<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Sync interface IP assignment best practice in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Sync-interface-IP-assignment-best-practice/m-p/54959#M10983</link>
    <description>There is a range of IP's that will not be routed anywhere and should only be used for network connections, this is the 100.64.0.0-100.127.255.255 range, also called the ISP range. &lt;BR /&gt;IP's from this range will not interfere with anything else and are growing in popularity for this kind of use.</description>
    <pubDate>Mon, 03 Jun 2019 18:20:48 GMT</pubDate>
    <dc:creator>Maarten_Sjouw</dc:creator>
    <dc:date>2019-06-03T18:20:48Z</dc:date>
    <item>
      <title>Sync interface IP assignment best practice</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Sync-interface-IP-assignment-best-practice/m-p/54601#M10905</link>
      <description>&lt;P&gt;what is best practice to assign IPs to sync interface?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we are using rfc1918 IPs with /30 for sync interfaces.&amp;nbsp; recently we discovered this problem.&amp;nbsp; the IPs that we are using are also used on the network.&amp;nbsp; when traffic to these destinations hits the firewall it promptly drops the packets due to the stealth rule and also the route is learned as connected.&amp;nbsp; is there anyway we can exclude the sync interface from advertised?&amp;nbsp; or do i need to re-ip all of my firewalls sync to use ip such as 127.0.0.0/30?&amp;nbsp; thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;C 192.168.80.0/30 is directly connected, eth3-01 Sync&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2019 19:23:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Sync-interface-IP-assignment-best-practice/m-p/54601#M10905</guid>
      <dc:creator>Wayne_Situ</dc:creator>
      <dc:date>2019-05-28T19:23:37Z</dc:date>
    </item>
    <item>
      <title>Re: Sync interface IP assignment best practice</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Sync-interface-IP-assignment-best-practice/m-p/54629#M10911</link>
      <description>&lt;P&gt;See&amp;nbsp;ClusterXL Administration Guide R80.20:&lt;/P&gt;
&lt;P&gt;We recommend that you secure the synchronization interfaces using one of the following strategies:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;• Use a dedicated synchronization network.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;• Connecting the physical network interfaces of the Cluster Members directly using a cross-cable. In a cluster with three or more members, use a dedicated hub or switch.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Notes:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;• See Supported Topologies for Synchronization Network (on page 26).&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;• You can synchronize members across a WAN. To do this, do the steps in Synchronizing Clusters on a WAN (on page 54).&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;• In ClusterXL, the synchronization network is supported on the lowest VLAN tag of a VLAN interface. For example, if three VLANs with tags 10, 20 and 30 are configured on interface eth1, only interface eth1.10 may be used for synchronization.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2019 08:24:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Sync-interface-IP-assignment-best-practice/m-p/54629#M10911</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-05-29T08:24:17Z</dc:date>
    </item>
    <item>
      <title>Re: Sync interface IP assignment best practice</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Sync-interface-IP-assignment-best-practice/m-p/54696#M10926</link>
      <description>&lt;P&gt;sorry if I wasn't clear with my question.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to know what is the best practice of IP assignment to the Sync interface.&amp;nbsp; I am using 192.168.80.1 and 192.168.80.2 for the firewalls with /30 mask.&amp;nbsp; this is a private range and I never thought it would cause a problem until I find out there is an actual system using the same IP.&amp;nbsp; so when the packet arrived at the firewall, the firewall see the destination as directly connected.&amp;nbsp; it drops the packet.&amp;nbsp; from the firewall's route table perspective I never thought the crossover cable for the Sync interface would be advertised.&amp;nbsp; but it is and it's a problem.&lt;/P&gt;&lt;P&gt;question is do I need to re-ip the sync interfaces?&amp;nbsp; or my preference is how to stop the sync interface IPs being advertised?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2019 23:54:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Sync-interface-IP-assignment-best-practice/m-p/54696#M10926</guid>
      <dc:creator>Wayne_Situ</dc:creator>
      <dc:date>2019-05-29T23:54:49Z</dc:date>
    </item>
    <item>
      <title>Re: Sync interface IP assignment best practice</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Sync-interface-IP-assignment-best-practice/m-p/54949#M10978</link>
      <description>If your sync IPs are in use elsewhere in your environment, you will need to change your sync IPs.&lt;BR /&gt;They should be unique to the cluster and not in use anywhere else in your environment.</description>
      <pubDate>Mon, 03 Jun 2019 17:08:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Sync-interface-IP-assignment-best-practice/m-p/54949#M10978</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-03T17:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: Sync interface IP assignment best practice</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Sync-interface-IP-assignment-best-practice/m-p/54959#M10983</link>
      <description>There is a range of IP's that will not be routed anywhere and should only be used for network connections, this is the 100.64.0.0-100.127.255.255 range, also called the ISP range. &lt;BR /&gt;IP's from this range will not interfere with anything else and are growing in popularity for this kind of use.</description>
      <pubDate>Mon, 03 Jun 2019 18:20:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Sync-interface-IP-assignment-best-practice/m-p/54959#M10983</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-06-03T18:20:48Z</dc:date>
    </item>
  </channel>
</rss>

