- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello All,
Please I need your help.
We have a cluster of 2 VSX gateways in Gaia R80.40.
After a failover, one of the members stocks "down". From the screenshot in attachment, it seems as the fwd. process has crashed.
We did CPSTOP / CPSTART on the firewall, but the FWD process did not restart.
In the FWD logs, I can see this line which I cannot interpret: Unable to open '/vs0/dev/fw6v0': Connection refused.
Please could some one help?
Very possibly, the following is a fix in R80.40 JHF T198 that you could verify with TAC.
PRJ-44434,PMTR-89908 - ClusterXL
UPDATE: Improved the fullsync time after reboot in large scale environments. Refer to sk180742
https://support.checkpoint.com/results/sk/sk180742
Something maybe wrong with the fwkern.conf file. Did you make any changes in the file?
https://support.checkpoint.com/results/sk/sk92810
Akos
Hello @AkosBakos,
Thanks for your reply.
The file has not been modified.
But I will compare the file of the faulty firewall with that of the active one.
Maybe it was modified earlier, but the reboot happened only today -> that's why the problem arose today.
Akos
We have the problem since months after a failover and we had rebooted the firewall before.
Yesterday we just did another reboot.
I see, maybe can you just move/rename the fwkern.conf file (only for a test), then perform a reboot again, If the member come up to Standby, we caught the root cause.
Akos
Which JHF version is this machine installed with and have you reviewed the issue with TAC?
Note R80.40 became EOL in April of this year so please start planning your upgrade to a supported version.
Hello @Chris_Atkinson,
The JHF version is Take: 180 on both firewalls.
Do you think an upgrade to R81.20 or update the JHF could solve the issue?
Very possibly, the following is a fix in R80.40 JHF T198 that you could verify with TAC.
PRJ-44434,PMTR-89908 - ClusterXL
UPDATE: Improved the fullsync time after reboot in large scale environments. Refer to sk180742
https://support.checkpoint.com/results/sk/sk180742
Hello All,
I have not yet get in touch with the TAC, the local partner is still trying to open a case for us.
In the meantime, I just noticed that the license for Antibot and antivirus are expired on the faulty firewall.
Could it be the problem?
License status of these blades is not a factor for ClusterXL.
I would patch the firewalls with the latest recommended JHF, your call if you wish to have some prior validation from TAC.
Hello,
Thank you @Chris_Atkinson for your response. Installing the JHF T211, solved the issue.
But after the upgrade from R80.40 to R81.20 JHFT89, we noticed that the MAC of the management interface of the firewalls had changed. Is it normal? what could be the reason?
Thanks,
Is the Management interface configured as a bond, potentially it might change if the slaves came up in a different order.
I am sorry, but I am not sure I understand your response.
Please could you more explicit? If you have a link or document that could explain the process, I will be pleased if you you could share it.
The environment is cluster of 2 VSX firewalls with 1 VS each. The management interface is not a bond.
What hardware / appliance is used, do you have VMAC configured?
Seems sk98219 doesn't apply in your case, I would follow-up with TAC if the problem persists or is creating an issue.
https://support.checkpoint.com/results/sk/sk98219
Hi @Chris_Atkinson,
The SK definitely applies to my case. I made a mistake, the Mgmt interface is on a bond.
Thank you very much for your valuable help!
Thanks to all who take their time to help me!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
18 | |
11 | |
6 | |
6 | |
6 | |
6 | |
6 | |
4 | |
3 | |
3 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY