- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi I am moving an interface from a single 1 gb interface eg eth5 to 2 x10gb interface in a bond.
The ip addresses assigned are staying the same.
MGT is R81.20 & firewalls are R81.10 hfa 147
The issue is that topology needs an interface, can we have different ip addresses in topolgy? has anyone done this ?
The aim in to do this without a major outage
Any help is appreciated
What i would like to do is :
Standby fw :
1) remove ip address from eth5
2) add bond
3) assign ip address
4) add bond to topolgy
5) confirm fw in h/a
6) failover to primary firewall
7) do steps 1 -6
This kind of interface migration is quite common when upgrading from 1Gb to 10Gb links. Since you're keeping the same IP addresses, the key challenge is updating the topology in SmartCenter correctly and ensuring anti-spoofing doesn't interfere during the transition.
I suggest an updated step-by-step guide:
eth5)bondX) and assign the same IPI find this process I shared last month easier. There's no need to mess with antispoofing at all. It relies on the fact the members of a cluster don't actually need to use the same interface name to back a given cluster interface and VIP. As long as your cluster is working properly, there isn't any risk to traffic at all.
This kind of interface migration is quite common when upgrading from 1Gb to 10Gb links. Since you're keeping the same IP addresses, the key challenge is updating the topology in SmartCenter correctly and ensuring anti-spoofing doesn't interfere during the transition.
I suggest an updated step-by-step guide:
eth5)bondX) and assign the same IPvery appreciated
I would also add...always do "get interfaces WITHOUT topology"
Andy
I find this process I shared last month easier. There's no need to mess with antispoofing at all. It relies on the fact the members of a cluster don't actually need to use the same interface name to back a given cluster interface and VIP. As long as your cluster is working properly, there isn't any risk to traffic at all.
Very detailed process, thanks Bob!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 22 | |
| 15 | |
| 7 | |
| 6 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY