<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CheckPoint Maestro R81.20 and Nexus N9K -vPC connection in Hyperscale Firewall (Maestro)</title>
    <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264479#M3824</link>
    <description>&lt;P&gt;My plan is to isolate the MHO 02 device (which in the diagram is currently connected to PO30 on the Nexus). After that, we will remove the configuration interfaces member of Po30 and add those interfaces as members of Po29 on the Cisco Nexus switch.&lt;BR /&gt;Next, we will reconnect the MHO 02 device back into the system.&lt;/P&gt;&lt;P&gt;Can you help me with the following two issues?&lt;BR /&gt;-------------------------------------------------------&lt;BR /&gt;1. Is our approach feasible to avoid system downtime?&lt;BR /&gt;Summary of steps: [1] – Isolate MHO 02 → [2] – Configure the Cisco switch → [3] – Reconnect MHO 02.&lt;BR /&gt;2. If this approach is applicable, please provide us with the instructions on how to isolate the MHO and then reconnect the MHO afterward.&lt;BR /&gt;3. Do you have any other recommendations for this task?&lt;/P&gt;</description>
    <pubDate>Fri, 05 Dec 2025 06:58:38 GMT</pubDate>
    <dc:creator>Network_SNP</dc:creator>
    <dc:date>2025-12-05T06:58:38Z</dc:date>
    <item>
      <title>CheckPoint Maestro R81.20 and Nexus N9K -vPC connection</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264459#M3819</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Community,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are deploying two Maestro systems, R81.20, bundled and connected via VPC to nexus switches. On the MHO cluster, we configured 1 bond with 4 ports. However, on the Cisco Nexus 9000 devices, we declared them as 2 POs running VPC.&lt;/P&gt;&lt;P&gt;We monitored and recorded the Mac move log status appearing continuously on the Cisco Nexus 9000 devices, causing the CPU load of the device to be high.&amp;nbsp;%L2FM-4-L2FM_MAC_MOVE2: MAC 001c.7f82.060a in VLAN 34 has moved from Po30 to Po29.&lt;/P&gt;&lt;P&gt;We have a few questions as follows:&lt;BR /&gt;- Is the connection model between the MHO pair and the Cisco Nexus 9000 pair (on MHO use 1 Bond and on Cisco Nexus use 2 POs running VPC) a standard model or not?&amp;nbsp;&lt;BR /&gt;- We are considering that on the Cisco Nexus pair, the ports will be grouped into 1 PO, then the connection between the MHO pair and Cisco Nexus.&lt;/P&gt;&lt;P&gt;Please help me recommend Steps move from Po30 to Po29 on Cisco Nexus. There is no effect and no downtime for the system.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Dec 2025 01:46:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264459#M3819</guid>
      <dc:creator>Network_SNP</dc:creator>
      <dc:date>2025-12-05T01:46:22Z</dc:date>
    </item>
    <item>
      <title>CheckPoint Maestro to Cisco nexus 9K vPC</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264456#M3867</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Community,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;We are de&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CP_03122025.png" style="width: 976px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32315iC89C60B8711303EA/image-size/large?v=v2&amp;amp;px=999" role="button" title="CP_03122025.png" alt="CP_03122025.png" /&gt;&lt;/span&gt;ploying two Maestro systems, R81.20, bundled and connected via VPC to nexus switches. On the MHO cluster, we configured 1 bond with 4 ports. However, on the Cisco Nexus 9000 devices, we declared them as 2 POs running VPC.&lt;/P&gt;&lt;P&gt;We monitored and recorded the Mac move log status appearing continuously on the Cisco Nexus 9000 devices, causing the CPU load of the device to be high.&amp;nbsp;%L2FM-4-L2FM_MAC_MOVE2: MAC 001c.7f82.060a in VLAN 34 has moved from Po30 to Po29.&lt;/P&gt;&lt;P&gt;We have a few questions as follows:&lt;BR /&gt;- Is the connection model between the MHO pair and the Cisco Nexus 9000 pair (on MHO use 1 Bond and on Cisco Nexus use 2 POs running VPC) a standard model or not?&amp;nbsp;&lt;BR /&gt;- We are considering that on the Cisco Nexus pair, the ports will be grouped into 1 PO, then the connection between the MHO pair and Cisco Nexus.&lt;/P&gt;&lt;P&gt;Please help me recommend Steps move from Po30 to Po29 on Cisco Nexus. There is no effect and no downtime for the system.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Dec 2025 01:38:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264456#M3867</guid>
      <dc:creator>Network_SNP</dc:creator>
      <dc:date>2025-12-05T01:38:27Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Maestro R81.20 and Nexus N9K -vPC connection</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264461#M3820</link>
      <description>&lt;P&gt;All four ports needs to be in one bond/PO on both ends. It's all one LACP setup.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Dec 2025 01:50:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264461#M3820</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2025-12-05T01:50:06Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Maestro R81.20 and Nexus N9K -vPC connection</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264462#M3821</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/71054"&gt;@emmap&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please help me advise steps to bundle all interfaces in one bond/PO from Po30 to Po29 to no downtime.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Dec 2025 01:56:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264462#M3821</guid>
      <dc:creator>Network_SNP</dc:creator>
      <dc:date>2025-12-05T01:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Maestro R81.20 and Nexus N9K -vPC connection</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264464#M3822</link>
      <description>&lt;P&gt;I can't provide any guarantees about downtime but the simplest method to mind would be to take the interfaces out of Po30 and put them in Po29. This isn't a Cisco forum though and I'm not a Cisco user or expert.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Dec 2025 02:10:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264464#M3822</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2025-12-05T02:10:31Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Maestro R81.20 and Nexus N9K -vPC connection</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264478#M3823</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/71054"&gt;@emmap&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My idea to change configuration:&lt;/P&gt;&lt;P&gt;1&amp;gt; Move MHO-02 to down with the command:&amp;nbsp;cpstop&lt;/P&gt;&lt;P&gt;2&amp;gt; Disable port5 and Port 6 on MHO-02 --&amp;gt; MHO-01 cover traffic&lt;/P&gt;&lt;P&gt;3&amp;gt; Change config on Cisco Nexus from po30 to po29 for 4 interface uplink to MHO.&lt;/P&gt;&lt;P&gt;4&amp;gt; cpstart MHO-02&lt;/P&gt;&lt;P&gt;5&amp;gt; Enable Port5 and Port6 on MHO-02&lt;/P&gt;&lt;P&gt;Please help me recheck Steps to ensure no downtime.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Dec 2025 06:55:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264478#M3823</guid>
      <dc:creator>Network_SNP</dc:creator>
      <dc:date>2025-12-05T06:55:37Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Maestro R81.20 and Nexus N9K -vPC connection</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264479#M3824</link>
      <description>&lt;P&gt;My plan is to isolate the MHO 02 device (which in the diagram is currently connected to PO30 on the Nexus). After that, we will remove the configuration interfaces member of Po30 and add those interfaces as members of Po29 on the Cisco Nexus switch.&lt;BR /&gt;Next, we will reconnect the MHO 02 device back into the system.&lt;/P&gt;&lt;P&gt;Can you help me with the following two issues?&lt;BR /&gt;-------------------------------------------------------&lt;BR /&gt;1. Is our approach feasible to avoid system downtime?&lt;BR /&gt;Summary of steps: [1] – Isolate MHO 02 → [2] – Configure the Cisco switch → [3] – Reconnect MHO 02.&lt;BR /&gt;2. If this approach is applicable, please provide us with the instructions on how to isolate the MHO and then reconnect the MHO afterward.&lt;BR /&gt;3. Do you have any other recommendations for this task?&lt;/P&gt;</description>
      <pubDate>Fri, 05 Dec 2025 06:58:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264479#M3824</guid>
      <dc:creator>Network_SNP</dc:creator>
      <dc:date>2025-12-05T06:58:38Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Maestro R81.20 and Nexus N9K -vPC connection</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264484#M3826</link>
      <description>&lt;P&gt;Bonding and uplink interface usage is managed at the security groups, there's no requirement or option to isolate the MHOs. Simply shut the ports at the switch side, make the necessary changes, then unshut them.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Dec 2025 07:46:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264484#M3826</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2025-12-05T07:46:20Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Maestro R81.20 and Nexus N9K -vPC connection</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264486#M3827</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Yes, that should work.&lt;/P&gt;&lt;P&gt;Important:&lt;/P&gt;&lt;P&gt;Please disable the ports on the switch side, not on the MHO.&lt;/P&gt;&lt;P&gt;Procedure:&lt;/P&gt;&lt;P&gt;- Shut down the switch ports on vpc30&lt;/P&gt;&lt;P&gt;- Add the ports to vpc29&lt;/P&gt;&lt;P&gt;- Then, re-enable the ports on the switch one by one.&lt;/P&gt;&lt;P&gt;Important:&lt;/P&gt;&lt;P&gt;Be sure to perform this action in the Change Window and ensure that the switch can still be configured even the procedure fails (Consoleconnection to the switch...)&lt;/P&gt;</description>
      <pubDate>Fri, 05 Dec 2025 09:00:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264486#M3827</guid>
      <dc:creator>Pauli</dc:creator>
      <dc:date>2025-12-05T09:00:20Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Maestro R81.20 and Nexus N9K -vPC connection</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264488#M3828</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/680"&gt;@Pauli&lt;/a&gt;&amp;nbsp;described the correct way. The bond on the security group is ok with your 4 interface. You have to change your Nexus portchannel to one portchannel with all 4 interfaces from both Nexus.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Dec 2025 09:34:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/264488#M3828</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2025-12-05T09:34:17Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Maestro to Cisco nexus 9K vPC</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/266050#M3868</link>
      <description>&lt;P&gt;If you have separate vPC on the switch side you will need separate bonds on the Check Point side.&lt;/P&gt;
&lt;P&gt;The detailed steps to otherwise move as you described would be better asked of a network engineer familiar with Nexus.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Dec 2025 09:52:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/CheckPoint-Maestro-R81-20-and-Nexus-N9K-vPC-connection/m-p/266050#M3868</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-12-28T09:52:40Z</dc:date>
    </item>
  </channel>
</rss>

