- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
We are using ClsuterXl with 2gateway cp9100 and we have two isp, we have configured isp redundancy but when isp 1 down then we are not able to get internet, we have configured ISP Redundancy from ClusterXL, I have mentioned some output below.
Please provide the output of the following:
[Expert@RM2-FW02:0]# cphaprob -a if
CCP mode: Manual (Unicast)
Required interfaces: 5
Required secured interfaces: 1
Interface Name: Status:
eth1 UP
eth2 UP
eth3 UP
Sync (S) UP
Mgmt Non-Monitored
bond1 (LS) UP
S - sync, HA/LS - bond type, LM - link monitor, P - probing
Virtual cluster interfaces: 7
eth1 125.17.XX.XX -ISP1
eth2 14.195.XX.XX-ISP2
eth3 10.20.xx.10
bond1 10.199.xx.5
vpnt1 169.254.xx.118
vpnt2 169.254.xx.157
vpnt3 169.254.xx.222
[Expert@RM2-FW02:0]#
EMB-SJRM2-FW01> show route all
Codes: C - Connected, S - Static, R - RIP, B - BGP (D - Default),
O - OSPF IntraArea (IA - InterArea, E - External, N - NSSA),
IS - IS-IS (L1 - Level 1, L2 - Level 2, IA - InterArea, E - External),
A - Aggregate, K - Kernel Remnant, H - Hidden, P - Suppressed,
NP - NAT Pool, U - Unreachable, i - Inactive
S 0.0.0.0/0 via 14.195.XX.XX, eth2, cost 0, age 55725
C 1.1.1.0/24 is directly connected, Sync
SYNC
C 10.20.XX.0/28 is directly connected, eth3
Sens ASA
C i 10.20.XX.0/28 is directly connected, eth3
Sensopart ASA
S 10.98.XX.0/23 via 169.254.106.117, vpnt1, cost 0, age 55725
AWS SG Tunnel
S 10.159.XX.0/19 via 169.254.84.157, vpnt2, cost 0, age 55725
BFL AWS Mumbai
S 10.162.XX.0/16 via 169.254.XXX.221, vpnt3, cost 0, age 55725
BFL BFSI AWS Mumbai
C 10.199.XX.0/28 is directly connected, bond1
CORE_SW _1_2-LAN
C i 10.199.XX.0/28 is directly connected, bond1
CORE_SW _1_2-LAN
S i 10.199.XX.0/28 via 10.199.XX.1, bond1, cost 0, age 55725
FIREWALL VLAN 199
ClusterXL snap below.
Hi @VIKAS1
Have you read this?
|
Primary/Backup |
Outgoing traffic uses an active primary link. Hide NAT is used to change the source address of outgoing packets to the address of the interface, through which the packet leaves the Security Gateway / Scalable Platform Security Group. This allows return packets to be automatically routed through the same ISP link, because their destination address is the address of the correct link. Administrator configures the Hide NAT settings. |
When "not working" you're able to ping the 8.8.8.8, or there is no traffic to outside direcion at all?
Akos
When "not working" you're able to ping the 8.8.8.8, or there is no traffic to outside direcion at all?
Not able to ping 8.8.8.8
ISP Redundancy on a Security Gateway / Security Group , i will go through this once
And if you run a fw monitor to 8.8.8.8 you see the leaving interface correctly (iIoO)?
What do you see in the SmarLog? Is this traffic NATed to the correcp publicIP?
we are planning a controlled troubleshooting activity bcz of its live setup during weekend ,However, we have observed that when one ISP (e.g., Airtel or TATA) goes down, the entire network loses internet access — impacting all users
I suppose that, there would be a NAT issue. There is a manual NAT which translated the traffic eg.: to TATA's public IP address and when it goes down the NAT still NAT to TATA's private address instead of Artiel.
Here an article about NAt: https://support.checkpoint.com/results/sk/sk174197
Could you please check this too?
Akos
Yes sure, i will go through sk174197. will share you NAT configuration which we have applied.
One more thing:
Have you tried to set this thing?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 26 | |
| 19 | |
| 10 | |
| 8 | |
| 6 | |
| 6 | |
| 5 | |
| 5 | |
| 5 | |
| 4 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY