<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ClusterXL- switch CISCO reports Packet received with invalid source MAC address (00:00:00:00:00:00) in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/ClusterXL-switch-CISCO-reports-Packet-received-with-invalid/m-p/198552#M9827</link>
    <description>&lt;P&gt;Hello team,&lt;/P&gt;&lt;P&gt;We have a ClusterXL with two 1800 appliances with R81.10.08, in High Availability. Today the switching team informs us that from the interface connected to our WAN interface the error is generated:&lt;/P&gt;&lt;P&gt;Packet received with invalid source MAC address (00:00:00:00:00:00:00:00:00).&lt;/P&gt;&lt;P&gt;In the WAN interface I can see no errors, no drops, the cluster has not switched in those hours, and there is no evidence of high resource consumption.&lt;/P&gt;&lt;P&gt;In the switch we can see two entries in this port, the first one is the physical MAC of our WAN interface, and the second one is the VMAC address.&lt;/P&gt;&lt;P&gt;How can I verify what is happening with the interface?&lt;/P&gt;&lt;P&gt;Thanks in advance and let me know if you need more information.&lt;/P&gt;</description>
    <pubDate>Tue, 21 Nov 2023 17:38:04 GMT</pubDate>
    <dc:creator>JDCasCruz</dc:creator>
    <dc:date>2023-11-21T17:38:04Z</dc:date>
    <item>
      <title>ClusterXL- switch CISCO reports Packet received with invalid source MAC address (00:00:00:00:00:00)</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/ClusterXL-switch-CISCO-reports-Packet-received-with-invalid/m-p/198552#M9827</link>
      <description>&lt;P&gt;Hello team,&lt;/P&gt;&lt;P&gt;We have a ClusterXL with two 1800 appliances with R81.10.08, in High Availability. Today the switching team informs us that from the interface connected to our WAN interface the error is generated:&lt;/P&gt;&lt;P&gt;Packet received with invalid source MAC address (00:00:00:00:00:00:00:00:00).&lt;/P&gt;&lt;P&gt;In the WAN interface I can see no errors, no drops, the cluster has not switched in those hours, and there is no evidence of high resource consumption.&lt;/P&gt;&lt;P&gt;In the switch we can see two entries in this port, the first one is the physical MAC of our WAN interface, and the second one is the VMAC address.&lt;/P&gt;&lt;P&gt;How can I verify what is happening with the interface?&lt;/P&gt;&lt;P&gt;Thanks in advance and let me know if you need more information.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 17:38:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/ClusterXL-switch-CISCO-reports-Packet-received-with-invalid/m-p/198552#M9827</guid>
      <dc:creator>JDCasCruz</dc:creator>
      <dc:date>2023-11-21T17:38:04Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL- switch CISCO reports Packet received with invalid source MAC address (00:00:00:00:00:</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/ClusterXL-switch-CISCO-reports-Packet-received-with-invalid/m-p/198577#M9828</link>
      <description>&lt;P&gt;Have you used tcpdump -e to verify the MAC address of the packets originating from that interface are correct?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 20:45:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/ClusterXL-switch-CISCO-reports-Packet-received-with-invalid/m-p/198577#M9828</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-11-21T20:45:34Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL- switch CISCO reports Packet received with invalid source MAC address (00:00:00:00:00:</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/ClusterXL-switch-CISCO-reports-Packet-received-with-invalid/m-p/198653#M9830</link>
      <description>&lt;P&gt;I used tcpdump, but the problem isn't happenning all time. But in the cisco switch it relates the port connected to the firewall.&amp;nbsp;What else could I do to validate the problem?. Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 14:02:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/ClusterXL-switch-CISCO-reports-Packet-received-with-invalid/m-p/198653#M9830</guid>
      <dc:creator>JDCasCruz</dc:creator>
      <dc:date>2023-11-22T14:02:02Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL- switch CISCO reports Packet received with invalid source MAC address (00:00:00:00:00:</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/ClusterXL-switch-CISCO-reports-Packet-received-with-invalid/m-p/199205#M9857</link>
      <description>&lt;P&gt;Hello team,&lt;BR /&gt;Today the problem happened again, and I found one thing in common with the first time it happened. In both cases I was creating a static route in the webUI.&lt;/P&gt;&lt;P&gt;cat /var/log/routed_messages&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FIRST TIME:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;FW-2 (ACTIVE):&lt;/STRONG&gt;&lt;BR /&gt;Nov 21 10:25:29.929134 [routed] NOTICE: task_reconfigure re-initializing from /etc/routed0.conf.&lt;BR /&gt;Nov 21 10:25:29.935715 [routed] NOTICE: Tracing to "/var/log/routed.log" suspended&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;SECOND TIME:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;FW-1(ACTIVE):&lt;BR /&gt;&lt;/STRONG&gt;Nov 28 15:55:28.622737 [routed] NOTICE:&amp;nbsp; task_reconfigure re-initializing from /etc/routed0.conf&lt;BR /&gt;Nov 28 15:55:28.628394 [routed] NOTICE:&amp;nbsp; Tracing to "/var/log/routed.log" suspended&lt;/P&gt;&lt;P&gt;Now, what can I do?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Nov 2023 23:23:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/ClusterXL-switch-CISCO-reports-Packet-received-with-invalid/m-p/199205#M9857</guid>
      <dc:creator>JDCasCruz</dc:creator>
      <dc:date>2023-11-28T23:23:30Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL- switch CISCO reports Packet received with invalid source MAC address (00:00:00:00:00:</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/ClusterXL-switch-CISCO-reports-Packet-received-with-invalid/m-p/199212#M9858</link>
      <description>&lt;P&gt;Suggest engaging with the TAC: &lt;A href="https://help.checkpoint.com" target="_blank"&gt;https://help.checkpoint.com&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Nov 2023 23:50:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/ClusterXL-switch-CISCO-reports-Packet-received-with-invalid/m-p/199212#M9858</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-11-28T23:50:32Z</dc:date>
    </item>
  </channel>
</rss>

