<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Server interface configuration high availability interfaces in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/268918#M13565</link>
    <description>&lt;P&gt;&lt;A href="https://manpages.debian.org/testing/ifupdown-ng/interfaces-bond.5.en.html" target="_blank"&gt;https://manpages.debian.org/testing/ifupdown-ng/interfaces-bond.5.en.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;something for Debian but as said I would strongly recommend using a switch&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 28 Jan 2026 10:19:08 GMT</pubDate>
    <dc:creator>Vincent_Bacher</dc:creator>
    <dc:date>2026-01-28T10:19:08Z</dc:date>
    <item>
      <title>Server interface configuration high availability interfaces</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/268827#M13559</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I'm trying to configure network bonding on a Linux server (Debian 12) that connects to a &lt;STRONG&gt;Check Point SMB Gateway cluster with High Availability&lt;/STRONG&gt;. I'm experiencing interface issues and need clarification on the expected configuration.&lt;/P&gt;&lt;H2&gt;Current Setup:&lt;/H2&gt;&lt;P&gt;&lt;STRONG&gt;Check Point Side:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;SMB Gateway in HA cluster mode&lt;/LI&gt;&lt;LI&gt;LAN8 interface configured with bond-mode: 802.3ad (LACP)&lt;/LI&gt;&lt;LI&gt;Two members in the cluster&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Linux Server Side:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Debian 12 with two interfaces (ens6f0, ens6f1)&lt;/LI&gt;&lt;LI&gt;Both cables connected to the same Check Point cluster (LAN8)&lt;/LI&gt;&lt;LI&gt;Bond0 configured in 802.3ad (LACP) mode&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Current /etc/network/interfaces:&lt;/STRONG&gt;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;PRE&gt;auto bond0
iface bond0 inet static
    address x.x.x.x
    netmask 255.255.255.0
    gateway x.x.x.1
    bond-slaves ens6f0 ens6f1
    bond-mode 802.3ad
    bond-miimon 100
    bond-lacp-rate slow
    bond-xmit-hash-policy layer2+3
    bond-updelay 200
    bond-downdelay 200
    dns-nameservers 1.1.1.1&lt;/PRE&gt;&lt;/DIV&gt;&lt;H2&gt;The Problem:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;With only ens6f0 in bond0:&lt;/STRONG&gt; Everything works fine, LAN8 stays UP&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;When adding ens6f1 to bond0:&lt;/STRONG&gt; The Check Point LAN8 interface goes DOWN&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Removing ens6f1 from bond0:&lt;/STRONG&gt; LAN8 comes back UP immediately&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Bond status shows:&lt;/STRONG&gt;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;PRE&gt;Bonding Mode: IEEE 802.3ad Dynamic link aggregation
...
Slave Interface: ens6f0
MII Status: up
Aggregator ID: 1

Slave Interface: ens6f1
MII Status: up
Aggregator ID: 2  ← Different aggregator!&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;STRONG&gt;LACP partner detection:&lt;/STRONG&gt;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;PRE&gt;Partner Mac Address: 00:00:00:00:00:00  ← No LACP partner detected&lt;/PRE&gt;&lt;/DIV&gt;&lt;H2&gt;My Questions:&lt;/H2&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Is LACP (802.3ad) the correct mode&lt;/STRONG&gt; for connecting to a Check Point SMB HA cluster, or should I use active-backup instead?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;On the Check Point side&lt;/STRONG&gt;, what interface configuration is expected when a server uses bonding? Should LAN8 be configured differently for HA setups?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Should both server NICs connect to the same physical Check Point device&lt;/STRONG&gt;, or one to each cluster member?&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;H2&gt;What I've Tried:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;OK Single interface (ens6f0) works perfectly&lt;/LI&gt;&lt;LI&gt;LACP bonding causes LAN8 to go down on the second member&lt;/LI&gt;&lt;LI&gt;Both interfaces show different Aggregator IDs&lt;/LI&gt;&lt;LI&gt;No LACP partner MAC detected&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Environment:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV&gt;Quantum Spark 2560 Appliance (HA cluster)&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;Debian 12 server 4 port NICs&amp;nbsp;ens6f0, ens6f1&lt;/LI&gt;&lt;LI&gt;Gateway: 10.2.0.1 (Check Point LAN8)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Any guidance on the proper configuration would be greatly appreciated!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jan 2026 19:07:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/268827#M13559</guid>
      <dc:creator>yesok</dc:creator>
      <dc:date>2026-01-27T19:07:14Z</dc:date>
    </item>
    <item>
      <title>Re: Server interface configuration high availability interfaces</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/268892#M13560</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/138132"&gt;@yesok&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See if post I had about it recently helps. I know this was not SMB, but regular Gaia 9100 firewalls, but still, might be related.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Issue-with-9100-clusterXL-with-bond-interface-enabled/m-p/265008#M52143" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/Issue-with-9100-clusterXL-with-bond-interface-enabled/m-p/265008#M52143&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 03:50:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/268892#M13560</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-28T03:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: Server interface configuration high availability interfaces</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/268899#M13561</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;The two appliances in the HA cluster are not presenting a multi-channel bond, so trying to use LACP like that across the two appliances will not work. They are presenting two separate LACP bonds with one interface in each down to the server, but the server is presenting a single LACP bond with two interfaces back to the appliances. This won't work.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ideally you need a switching layer here so that the gateways can do their HA independly to the server's interface teaming. I don't think there's a good way to do it without a switch between them. If you set it as an active-standby bond on the server and no bond on the appliances, set the appliance HA to be 'primary up' and then set the primary interface on the server to be the one facing the primary appliance, you'll have some way to manage it.. but it won't be perfect. If the primary appliance goes into a 'down' state without that LAN8 interface going down, the server won't know that it should be using the other interface in the bond. Check Point HA isn't designed to be used without a switch on set of HA interfaces.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 05:28:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/268899#M13561</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2026-01-28T05:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: Server interface configuration high availability interfaces</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/268902#M13562</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I definitely wouldn’t go without switch interlink with LACP bonding as well. If it’s absolutely just without it, I’d first try active backup, and on the Linux side, I’d configure ARP monitoring in addition . However, I can’t actually look up any links right now, since I’m a bit limited. Maybe someone else can do that for us.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 06:45:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/268902#M13562</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-28T06:45:45Z</dc:date>
    </item>
    <item>
      <title>Re: Server interface configuration high availability interfaces</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/268906#M13563</link>
      <description>&lt;P&gt;Thank you both for your responses. Understanding how HA interfaces function on Spark was our initial requirement, which will now allow us to choose the best configuration mode. We'll proceed with testing the active-backup mode using ARP probe to verify its functionality.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 07:22:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/268906#M13563</guid>
      <dc:creator>yesok</dc:creator>
      <dc:date>2026-01-28T07:22:33Z</dc:date>
    </item>
    <item>
      <title>Re: Server interface configuration high availability interfaces</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/268914#M13564</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;If LAN8 is monitored (from cluster perspective) or has virtual IP then you must have a switch between the server and the Spark cluster. In that case, there is no point defining bond on the server.&lt;/P&gt;
&lt;P&gt;If you need a bond on the Spark side then configuration should be identical on both cluster members, e.g. LAN7+LAN8 on both gateways. Naturally, this configuration also requires switch between the cluster and the server.&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 08:59:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/268914#M13564</guid>
      <dc:creator>sigal</dc:creator>
      <dc:date>2026-01-28T08:59:45Z</dc:date>
    </item>
    <item>
      <title>Re: Server interface configuration high availability interfaces</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/268918#M13565</link>
      <description>&lt;P&gt;&lt;A href="https://manpages.debian.org/testing/ifupdown-ng/interfaces-bond.5.en.html" target="_blank"&gt;https://manpages.debian.org/testing/ifupdown-ng/interfaces-bond.5.en.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;something for Debian but as said I would strongly recommend using a switch&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 10:19:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/268918#M13565</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-28T10:19:08Z</dc:date>
    </item>
    <item>
      <title>Re: Server interface configuration high availability interfaces</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/268986#M13567</link>
      <description>&lt;P&gt;We attempted this approach using active-backup mode with ARP probes directed to one of the member IP addresses, but the interface on gw2 still remains down. Unfortunately, installing a switch is not an option for us. As an alternative, we will create a Link Aggregation interface with 2 member interfaces, where only one will be physically connected. We will keep you updated on the results.&lt;/P&gt;&lt;P&gt;gw2&amp;gt; cphaprob -a if&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;CCP mode: Manual (Unicast)&lt;BR /&gt;Required interfaces: 3&lt;BR /&gt;Required secured interfaces: 1&lt;/P&gt;&lt;P&gt;Interface Name: Status:&lt;/P&gt;&lt;P&gt;lo Non-Monitored&lt;BR /&gt;WAN UP&lt;BR /&gt;LAN1 Non-Monitored&lt;BR /&gt;LAN6 Non-Monitored&lt;BR /&gt;LAN8 (P) Inbound: DOWN (83331.8 secs)&lt;BR /&gt;Outbound: DOWN (506.6 secs)&lt;BR /&gt;SYNCBOND (S-HA) UP&lt;/P&gt;&lt;P&gt;S - sync, HA/LS - bond type, LM - link monitor, P - probing&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Linux active-backup bond configuration&lt;/P&gt;&lt;P&gt;cat /proc/net/bonding/bond0&lt;BR /&gt;Ethernet Channel Bonding Driver: v6.1.0-23-amd64&lt;/P&gt;&lt;P&gt;Bonding Mode: fault-tolerance (active-backup)&lt;BR /&gt;Primary Slave: ens6f0 (primary_reselect always)&lt;BR /&gt;Currently Active Slave: ens6f0&lt;BR /&gt;MII Status: up&lt;BR /&gt;MII Polling Interval (ms): 0&lt;BR /&gt;Up Delay (ms): 0&lt;BR /&gt;Down Delay (ms): 0&lt;BR /&gt;Peer Notification Delay (ms): 0&lt;BR /&gt;ARP Polling Interval (ms): 1000&lt;BR /&gt;ARP Missed Max: 2&lt;BR /&gt;ARP IP target/s (n.n.n.n form): x.x.x.x&amp;nbsp; //gw1 interface IP&lt;BR /&gt;NS IPv6 target/s (xx::xx form):&lt;/P&gt;&lt;P&gt;Slave Interface: ens6f0&lt;BR /&gt;MII Status: up&lt;BR /&gt;Speed: 1000 Mbps&lt;BR /&gt;Duplex: full&lt;BR /&gt;Link Failure Count: 1&lt;BR /&gt;Permanent HW addr: 6c:fe:54:8c:55:08&lt;BR /&gt;Slave queue ID: 0&lt;/P&gt;&lt;P&gt;Slave Interface: ens6f1&lt;BR /&gt;MII Status: up&lt;BR /&gt;Speed: 1000 Mbps&lt;BR /&gt;Duplex: full&lt;BR /&gt;Link Failure Count: 0&lt;BR /&gt;Permanent HW addr: 6c:fe:54:8c:55:09&lt;BR /&gt;Slave queue ID: 0&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 18:22:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/268986#M13567</guid>
      <dc:creator>yesok</dc:creator>
      <dc:date>2026-01-28T18:22:06Z</dc:date>
    </item>
    <item>
      <title>Re: Server interface configuration high availability interfaces</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/269010#M13568</link>
      <description>&lt;P&gt;It makes sense that it's down on GW2, as it won't be able to see anything on that link. It will be trying to ARP for IPs and ping them but if it's directly connected to the server's backup link, it won't be getting anything back at all. The clustering just isn't designed to work in such a situation.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 01:55:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/269010#M13568</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2026-01-29T01:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: Server interface configuration high availability interfaces</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/269011#M13569</link>
      <description>&lt;P&gt;100% true. We had exact same scenario in the post I rrferenced.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 02:56:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/269011#M13569</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-29T02:56:39Z</dc:date>
    </item>
    <item>
      <title>Re: Server interface configuration high availability interfaces</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/269016#M13571</link>
      <description>&lt;P&gt;Oh dear, I made a mistake in my thinking. That's right. Then there's probably no way around using a switch, unless you want to resort to the competition from Sunnyvale, because there you simply set two interfaces without bonding, and you're done.&lt;/P&gt;
&lt;PRE&gt;config system ha&lt;BR /&gt;   set hbdev &amp;lt;primary_interface&amp;gt;&lt;BR /&gt;   set backup-hbdev &amp;lt;backup_interface&amp;gt;&lt;BR /&gt;end&lt;/PRE&gt;</description>
      <pubDate>Thu, 29 Jan 2026 06:54:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/269016#M13571</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-29T06:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: Server interface configuration high availability interfaces</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/269492#M13593</link>
      <description>&lt;P&gt;I solved this issue by installing keepalived on Linux. Here's my working configuration:&lt;/P&gt;&lt;H2&gt;Configuration&lt;/H2&gt;&lt;H3&gt;/etc/keepalived/keepalived.conf&lt;/H3&gt;&lt;PRE&gt;global_defs {
    router_id XXXX
    enable_script_security
    script_user root
}

# Monitor Firewall 1 via ens6f0
vrrp_script check_fw1 {
    script "/usr/bin/fping -I ens6f0 -c 2 -t 500 x.x.x.x"
    interval 3
    weight -50
    fall 2
    rise 2
}

# Monitor Firewall 2 via ens6f1
vrrp_script check_fw2 {
    script "/usr/bin/fping -I ens6f1 -c 2 -t 500 x.x.x.y"
    interval 3
    weight -30
    fall 2
    rise 2
}

vrrp_instance GW_FAILOVER {
    state MASTER
    interface ens6f0
    virtual_router_id 51
    priority 100
    advert_int 1
    
    virtual_ipaddress {
        169.254.1.1/32 dev ens6f0
    }
    
    track_script {
        check_fw1
        check_fw2
    }
    
    notify_master "/etc/keepalived/use_fw1.sh"
    notify_backup "/etc/keepalived/use_fw2.sh"
}&lt;/PRE&gt;&lt;H3&gt;/etc/keepalived/use_fw1.sh&lt;/H3&gt;&lt;PRE&gt;#!/bin/bash
logger -t KEEPALIVED "Using FW1  via ens6f0"
ip route replace default via x.x.x.x dev ens6f0 metric 10&lt;/PRE&gt;&lt;H3&gt;/etc/keepalived/use_fw2.sh&lt;/H3&gt;&lt;PRE&gt;#!/bin/bash
logger -t KEEPALIVED "Switching to FW2 via ens6f1"
ip route replace default via x.x.x.y dev ens6f1 metric 20&lt;/PRE&gt;&lt;PRE&gt;chmod +x /etc/keepalived/*.sh
systemctl restart keepalived&lt;/PRE&gt;&lt;HR /&gt;&lt;H2&gt;How It Works&lt;/H2&gt;&lt;P&gt;The solution uses weighted priorities to determine failover:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Priority 100&lt;/STRONG&gt; (initial): Both firewalls reachable → Use FW1&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Priority 70&lt;/STRONG&gt;: FW2 unreachable (-30) → Stay on FW1&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Priority 50&lt;/STRONG&gt;: FW1 unreachable (-50) → Switch to FW2 (BACKUP state)&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Priority 20&lt;/STRONG&gt;: Both unreachable (-80) → FAULT state&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;When an interface goes down, the fping check automatically fails (can't ping through a down interface), triggering the appropriate failover.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Feb 2026 20:03:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/269492#M13593</guid>
      <dc:creator>yesok</dc:creator>
      <dc:date>2026-02-02T20:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: Server interface configuration high availability interfaces</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/269493#M13594</link>
      <description>&lt;P&gt;Thats amazing, thanks for letting us know&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/138132"&gt;@yesok&lt;/a&gt;&amp;nbsp;...great work!&lt;/P&gt;</description>
      <pubDate>Mon, 02 Feb 2026 20:11:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Server-interface-configuration-high-availability-interfaces/m-p/269493#M13594</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-02T20:11:20Z</dc:date>
    </item>
  </channel>
</rss>

