- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Ask Check Point Threat Intelligence Anything!
October 28th, 9am ET / 3pm CET
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
Hello guys
We have noticed that after upgrading from R80.30 to R81.10 two of our clusters behave erratically after policy installation. The primary will remain as active(F) which believing the secondary is in standby while the secondary shows itself as active and the primary as Lost. This will go on for 4-5 minutes until both members converge in the correct state. cphaprob says that there are no ccp sent in the sync interface however tcpdump says otherwise
I noticed that the output of the following parameters is different on both members
[Expert@GW-01:0]# fw ctl get int fwha_mac_magic
fwha_mac_magic = 254
[Expert@GW-01:0]# fw ctl get int fwha_mac_forward_magic
fwha_mac_forward_magic = 253
[Expert@GW-02:0]# fw ctl get int fwha_mac_magic
fwha_mac_magic = 1
[Expert@GW-02:0]# fw ctl get int fwha_mac_forward_magic
fwha_mac_forward_magic = 254
Are this still relevant in R81.10, I have a case open with tac however it has been lagging so any opinion would be helpful
Rebooting the standby member has solved the issue for now, I will monitor this for a moment.
Your commands are outdated! Better look into the current CP_R81.10_ClusterXL_AdminGuide and here: sk42096: Cluster member is stuck in 'Ready' state
I did not see any mention of cluster ID or mac magic in the new admin guide. I am afraid that this is something the gateways have inherited from previous versions since they have been upgraded in place. On other R81.10 cluster I have done a clean install the values are the same on both members.
What CCP mode does each member believe it is operating in?
Note the following was introduced starting from R80.40
* Support for Cluster Control Protocol (CCP) in Unicast mode for any number of cluster members eliminating the need for CCP Broadcast, Multicast or Automatic modes.
* Eliminated the need for MAC Magic configuration when several clusters are connected to the same subnet.
* Cluster Control Protocol encryption is now enabled by default.
You're onto something while the active member has ccp correctly set as unicast on the standby it is like this
CCP mode: Manual (Multicast)
They should ideally both be the same i.e. both auto or both unicast.
Any idea as to how I can change it?
To set the CCP mode:
set cluster ccp {auto | unicast | multicast | broadcast}
cphaconf set_ccp {auto | unicast | multicast | broadcast}
This configuration applies immediately and survives reboot.
I checked in client's cluster and both members have exact same values, mac_magic as 254 and mac_forward_magic as 253.
Can you paste output of cphaprob state and cphaprob -a if?
gw2
cphaprob -a if
CCP mode: Manual (Multicast)
Required interfaces: 5
Required secured interfaces: 1
Interface Name: Status:
eth5 UP
eth8 UP
Sync (S) UP
bond0.11 (LS) UP
bond0.48 (LS) UP
S - sync, LM - link monitor, HA/LS - bond type
Virtual cluster interfaces: 16
gw1
cphaprob -a if
CCP mode: Manual (Unicast)
Required interfaces: 5
Required secured interfaces: 1
Interface Name: Status:
eth5 UP
eth8 UP
Sync (S) UP
bond0.11 (LS) UP
bond0.48 (LS) UP
S - sync, LM - link monitor, HA/LS - bond type
Virtual cluster interfaces: 16
[Expert@HostName]# cphaconf set_ccp unicast
I dont believe multicast is supported in R81.10 from what I remember last time customer and I tried changing it, but give it a go. Its been few months, so its possible it was another protocol.
I change it however the issue still happens this is what cphaprob state on gw2 looks after policy installation. There is no unique address for gw-1 either
ID Unique Address Assigned Load State Name
1 none 0% GW-01
2 (local) a.b.c.d 100% GW-02
Active PNOTEs: LPRB, IAC
Last member state change event:
Event Code: CLUS-116505
State change: DOWN -> ACTIVE(!)
Reason for state change: All other machines are dead (timeout), Interface Sync is down (Cluster Control Protocol packets are not received)
Event time: Thu Jul 14 16:59:52 2022
Last cluster failover event:
Transition to new ACTIVE: Member 1 -> Member 2
Reason: Available on member 1
Event time: Thu Jul 14 16:59:52 2022
Cluster failover count:
Failover counter: 6
Time of counter reset: Fri Jun 24 08:32:48 2022 (reboot)
What mode did you change it to?
I changed both members to unicast
So what is currently output of cphaprob state and cphaprob -a if?
CCP mode: Manual (Unicast)
Required interfaces: 5
Required secured interfaces: 1
same for both
Okay and what about magic_mac settings? Are they the same? If so, then its possible to make it work, you may need to do a quick failover by running clusterXL_admin down on master or cphastop and cphastart on BOTH.
Andy
Same thing happened to me. I upgraded from R80.30 to R81.10 and the cluster was not established as it kept poking both members. Would it be necessary to configure the CCP mode so that the cluster remains Active > Passive? and keep it in the state it comes from R80.30?
Same thing happened to me. I upgraded from R80.30 to R81.10 and the cluster was not established as it kept poking both members. Would it be necessary to configure the CCP mode so that the cluster remains Active > Passive? and keep it in the state it comes from R80.30?
I upgraded one customer's cluster from R80.40 to R81.10 and never had this problem. The mode has always been unicast.
It's also worth checking CCP encryption per sk169777.
This might be worth a try, I will probably check this on Monday and come back here with the results
This unfortunately did not work
This is exactly the behavior I am seeing too still no meaningful reply from TAC
Rebooting the standby member has solved the issue for now, I will monitor this for a moment.
Has it remained stable since?
(Note sk174510 was recently published for an MVC upgrade issue)
It has, I have marked the post as the solution, thank you for you help
So, if kernel parameters are different – what is the content of $FWDIR/boot/modules/fwkern.conf of both nodes? Any kernel parameters set there differently?
The parameters mentioned above are not in fwkern.conf
I believe it would if it was set manually
$FWDIR/boot/modules/fwkern.conf
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
21 | |
9 | |
9 | |
7 | |
7 | |
7 | |
6 | |
5 | |
5 | |
4 |
Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewWed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewTue 28 Oct 2025 @ 12:30 PM (EDT)
Check Point & AWS Virtual Immersion Day: Web App ProtectionAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY