<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Failvoer issue on Vsec GW Cluster R81.20 in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179317#M402</link>
    <description>&lt;P&gt;Good job and tx for sharing!&lt;/P&gt;</description>
    <pubDate>Thu, 27 Apr 2023 09:04:05 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2023-04-27T09:04:05Z</dc:date>
    <item>
      <title>Failvoer issue on Vsec GW Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179144#M395</link>
      <description>&lt;P&gt;I have a Checkpoint vsec Cluster in AWS on R80.40. Recently i upgraded it to R81.20 however somehow the HA functionality is not working on R81.20&lt;/P&gt;&lt;P&gt;As in AWS ..default route is pointed towards eni of active member (say Member A) and when a failover occurs eni changes automatically to that of secondary member (Mem B). However this is not happening on R81.20 in my case , even after simulating the failover default route still points to eni of Member A even though Member B is active. Is there any specific config required to be done on R81.20 wrt failover ?&lt;/P&gt;&lt;P&gt;any help is appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 18:34:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179144#M395</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2023-04-25T18:34:31Z</dc:date>
    </item>
    <item>
      <title>Re: Failvoer issue on Vsec GW Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179150#M396</link>
      <description>&lt;P&gt;Have not heard of issue like this yet. What happens if you run cphaprob commands on both members, does it show correct state as it should after failover? It would make sense that ENI would automatically switch over to other member upon failover, I agree 100%.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you see any relevant info/logs on AWS side at all?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 19:56:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179150#M396</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-04-25T19:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: Failvoer issue on Vsec GW Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179164#M397</link>
      <description>&lt;P&gt;Cphaprob commands show the correct state after i simulate the failover.. its just that the eni isnt switching.. at aws side also i didnt find anything.&lt;/P&gt;&lt;P&gt;There is one thing though ..in r80.40 i used to run these as Active active.. but in r80.20 documentation for cloudguard its specifically mentioned to work as an active standby unit with an additonal option in smartconsole as "use in geo cloud mode".&lt;/P&gt;&lt;P&gt;I wonder if thats the issue and it isnt supposed to run in active active in a way as it did in r80.40&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 20:59:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179164#M397</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2023-04-25T20:59:06Z</dc:date>
    </item>
    <item>
      <title>Re: Failvoer issue on Vsec GW Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179165#M398</link>
      <description>&lt;P&gt;Im pretty sure in R81+, you can only run as A-P, NOT A-A&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 21:30:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179165#M398</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-04-25T21:30:47Z</dc:date>
    </item>
    <item>
      <title>Re: Failvoer issue on Vsec GW Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179294#M399</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That would depend on which solution did you upgrade from - single az or cross az cluster.&lt;/P&gt;
&lt;P&gt;R81.20 cross az cluster uses a different Active-Standby architecture.&lt;/P&gt;
&lt;P&gt;Please refer to the &lt;A href="https://support.checkpoint.com/results/sk/sk162365" target="_self"&gt;updated upgrading documentation index&lt;/A&gt; and specifically to the following document:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk180306" target="_self"&gt;How to migrate CloudGuard Network Geo Cluster R81.10 or lower to R81.20 Cross AZ Cluster&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In case of upgrading a cross-az cluster, additional steps are required to complete the upgrade.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Dmitry&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV id="tinyMceEditor_13a7012b00fb81dDmitry_Gorn_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 27 Apr 2023 05:29:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179294#M399</guid>
      <dc:creator>Dmitry_Gorn</dc:creator>
      <dc:date>2023-04-27T05:29:31Z</dc:date>
    </item>
    <item>
      <title>Re: Failvoer issue on Vsec GW Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179295#M400</link>
      <description>&lt;P&gt;It doesn't matter if it's A/A or A/P&amp;nbsp; , both work in the same way with the external route table.&lt;/P&gt;
&lt;P&gt;Check $FWDIR/log/aws_had.elg log file if there are any exceptions there&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Apr 2023 05:30:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179295#M400</guid>
      <dc:creator>Nir_Shamir</dc:creator>
      <dc:date>2023-04-27T05:30:14Z</dc:date>
    </item>
    <item>
      <title>Re: Failvoer issue on Vsec GW Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179314#M401</link>
      <description>&lt;P&gt;Issue is resolved now..turned out there was an issue with the GW DNS due to which it wasnt able to connect to AWS Services which would have led to a route swithover.&lt;/P&gt;&lt;P&gt;as soon as DNS was resolved route switch is working as expected.&lt;/P&gt;&lt;P&gt;Thank you to everyone who replied to this thread &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Apr 2023 09:01:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179314#M401</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2023-04-27T09:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: Failvoer issue on Vsec GW Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179317#M402</link>
      <description>&lt;P&gt;Good job and tx for sharing!&lt;/P&gt;</description>
      <pubDate>Thu, 27 Apr 2023 09:04:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179317#M402</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-04-27T09:04:05Z</dc:date>
    </item>
    <item>
      <title>Re: Failvoer issue on Vsec GW Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179319#M403</link>
      <description>&lt;P&gt;I followed this exact same document while upgrding..however i tried to configure my cluster&amp;nbsp; as A/A as well as A/S and both seem to work fine. In R80.40 use geo cluster with A/S wasnt an option which is available in R81. I wonder why A/A is not mentioned in the document there as it seems to be working fine.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Apr 2023 09:05:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179319#M403</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2023-04-27T09:05:20Z</dc:date>
    </item>
    <item>
      <title>Re: Failvoer issue on Vsec GW Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179321#M404</link>
      <description>&lt;P&gt;Yea in the documentation also only A/P is mentioned but i configured my R81 with A/A and it seems to work fine.&lt;/P&gt;&lt;P&gt;I think may b the A/P option with "use Geo Mode" in R81 serves the same purpose as an A/A cluster as the external routing also is similar&lt;/P&gt;</description>
      <pubDate>Thu, 27 Apr 2023 09:24:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failvoer-issue-on-Vsec-GW-Cluster-R81-20/m-p/179321#M404</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2023-04-27T09:24:17Z</dc:date>
    </item>
  </channel>
</rss>

