CP1:0]# cphaprob show_bond bond4.5&lt;/P&gt;&lt;P&gt;Bond name: bond4.5&lt;BR /&gt;Bond mode: Load Sharing&lt;BR /&gt;Bond status: DOWN&lt;/P&gt;&lt;P&gt;Balancing mode: 802.3ad Layer2 Load Balancing&lt;BR /&gt;Configured slave interfaces: 2&lt;BR /&gt;In use slave interfaces: 2&lt;BR /&gt;Required slave interfaces: 1&lt;/P&gt;&lt;P&gt;Slave name | Status | Link&lt;BR /&gt;----------------+-----------------+-------&lt;BR /&gt;eth5 | Active | Yes&lt;BR /&gt;eth4 | Active | Yes&lt;/P&gt;&lt;P&gt;Also doing tcpdump with -p flag still shows ARP replies are coming into eth5:&lt;/P&gt;&lt;P&gt;[Expert@CP1:0]# tcpdump -p -e -i eth5 | grep 248&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on eth5, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;16:33:50.326391 00:e0:4c:36:01:e4 (oui Unknown) &amp;gt; 00:1c:7f:8d:e3:4b (oui Unknown), ethertype 802.1Q (0x8100), length 64: vlan 5, p 0, ethertype ARP, Reply 10.100.5.248 is-at 00:e0:4c:36:01:e4 (oui Unknown), length 46&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will try to pull the cables as you suggested in order to check if bond is working with just one member.&lt;/P&gt;</description>
      <pubDate>Sun, 16 Aug 2020 14:39:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Cluster-Interfaces-down/m-p/94278#M7327</guid>
      <dc:creator>MladenAntesevic</dc:creator>
      <dc:date>2020-08-16T14:39:49Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 Cluster-Interfaces down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Cluster-Interfaces-down/m-p/94283#M7330</link>
      <description>&lt;P&gt;Hi Timothy,&lt;/P&gt;&lt;P&gt;you are right, as you suggested there was a wrong port-channel configuration on a Cisco switch. Actually, it was a very basic mistake, port-channel on a Cisco side was statically defined, without any LACP nad we have 802.1ad LACP on the cluster side. I did not immediately recognized such a basic mistake, because traffic was actually flowing in one direction, not the opposite, so it was quite confusing.&lt;/P&gt;&lt;P&gt;Thank you for you help solving this issue.&lt;/P&gt;</description>
      <pubDate>Sun, 16 Aug 2020 17:45:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-Cluster-Interfaces-down/m-p/94283#M7330</guid>
      <dc:creator>MladenAntesevic</dc:creator>
      <dc:date>2020-08-16T17:45:44Z</dc:date>
    </item>
  </channel>
</rss>

