<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem with MAC address on the wrong interface in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-MAC-address-on-the-wrong-interface/m-p/101865#M7982</link>
    <description>&lt;P&gt;It wasn't the MAC caching itself that surprised me but how it manifested itself.&amp;nbsp; IKEv2 negotiation would succeed just fine with the Cisco peer gateway (because that is handled outside SecureXL in process space by vpnd).&amp;nbsp; When the first IPSec NAT-T packets would start to be sent by SecureXL I could see them leaving on the external interface with tcpdump, but the Cisco end said they weren't getting anything.&amp;nbsp; Bounced IKE/IPSec SAs with &lt;STRONG&gt;vpn tu&lt;/STRONG&gt; a couple of times which had no effect, and frankly SecureXL really should have let go of that cached MAC address when I did that.&amp;nbsp; Even tried failing the cluster over which had no effect either since the MAC cache table is sync'ed between the cluster members.&lt;/P&gt;
&lt;P&gt;Finally decided to use -e option to tcpdump to look at the MAC addresses on the IPSec traffic, and I'm scratching my head trying to figure out where this bogus destination MAC is coming from, which is the reason why the IPSec traffic isn't going anywhere.&amp;nbsp; It's not in the Gaia ARP cache, so I finally searched SecureKnowledge and there was the solution...&lt;/P&gt;</description>
    <pubDate>Thu, 12 Nov 2020 12:27:41 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2020-11-12T12:27:41Z</dc:date>
    <item>
      <title>Problem with MAC address on the wrong interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-MAC-address-on-the-wrong-interface/m-p/101589#M7955</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I've a problem with udp packets (dns queries). I'm testing in a simple configuration.&lt;/P&gt;&lt;P&gt;interface eth4 external,&amp;nbsp; MAC address&amp;nbsp;00:1c:7f:32:04:21&lt;/P&gt;&lt;P&gt;corrisponding external router interface, MAC Address&amp;nbsp;c4:7d:4f:d6:55:e1&lt;/P&gt;&lt;P&gt;internal interface eth7,&amp;nbsp;&amp;nbsp;MAC address&amp;nbsp;00:1c:7f:32:04:1e&lt;/P&gt;&lt;P&gt;internal client IP Address xxx.xxx.xxx.107, MAC Address&amp;nbsp;00:0c:29:7f:e1:78&lt;/P&gt;&lt;P&gt;when I do a dns query on 8.8.8.8 I see:&lt;/P&gt;&lt;P&gt;---------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;gt; tcpdump -n -e -i eth7 host 8.8.8.8 and port 53 (INTERNAL INTERFACE)&lt;/P&gt;&lt;P&gt;&lt;EM&gt;10:09:34.756268 00:0c:29:7f:e1:78 &amp;gt; 00:1c:7f:32:04:1e, ethertype IPv4 (0x0800), length 70: xxx.xxx.xxx.107.40518 &amp;gt; 8.8.8.8.domain: 30244 [1au] NS? . (28)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;---------------------------------------------&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;tcpdump -n -e -i eth4 host 8.8.8.8 and port 53 (EXTERNAL INTERFACE)&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;10:09:34.756527 00:1c:7f:32:04:21 &amp;gt; c4:7d:4f:d6:55:e1, ethertype IPv4 (0x0800), length 70: xxx.xxx.xxx.107.40518 &amp;gt; 8.8.8.8.domain: 30244 [1au] NS? . (28)&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;-------------------------------------------------&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;and everything is OK&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Problems start with the answer:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;---------------------------------------------&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;tcpdump -n -e -i eth4 host 8.8.8.8 and port 53 (EXTERNAL INTERFACE)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;10:09:34.766040 c4:7d:4f:d6:55:e1 &amp;gt; 00:1c:7f:32:04:21, ethertype IPv4 (0x0800), length 567: 8.8.8.8.domain &amp;gt; xxx.xxx.xxx.107.40518: 30244$ 14/0/1 NS j.root-servers.net., NS k.root-servers.net., NS b.root-servers.net., NS i.root-servers.net., NS c.root-servers.net., NS g.root-servers.net., NS d.root-servers.net., NS e.root-servers.net., NS f.root-servers.net., NS h.root-servers.net., NS a.root-servers.net., NS m.root-servers.net., NS l.root-servers.net., RRSIG (525)&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;OK, is external&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;----------------&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;BUT I SEE THE SAME MAC ADDRESS ON THE INTERNAL INTERFACE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;gt; tcpdump -n -e -i eth7 host 8.8.8.8 and port 53 (INTERNAL INTERFACE)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;10:09:34.766053 00:1c:7f:32:04:21 &amp;gt; c4:7d:4f:d6:55:e1, ethertype IPv4 (0x0800), length 567: 8.8.8.8.domain &amp;gt; xxx.xxx.xxx.107.40518: 30244$ 14/0/1 NS j.root-servers.net., NS k.root-servers.net., NS b.root-servers.net., NS i.root-servers.net., NS c.root-servers.net., NS g.root-servers.net., NS d.root-servers.net., NS e.root-servers.net., NS f.root-servers.net., NS h.root-servers.net., NS a.root-servers.net., NS m.root-servers.net., NS l.root-servers.net., RRSIG (525)&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;HERE MAC ADDRESS ARE WRONG&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;then the internal client do a new request&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;10:09:39.756179 00:0c:29:7f:e1:78 &amp;gt; 00:1c:7f:32:04:1e, ethertype IPv4 (0x0800), length 70: xxx.xxx.xxx.107.52567 &amp;gt; 8.8.8.8.domain: 39751 [1au] NS? . (28)&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;and MAC ADDRESS in answer are correct&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;10:09:39.766554 00:1c:7f:32:04:1e &amp;gt; 00:0c:29:7f:e1:78, ethertype IPv4 (0x0800), length 567: 8.8.8.8.domain &amp;gt; 80.86.52.107.52567: 39751$ 14/0/1 NS a.root-servers.net., NS b.root-servers.net., NS c.root-servers.net., NS d.root-servers.net., NS e.root-servers.net., NS f.root-servers.net., NS g.root-servers.net., NS h.root-servers.net., NS i.root-servers.net., NS j.root-servers.net., NS k.root-servers.net., NS l.root-servers.net., NS m.root-servers.net., RRSIG (525)&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;and the client receive the answer.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;No proxy arp, no cluster&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ANY IDEA ?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;fabrizio&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2020 09:15:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-MAC-address-on-the-wrong-interface/m-p/101589#M7955</guid>
      <dc:creator>fmalfanti</dc:creator>
      <dc:date>2020-11-10T09:15:24Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with MAC address on the wrong interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-MAC-address-on-the-wrong-interface/m-p/101683#M7962</link>
      <description>&lt;P&gt;What version/JHF?&lt;BR /&gt;Also this sounds like it should be a TAC case.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2020 21:08:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-MAC-address-on-the-wrong-interface/m-p/101683#M7962</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-11-10T21:08:34Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with MAC address on the wrong interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-MAC-address-on-the-wrong-interface/m-p/101771#M7966</link>
      <description>&lt;P&gt;As it turns out the Check Point product code does do some caching of MAC addresses in various state tables (which surprised me a bit as maintaining the ARP cache is typically a Gaia OS function); just ran into this gem the other day which drove me crazy for awhile trying to figure it out:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk116453&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank" rel="noopener"&gt;sk116453: IPSec VPN NAT-T traffic is sent to the &lt;STRONG&gt;MAC&lt;/STRONG&gt; &lt;STRONG&gt;address&lt;/STRONG&gt; of &lt;STRONG&gt;wrong&lt;/STRONG&gt; next hop or old IP&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Your case sounds very similar to this one:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk116160&amp;amp;partition=Advanced&amp;amp;product=SecureXL" target="_blank" rel="noopener"&gt;sk116160: Computers with dynamically assigned IP addresses are not able to access web sites by their URLs when SecureXL is enabled&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;See if disabling SecureXL temporarily solves the problem if you are not running at least R80.30 Jumbo HFA Take 76+ which contains the fix.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Nov 2020 12:48:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-MAC-address-on-the-wrong-interface/m-p/101771#M7966</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-11-11T12:48:03Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with MAC address on the wrong interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-MAC-address-on-the-wrong-interface/m-p/101776#M7967</link>
      <description>&lt;P&gt;MAC caching with SXL is okay, if you want to forward accelerated traffic. I am surprised you are surprised &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Nov 2020 13:02:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-MAC-address-on-the-wrong-interface/m-p/101776#M7967</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-11-11T13:02:55Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with MAC address on the wrong interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-MAC-address-on-the-wrong-interface/m-p/101780#M7968</link>
      <description>&lt;P&gt;I saw&amp;nbsp; other cases, effects are similar, not the contest. In my case everything is static, no NAT, no VPN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;arp -an show correct associations MAC/IP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Nov 2020 13:27:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-MAC-address-on-the-wrong-interface/m-p/101780#M7968</guid>
      <dc:creator>fmalfanti</dc:creator>
      <dc:date>2020-11-11T13:27:08Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with MAC address on the wrong interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-MAC-address-on-the-wrong-interface/m-p/101865#M7982</link>
      <description>&lt;P&gt;It wasn't the MAC caching itself that surprised me but how it manifested itself.&amp;nbsp; IKEv2 negotiation would succeed just fine with the Cisco peer gateway (because that is handled outside SecureXL in process space by vpnd).&amp;nbsp; When the first IPSec NAT-T packets would start to be sent by SecureXL I could see them leaving on the external interface with tcpdump, but the Cisco end said they weren't getting anything.&amp;nbsp; Bounced IKE/IPSec SAs with &lt;STRONG&gt;vpn tu&lt;/STRONG&gt; a couple of times which had no effect, and frankly SecureXL really should have let go of that cached MAC address when I did that.&amp;nbsp; Even tried failing the cluster over which had no effect either since the MAC cache table is sync'ed between the cluster members.&lt;/P&gt;
&lt;P&gt;Finally decided to use -e option to tcpdump to look at the MAC addresses on the IPSec traffic, and I'm scratching my head trying to figure out where this bogus destination MAC is coming from, which is the reason why the IPSec traffic isn't going anywhere.&amp;nbsp; It's not in the Gaia ARP cache, so I finally searched SecureKnowledge and there was the solution...&lt;/P&gt;</description>
      <pubDate>Thu, 12 Nov 2020 12:27:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-MAC-address-on-the-wrong-interface/m-p/101865#M7982</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-11-12T12:27:41Z</dc:date>
    </item>
  </channel>
</rss>

