- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi,
Could someone please help us with this, We have a client who are using R80.10 cluster firewall and has the ISP failover configured but then when the primary ISP goes down we can see on the tracker that the secondary ISP preceded the connection but then there are still no internet connection for the users, we have already done the isolation listed below.
- Check secondary ISP internet connection by bypassing the firewall (has internet connection.)
- Make sure that we only has one default gateway ( Primary ISP default Gateway)
- Check the next hop IP address for both ISP on ISP redundancy setting on smartdashboard
- Check sk61692 for possible misconfiguration.
- Make sure the default gateway/next hop IP address for both ISP are reachable.
- Check ISP failover status on Clish by using " cpstat fw " command.
- We also do a testing on a standalone R80.10 firewall and has the same output.
Regards,
Hello,
Could you elaborate with "cpstat fw" result and tell us routing table is changing when ISP failover "route -n".
Hi Anthony,
Thanks for your reply, when I run " cpstat fw " I could see that both ISP have OK status and then for testing I would manually turn down the primary to check if failover would work, after turning down the primary ISP I would see on tracker that the primary ISP are down and that the secondary ISP are up for connection but then there is still no internet connection for users.
When ISP goes down, you should have a change on the routing table.
"watch -d route -n"
Do you see it ?
regards,
Anthony
Yes I could see the default route change whenever I manually turn down the primary ISP, whats weird is that I could see on the tracker that the failover are working and that my firewall users are being NATed using the secondary ISP IP address but still internet access are not working.
I also try to test this setup to R77.30 firewall and its working, only in R80.10 that I'm having trouble.
Thanks for responding.
Hello Rudy,
from what I learn about R80.10, Topology is much more enforced than before.
An example: If topology is wrong on the object, it can discard the trafic without blocking it. (database correction solve the issue)
I'll build this morning a lab with R77.30 and R80.10 with 2 ISP and try to replicate your issue.
Did you try to disable Sxl for testing purpose ?
Could you kindly provide me some more debugs.
ping 8.8.8.8 //from one host on your network
fwaccel off //(if you can)
fw ctl zdebug drop | grep 8.8.8.8
fw monitor -e "host(8.8.8.8),accept;"
route -n
fw ctl affinity -l -r -v
remove has much information about host ip etc ... we need interfaces and NAT.
regards,
Anthony
In case the backup line goes UP and there is still no Internet connection, what about NAT rules? Have you got properly configured them for inside networks like following?
Hi Petr,
I have already check the NAT configuration for the users to that setting and its still not working.
Thanks for responding.
1) Tried clearing the CAM tables on your switches/routers? Also, any static ARP's?
2) Have you run a zdebug + drop as well as fwmonitor(Turn of SXL)? That would hopefully tell you a little more.
3) Failover? Rebooted the members?
Hi,
Thanks for responding.
1. There are no static ARP's on the router.
2. Try to run fwmonitor and it shows that both connections for ISP are working fine.
3. Yes we setup the configuration as failover., what do you mean by rebooted the member?
Hi Guys!
I just solve the issue today, I install the jumbo hotfix for R80.10 take 154 for it work, Thanks everyone for help!
I am also facing the same error on R80.30, can someone please help me on this
Regards,
Najeeb Ahmad
Did you get a solution to this problem, kindly share
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
24 | |
15 | |
4 | |
3 | |
3 | |
3 | |
3 | |
3 | |
2 | |
2 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY