SIC breaks while pushing the policy from Smart-1 Cloud management server to Security Gateway.
The command "maas status" from Security Gateway show MaaS tunnel is down and up again after some time, but the interface is unable to resolve the maas status.
Change of the Security Gateway from User-mode to Kernel-mode stops the issue from happening again.
The command "fw fetchlocal -d $FWDIR/state/__tmp/FW1" restores the SIC and interface status.
fw fetchlocal -d $FWDIR/state/__tmp/FW1
The maas_tunnel interface is not updated properly during the policy installation, MaaS traffic then route to the loopback interface instead.