<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Network 198.51.101.0 in Hyperscale Firewall (Maestro)</title>
    <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185670#M2077</link>
    <description>&lt;P&gt;You are completely right.&amp;nbsp;But this customer sees that as a design flaw, and he has a point.&lt;BR /&gt;The changes mentioned in sk179028 don't seem too complicated, we will go that way.&lt;/P&gt;&lt;P&gt;Thanks, again.&lt;/P&gt;</description>
    <pubDate>Wed, 05 Jul 2023 12:52:56 GMT</pubDate>
    <dc:creator>dj0Nz</dc:creator>
    <dc:date>2023-07-05T12:52:56Z</dc:date>
    <item>
      <title>Network 198.51.101.0</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185643#M2068</link>
      <description>&lt;P&gt;Mates,&lt;/P&gt;&lt;P&gt;while troubleshooting a new deployment we found a network 198.51.101.0 which is used internally by Maestro. This network is a public routed one (&lt;A href="https://wq.apnic.net/apnic-bin/whois.pl?searchtext=198.51.101.0&amp;amp;object_type=inetnum" target="_blank"&gt;https://wq.apnic.net/apnic-bin/whois.pl?searchtext=198.51.101.0&amp;amp;object_type=inetnum&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;Does Check Point have some kind of agreement with the owner which allows them to use these addresses? Or is this some kind of "has anyone seen my glasses"-incident?&lt;/P&gt;&lt;P&gt;Cheers,&lt;BR /&gt;Michael&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jul 2023 09:41:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185643#M2068</guid>
      <dc:creator>dj0Nz</dc:creator>
      <dc:date>2023-07-05T09:41:57Z</dc:date>
    </item>
    <item>
      <title>Re: Network 198.51.101.0</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185646#M2069</link>
      <description>&lt;P&gt;Suggest reviewing the following SK and following up further with your CP SE as needed.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk179028" target="_self"&gt;sk179028: Connectivity issues with hosts in the network of 198.51.101+X.0/25 on Security Group X&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jul 2023 09:59:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185646#M2069</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-07-05T09:59:50Z</dc:date>
    </item>
    <item>
      <title>Re: Network 198.51.101.0</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185649#M2070</link>
      <description>&lt;P&gt;This range is used for internal communications and should not affect your production traffic in normal situations. However, if you need to change it, there is an SK provided by&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;here already.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jul 2023 10:04:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185649#M2070</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-07-05T10:04:03Z</dc:date>
    </item>
    <item>
      <title>Re: Network 198.51.101.0</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185657#M2072</link>
      <description>&lt;P&gt;Thanks a lot. This will help!&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jul 2023 10:44:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185657#M2072</guid>
      <dc:creator>dj0Nz</dc:creator>
      <dc:date>2023-07-05T10:44:47Z</dc:date>
    </item>
    <item>
      <title>Re: Network 198.51.101.0</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185660#M2073</link>
      <description>&lt;P&gt;If I'm not misinterpreting the routing table below, the customer won't be able to communicate with the "Bandung Institute of Technology" because the gateway has a local route.&lt;/P&gt;&lt;P&gt;But anyway, the SK provided by Chris will help.&lt;/P&gt;&lt;P&gt;Maybe someone at R&amp;amp;D can have a look at this issue, perhaps shifting internal communications to a separate network namespace could do the trick.&lt;/P&gt;&lt;P&gt;Thanks a lot for your help!&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;Routing table from customer SMO:&lt;/P&gt;&lt;P&gt;[Expert@firewall-ch01-01:0]# ip route show&lt;BR /&gt;default via x.x.x.x dev magg0 proto 7&lt;BR /&gt;x.x.x.x/24 dev bond1.x proto kernel scope link src x.x.x.x&lt;BR /&gt;x.x.x.x/24 dev magg0 proto kernel scope link src x.x.x.x&lt;BR /&gt;192.0.2.0/24 dev Sync proto kernel scope link src 192.0.2.1&lt;BR /&gt;198.51.101.0/25 dev eth1-CIN proto kernel scope link src 198.51.101.1&lt;BR /&gt;198.51.101.128/25 dev eth2-CIN proto kernel scope link src 198.51.101.201&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jul 2023 10:54:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185660#M2073</guid>
      <dc:creator>dj0Nz</dc:creator>
      <dc:date>2023-07-05T10:54:24Z</dc:date>
    </item>
    <item>
      <title>Re: Network 198.51.101.0</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185664#M2074</link>
      <description>&lt;P&gt;Very unlikely, most probably your German customers have no need to connect to a business school in Indonesia.&lt;/P&gt;
&lt;P&gt;Also, I quickly took a look at what they have in the range &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;You do not want to connect to any of those resources, but in case you do, there is always a way to change the internal communication IP range, as already mentioned.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jul 2023 12:15:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185664#M2074</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-07-05T12:15:17Z</dc:date>
    </item>
    <item>
      <title>Re: Network 198.51.101.0</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185670#M2077</link>
      <description>&lt;P&gt;You are completely right.&amp;nbsp;But this customer sees that as a design flaw, and he has a point.&lt;BR /&gt;The changes mentioned in sk179028 don't seem too complicated, we will go that way.&lt;/P&gt;&lt;P&gt;Thanks, again.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jul 2023 12:52:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185670#M2077</guid>
      <dc:creator>dj0Nz</dc:creator>
      <dc:date>2023-07-05T12:52:56Z</dc:date>
    </item>
    <item>
      <title>Re: Network 198.51.101.0</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185686#M2078</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This IP range was first used back in 2011 while SP Chassis solution was first introduced.&lt;/P&gt;
&lt;P&gt;This range was for documentation purposes only as mentioned here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://en.wikipedia.org/wiki/Reserved_IP_addresses#cite_note-rfc5737-6" target="_blank"&gt;https://en.wikipedia.org/wiki/Reserved_IP_addresses#cite_note-rfc5737-6&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Currently there is option to replace those IPs as mentioned in &lt;SPAN&gt;sk179028, we will look into it for future releases.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Yair&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jul 2023 15:17:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185686#M2078</guid>
      <dc:creator>Yair_Shahar</dc:creator>
      <dc:date>2023-07-05T15:17:07Z</dc:date>
    </item>
    <item>
      <title>Re: Network 198.51.101.0</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185700#M2080</link>
      <description>&lt;P&gt;Sorry, I have to disagree. AFAIK the TEST-NET-2 range has always been 198.51.100.0/24.&lt;BR /&gt;But good to hear that you are working on this matter.&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jul 2023 17:30:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/185700#M2080</guid>
      <dc:creator>dj0Nz</dc:creator>
      <dc:date>2023-07-05T17:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: Network 198.51.101.0</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/186139#M2097</link>
      <description>&lt;P&gt;Indeed it is.&lt;BR /&gt;&lt;A href="https://tools.ietf.org/html/rfc5737" target="_blank"&gt;https://tools.ietf.org/html/rfc5737&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml" target="_blank"&gt;https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 17:32:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/186139#M2097</guid>
      <dc:creator>Nicholas_Cuba</dc:creator>
      <dc:date>2023-07-11T17:32:21Z</dc:date>
    </item>
    <item>
      <title>Re: Network 198.51.101.0</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/187500#M2117</link>
      <description>&lt;P&gt;Okay this is weird. Checked sk179028 and found this:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[Expert@smo:0]# ifconfig -a | grep -B 1 198.51
eth1-CIN    Link encap:Ethernet  HWaddr 00:1C:7F:xx:xx:xx
            inet addr:198.51.101.1  Bcast:198.51.101.127  Mask:255.255.255.128
--
eth2-CIN    Link encap:Ethernet  HWaddr 00:1C:7F:xx:xx:xx
            inet addr:198.51.101.201  Bcast:198.51.101.255  Mask:255.255.255.128
[Expert@smo:0]# jq -r .cin /etc/smodb.json
{
  "base-ip": "198.51.100.1",
  "base-mask-length": 25,
  "base-vlan": 3900
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On mho I found this:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[Expert@mho:0]# grep 198.51.101 /etc/maestro_internal_communication_ips
198.51.101.0/25
&lt;/LI-CODE&gt;
&lt;P&gt;Now i am very curious about the explanation from TAC...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jul 2023 12:42:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/187500#M2117</guid>
      <dc:creator>dj0Nz</dc:creator>
      <dc:date>2023-07-25T12:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: Network 198.51.101.0</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/187536#M2118</link>
      <description>&lt;P&gt;Found it.&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk174966" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk174966&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;-&amp;gt; Filter: smodb.json&lt;/P&gt;
&lt;P&gt;I wonder why "&lt;SPAN&gt;The Maestro Orchestrator will read the IP address range for CIN interfaces from the&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;smodb.json&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;database." is called an "Enhancement" but anyway...&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":face_without_mouth:"&gt;😶&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jul 2023 14:07:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/187536#M2118</guid>
      <dc:creator>dj0Nz</dc:creator>
      <dc:date>2023-07-25T14:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: Network 198.51.101.0</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/191609#M2230</link>
      <description>&lt;P&gt;Finally, we got an "explanation":&lt;/P&gt;
&lt;P&gt;"3rd octet is variable + Security Group ID. This is as per design"&lt;/P&gt;
&lt;P&gt;Asked to add this (and the procedure from sk174966) to the Maestro documentation.&lt;BR /&gt;At least this "design" and how to cope with it should be documented somewhere...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Sep 2023 14:16:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/191609#M2230</guid>
      <dc:creator>dj0Nz</dc:creator>
      <dc:date>2023-09-05T14:16:47Z</dc:date>
    </item>
    <item>
      <title>Re: Network 198.51.101.0</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/241150#M3190</link>
      <description>&lt;P&gt;I just found this thread and the solution, however, this is is something that should be addressed.&amp;nbsp; &amp;nbsp; &amp;nbsp;I have subnets 198.51.101 - 108 on my maestro.&lt;BR /&gt;&lt;BR /&gt;Putting these subnets into BGP looking glass sites, most of them have valid BGP routes on the public Internet, not just the one that I had issues with.&amp;nbsp; &amp;nbsp; Using public IP space that isn't yours, for anything is bad form all around, but hiding it in a public application is even a bigger deal.&lt;BR /&gt;&lt;BR /&gt;More annoyingly they are /25's on each of our maestro's so sometimes this communication would work and sometimes it wouldn't, depending on which MHO it hit.&lt;BR /&gt;&lt;BR /&gt;I know there is no "safe" set of subnets to use when you are deploying every large enterprise in the world.&amp;nbsp; &amp;nbsp;But randomly picking someone else's public IP space, and burring it in the layers of abstraction that is the Maestro MHO is probably not the best solution.&lt;BR /&gt;&lt;BR /&gt;The only reason I found this in just a few hours is my corporation owns and leases a couple /24's in the 198.x.x.x IP space and I have stumbled into an issue with 198.51.100.0/24(IANA reserved for testing / documentation) before.&amp;nbsp; (a poorly written BOGON deployment)&amp;nbsp; &amp;nbsp; but 198.51.101+ are publicly routed and should not be used.&lt;BR /&gt;&lt;BR /&gt;I can tell you that at this large corporation, we use one of OUR owned and publicly routable subnets inside our application back end, deployed publicly.&amp;nbsp; &amp;nbsp;We simply will not ever deploy that particular subnet to the Internet.&amp;nbsp; &amp;nbsp;At that point, there really is a subnet that no other corporation should ever need to route to that is NOT RFC 1918 space or the like.&amp;nbsp; &amp;nbsp; So there is a solution to this problem....&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2025 18:35:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Network-198-51-101-0/m-p/241150#M3190</guid>
      <dc:creator>David_Evans</dc:creator>
      <dc:date>2025-02-13T18:35:33Z</dc:date>
    </item>
  </channel>
</rss>

