Hi all,
I'm trying to use our old and unsupported Checkpoint 21800 Gateways as an analysis firewall in our Cisco ACI fabric. The gateways should be used to see the communication patterns between various devices. Based on the logs Cisco ACI contracts will be applied in the fabric. The gateways should only be used for initial analysis - no real world traffic.
I've setup the gateways with the latest supported version 80.40 and the latest (recommended) Jumbo Take 211. ClusterXL was configured manually. CIsco recommends a one-armed firewall for this use case. Therefore the Cluster had been configured as follows:
fw-1 eth01 (cluster & sync) in aci pod 1 -> 10.200.90.4/29
fw-2 eth01 (cluster & sync) in aci pod 2 -> 10.200.90.5/29 (Active Node)
VMAC -> 10.200.90.6/29
Gateway -> 10.200.90.1/29
Now I have this weird phenomenon:
Ping checks under any linux environment (our linux jump host, cisco switches and routers) work flawlessly.
Ping checks under Windows:
Ping to 10.200.90.4 works perfect
Ping to 10.200.90.5 works perfect
Ping to 10.200.90.6 does not work
After some wait time and no traffic to the above mentioned IPs it looks like this
Ping to 10.200.90.4 works perfect
Ping to 10.200.90.5 does not work
Ping to 10.200.90.6 works perfect
and so on ...
Did a wireshark trace under Windows and it showed that the Cluster is not responding from the VMAC IP 10.200.9.6 but instead responding from 10.200.9.5
Verified under linux with fping
fping 10.200.90.4 10.200.90.5 10.200.90.6
10.200.90.4 is alive
10.200.90.5 is alive
[<- 10.200.90.5]10.200.90.6 is alive
means that fping received the ICMP echo reply from 10.200.90.6, but it came with a source address of 10.200.90.5.
I've search all available SKs but without success. Any ideas from the experts how to solve or remediate this?
Could "Cluster IP Addresses on Different Subnets" be a solution? But how to configure this on a one-armed-firewall?
Any help is highly appreciated 😁
Kind regards
Oliver