- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
This week we had some clusters upgraded from R80.10 to R80.30, the customer wants the new and improved HTTPS functionality.
When we were done, on 2 VRRP clusters we had some automatic NAT and a special Hide NAT (for WiFi guests) After upgrading you install the policy twice, first the acces and then again for the Threat Prevention policy.
After some time we were told the Guest WiFi did not work, investigation pointed in the end to the proxy ARP that was not active, so we added the Proxy ARP command for the Hide address, pushed the access policy (the third time). After looking with fw ctl arp we then saw 2 Proxy ARP addresses, the one we added and the other was a automatic NAT.
After removing the manual Proxy ARP again, the fw ctl arp kept showing both ARP entries.
When we upgraded the other cluster we checked again after 1, 2 and 3 pushes of the access policy and only after the third push the Proxy ARP addresses showed up.
It has been reported and R&D will be informed.
Hello everyone,
As stated, today we upgraded one of the members to R80.30 and we had the same issue as in R80.20, this time we could verify that it was an ARP issue only affecting in the Proxy ARP configuration.
It seems like magic but as soon as we pushed policies for the third time the affected services started to work, and the output of fw ctl arp was complete.
If R80.30 is stable we will upgrade the other member by monday 22/7, I'm really eager to see how this issue is handled after failovers, will update afterwards.
Regards,
Did anyone get any response from TAC about why this happens and how to avoid it ?
thanks
Peter
bump
Maarten,
In our case we are using ClusterXL and this behaviour happened with R80.20 and R80.30 (The other member is in R80.10). During the first test with R80.20 we could not see the output of fw ctl arp, but after seeing your post we checked the fw ctl arp state of the active cluster in R80.10, as soon as we generated the failover with cphastop the output of the same command was by far incomplete compared to the other member with standby member of R80.10.
After the third policy push fw ctl arp output was properly complete and our switches started to see the correct MAC.
Regards,
bump
Hi all,
We found an issue with Cluster VRRP and we are working on a fix.
if someone encounter same issue on none VRRP environment can he please contact me offline so we can investigate the system?
iliay@checkpoint.com
Hi,
currently we have the fix as HF so customers that encounter with this issue can open ticket to get the fix.
the fix will be included on future JHF.
Thanks,
Ilya
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
23 | |
12 | |
9 | |
8 | |
8 | |
6 | |
5 | |
5 | |
4 | |
4 |
Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY