<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CP1400 Cluster &amp;quot;move&amp;quot; WAN-IP on failover? in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15700#M450</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I find it real strange that .252 stops to respond. Local IPs must always respond and only the cluster IP should be flapping. To me it looks like there is some&amp;nbsp;problem between the switch and the appliances.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Btw, do you ping them from machine in same VLAN ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to try with another switch ? Preferably one that is not very intelligent.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 23 May 2018 03:25:48 GMT</pubDate>
    <dc:creator>HristoGrigorov</dc:creator>
    <dc:date>2018-05-23T03:25:48Z</dc:date>
    <item>
      <title>CP1400 Cluster "move" WAN-IP on failover?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15692#M442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't really get the "anatomy" of a CP1400 series cluster. Two questions for you guys:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Can I achive this setup with a 1400 series cluster config:&lt;BR /&gt;(active CP cluster member holds public WAN IP; on cluster failover, IP will be bound by new active (former inactive) member)&lt;BR /&gt;&lt;BR /&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64641_pastedImage_7.png" style="width: auto; height: auto;" /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;Is there more comprehensive information on clustering CP 1400 series than the 1 1/2 pages in the&amp;nbsp;&lt;EM&gt;Check Point 1430/1450 Appliance Locally Managed Administration Guide&lt;/EM&gt;?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As always; Thanks in advance for your feedback!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Apr 2018 10:13:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15692#M442</guid>
      <dc:creator>Julius_Kaiser</dc:creator>
      <dc:date>2018-04-17T10:13:32Z</dc:date>
    </item>
    <item>
      <title>Re: CP1400 Cluster "move" WAN-IP on failover?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15693#M443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Julius,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A cluster&amp;nbsp;with SMB appliances is not very different from other Check Point appliances.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need 3 static IP addresses on the same subnet for every cluster interface in order to make failover possible, 1 for each member (physical IP addresses) and a VIP address wich will change owner upon failover.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means you would need a range of public IP adresses to connect your WAN interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I have managed to do for costumers that had a single public IP address was to set the cluster behind the ISP router. The WAN interface would be in a private IP range (such as 192.168.0.0/24). Then I set the router to forward everything from the internet to the VIP address of the cluster. Not ideal, but it works.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Apr 2018 16:30:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15693#M443</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2018-04-17T16:30:34Z</dc:date>
    </item>
    <item>
      <title>Re: CP1400 Cluster "move" WAN-IP on failover?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15694#M444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you want to achieve is basically what HA cluster do, so no problem with that, it is supported in 1400 appliances.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is the ClusterXL admin guide (just google it) that describes in great details how this cluster technology works. For SMB devices there are some known limitations regarding this (check&amp;nbsp;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;sk105380).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Btw, if you plan to use VLANs on the WAN interface you will likely run into the problem described by me somewhere earlier in this section.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;From my personal experience configuring ClusterXL on 1400 with WebUI is not very robust and stable but it works at the end.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Good luck with your setup.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Apr 2018 03:28:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15694#M444</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-04-18T03:28:27Z</dc:date>
    </item>
    <item>
      <title>Re: CP1400 Cluster "move" WAN-IP on failover?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15695#M445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Pedro,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is exactly what I would assume and what I'm doing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a range of public IP addresses (indeed a /24 public range), every physical CP appliance (cluster member) gets one of these IPs + one VIP from the same range, e.g.:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;physical address 1: x.x.x.53&lt;/P&gt;&lt;P&gt;physical address 2: x.x.x.54&lt;/P&gt;&lt;P&gt;virtual cluster ip: x.x.x.55&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm monitoring the WAN interfaces for failover.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What happens is that the virtual IP answeres for ~20 pings, than does not respond anymore. A failover (unplugging one WAN link) does not lead to the VIP responding again.&lt;/P&gt;&lt;P&gt;I will try to add some output here (pings, arp) but will only manage to do so in the evening..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your feedback so far!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Apr 2018 03:28:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15695#M445</guid>
      <dc:creator>Julius_Kaiser</dc:creator>
      <dc:date>2018-04-18T03:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: CP1400 Cluster "move" WAN-IP on failover?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15696#M446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then it seems you are having a real problem and might be best to open a ticket with support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might want to check the HA page on WebUI to see if all required interfaces are set for HA and click the diagnostics to see problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These commands might also help you:&lt;/P&gt;&lt;P&gt;cphaprob stat&lt;/P&gt;&lt;P&gt;cphaprob -a if&lt;/P&gt;&lt;P&gt;cphaprob -l list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Share the results with us if you wish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Apr 2018 13:45:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15696#M446</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2018-04-18T13:45:19Z</dc:date>
    </item>
    <item>
      <title>Re: CP1400 Cluster "move" WAN-IP on failover?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15697#M447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is this a locally managed cluster or are they managed by a management server?&lt;/P&gt;&lt;P&gt;When it is managed by a management server, this should just work fine, when you set it up as a Small Business Cluster.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have no experience with a locally managed cluster but am working on getting 8 centrally managed clusters going.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Apr 2018 18:09:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15697#M447</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-04-18T18:09:42Z</dc:date>
    </item>
    <item>
      <title>Re: CP1400 Cluster "move" WAN-IP on failover?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15698#M448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you very much for your input on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;@&lt;A _jive_internal="true" data-userid="50921" data-username="maart190aef73-58b6-43b8-aee6-8bbb11391e10" href="https://community.checkpoint.com/people/maart190aef73-58b6-43b8-aee6-8bbb11391e10"&gt;Maarten Sjouw&lt;/A&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Is this a locally managed cluster or are they managed by a management server?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;It is a locally managed cluster.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;@&lt;A _jive_internal="true" data-userid="44190" data-username="pedro23fac3ce-976b-4758-9531-4174df93a9b2" href="https://community.checkpoint.com/people/pedro23fac3ce-976b-4758-9531-4174df93a9b2"&gt;Pedro Espindola&lt;/A&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;You might want to check the HA page on WebUI to see if all required interfaces are set for HA and click the diagnostics to see problems.&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;These commands might also help you:&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;cphaprob stat&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;cphaprob -a if&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;cphaprob -l list&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I will consult the ClusterXL Guide, lab the setup and provide further information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, to this point, I never had a satitisfying experience with clustering 1400 series. I have to manage one production 1400 cluster that does not failover well (was initially configured by a former colleague - I wouldn't know what to do different though!) and my own&amp;nbsp;clustering attempts on this platform. The wizard and further configuration seams pretty straight forward, not really leaving a question on what to enter where.. (and I'm managing&amp;nbsp;lots of firewalls from many different vendors, so, kinda having an idea of what to setup usually)..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;@&lt;A _jive_internal="true" data-userid="52207" data-username="fwadm45c50081-5f45-4031-82dd-3186622f70de" href="https://community.checkpoint.com/people/fwadm45c50081-5f45-4031-82dd-3186622f70de"&gt;Hristo Grigorov&lt;/A&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff;"&gt;From my personal experience configuring ClusterXL on 1400 with WebUI is not very robust and stable but it works at the end.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;This is exactly what this feels like; not at all like configuring e.g. HSRP/ VRRP and voila. I always have the feeling "it'll may work if I do things in the right order and timing", but the first failover or firmware upgrade will definitely blow things up. On the other side&amp;nbsp;there're just a few web form fields, sync interfaces, even default heartbeat config shipping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok, I will be glad to rtfm and get back to you guys with actual configuration and debug output.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Apr 2018 20:00:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15698#M448</guid>
      <dc:creator>Julius_Kaiser</dc:creator>
      <dc:date>2018-04-18T20:00:43Z</dc:date>
    </item>
    <item>
      <title>Re: CP1400 Cluster "move" WAN-IP on failover?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15699#M449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello folks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I finally found some time to lab this again. Once the cluster is formed, it's pretty obvious what's happening:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.161.91.251&amp;nbsp;&amp;nbsp;&amp;nbsp;primary node, physical&lt;BR /&gt;10.161.91.252&amp;nbsp;&amp;nbsp;&amp;nbsp;secondary node, physical&lt;BR /&gt;10.161.91.254&amp;nbsp; &amp;nbsp;clusterxl virtual IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming&amp;nbsp;&lt;SPAN&gt;10.161.91.252 holds active role (master node that presents configuration etc):&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;10.161.91.251 is always responding to ping&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;10.161.91.252 responds to ping for approx. 30 sec, than stops responding&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;10.161.91.254 starts responding, responds for approx. 30 sec, than stops&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;10.161.91.252 starts responding again and so on&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;These 30 sec suggest that this has something to do with mac aging on the switch. (LAN interfaces terminate on a switch in a VLAN). However, setting mac aging to 10s on the switch does not lead to a shortened interval for "flapping" of the responding address.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have already tried to stick all MAC-addresses I can see to both ports connecting to the primary and secondary member.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px; font-family: 'courier new', courier, monospace;"&gt;&lt;STRONG&gt;mac address-table static 0100.5e7f.fffa vlan 1 interface FastEthernet0/2 FastEthernet0/1&lt;BR /&gt;mac address-table static 0100.5e00.0016 vlan 1 interface FastEthernet0/2 FastEthernet0/1&lt;BR /&gt;mac address-table static 001c.7f7e.6f78 vlan 1 interface FastEthernet0/2 FastEthernet0/1&lt;BR /&gt;mac address-table static 001c.7f7c.e19d vlan 1 interface FastEthernet0/2 FastEthernet0/1&lt;BR /&gt;mac address-table static 0100.5e00.00fb vlan 1 interface FastEthernet0/2 FastEthernet0/1&lt;BR /&gt;mac address-table static 0100.5e00.00fc vlan 1 interface FastEthernet0/2 FastEthernet0/1&lt;BR /&gt;mac address-table static 0000.0000.fe00 vlan 1 interface FastEthernet0/2 FastEthernet0/1&lt;BR /&gt;mac address-table static 0000.0000.fe01 vlan 1 interface FastEthernet0/2 FastEthernet0/1&lt;BR /&gt;mac address-table static 0100.5e5A.0A64 vlan 1 interface FastEthernet0/2 FastEthernet0/1&lt;BR /&gt;mac address-table static 0100.5e28.0A64 vlan 1 interface FastEthernet0/2 FastEthernet0/1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; font-size: 15px;"&gt;I also disabled igmp snooping globally on the switch &amp;amp; set CCP to unicast instead of multicast. None of this changed this behaviour. There is currently no other layer 3 devices involved expect of the CheckPoints and my client host.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; font-size: 15px;"&gt;The switch has layer 3 capabilities (Catalyst 2960 for testing), but no IP interfaces in VLAN 1, where the LAN-interfaces of the cluster are placed.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; font-size: 15px;"&gt;Is this a lead to follow? Do you have any ideas on this?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; font-size: 15px;"&gt;As always, thanks in advance for your time and feedback!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; font-size: 15px;"&gt;/edit: The sync interfaces are directly connected with a straight patch cable.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 May 2018 14:25:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15699#M449</guid>
      <dc:creator>Julius_Kaiser</dc:creator>
      <dc:date>2018-05-22T14:25:32Z</dc:date>
    </item>
    <item>
      <title>Re: CP1400 Cluster "move" WAN-IP on failover?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15700#M450</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I find it real strange that .252 stops to respond. Local IPs must always respond and only the cluster IP should be flapping. To me it looks like there is some&amp;nbsp;problem between the switch and the appliances.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Btw, do you ping them from machine in same VLAN ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to try with another switch ? Preferably one that is not very intelligent.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2018 03:25:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15700#M450</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-05-23T03:25:48Z</dc:date>
    </item>
    <item>
      <title>Re: CP1400 Cluster "move" WAN-IP on failover?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15701#M451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; border: 0px; font-weight: bold; font-size: 12px;"&gt;&lt;STRONG&gt;001c.7f7e.6f78 and&amp;nbsp;&lt;SPAN style="border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;001c.7f7c.e19d are the physical addresses, the&amp;nbsp;&lt;SPAN style="background-color: #ffffff; border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;0000.0000.fe00 and&amp;nbsp;0000.0000.fe01 are source MAC for CCP packets, however there should only be one source MAC per cluster as far as I know sk121953 ( I know it is for GAIA not embedded).&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="border: 0px; background-color: #ffffff; color: #333333; font-weight: bold; font-size: 12px;"&gt;&lt;STRONG style="background-color: #ffffff; border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;&lt;STRONG&gt;The&amp;nbsp;sk25977 describes the MAC Addresses used and also problems seen with them when using more than one cluster on 1 switch.&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="border: 0px; background-color: #ffffff; color: #333333; font-weight: bold; font-size: 12px;"&gt;&lt;STRONG style="background-color: #ffffff; border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;&lt;STRONG&gt;The 0100 MAC addresses are described in Destination Multicast MAC Addresses in that same SK..&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="border: 0px; background-color: #ffffff; color: #333333; font-weight: bold; font-size: 12px;"&gt;&lt;STRONG style="background-color: #ffffff; border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;&lt;STRONG&gt;In centrally managed solutions sometimes clusters can be set to Forward traffic to member to cluster IP.&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="border: 0px; background-color: #ffffff; color: #333333; font-weight: bold; font-size: 12px;"&gt;&lt;STRONG style="background-color: #ffffff; border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;&lt;STRONG&gt;On your switch you will probably need to disable all types of security on the ports, Nexus Switches in VM environments have similar problems when you try to setup a VSEC cluster. These security setting prevent the usage of more than one mac on a port from the same device.&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2018 04:39:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15701#M451</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-05-23T04:39:44Z</dc:date>
    </item>
    <item>
      <title>Re: CP1400 Cluster "move" WAN-IP on failover?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15702#M452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julius&lt;/P&gt;&lt;P&gt;As discussed the issue was found to be due to the "&lt;STRONG style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;CODE&gt;fw_allow_simultaneous_ping" setting not being set and you were seeing the following messages in fw ctl zdebug drop&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;;[cpu_0];[fw4_0];fw_log_drop_ex: Packet proto=1 x.x.x.x:2048 -&amp;gt; x.x.x.x:9672 dropped by fw_handle_first_packet Reason: fwconn_key_init_links (INBOUND) failed;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, x.x.x.x:0&amp;nbsp;-&amp;gt; x.x.x.x:2 IPP 1&amp;gt;, dropped by handle_outbound_pac, Reason: connection not found;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Implementing&amp;nbsp;&lt;SPAN style="font-size: 11.0pt;"&gt;sk26874 resolved the issue&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2018 14:24:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1400-Cluster-quot-move-quot-WAN-IP-on-failover/m-p/15702#M452</guid>
      <dc:creator>Nick_Finney</dc:creator>
      <dc:date>2018-08-24T14:24:11Z</dc:date>
    </item>
  </channel>
</rss>

