- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi Experts,
We upgraded RAM in one of our 4800 cluster , post-firewall reboot we noticed one of the interafce on standby member is in VRRP initialize state.
We do see the arp entry of the active member on the standby member of that interface but don't see the arp entry of the standby member on the active member for the interface in the init state.
We have done the following workaround to mitigate this:
Further Analysis.
Is there something we are missing and what can bee done to resolve the issue. ?
Regards
Sijeel
Hi Sijeel,
Just so we can get better idea, can you please send below outputs from BOTH members?
Andy
cphaprob state
cphaprob -a if
cphaprob list
cphaprob syncstat
cphaprob roles
cphaprob tablestat
Andy
Hi Andy,
Please find the output. I have also added output for below command
show vrrp summary
show vrrp interface eth1-01.1491 ( Problematic interface on standby)
show route destination 163.166.149.35 (on standby )
show route destination 163.166.149.36 (on active )
show route direct
Regards,
Sijeel
I have a call in 10 mins, but I quickly reviewed show interface command for problematic one and vmac and IDs looks correct to me. This happened AFTER upgrade you said?
Can you also please send topology config, SPECIFICALLY for problematic interface? Please blur out any sensitive data.
Andy
Please find the topology
Thanks, but I more meant topology properties ONLY for interface you have issue with, if you double click on it. I think it would also be worth to contact TAC, so they can do remote session and see whats going on.
Hi .
Please find the details , it been 2 months my team has raised a case with TAC but they arent able to identify the issue,
Do u have any idea what can be an issue as the connected route is not showing in the routing table? what could be a reason for such an issue,The link status is up for the interface
Im really not sure, as looking at your screenshots, all seems correct to me. If TAC case has been ongoing for 2 months, did they at least escalate it? Sounds way too long for an issue like this...if connected route is missing, tells me something with the interface is wrong, since its not static route, cant be added manually. What steps did TAC provide you so far?
Andy
the rest of the sub interfaces are fine the issue is with this interafce. if this was ab issue with the physical interface then we would have faced the issue with all the sub-interfaces
.TAC has taken dumps , asked to update HF . Below steps have been done till now.
As per zdebug NOKFW35 is dropping packets for 163.166.149.36 due to local local spoofing (screenshot attached)
Anti-Spoofing drops indicate that the source IP address of the packet received on a certain interface is not a part of the defined interface's topology.
Local interface address spoofing drops indicate that the Security Gateway / Cluster member received a packet with a source IP address that belongs to one of the local interfaces on the Security Gateway / Cluster member.
What type of NIC card is populated in the expansion slot?
Anything odd in /var/log/messages ?
Can you please confirm the version & jumbo that this gateway/cluster is installed with?
(Note 4800 appliances are no longer supported).
Hi Chris,
R80.40 +take 180 is installed . I dont see any odd messages also, the rest of the logical interfaces on the physical port are working fine. the issue is with 1 logical interface.
Line card model : CPAP-4-1F Type 4 ports 1 gbe sfp
Note Take 196 is the current recommended release and includes the following VRRP fixes for awareness.
Hey @Malik1 ,
I think, as always, @Chris_Atkinson brings up a good point. To add to what he said, I would strongly consider also upgrade to R81.10, jumbo 94, if you can, as its super stable.
Not sure if TAC made that recommendation yet.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
9 | |
8 | |
6 | |
5 | |
5 | |
5 | |
5 | |
5 | |
4 | |
4 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY