<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: New Maestro Cluster SIC errors in Hyperscale Firewall (Maestro)</title>
    <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/276249#M4212</link>
    <description>&lt;P&gt;Hello mates,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Following SK that I was pointed to, &lt;A href="https://protect.checkpoint.com/v2/r02/___https:/support.checkpoint.com/results/sk/sk168181___.YzJlOmNwYWxsOmM6bzo0NTc4YjU2MmM3YzNlMTc1NjA2OGQxMmNiOTUyYmFlMTo3OmYyNzY6MjA2YWYwOTI1ZjZmMDI0NGZkZmNjZDZiOTNhYzYxN2ZmNTFjM2Q0OGQzZjVkZWI4ODliNmI4ZjIxYThkODNiMDpoOlQ6Tg" data-auth="NotApplicable" target="_blank"&gt;SK168181&lt;/A&gt;&amp;nbsp;( thank you &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/33946"&gt;@Gennady&lt;/a&gt;&amp;nbsp; and &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/71054"&gt;@emmap&lt;/a&gt;&amp;nbsp;) it states that what we’re facing, is due to "Dataplane Endpoint Learning".&lt;/P&gt;
&lt;TABLE width="623"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="623"&gt;
&lt;P&gt;&lt;STRONG&gt;Symptoms&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Security Group Management interfaces (Example: eth1-Mgmt4, magg0) are intermittently inaccessible. Policy installation most likely fails during this time.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Communication issues with ClusterXL members.&lt;BR /&gt;Traffic captures indicate the packets are forwarded to the wrong member.&lt;BR /&gt;For example - when trying to access the Standby member, packets are forwarded to the Active member.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Cluster status monitoring commands like 'cphaprob stat' do not show any problematic status&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Active traffic may be forwarded to the wrong cluster member or Maestro SGM&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Cause&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Cisco ACI has several proprietary features which cause problems with Check Point clusters.&lt;BR /&gt;These features are "Endpoint Dataplane Learning", "COOP Endpoint Dampening", and "Rogue Endpoint Detection".&amp;nbsp;&lt;BR /&gt;Before explaining these features, we will review some key points about Check Point clusters.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Check Point Clustering&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Most switches learn information about hosts connected to the network by listening to ARP requests and replies. Check Point clustering relies on this behavior to ensure traffic is always sent to the Active cluster member by using GARP.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key points about ClusterXL Clusters:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;All clustered interfaces have a Virtual IP (VIP) which is shared by all cluster members.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Any cluster member may transmit information on a clustered interface using the shared VIP and their own &lt;STRONG&gt;unique&lt;/STRONG&gt;&amp;nbsp;MAC address.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Traffic destined for the shared VIP &lt;STRONG&gt;must&lt;/STRONG&gt;&amp;nbsp;be forwarded to the Active cluster member.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key points about Chassis and Maestro Security Groups:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;The IP configured on the Management port is shared between all Security Group members.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Only the SMO replies to ARP requests received on the Management port.&lt;BR /&gt;All other SGMs drop the ARP request.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Any SGM in the Security Group may transmit information using the Management port, the shared Management IP, and their own &lt;STRONG&gt;unique&lt;/STRONG&gt;&amp;nbsp;MAC address.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Traffic received on the Management port &lt;STRONG&gt;must&lt;/STRONG&gt;&amp;nbsp;have the destination MAC address of the current SMO.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Cisco Endpoint Learning Features&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Cisco ACI does not behave like most switches as explained above.&amp;nbsp;&lt;BR /&gt;The switches still listen to ARP requests and replies to learn about the network.&lt;BR /&gt;With "Dataplane Endpoint Learning", the Cisco switches also learn about the network from the source IP and source MAC information in regular network traffic.&lt;BR /&gt;&lt;BR /&gt;Because any Cluster member or SGM can transmit traffic using their own unique MAC address and a shared IP address, the Cisco ACI switch thinks that the shared IP is constantly "moving" to different MACs.&lt;BR /&gt;If the IP-MAC association changes too frequently, the IP is considered "misbehaving" or "rogue".&lt;BR /&gt;&lt;BR /&gt;Once the shared IP address is considered "misbehaving" or "rogue", Cisco features like "Rogue Endpoint Detection" or "COOP Endpoint Dampening" disable updates and freeze the current IP-MAC association. If the frozen MAC does not belong to the currently active Cluster member or SMO SGM, then there will be traffic issues.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Solution&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;There are several possible solutions:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: Each of the following is an independent option. They are &lt;STRONG&gt;not &lt;/STRONG&gt;all required.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Option 1: In ClusterXL clusters, configure the cluster to use VMAC as explained in &lt;A href="https://protect.checkpoint.com/v2/r02/___https:/supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk50840___.YzJlOmNwYWxsOmM6bzo0NTc4YjU2MmM3YzNlMTc1NjA2OGQxMmNiOTUyYmFlMTo3OjUxZTU6MzBhNmJhNzhhMWE0NWZmMTAxNGVmNzNjOGRmYjM4ODk3OWEzYTYyZGU5Mjk0MGVkNjc5YzRkMmQxODY5ODBiZDpoOlQ6Tg" data-auth="NotApplicable" target="_blank"&gt;sk50840&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;BR /&gt;Chassis and Maestro Security Groups use VMAC by default for Data interfaces.&lt;BR /&gt;VMAC is currently not supported on Chassis and Maestro Management interfaces&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Option 2: As of Cisco version 5.2(1g), Endpoint Dataplane Learning can now be configured at the EPG level (per host). To resolve the behavior, simply disable Endpoint Dataplane Learning for the relevant Check Point Cluster / Maestro IP Address(es). The new configuration options are explained in &lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://protect.checkpoint.com/v2/r02/___https:/www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/application-centric-infrastructure/white-paper-c11-739989.html%23IPDataplaneLearningperhost___.YzJlOmNwYWxsOmM6bzo0NTc4YjU2MmM3YzNlMTc1NjA2OGQxMmNiOTUyYmFlMTo3OmJmOWY6Y2JjM2U4MDU0Nzk0YWFmYWJkZDMyYTI0NTE5NjZlOGQ2NTJhMThjY2UzZjI5YmZjYmQwMjBjZjY0NzMyYzk2YjpoOlQ6Tg" data-auth="NotApplicable" target="_blank"&gt;this Cisco documentation&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, we had checked our DC ACI and we could confirm what the SK states.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Sorin_Gogean_0-1777459135806.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34145i18958005ADF18975/image-size/large?v=v2&amp;amp;px=999" role="button" title="Sorin_Gogean_0-1777459135806.png" alt="Sorin_Gogean_0-1777459135806.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;and&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Sorin_Gogean_1-1777459135819.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34144i997AF7AAD59834E4/image-size/large?v=v2&amp;amp;px=999" role="button" title="Sorin_Gogean_1-1777459135819.png" alt="Sorin_Gogean_1-1777459135819.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Based on those information’s we’re seeing in the Faults/Events I was able to confirm that the management issue could be cause by "Dataplane Endpoint Learning".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As this confirms that we indeed had 2 MAC’s pointing to the same IP address – 10.4.169.181 from the 0012.C1&lt;STRONG&gt;10&lt;/STRONG&gt;.00B5 and 0012.C1&lt;STRONG&gt;20&lt;/STRONG&gt;.00B5&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Sorin_Gogean_2-1777459135832.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34146iF15AB63B0DD56D77/image-size/large?v=v2&amp;amp;px=999" role="button" title="Sorin_Gogean_2-1777459135832.png" alt="Sorin_Gogean_2-1777459135832.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;and&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Sorin_Gogean_3-1777459135844.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34147iA5B2A5E2210C9D97/image-size/large?v=v2&amp;amp;px=999" role="button" title="Sorin_Gogean_3-1777459135844.png" alt="Sorin_Gogean_3-1777459135844.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;To confirm those, we have also tested by temporary moving Management Ports outside ACI and as soon as DC guys helped us with the connections move, we could validate SIC for 5 - 7 times. Previously we could not get 3 out of 5 validations.&lt;/P&gt;
&lt;P&gt;As we can’t stay with the Management outside of ACI, we&amp;nbsp;discussed with DC ACI responsible colleagues to disable the “IP Data-plane Learning” on specific IP’s and confirm if that fixes our problem or not. Just few minutes after we had set the specific IP's to not do “IP Data-plane Learning”, we could validate the the SIC communication, same way we did while outside ACI.&amp;nbsp;&lt;/P&gt;
&lt;DIV id="tinyMceEditor_1e851c3d788602Sorin_Gogean_6" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ACI.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34148iB5885FEBCEAFCEC0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ACI.png" alt="ACI.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In conclusion, if you have in your DataCenters ACI implemented, or wherever you install Maestro, make sure that the Security Group Management is either outside ACI - if that is possible - but if you don't, then add the Management IP's specifically and disable&amp;nbsp;“IP Data-plane Learning” !!!!&lt;BR /&gt;&lt;BR /&gt;Confusing part was that we would expect to see Alerts on ACI, like any other MAC or IP flapping but that was not the case. On Maestro Security Group, it seems that even there is one SG appliance selected as "primary" for Management, the traffic shows with MAC from each node in certain cases.&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="100%" height="69px"&gt;[Expert@ALVA-SGFW01-s01-01:0]# ifconfig | grep 00:12&lt;BR /&gt;wrp0 Link encap:Ethernet HWaddr 00:12:C1&lt;STRONG&gt;:10:&lt;/STRONG&gt;00:B4&lt;BR /&gt;[Expert@ALVA-SGFW01-s01-01:0]#&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD height="69px"&gt;[Expert@ALVA-SGFW01-s01-02:0]# ifconfig | grep 00:12&lt;BR /&gt;wrp0 Link encap:Ethernet HWaddr 00:12:C1:&lt;STRONG&gt;20:&lt;/STRONG&gt;00:B4&lt;BR /&gt;[Expert@ALVA-SGFW01-s01-02:0]#&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD height="69px"&gt;[Expert@ALVA-SGFW01-s01-03:0]# ifconfig | grep 00:12&lt;BR /&gt;wrp0 Link encap:Ethernet HWaddr 00:12:C1&lt;STRONG&gt;:30:&lt;/STRONG&gt;00:B4&lt;BR /&gt;[Expert@ALVA-SGFW01-s01-03:0]#&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD height="25px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD height="25px"&gt;
&lt;P&gt;[Expert@ALVA-SGFW01-s01&lt;U&gt;&lt;STRONG&gt;-03&lt;/STRONG&gt;&lt;/U&gt;:0]# asg stat -i tasks&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;| Task (Task ID) | Site1 |&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;| SMO (0) |&lt;STRONG&gt; 1&lt;/STRONG&gt; |&lt;BR /&gt;| General (1) |&lt;STRONG&gt; 1&lt;/STRONG&gt; |&lt;BR /&gt;| LACP (2) | &lt;STRONG&gt; 1&lt;/STRONG&gt; |&lt;BR /&gt;| CH Monitor (3) | &lt;STRONG&gt; 1&lt;/STRONG&gt; |&lt;BR /&gt;| DR Manager (4) | &lt;STRONG&gt; 1&lt;/STRONG&gt; |&lt;BR /&gt;| UIPC (5) | &lt;STRONG&gt; 1&lt;/STRONG&gt; |&lt;BR /&gt;| Alert (6) | &lt;STRONG&gt; 1&lt;/STRONG&gt; |&lt;BR /&gt;| SDWAN (7) | &lt;STRONG&gt; 1&lt;/STRONG&gt; |&lt;BR /&gt;--------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;[Expert@ALVA-SGFW01-s01-03:0]#&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;Thank you everyone for the support, as I learned something new in the last months.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now we're moving forward with the planning of the migration from the 2 x 15K cluster to vFW on Maestro.&lt;BR /&gt;&lt;BR /&gt;Thank you and have a great week,&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 29 Apr 2026 11:04:44 GMT</pubDate>
    <dc:creator>Sorin_Gogean</dc:creator>
    <dc:date>2026-04-29T11:04:44Z</dc:date>
    <item>
      <title>New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275069#M4103</link>
      <description>&lt;P&gt;Hello Checkmates,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Recently we started the process of migrating to Maestro in our DC's.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For that we decided to go with 2xMHO140's&amp;nbsp; and either 3 x SG9300 or SG9400 - depending on the size of the DC.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Racked everything in February, and since then we're battling with some weird things.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Starting from the connections and set-up, we're having a single site with 2 MHO's and each SG's connected in both.&amp;nbsp;&lt;BR /&gt;Then we have the first 1 and 2 ports from MHO's connected to our ACI for SG Management - Vlan168 - and then the Uplinks on ports 5, 7, 8, 11 and 12) . For SG's - downlinks - we use port 25 (changed to downlink!) and 27 and 29 .&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33958i37AC6F41C6C70B40/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Picture1.png" alt="Picture1.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Now, for the installation process, we re-imaged the appliances with R82 T777 (back in February) and configured the Management, LOM and other standard settings.&lt;/P&gt;
&lt;P&gt;We've built an SG (VSNext) with only one appliance, did the JHF60 (again it was back in February) and added it to Management - brand new VM with R82.&lt;/P&gt;
&lt;P&gt;Added a 2nd node on the SG, and after everything synchronized we created an VS. Added that new VS to Management and all was fine.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When we wanted to push an updated policy to the newly created SG - VS0 - we got several failures due to different SIC or communication issues (as per below examples). And the FUN begins &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; .&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled picture A.gif" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33959i106549AAF269ECF2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Untitled picture A.gif" alt="Untitled picture A.gif" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled picture B.gif" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33960i6F39E216E3F89B7D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Untitled picture B.gif" alt="Untitled picture B.gif" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;From the investigations we started with Support Engineer and our Professional Services guys, we noticed that for whatever reason, when we are doing SIC verifications from Management, either 2 times out of 5 or 3 times out of 5 we get different SIC errors like:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled picture C.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33963iDF61FD70C3BA3D34/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Untitled picture C.png" alt="Untitled picture C.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;But when we check on the SG directly, we can see that SIC is OK.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled picture E.png" style="width: 520px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33964iCA359C84E039B401/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled picture E.png" alt="Untitled picture E.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;That error shows only when we have 2 or more nodes in the Security Group, either with VSNext or without.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We also applied the Certificate Hotfix for the JHF60, still no change and we also did the JHF73 without success - same SIC errors or policy push errors were seen.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;We've verified the SIC certificate to be valid and Management knows it, we re-did SIC at least 10 times, no change. As long as we have a 2nd member in Security Group, it's starting to show the SIC error while validating or pushing policies.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Last Saturday, we have re-imaged all the appliances from Singapore DC to R82 T779 and applied JHF91, same behavior.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While waiting for the Support engineer to see with BU what can be wrong, I want to ask if any of you that work with Maestro, have seen this beavior, and&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS: in order to exclude the dedicated Management interface as a possible cause of the problem, we have 3 ports shut-down from MHO side, so right now we are working with a single Interface for the management of SG's. Same SIC errors are seen.....&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 10:07:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275069#M4103</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2026-04-08T10:07:24Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275070#M4104</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1967"&gt;@Lari_Luoma&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/4113"&gt;@Anatoly&lt;/a&gt;&amp;nbsp; Any comments?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 10:23:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275070#M4104</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2026-04-08T10:23:57Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275073#M4105</link>
      <description>&lt;P&gt;How is your magg bond configured, and does it match what's on the switches? Are the switches doing any sort of MAC learning from outbound packets? If so this would need to be disabled.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 11:10:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275073#M4105</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2026-04-08T11:10:31Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275074#M4106</link>
      <description>&lt;P&gt;Either way, If we go with normal Security Group or with VSNext, the management interface is configured active/back-up .&lt;BR /&gt;On VSNext, underneath it's an MAGG while on the V0 it's an WRP interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On ACI side we have all ports set as access, no MAC filtering.&amp;nbsp;&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="100%"&gt;
&lt;P&gt;[Global] ALVS-SGFW022-s01-01:0&amp;gt; show interface magg1&lt;BR /&gt;1_01:&lt;BR /&gt;state on&lt;BR /&gt;mac-addr 00:1c:7f:4c:18:dd&lt;BR /&gt;type magg&lt;BR /&gt;link-state not available&lt;BR /&gt;instance 500&lt;BR /&gt;mtu 1500&lt;BR /&gt;auto-negotiation off&lt;BR /&gt;speed N/A&lt;BR /&gt;ipv6-autoconfig Not configured&lt;BR /&gt;monitor-mode Not configured&lt;BR /&gt;duplex N/A&lt;BR /&gt;link-speed Not configured&lt;BR /&gt;comments&lt;BR /&gt;ipv4-address Not Configured&lt;BR /&gt;ipv6-address Not Configured&lt;BR /&gt;ipv6-local-link-address Not Configured&lt;/P&gt;
&lt;P&gt;Statistics:&lt;BR /&gt;TX bytes:237474217 packets:716004 errors:0 dropped:0 overruns:0 carrier:0&lt;BR /&gt;RX bytes:1307319726 packets:2281057 errors:0 dropped:149771 overruns:0 frame:0&lt;/P&gt;
&lt;P&gt;SD-WAN: Not Configured&lt;/P&gt;
&lt;P&gt;1_02:&lt;BR /&gt;state on&lt;BR /&gt;mac-addr 00:1c:7f:4c:07:c9&lt;BR /&gt;type magg&lt;BR /&gt;link-state not available&lt;BR /&gt;instance 500&lt;BR /&gt;mtu 1500&lt;BR /&gt;auto-negotiation off&lt;BR /&gt;speed N/A&lt;BR /&gt;ipv6-autoconfig Not configured&lt;BR /&gt;monitor-mode Not configured&lt;BR /&gt;duplex N/A&lt;BR /&gt;link-speed Not configured&lt;BR /&gt;comments&lt;BR /&gt;ipv4-address Not Configured&lt;BR /&gt;ipv6-address Not Configured&lt;BR /&gt;ipv6-local-link-address Not Configured&lt;/P&gt;
&lt;P&gt;Statistics:&lt;BR /&gt;TX bytes:182919557 packets:593347 errors:0 dropped:0 overruns:0 carrier:0&lt;BR /&gt;RX bytes:1173288484 packets:2164249 errors:0 dropped:148454 overruns:0 frame:0&lt;/P&gt;
&lt;P&gt;SD-WAN: Not Configured&lt;/P&gt;
&lt;P&gt;[Global] ALVS-SGFW022-s01-01:0&amp;gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;[Global] ALVS-SGFW022-s01-01:0&amp;gt; show interfaces all&lt;BR /&gt;Interface wrp0&lt;BR /&gt;state on&lt;BR /&gt;mac-addr 00:12:c1:10:00:29&lt;BR /&gt;type wrp&lt;BR /&gt;link-state not available&lt;BR /&gt;instance 0&lt;BR /&gt;mtu 1500&lt;BR /&gt;auto-negotiation off&lt;BR /&gt;speed N/A&lt;BR /&gt;ipv6-autoconfig Not configured&lt;BR /&gt;monitor-mode Not configured&lt;BR /&gt;duplex N/A&lt;BR /&gt;link-speed Not configured&lt;BR /&gt;comments&lt;BR /&gt;ipv4-address 10.18.169.41/21&lt;BR /&gt;ipv6-address Not Configured&lt;BR /&gt;ipv6-local-link-address Not Configured&lt;/P&gt;
&lt;P&gt;Statistics:&lt;BR /&gt;TX bytes:237437595 packets:715738 errors:0 dropped:0 overruns:0 carrier:0&lt;BR /&gt;RX bytes:1145052615 packets:1333705 errors:321620 dropped:0 overruns:0 frame:0&lt;/P&gt;
&lt;P&gt;SD-WAN: Not Configured&lt;/P&gt;
&lt;P&gt;Leading to Virtual Switch: mgmt-switch (ID 500)&lt;BR /&gt;[Global] ALVS-SGFW022-s01-01:0&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;BR /&gt;Thank you,&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 11:24:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275074#M4106</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2026-04-08T11:24:39Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275077#M4107</link>
      <description>&lt;P&gt;Good day!&lt;/P&gt;&lt;P&gt;Do you see any regular packet drop when you ping from the Management Server to the SG Management IP? May it be a general connectivity issue? I see 6.5% of RX errors on magg interfaces. This doesn't look good.&lt;/P&gt;&lt;P&gt;If we see significant packet loss from the Management Server to the SG, then it is expected that SIC verification and policy push fails. We need to narrow down the problem area starting from bottom up.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 11:45:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275077#M4107</guid>
      <dc:creator>Gennady</dc:creator>
      <dc:date>2026-04-08T11:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275078#M4108</link>
      <description>&lt;P&gt;In addition,&lt;/P&gt;&lt;P&gt;Did you have a chance to capture traffic on the SG (all SGMs at the same time) at the moment when you verify SIC from the Management Server?&lt;/P&gt;&lt;P&gt;The fact that the problem appears only if you add more than 1 SGM to the SG points to some distribution problem. It should not affect magg interface until packets from the Management Server in fact arrives on some Data interface or SMO role is flapping (this is very unlikely).&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 11:52:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275078#M4108</guid>
      <dc:creator>Gennady</dc:creator>
      <dc:date>2026-04-08T11:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275079#M4109</link>
      <description>&lt;P&gt;Not MAC filtering, MAC learning. If the ACI is learning MAC addresses from outbound packets, it's going to be constantly changing the MAC table for the magg interfaces, and packets are going to get lost, leading to SIC failures. On the SG management port, each SGM uses its own MAC address, so MAC learning can break things.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 11:54:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275079#M4109</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2026-04-08T11:54:05Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275080#M4110</link>
      <description>&lt;P&gt;hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/33946"&gt;@Gennady&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No we do not have packet loss between Management and SG's.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And even if we would have a packet loss.&lt;/P&gt;
&lt;P&gt;If that would be the case, then how can we explain that in an VS created on top of the SecurityGroup, we get 5 out of 5 SIC validations and no errors when pushing the Policy?&lt;/P&gt;
&lt;P&gt;Thank you,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 11:54:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275080#M4110</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2026-04-08T11:54:49Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275081#M4111</link>
      <description>&lt;P&gt;Yes we did packet captures on Management and both SG members and shared them with the Support .&lt;BR /&gt;&lt;BR /&gt;Indeed it points to a distribution problem, but the distribution set-up is for the data-path and not for management per my understanding.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SMO role was not flapping as we checked and it's always the first member that we used to build the SG.&amp;nbsp;&lt;BR /&gt;still while doing tcpdumps on both members and we were checking SIC, we've seen that almost every time when SIC failed, the other member was showing traffic at one point. So why is shifting, I can't say.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you,&lt;BR /&gt;&lt;BR /&gt;Thank you,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 12:00:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275081#M4111</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2026-04-08T12:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275083#M4112</link>
      <description>&lt;P&gt;As I know, we don't do any MAC learning/filtering on ACI side.&lt;/P&gt;
&lt;P&gt;But, if we were to do any of that, we should have alerts on ACI side for MAC flapping and the Leaf ports that we have the Management connected - those first 2 ports from each MHO.&amp;nbsp;&lt;BR /&gt;But since we are with only one port active right now, there is no MAC flapping, unless the Management IP - 10.18.169.41 in Singapore case - jumps between the 2 members for whatever reason....&lt;/P&gt;
&lt;P&gt;I'll doublecheck and come back.&lt;BR /&gt;&lt;BR /&gt;Thank you,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 12:06:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275083#M4112</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2026-04-08T12:06:23Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275084#M4113</link>
      <description>&lt;P&gt;MAC learning would explain the shifting. If you do the tcpdumps with the MACs shown (-e) do you see the inbound MACs change when SIC stops working and you see traffic on the other SGM?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 12:08:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275084#M4113</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2026-04-08T12:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275085#M4114</link>
      <description>&lt;P&gt;We'll run again the captures and watch the MAC and come back.&amp;nbsp;&lt;BR /&gt;Still I repeat, if we are using a single port between MHO's and ACI for management, then we have a single Inbound MAC so ?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Thank you,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 12:23:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275085#M4114</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2026-04-08T12:23:20Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275087#M4115</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/71054"&gt;@emmap&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/33946"&gt;@Gennady&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;I assume you have Maestro Clusters that you have set.&lt;BR /&gt;My questions to you is, from MHO SG management ports to your network, do you connect to an ACI or standard network clusters/stack ?&lt;BR /&gt;If it's an ACI like we have, did you configure it as Access Port only or ?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thank you,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 12:37:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275087#M4115</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2026-04-08T12:37:50Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275088#M4116</link>
      <description>&lt;P&gt;As promised, we checked the ACI side for MAC flapping and we don't have any alerts for the ports that we use for SG Management.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 12:39:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275088#M4116</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2026-04-08T12:39:12Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275089#M4117</link>
      <description>&lt;P&gt;No it's MAC per SGM, not per MHO/port. If it works stable with one SGM then it's not MAC flapping. Not sure about VSNext if each VS also has its own MAC address on there but that might need checking too.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 12:39:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275089#M4117</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2026-04-08T12:39:53Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275091#M4118</link>
      <description>&lt;P&gt;I have the same understanding, and in order to exclude VSNext, we have wiped and created an standard Security Group as well.&amp;nbsp;&lt;BR /&gt;And with that we have the same SIC behavior.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ty,&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 12:50:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275091#M4118</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2026-04-08T12:50:26Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275093#M4119</link>
      <description>&lt;P&gt;I do have Maestro configured. Unfortunately, it is on R81.20 and it is connected to regular Cisco Nexus. This is why I cannot be helpful enough for your problem investigation.&lt;/P&gt;&lt;P&gt;However, please, take a look at this SK. It may give you a lead.&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk168181" target="_blank"&gt;sk168181 - Communication problems with ClusterXL clusters connected to Cisco ACI&lt;/A&gt;&lt;/P&gt;&lt;P&gt;From general Maestro standpoint. Magg interfaces are excluded from distribution, and it should not be a problem until somehow management traffic is sent/received via a data interface. Usually, it happens because of some routing mistake. I am sure that it was already checked.&lt;/P&gt;&lt;P&gt;If you would like to look into SMO state in more details, then you can try this zdebug command:&lt;BR /&gt;fw ctl zdebug -T -d 'SMO,smo' -m cluster + conf&lt;/P&gt;&lt;P&gt;It is very lightweight and shows changes in SMO role.&lt;/P&gt;&lt;P&gt;"-d" puts a filter in kernel to match string "SMO" or string "smo", otherwise module cluster with flag conf returns too many data.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 13:13:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275093#M4119</guid>
      <dc:creator>Gennady</dc:creator>
      <dc:date>2026-04-08T13:13:24Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275094#M4120</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I am not a ACI expert and not sure how much of ACI features you are using, but I know ACI is some what different than a traditional switched network.&amp;nbsp;Is there a possibility to connect the MAGG to a traditional (non-ACI) switch to see what happens?&lt;BR /&gt;Maybe you can rule out ACI.&lt;BR /&gt;&lt;BR /&gt;Don't think it is relevant here, but did you configure a Primary Interface in the MAGG bond? I have seen strange things when creating an Active/Backup bond without a Primary Interface.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Martijn&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 13:15:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275094#M4120</guid>
      <dc:creator>Martijn</dc:creator>
      <dc:date>2026-04-08T13:15:31Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275099#M4121</link>
      <description>&lt;P&gt;ty&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/33946"&gt;@Gennady&lt;/a&gt;&amp;nbsp;, I will check the SMO state and come back.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As for the ACI and SK you provided, that makes sense, but we should have alerts on ACI side if an IP changes MAC .&lt;/P&gt;
&lt;P&gt;As you see, we have the same MAC for&amp;nbsp;the SG IP:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image (9).png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33965iEF2BBB8C351E03A9/image-size/large?v=v2&amp;amp;px=999" role="button" title="image (9).png" alt="image (9).png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;ty,&lt;BR /&gt;PS: I've run the zdebug on both nodes while checking SIC and getting failures, and I did not get any packets, so during the SIC check SMO was not changing, I guess....&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 13:43:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275099#M4121</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2026-04-08T13:43:59Z</dc:date>
    </item>
    <item>
      <title>Re: New Maestro Cluster SIC errors</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275102#M4122</link>
      <description>&lt;P&gt;If there are no messages in zdebug during the problem replication. then we can rule out SMO flap.&lt;/P&gt;&lt;P&gt;An example of SMO role change is below:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Снимок экрана 2026-04-08 165052.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33967i0D633D47771335F6/image-size/large?v=v2&amp;amp;px=999" role="button" title="Снимок экрана 2026-04-08 165052.png" alt="Снимок экрана 2026-04-08 165052.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 13:54:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/New-Maestro-Cluster-SIC-errors/m-p/275102#M4122</guid>
      <dc:creator>Gennady</dc:creator>
      <dc:date>2026-04-08T13:54:40Z</dc:date>
    </item>
  </channel>
</rss>

