<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic HA Failover Issues in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/HA-Failover-Issues/m-p/25922#M3684</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just deployed a new Check Point Azure HA instance following&amp;nbsp;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;sk110194 and deploying the HA template referenced therein.&amp;nbsp; I'm having several issues with failover (namely, route tables do not update), but believe I am missing something in the documentation.&amp;nbsp; Some of the confusion I'm having with the sk:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;1.) It only mentions creating a cluster VIP for the eth0 (external) interface, but the sk makes several allusions to having a clustered internal interface.&amp;nbsp; I'm wondering if I need to change the eth1 (internal) interface from sync to a "Cluster + Sync" interface like it has me do for the external interface.&amp;nbsp; If i do need to implement a cluster vip for the internal interface, in the routing tables, should I then manually just point all traffic that is current set to go to firewall 1's eth1 to now go to the cluster VIP IP?&amp;nbsp; I've been operating off of the assuming that the failover script would manually point the traffic from firewall 1's eth1 to firewall 2's eth1 upon failover, but can see a scenario where this could be handled by a VIP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;2.)&amp;nbsp; Load balancers were removed from the most recent version of the CloudGuard deployment template, but will I need one in order to get failover to function correctly? The sk makes reference to setting up a load balancer, but doesn't provide any details that I can find.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Thanks for any help you can give,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Kevin&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 24 May 2018 15:35:45 GMT</pubDate>
    <dc:creator>Kevin_Werner</dc:creator>
    <dc:date>2018-05-24T15:35:45Z</dc:date>
    <item>
      <title>HA Failover Issues</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/HA-Failover-Issues/m-p/25922#M3684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just deployed a new Check Point Azure HA instance following&amp;nbsp;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;sk110194 and deploying the HA template referenced therein.&amp;nbsp; I'm having several issues with failover (namely, route tables do not update), but believe I am missing something in the documentation.&amp;nbsp; Some of the confusion I'm having with the sk:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;1.) It only mentions creating a cluster VIP for the eth0 (external) interface, but the sk makes several allusions to having a clustered internal interface.&amp;nbsp; I'm wondering if I need to change the eth1 (internal) interface from sync to a "Cluster + Sync" interface like it has me do for the external interface.&amp;nbsp; If i do need to implement a cluster vip for the internal interface, in the routing tables, should I then manually just point all traffic that is current set to go to firewall 1's eth1 to now go to the cluster VIP IP?&amp;nbsp; I've been operating off of the assuming that the failover script would manually point the traffic from firewall 1's eth1 to firewall 2's eth1 upon failover, but can see a scenario where this could be handled by a VIP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;2.)&amp;nbsp; Load balancers were removed from the most recent version of the CloudGuard deployment template, but will I need one in order to get failover to function correctly? The sk makes reference to setting up a load balancer, but doesn't provide any details that I can find.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Thanks for any help you can give,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Kevin&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2018 15:35:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/HA-Failover-Issues/m-p/25922#M3684</guid>
      <dc:creator>Kevin_Werner</dc:creator>
      <dc:date>2018-05-24T15:35:45Z</dc:date>
    </item>
    <item>
      <title>Re: HA Failover Issues</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/HA-Failover-Issues/m-p/25923#M3685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/47364"&gt;Kevin Werner&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have recently&amp;nbsp;deployed Check Point CloudGuard solution on Azure in April 2018.&amp;nbsp;At that time there was no Internal VIP provide.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But i can see the sk was recently updated with new features provided on CloudGuard Cluster and mentions about the VIP on the Internal side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(Assuming) I would&amp;nbsp;say you to do the same config in Cluster object&amp;nbsp;that is there for eth0&amp;nbsp;&lt;SPAN style="color: #000000; background-color: #ffffff;"&gt;"Cluster + Sync"&lt;SPAN&gt;&amp;nbsp;for eth1 also.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff;"&gt;&lt;SPAN&gt;And point the route from Backend / Server subnets to this Internal VIP.&amp;nbsp;On fail-over, API calling will move Internal VIP from eth1 of GW1 to eth1 of GW2.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: #ffffff;"&gt;&lt;SPAN&gt;Then there would not be any requirement to update the Route Tables.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff;"&gt;&lt;SPAN&gt;Also about Load Balancers:- They are needed when you want to Publish Web Services (Web page / Application running on any Server) over the Internet.&amp;nbsp;Detach&amp;nbsp;Static Public IP from Servers(Web Server / Application) if any and move them to Load Balancer then create Inbound NAT Rules on Load Balancer and do related configuration on Check Point (refer sk).&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff;"&gt;&lt;SPAN&gt;Hope this information was helpful.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2018 16:41:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/HA-Failover-Issues/m-p/25923#M3685</guid>
      <dc:creator>Nikhil_Deshmukh</dc:creator>
      <dc:date>2018-05-24T16:41:07Z</dc:date>
    </item>
    <item>
      <title>Re: HA Failover Issues</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/HA-Failover-Issues/m-p/25924#M3686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perfect, thanks Nikhil, I'll give it a whirl&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2018 16:44:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/HA-Failover-Issues/m-p/25924#M3686</guid>
      <dc:creator>Kevin_Werner</dc:creator>
      <dc:date>2018-05-24T16:44:10Z</dc:date>
    </item>
  </channel>
</rss>

