- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hi Community,
I want to disable or switch off the CCP packet check on specific interfaces. Only on 1 interface out of 8.
So if the CCP packet is not receiving on this interfaces, this will not cause cluster failover.
Is it possible somehow?
BR
Akos
Yes just define the desired interfaces as Network Type "private" in the topology of the cluster object. However I don't think you are allowed to present a cluster/virtual IP address when the interface is in this mode; the firewalls just use their dedicated fixed IP addresses on the private interface.
Hi Timothy,
Yes, this can be a solution, but I need to present 1 IP as gateway, so this can't be a solution.
An I forgot one important thing, this is an SMB cluster R80.20.15
BR
Akos
You can configure the interface to only monitor the physical link rather than CCP packets:
Hi,
Thanks for the information.
After I posted my question, I found this article
An I forgot one important thing, this is an SMB cluster R80.20.15. The article belongs to R81. Is it applicable on SMB appliances as well?
BR
Akos
@mcatanzaro Done. It was not obvious from the start that this is an SMB issue 🙂
You are right, Sorry about that
This is not possible on locally managed SMBs. On centrally managed, you can configure it: When High Availability is disabled on the interface, the interface is considered non-monitored private (not part of the cluster configuration).
See Quantum Spark 1500, 1600 and 1800 Appliance Series R80.20.30 Centrally Managed Administration Guide p.23
Yes, it is a centrally managed SMB cluster. If I set non-monitored private, it will cause lost the ability of the virtual IP which is really important in that two trunc interface.
I know the cluster prerequisites, which describes between cluster interfaces must be layer 2 connection....
In a nutshell:
There is a special device with two interfaces:

On the special device (appliance) eth1 and eth2 is a linux bond trunc interface. This device is probing its default gateway on both interfaces. The traffic will flow on that IF, which receives the ARP answer faster.
And no, I can't put an active device there (router, switch, etc.) It is prohibited.
This is a very special scenario
Any idea will appreciate
Open an SR# with TAC !
Done 🙂
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 |
Tue 19 May 2026 @ 06:00 PM (IDT)
AI Security Masters E8 - Claude Mythos: New Era in Cyber SecurityWed 20 May 2026 @ 11:00 AM (CEST)
The New DDoS Reality: Autonomy, Scale, and the Future of DefenceTue 19 May 2026 @ 06:00 PM (IDT)
AI Security Masters E8 - Claude Mythos: New Era in Cyber SecurityWed 20 May 2026 @ 11:00 AM (CEST)
The New DDoS Reality: Autonomy, Scale, and the Future of DefenceFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY