- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Ask Check Point Threat Intelligence Anything!
October 28th, 9am ET / 3pm CET
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
I had a multi-hour call with Diamond TAC today dealing with a VSX cluster R81.20 after an update to JHF 89. We had one VS with an interface with multiple VLANs that was missing the highest VLAN on the monitored list. No matter what trick we did, we couldn't get the 2 JHF 89 gateways to sync up with the 1 older JHF gateway. It was affecting only ONE VS, too, not the others. All others worked just fine!
I rolled back JHF 89 and instead installed JHF 84 and all is well now. This may not affect everyone, but TAC told me about another case they had with the exact same issue.
Hopefully your updates aren't as troublesome, and may they bring you success, but be aware of your multi-VLAN interfaces for VSX. JHF 89 doesn't seem to play nice with those.
Starting from R81.20 Take 89, ONLY lowest VLAN is monitored.
Apparently a known issue.
We also have an SR open for this on VSX running R81.10 and Take 150 onwards.
Good to know! I had old client tell me about it the other day, but I was not aware it was a known issue until I saw your post.
Andy
If we face issues with monitored VLANs, in most cases cpstop;cpstart from problematic VS help.
If not fixed after cprestart, there is not documented command:
fw vsx restart_vs <VSID>
Example for restarting VS 3: fw vsx restart_vs 3
Try that if it helps.
Yep, did that, too. Good idea. Didn’t help, tho. VS remained down on the JHF 89 gateway.
Full rollback was the only remaining option.
Hello,
as Alex already mentioned we are one of the customers with this issue. And also TAC told us about other cases. Our case is open since 22 October. We are waiting for a debug script.
As it seems that there are more and more users experiencing this problem I wonder why checkpoint doesn't place a warning or at least a "known issue" so that customers planning to go to the "recommended" release will have something to go on.
we will add it to the important note of the jumbo by tomorrow
Hello Matan,
you posted an entry this morning in this case. Where is this entry? Was the information wrong?
Regards,
Jan
Hi @Jan_Kleinhans we are still working on the most accurate communication.
meanwhile, be aware we have a fix and it will be released in the jumbo we plan to release next week
Thanks
Matan.
Hi All
We have identified an issue with the new Jumbo take that affects the VSX cluster env with VLANs.
During the installation on the Standby member, a temporary monitoring mismatch occurs:
the Standby begins monitoring only the lowest VLAN, while the Active member monitors both the lowest and highest VLANs.
This mismatch causes an "ACTIVE!" (on the member running the pre JHF 89 version) or Down state (instead of Standby state on the member running JHF 89) to be triggered.
Although this is a cosmetic issue and does not impact traffic flow or failover functionality, we still recommend that VSX customers wait for the next Jumbo release ( Plan to be released next week). Important note in the jumbo doc will be added today as well
For customers who wish to proceed with the installation, an SK with detailed installation instructions will be published today (and shared on this thread).
Will this also include a Jumbo update for JHFA106 on R81 (The issue is on this as well - TAC case raised and identified)
sk182819 was published for this issue.
Awesome!
doing cpstop on active member cannot be considered as "manual failover". Better wording should be "hard switchover with small outage". Maitanance window is needed anyway.
It is also not clear from the article if cpstop/failover should be done from VS0 or from specific VS. Depending if VSX is in HA or VSLS mode.
In which world can happen that affected VS will be in STANDBY state while highest VLAN is not monitored correctly ? It has to be in DOWN state and "normal failover" cannot happen due to LPRB or IAC Pnote problem.
Starting from R81.20 Take 89, ONLY lowest VLAN is monitored.
Looks like just came out today.
The SK mentions this issue is fixed in R82.
We don't see upgrading VSX clusters to R82 before a year of hotfixes if not more.
We see a similar issue in R81.10 and hope some fixes will roll out for other versions as well.
Only R81.10, R81.20 and R82 are still supported. All other versions are EoL already (R81 reached EoL in October 2024).
I agree with you about R82. Once R82 is not declared as Recommended version, there is no way I am going to put this version on production firewall. There are tons of bugs within R81.10 and R81.20. I will be surprised if R82 is exception.
Back to the topic - What does it mean that highest VLAN issue is fixed in R82 ? If it is by design that monitoring of highest VLAN is no longer available starting from R81.20 Take 89, what/how it is fixed in R82 ? R82 is just R81.20 Take 89 with updated kernel and fancy new features...
We have a commercial agreement to extended support, hence my question and the fact a new Jumbo has been released for R81, so it makes sense CP should fix this issue prior going to final recommended release.
R81.20 JHF T90 was released with the fix for this issue.
I see came out today, let me install it in the lab.
Andy
"Problem" solved then, close all the cases 🙂
Just need R81.10 and R81 Jumbo's to know be updated.
R81.10 JHF T171 was released with the same fix.
R81 JHF Take 107 was also released with the relevant fix.
so, it looks like sk182816 which was about "Starting from R81.20 Take 89, ONLY lowest VLAN is monitored" has been deleted.
At the end it was really a bug and not a feature ?
Didnt want to be too specific, thus general, ordinary, any Vendor.
lol
The SK was deleted because, it turns out, it's a duplicate.
The correct SK is: https://support.checkpoint.com/results/sk/sk182819
If I remember correctly what was written within deleted sk182816, it was that starting from R81.10 Take 169 and also R81.20 Take 89, only lowest VLAN is monitored by default.
Within sk182819 it is mentioned that by default both lowest and highest VLANs are monitored by default:
The Standby VSX Cluster Member starts monitoring only the lowest VLAN, while the Active VSX Cluster Member continues to monitor both the lowest VLAN and the highest VLAN (which is the default behavior).
Anyway, I will test it in LAB and report back where is the truth.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
21 | |
13 | |
12 | |
9 | |
7 | |
7 | |
7 | |
7 | |
5 | |
4 |
Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewWed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewTue 28 Oct 2025 @ 12:30 PM (EDT)
Check Point & AWS Virtual Immersion Day: Web App ProtectionAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY