<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Implementation Check Point VSX + Maestro s ACI (LACP, One-arm, PBR) – best practices? in Hyperscale Firewall (Maestro)</title>
    <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Implementation-Check-Point-VSX-Maestro-s-ACI-LACP-One-arm-PBR/m-p/247160#M3353</link>
    <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/122816"&gt;@katarina_&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;We've recently deployed Maestro &amp;amp; VSX with Cisco ACI using Symmetric PBR and have deployed it similar to how you've described. Here are a couple of things I've learned during the process:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;You'll need to add a rule to permit Service Graph Health Group probes. You can configure the probe on the APIC to use ICMP, HTTPS, etc. If the rule doesn't exist, the Service Graph won't work.&lt;/LI&gt;
&lt;LI&gt;If your magg0 interface is connected to the leaf switches, you'll need to disable the "IP dataplane learning" feature for the magg0 bridge domain subnet on the APIC to avoid management connectivity issues.&lt;/LI&gt;
&lt;LI&gt;If you're planning to enable dynamic balancing, there's a known issue where the mq_mng process runs multiple times, causing high CPU. I believe this is resolved in T99 (I'll try and dig out the PRJ reference).&lt;/LI&gt;
&lt;LI&gt;The 25G autonegotiation issue is an ACI-side issue. We found by hardcoding the leaf switch interface, bouncing the interface, then setting it back to autonegotiation and bouncing the interface again sorted it. That's far from ideal. We were concerned about what the potential impact would be if the leaf switch reloaded and multiple interfaces failed to negotiate correctly. A case was raised with Cisco TAC who confirmed it is a bug. We've now set the interfaces on the leaf switch to use the "Inherit" setting (Cisco's recommendation) and we've not had any issues since.&lt;/LI&gt;
&lt;LI&gt;Not an ACI-specific issue, but definitely a Maestro &amp;amp; VSX one is the use of Generic Data Centre objects in policy. If you're planning on using them in your Virtual System firewall policies, you'll need to create a dummy drop rule on VS0 as a workaround in order for the feature to work (R&amp;amp;D are currently working on a fix for this).&lt;/LI&gt;
&lt;LI&gt;Integrating the SMS/MDS with the Cisco APIC (using the Cloudguard Controller Cisco ACI object) is a great way of automating parts of your rulebase. It allows you to use the EPGs/ESGs as objects in the firewall policy, meaning if a new endpoint is added to an EPG on the fabric, it will automatically be included in any firewall rules associated with the EPG/ESG. This feature is not impacted by the Generic Data Centre issue mentioned above.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If I think of any more, I'll add them here.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Aaron.&lt;/P&gt;</description>
    <pubDate>Wed, 23 Apr 2025 18:47:07 GMT</pubDate>
    <dc:creator>AaronCP</dc:creator>
    <dc:date>2025-04-23T18:47:07Z</dc:date>
    <item>
      <title>Implementation Check Point VSX + Maestro s ACI (LACP, One-arm, PBR) – best practices?</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Implementation-Check-Point-VSX-Maestro-s-ACI-LACP-One-arm-PBR/m-p/246602#M3324</link>
      <description>&lt;P&gt;&lt;FONT size="2"&gt;Hello Community,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;SPAN&gt;we’re preparing for a Check Point Maestro + ACI implementation and would appreciate any input or best practices.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;H3&gt;&lt;STRONG&gt;&lt;FONT size="2"&gt;Our environment and Architecture:&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;FONT size="2"&gt;Platform: Check Point Maestro (2x 9700 SGMs + MHO-140)&lt;/FONT&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;FONT size="2"&gt;Software: R81.20&lt;/FONT&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;FONT size="2"&gt;Bonding mode: 802.3ad (LACP)&lt;/FONT&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;FONT size="2"&gt;Each bond connects to ACI fabric (2x Leafs) – currently working with 25G SR links&lt;/FONT&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;FONT size="2"&gt;One VS per ACI context (stage/prod)&lt;/FONT&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;FONT size="2"&gt;L3 IPs assigned directly to bond interfaces&lt;/FONT&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;FONT size="2"&gt;One-arm mode&lt;/FONT&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;FONT size="2"&gt;Policy-Based Routing (PBR)&lt;/FONT&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;FONT size="2"&gt;Interfaces connected to ACI (via LACP bundles)&lt;/FONT&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;FONT size="2"&gt;Are there best practices for one-arm PBR design with Maestro + ACI?&lt;/FONT&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;FONT size="2"&gt;What’s the recommended interface setup for L3 one-arm traffic into VSX (e.g., VLAN tagging, IP on bond, subinterfaces)?&lt;/FONT&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;FONT size="2"&gt;Any special considerations with LACP bonding on Maestro?&lt;/FONT&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;SPAN&gt;Any insights or shared experiences would be super helpful – we already resolved one port-down issue by hardcoding 25G speed on CP side (vs 10G default), so we’d love to avoid surprises during full implementation.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Thank you!&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Katarina&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2025 07:30:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Implementation-Check-Point-VSX-Maestro-s-ACI-LACP-One-arm-PBR/m-p/246602#M3324</guid>
      <dc:creator>katarina_</dc:creator>
      <dc:date>2025-04-16T07:30:57Z</dc:date>
    </item>
    <item>
      <title>Re: Implementation Check Point VSX + Maestro s ACI (LACP, One-arm, PBR) – best practices?</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Implementation-Check-Point-VSX-Maestro-s-ACI-LACP-One-arm-PBR/m-p/246988#M3346</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1967"&gt;@Lari_Luoma&lt;/a&gt;,&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/4113"&gt;@Anatoly&lt;/a&gt;&amp;nbsp;can you advise?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 10:28:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Implementation-Check-Point-VSX-Maestro-s-ACI-LACP-One-arm-PBR/m-p/246988#M3346</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-04-22T10:28:17Z</dc:date>
    </item>
    <item>
      <title>Re: Implementation Check Point VSX + Maestro s ACI (LACP, One-arm, PBR) – best practices?</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Implementation-Check-Point-VSX-Maestro-s-ACI-LACP-One-arm-PBR/m-p/247033#M3348</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/122816"&gt;@katarina_&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;With ACI service graphing and PBR is the recommended setup. You are correctly using VSX with a VS per tenant in one-arm mode. That's the best practice. Using trunked bonds is more scalable solution in my opinion. It needs fewer physical interfaces, and you can add more VLANs into a trunk when necessary. Then you would assign a VLAN from the trunk to each VS. With one-arm mode you should keep anti-spoofing disabled from the interface.&lt;BR /&gt;&lt;BR /&gt;The only limitation with LACP is that the bond members need to be connected to the same logical switch. In ACI you most likely have vPC enabled on leaf switches anyway, so you should be covered. My recommendation is to hard code the speed for the uplinks at the MHO.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 18:25:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Implementation-Check-Point-VSX-Maestro-s-ACI-LACP-One-arm-PBR/m-p/247033#M3348</guid>
      <dc:creator>Lari_Luoma</dc:creator>
      <dc:date>2025-04-22T18:25:43Z</dc:date>
    </item>
    <item>
      <title>Re: Implementation Check Point VSX + Maestro s ACI (LACP, One-arm, PBR) – best practices?</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Implementation-Check-Point-VSX-Maestro-s-ACI-LACP-One-arm-PBR/m-p/247035#M3349</link>
      <description>&lt;P&gt;Let me also add that you might want to engage with Check Point Professional Services. PS has a long experience with the best practices setups including the ACI environments.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 18:28:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Implementation-Check-Point-VSX-Maestro-s-ACI-LACP-One-arm-PBR/m-p/247035#M3349</guid>
      <dc:creator>Lari_Luoma</dc:creator>
      <dc:date>2025-04-22T18:28:31Z</dc:date>
    </item>
    <item>
      <title>Re: Implementation Check Point VSX + Maestro s ACI (LACP, One-arm, PBR) – best practices?</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Implementation-Check-Point-VSX-Maestro-s-ACI-LACP-One-arm-PBR/m-p/247160#M3353</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/122816"&gt;@katarina_&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;We've recently deployed Maestro &amp;amp; VSX with Cisco ACI using Symmetric PBR and have deployed it similar to how you've described. Here are a couple of things I've learned during the process:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;You'll need to add a rule to permit Service Graph Health Group probes. You can configure the probe on the APIC to use ICMP, HTTPS, etc. If the rule doesn't exist, the Service Graph won't work.&lt;/LI&gt;
&lt;LI&gt;If your magg0 interface is connected to the leaf switches, you'll need to disable the "IP dataplane learning" feature for the magg0 bridge domain subnet on the APIC to avoid management connectivity issues.&lt;/LI&gt;
&lt;LI&gt;If you're planning to enable dynamic balancing, there's a known issue where the mq_mng process runs multiple times, causing high CPU. I believe this is resolved in T99 (I'll try and dig out the PRJ reference).&lt;/LI&gt;
&lt;LI&gt;The 25G autonegotiation issue is an ACI-side issue. We found by hardcoding the leaf switch interface, bouncing the interface, then setting it back to autonegotiation and bouncing the interface again sorted it. That's far from ideal. We were concerned about what the potential impact would be if the leaf switch reloaded and multiple interfaces failed to negotiate correctly. A case was raised with Cisco TAC who confirmed it is a bug. We've now set the interfaces on the leaf switch to use the "Inherit" setting (Cisco's recommendation) and we've not had any issues since.&lt;/LI&gt;
&lt;LI&gt;Not an ACI-specific issue, but definitely a Maestro &amp;amp; VSX one is the use of Generic Data Centre objects in policy. If you're planning on using them in your Virtual System firewall policies, you'll need to create a dummy drop rule on VS0 as a workaround in order for the feature to work (R&amp;amp;D are currently working on a fix for this).&lt;/LI&gt;
&lt;LI&gt;Integrating the SMS/MDS with the Cisco APIC (using the Cloudguard Controller Cisco ACI object) is a great way of automating parts of your rulebase. It allows you to use the EPGs/ESGs as objects in the firewall policy, meaning if a new endpoint is added to an EPG on the fabric, it will automatically be included in any firewall rules associated with the EPG/ESG. This feature is not impacted by the Generic Data Centre issue mentioned above.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If I think of any more, I'll add them here.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Aaron.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Apr 2025 18:47:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Implementation-Check-Point-VSX-Maestro-s-ACI-LACP-One-arm-PBR/m-p/247160#M3353</guid>
      <dc:creator>AaronCP</dc:creator>
      <dc:date>2025-04-23T18:47:07Z</dc:date>
    </item>
    <item>
      <title>Re: Implementation Check Point VSX + Maestro s ACI (LACP, One-arm, PBR) – best practices?</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Implementation-Check-Point-VSX-Maestro-s-ACI-LACP-One-arm-PBR/m-p/247166#M3354</link>
      <description>&lt;P&gt;To clarify, the dummy drop rule for VS0 should contain the objects pulled in from the Generic Data Centre object. This is so the objects get loaded on VS0 so that they can be used by the Virtual System(s).&lt;/P&gt;</description>
      <pubDate>Wed, 23 Apr 2025 20:13:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Implementation-Check-Point-VSX-Maestro-s-ACI-LACP-One-arm-PBR/m-p/247166#M3354</guid>
      <dc:creator>AaronCP</dc:creator>
      <dc:date>2025-04-23T20:13:15Z</dc:date>
    </item>
    <item>
      <title>Re: Implementation Check Point VSX + Maestro s ACI (LACP, One-arm, PBR) – best practices?</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Implementation-Check-Point-VSX-Maestro-s-ACI-LACP-One-arm-PBR/m-p/247501#M3364</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1967"&gt;@Lari_Luoma&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Thank you&amp;nbsp; very much for your response, I have already hard-coded the speed, as I encountered this issue at the beginning.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Apr 2025 08:55:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/Implementation-Check-Point-VSX-Maestro-s-ACI-LACP-One-arm-PBR/m-p/247501#M3364</guid>
      <dc:creator>katarina_</dc:creator>
      <dc:date>2025-04-28T08:55:20Z</dc:date>
    </item>
  </channel>
</rss>

