- Products
- Learn
- Local User Groups
- Partners
- More
Call For Papers
Your Expertise, Our Stage
Ink Dragon: A Major Nation-State Campaign
Watch HereAI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
The Great Exposure Reset
AI Security Masters E4:
Introducing Cyata, Securing the Agentic AI Era
CheckMates Go:
CheckMates Fest
Hello All,
Please I need your help.
We have a cluster of 2 VSX gateways in Gaia R80.40.
After a failover, one of the members stocks "down". From the screenshot in attachment, it seems as the fwd. process has crashed.
We did CPSTOP / CPSTART on the firewall, but the FWD process did not restart.
In the FWD logs, I can see this line which I cannot interpret: Unable to open '/vs0/dev/fw6v0': Connection refused.
Please could some one help?
Very possibly, the following is a fix in R80.40 JHF T198 that you could verify with TAC.
PRJ-44434,PMTR-89908 - ClusterXL
UPDATE: Improved the fullsync time after reboot in large scale environments. Refer to sk180742
https://support.checkpoint.com/results/sk/sk180742
Something maybe wrong with the fwkern.conf file. Did you make any changes in the file?
https://support.checkpoint.com/results/sk/sk92810
Akos
Hello @AkosBakos,
Thanks for your reply.
The file has not been modified.
But I will compare the file of the faulty firewall with that of the active one.
Maybe it was modified earlier, but the reboot happened only today -> that's why the problem arose today.
Akos
We have the problem since months after a failover and we had rebooted the firewall before.
Yesterday we just did another reboot.
I see, maybe can you just move/rename the fwkern.conf file (only for a test), then perform a reboot again, If the member come up to Standby, we caught the root cause.
Akos
Which JHF version is this machine installed with and have you reviewed the issue with TAC?
Note R80.40 became EOL in April of this year so please start planning your upgrade to a supported version.
Hello @Chris_Atkinson,
The JHF version is Take: 180 on both firewalls.
Do you think an upgrade to R81.20 or update the JHF could solve the issue?
Very possibly, the following is a fix in R80.40 JHF T198 that you could verify with TAC.
PRJ-44434,PMTR-89908 - ClusterXL
UPDATE: Improved the fullsync time after reboot in large scale environments. Refer to sk180742
https://support.checkpoint.com/results/sk/sk180742
Hello All,
I have not yet get in touch with the TAC, the local partner is still trying to open a case for us.
In the meantime, I just noticed that the license for Antibot and antivirus are expired on the faulty firewall.
Could it be the problem?
License status of these blades is not a factor for ClusterXL.
I would patch the firewalls with the latest recommended JHF, your call if you wish to have some prior validation from TAC.
Hello,
Thank you @Chris_Atkinson for your response. Installing the JHF T211, solved the issue.
But after the upgrade from R80.40 to R81.20 JHFT89, we noticed that the MAC of the management interface of the firewalls had changed. Is it normal? what could be the reason?
Thanks,
Is the Management interface configured as a bond, potentially it might change if the slaves came up in a different order.
I am sorry, but I am not sure I understand your response.
Please could you more explicit? If you have a link or document that could explain the process, I will be pleased if you you could share it.
The environment is cluster of 2 VSX firewalls with 1 VS each. The management interface is not a bond.
What hardware / appliance is used, do you have VMAC configured?
Seems sk98219 doesn't apply in your case, I would follow-up with TAC if the problem persists or is creating an issue.
https://support.checkpoint.com/results/sk/sk98219
Hi @Chris_Atkinson,
The SK definitely applies to my case. I made a mistake, the Mgmt interface is on a bond.
Thank you very much for your valuable help!
Thanks to all who take their time to help me!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 35 | |
| 21 | |
| 18 | |
| 12 | |
| 9 | |
| 9 | |
| 8 | |
| 8 | |
| 8 | |
| 7 |
Tue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesThu 19 Mar 2026 @ 11:00 AM (EDT)
Tips and Tricks 2026 #2: AI Security Challenges and SolutionsTue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesThu 19 Mar 2026 @ 11:00 AM (EDT)
Tips and Tricks 2026 #2: AI Security Challenges and SolutionsTue 24 Mar 2026 @ 04:00 PM (CET)
Maestro Masters EMEA: Hyperscale Firewall Architectures and OptimizationTue 24 Mar 2026 @ 06:00 PM (COT)
San Pedro Sula: Spark Firewall y AI-Powered Security ManagementThu 26 Mar 2026 @ 06:00 PM (COT)
Tegucigalpa: Spark Firewall y AI-Powered Security ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY