- Products
- Learn
- Local User Groups
- Partners
- More
Secure Your AI Transformation
9 April @ 12pm SGT / 3pm CET / 2PM EDT
Check Point WAF TechTalk:
Introduction and New Features
AI Security Masters E6: When AI Goes Wrong -
Hallucinations, Jailbreaks, and the Curious Behavior of AI Agents
Ink Dragon: A Major Nation-State Campaign
Watch HereAI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
CheckMates Go:
CheckMates Fest
Hello All, Need a help with the ClusterXL issue. We've two 23800's configured in Cluster running on R80.10 Take-42 since December-2017. Recently we discovered, In the active firewall the output of 'cphaprob stat' shows Active/Down, however in the standby firewall shows Active/Standby. We tried cpstop & cptstart and rebooted problematic one, but that doesn't resolved our issue.
On the Active Firewall:-
cphaprob stat
Cluster Mode: High Availability (Active Up) with IGMP Membership
Number Unique Address Assigned Load State
1 (local) 10.254.254.2 100% Active
2 10.254.254.1 0% Down
On the Standby Firewall:-
cphaprob stat
Cluster Mode: High Availability (Active Up) with IGMP Membership
Number Unique Address Assigned Load State
1 10.254.254.2 100% Active
2 (local) 10.254.254.1 0% Standby
Couldn't find anything in pnotes. Everything looks okay.
FW1:- Standby
cphaprob list
There are no pnotes in problem state
* Use -l option to show full list of pnotes
FW2:- Active
cphaprob list
There are no pnotes in problem state
* Use -l option to show full list of pnotes
Does anyone came across the similar issue??? Can someone please give us their valuable suggestions on this.
My suggestion is to find where the problem is.
cpharpob stat
cphaprob -l list
cphaprob -a if
cphaconf show_bond
cphaconf cluster_id get
fw ctl pstat
fw tab -t connections -s
fw ctl affinity -l -a
fw ctl multik stat
cat /var/log/messages
May be related to the improper handling of multicast by the switch.
If you can, try changing the CCP mode to broadcast and see if this'll resolve your issues: How to set ClusterXL Control Protocol (CCP) in Broadcast / Multicast mode in ClusterXL
See SK:
sk33221
sk31934
Or changing the CCP mode to broadcast:
# cphaconf set_ccp broadcast
I don't understand why multicast mode is used by default anyway. Broadcast is always the best way.
Because CCP in broadcast mode is blasted out of all interfaces of the cluster to every connected network, whereas properly configured multicast allows cluster members to subscribe to it reducing unnecessary traffic in the broadcast domain.
Yes you're right, but with 2*10 CCP packets per interface, that's no problem from my point of view. But this has been a phillosofic discussion for 20 years (broadcast or multicast). If the switches are configured correctly "multicast" is better from my point of view. CCP Broadcast is uncomplicated.
sk20576 - as mentioned above, changing CCP mode from Multicast to Broadcast resolved this issue for me.
In my last case it was the difference in affinity settings (fw ctl affinity -l -r -v) and multi-queue configuration on both members...
Also, check hotfix level for both members... cpinfo -y all
Or maybe different time configured on both members... use NTP if possible
Change CCP to broadcast, specially if there is a Cisco Nexus Switch in the middle, it's happened to me several times...
Check if the switch, the firewall is connected to, has a feature enabled called EEE (Energy Efficient Ethernet). If it is enabled, disable it and check the cluster state again.
What does the long error message on the "Down" cluster gateway show?
# cpstat ha -f all
If there are interface errors, what does the following command show?
# cphaprob -a if
Do you see sync errors or cluster change with the following command?
# clish -c "show routed cluster-state detailed"
Any sync errors:
# fw ctl pstat
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 13 | |
| 10 | |
| 8 | |
| 8 | |
| 6 | |
| 5 | |
| 5 | |
| 5 | |
| 4 | |
| 4 |
Tue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesWed 08 Apr 2026 @ 07:00 PM (CST)
ERM al Descubierto: Amenazas Ocultas que Pondrán a Prueba tu Empresa en 2026Tue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesWed 08 Apr 2026 @ 07:00 PM (CST)
ERM al Descubierto: Amenazas Ocultas que Pondrán a Prueba tu Empresa en 2026Tue 14 Apr 2026 @ 03:00 PM (PDT)
Renton, WA: Securing The AI Transformation and Exposure ManagementThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY