- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Is this expected behaviour design that Checkpoint Standby node in cluster will access internet, IPS update, contacting internal servers etc., happens through Sync interface?
Pinged Google DNS 8.8.8.8 from Standby node and captured traffic on Standby firewall using tcpdump and observed traffic echo request packets on sync interface but there is no reply. Further observed there is difference in Source MAC address which leads to VMWare ESX host drops packet.
I have changed Forged transmits option to Accept from Reject in ESX portgroup fixed the issue. However, I would like to know from Checkpoint experts about below Unknown MAC addresses.
Below packet capture from Standby node sync interface
02:56:2e:00:00:01 (Unknow MAC) > 00:0c:29:XX:XX:XX (Active Node Sync interface MAC), ethertype IPv4 (0x0800), length 98: X.X.X.X (Standby Node internet interface IP) > 8.8.8.8: ICMP echo request, id 16914, seq 115, length 64
00:01:00:00:fd:01 (Unknown MAC) > 00:0c:29:YY:YY:YY (Standby Node Sync interface MAC), ethertype IPv4 (0x0800), length 98: 8.8.8.8 > X.X.X.X (Standby Node internet interface IP): ICMP echo reply, id 16914, seq 28, length 64
Dear @Nandhakumar
@Chris_Atkinson has mentioned above sk167453, but indeed, it does not apply to your case directly, and the forwarding MAC is not described there.
However, there are other documentation sources. Please look into the forwarding chapter of the older ClusterXL ATRG (page 41): https://supportcenter.checkpoint.com/supportcenter/portal/role/supportcenterUser/page/default.psml/m...
It explains how traffic is forwarded and how the special forwarding MAC address is formed. Look up fwha_mac_forward_magic parameter (page 42 of the document).
Note the ATRG is for R80.10 and below. In later documentation forwarding mechanism is no longer mentioned. Yet forwarding MAC still applies.
If you need an official answer, please open a case with TAC.
Hope this answers your question. If not, feel free to elaborate further.
Standby members traffic via Sync is expected (R80.40) and higher, refer: sk167453
Note sk169154 (section 3.4) provides a mechanism to alter the behaviour if needed.
Thanks for that information. However, I would like to know Unknown MAC address belongs to Checkpoint or not? How can we ensure that?
There is no aymmetric connection issue here.
Chris is correct it is indeed expected behavior. As far as unknown MAC, can you verify if that MAC is indeed showing either in cphaprob -a if or ifconfig -a command?
Andy
There is no such MAC address obderved by running suggested commands
Do you see the same mac-address when both cluster members are on the same ESX host?
Possibly correction layer mac-address TAC should be able to help confirm.
I dont think so this is specific to ESX host. I am getting same in Checkpoint appliance standby node as well.
But your cluster works fine otherwise? No failover issue?
Cluster works absolutely fine. Only issue with Standby node unable to communicate outside world, that too fixed after allowed Forged transmits in ESX but we want to understand from Checkpoint why this behaviour and where these MAC address were getting generated?
Why it not forward packets with actual standby sync interface MAC address as Source MAC?
I dont have any more ideas, sorry mate. Maybe open a TAC case and see what they say. Personally, I had never seen that before.
No issues @the_rock . Have already TAC case opened but no useful update from them. I have figured out all these things by myself. Let me see, what they will answer for this Unknown MAC.
Thanks for your response 🙂
One MAC is from EQUIP'TRANS (see above) - 02:56:2e:00:00:01 is not tied to a vendor. All CP appliances interface HW MACs are in the form:
00:1C:7F:xx:yy:zz
MAC-Segment: | 00:01:00:00:00:00 - 00:01:00:FF:FF:FF (MA-L) |
---|---|
Hersteller: | EQUIP'TRANS |
Adresse: | 31 rue Paul Cezanne LA ROCHETTE 77000 FR |
Those are MAC addresses used to forward traffic from a Standby member. Check why the standup member is actually receiving traffic that needs to be forwarded.
Not getting your point. @G_W_Albrecht @_Val_ Standby member uses same kind of MAC address to forward traffic to other hosts irrpespective of type of deployment (Deploy in Physical server such as HP or deploy as VM in esx host or Checkpoint appliance).
So, Checkpoint has to answer.
Check Point is two words.
What I see from your original post, you see traffic being forwarded from the standby member to the active member. This is normal for some limited scenarios, where a few connections may still be handled by a standby member after failover. These connections should be then forwarded to the active member and sent out.
To do that, a standby member is forwarding packets using an artificial MAC address. This is part of ClusterXL tech. The last octet of that artificial MAC address is a function of your cluster ID.
Depending on the version of your FWs (which you failed to mention) this forwarding can be done via sync or via production interfaces of your cluster.
If you see a lot of forwarded traffic, you should investigate why production traffic hits the standby and not the active member, and fix the issue.
In your case, who is pinning 8.8.8.8 through standby member?
Cluster running in Gaia R81.10 version. I only ran ping 8.8.8.8 to test internet connectivity from standby firewall. Production traffic always hits active firewall not stanbdy. There is no issue with production application traffic.
Here, the issue that we are talking about connection initiated by standby member. Probably, I will wait for assigned engineer from Check Point to address my queries through remote session.
Keep us posted, very interesting issue indeed.
It is only interesting if one does not know how ClusterXl works, @the_rock 🙂
@_Val_ lol, thats it : - )
This is by design, see about forwarded traffic once mode.
Still my question not answered. Where is the proof from Check Point, this is by design? Can you point to any SK article or public document please?
Sending traffic from Standby node to Active node for any communication by design is okay to accept but packets with unknown source MAC address is something I want to know and ensure that it belongs to checkpoint. Remember ESX blocking this traffic by MAC address Forging.
I agree with you 100%. Please keep us posted what TAC says.
Dear @Nandhakumar
@Chris_Atkinson has mentioned above sk167453, but indeed, it does not apply to your case directly, and the forwarding MAC is not described there.
However, there are other documentation sources. Please look into the forwarding chapter of the older ClusterXL ATRG (page 41): https://supportcenter.checkpoint.com/supportcenter/portal/role/supportcenterUser/page/default.psml/m...
It explains how traffic is forwarded and how the special forwarding MAC address is formed. Look up fwha_mac_forward_magic parameter (page 42 of the document).
Note the ATRG is for R80.10 and below. In later documentation forwarding mechanism is no longer mentioned. Yet forwarding MAC still applies.
If you need an official answer, please open a case with TAC.
Hope this answers your question. If not, feel free to elaborate further.
Thanks so much @_Val_ for the information. I could see fwha_forward_mac_magic has decimal value of 253 which is equivalent to 'FD' in hexadecimal. Also, I assume that it takes 00 (as ID of target member) for member with highest priority and 01 (as ID of target member) for member with lower priority for version R81.10 atleast, I have verified with few cluster gateways and got same id in source MAC. Also Can you confirm in R81.10, the default forwarding Source MAC format is something like this "00 01(not sure what this value but i could see its same in all cluster members) 00 00 fd (forward mac magic id) 01/00 (id of target cluster member)" ?
Can you correct me if anything I misunderstand in above sentence?
I also would like to know actual source MAC address where connection initiated i.e., 02:56:2e:00:00:01 (Unknow MAC). How this was calculated?
Both magic MAC and forward-magic MACs are function of a Cluster-ID, which is in your case 1. They differ in 1 bit.
The source forwarding MAC is the reversal of forward-magic MAC, i.e. 00:00:00:00:00:00 minus your forward_magic MAC.
Once more, these are very advanced settings that are not well documented.
By the way, @G_W_Albrecht provided the right info...not sure if he used same site to look it up, but below is what I used.
https://macaddress.io/mac-address-lookup/0V5glOjVkq
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
19 | |
12 | |
8 | |
7 | |
6 | |
6 | |
6 | |
4 | |
4 | |
3 |
Wed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasMon 22 Sep 2025 @ 03:00 PM (CEST)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY