- Products
- Learn
- Local User Groups
- Partners
-
More
Celebrate the New Year
With CheckMates!
Value of Security
Vendor Self-Awareness
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
Mobile Security
Buyer's Guide Out Now
Important! R80 and R80.10
End Of Support around the corner (May 2021)
This week we had some clusters upgraded from R80.10 to R80.30, the customer wants the new and improved HTTPS functionality.
When we were done, on 2 VRRP clusters we had some automatic NAT and a special Hide NAT (for WiFi guests) After upgrading you install the policy twice, first the acces and then again for the Threat Prevention policy.
After some time we were told the Guest WiFi did not work, investigation pointed in the end to the proxy ARP that was not active, so we added the Proxy ARP command for the Hide address, pushed the access policy (the third time). After looking with fw ctl arp we then saw 2 Proxy ARP addresses, the one we added and the other was a automatic NAT.
After removing the manual Proxy ARP again, the fw ctl arp kept showing both ARP entries.
When we upgraded the other cluster we checked again after 1, 2 and 3 pushes of the access policy and only after the third push the Proxy ARP addresses showed up.
It has been reported and R&D will be informed.
Hello everyone,
As stated, today we upgraded one of the members to R80.30 and we had the same issue as in R80.20, this time we could verify that it was an ARP issue only affecting in the Proxy ARP configuration.
It seems like magic but as soon as we pushed policies for the third time the affected services started to work, and the output of fw ctl arp was complete.
If R80.30 is stable we will upgrade the other member by monday 22/7, I'm really eager to see how this issue is handled after failovers, will update afterwards.
Regards,
Did anyone get any response from TAC about why this happens and how to avoid it ?
thanks
Peter
bump
Maarten,
In our case we are using ClusterXL and this behaviour happened with R80.20 and R80.30 (The other member is in R80.10). During the first test with R80.20 we could not see the output of fw ctl arp, but after seeing your post we checked the fw ctl arp state of the active cluster in R80.10, as soon as we generated the failover with cphastop the output of the same command was by far incomplete compared to the other member with standby member of R80.10.
After the third policy push fw ctl arp output was properly complete and our switches started to see the correct MAC.
Regards,
bump
Hi all,
We found an issue with Cluster VRRP and we are working on a fix.
if someone encounter same issue on none VRRP environment can he please contact me offline so we can investigate the system?
iliay@checkpoint.com
Hi,
currently we have the fix as HF so customers that encounter with this issue can open ticket to get the fix.
the fix will be included on future JHF.
Thanks,
Ilya
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY