- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
A question about how many physical ports are down before a bond is shown down.
In the examples for how to build bond groups it show two interface been bonded and when issuing a 'cphaprob show_bond' (show cluster bond all from clish) it shows 2 interfaces configures and interfaces required been 1.
S
uch as;
Bond name | Mode | Sate |Slaves configured |Slaves link up |Slaves required
bond100.100 | Load Sharing | UP | 2 | 2 | 1
bond110.200 | Load Sharing | UP | 4 | 4 | 3
This from my testing means that a single interface been down will not show the bond interface as down but as 'UP!' - Bond interface us UP yet attention required.
Bond name | Mode | Sate |Slaves configured |Slaves link up |Slaves required
bond100.100 | Load Sharing | UP ! | 2 | 1 | 1
bond110.200 | Load Sharing | UP | 4 | 4 | 3
I also have a bond group configured using four interfaces, so when running the command it shows as four up but three required. Is there anyway to change the number of required interfaces, so the device would stay active with two interfaces down, so 'required' been 2 rather than 3?
Bond name | Mode | Sate |Slaves configured |Slaves link up |Slaves required
bond100.100 | Load Sharing | UP | 2 | 2 | 1
bond110.200 | Load Sharing | DOWN | 4 | 2 | 3
Searching the knowledge base is drawing a blank for me, anyone know of a SK that could assist?
Thanks, I'll have a look at that.
Well, the gateways accept the command and the cpha_bond_ls_config.conf looks correct.
However 'cphaprob show_bond' still shows configured 4 up 4 required 3, after a policy push.
The question is - is it working then or not? (even it's still showing wrong number of required slaves)
What is your software/JHF version?
If you feel that everything seems to be properly configured and it still doesn't work as expected then TAC should be involved.
BR
Daniel.
Show version all;
Product version Check Point Gaia R81.10
OS build 335
OS kernel version 3.10.0-957.21.3cpx86_64
OS edition 64-bit
cpinfo;
==============================================
General Info
==============================================
OS: Gaia
Version: R81.10 - Build 883
kernel: R81.10 - Build 793
Type: GW cluster
What about JHF? (cpinfo -y all).
BR
Daniel.
it looks like the initial policy push I did, didn't make the change 'live'. I've just re-pushed the policy after making a non related change and can now see the following;
Bond name | Mode | Sate |Slaves configured |Slaves link up |Slaves required
bond100.100 | Load Sharing | UP | 2 | 2 | 1
bond110.200 | Load Sharing | DOWN | 4 | 2 | 2
Thanks for your help Daniel. looks like I'm behind a HFA so next weeks job will be raising the changes for patching the SC's and gateways on the live systems.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 66 | |
| 19 | |
| 13 | |
| 12 | |
| 11 | |
| 9 | |
| 9 | |
| 7 | |
| 7 | |
| 7 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY