<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: External check to determine active/standby state of cluster members? in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158630#M829</link>
    <description>&lt;P&gt;That's not the intent of my response. Actually it seems we have a mix of HA &amp;amp; Active/Active architectures in play.&lt;/P&gt;
&lt;P&gt;We typically have different templates depending on HA or Active/Active (Autoscale) requirements per:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_IaaS_HighAvailabilty_for_GCP/Default.htm" target="_blank" rel="noopener"&gt;CloudGuard Network &lt;STRONG&gt;High Availability&lt;/STRONG&gt; R80.30 and above for Google Cloud Platform Administration Guide&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_and_Above_CG_Autoscaling_Managed_Instance_Group_for_GCP/AdminGuide/Default.htm" target="_blank" rel="noopener"&gt;CloudGuard GCP &lt;STRONG&gt;Auto Scaling&lt;/STRONG&gt; Managed Instance Group (MIG) for R80.30 and Higher Administration Guide&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;If the Cluster is a true HA cluster only the "VIP" (Cluster's External IP) should be a backend target of the LB, not the individual gateway / cluster member IPs (standby won't process traffic).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally (but not so relevant to a load-balancer discussion) with normal cluster XL HA gateways you could query via SNMP to determine the active state i.e.&lt;/P&gt;
&lt;P&gt;The OID 1.3.6.1.4.1.2620.1.5.6.0&lt;/P&gt;
&lt;P&gt;The expected output is:&lt;/P&gt;
&lt;P&gt;From the Active member:&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.5.6.0 = STRING: "Active"&lt;/P&gt;
&lt;P&gt;From the Standby member:&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.5.6.0 = STRING: "Standby"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 18 Oct 2022 04:19:25 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2022-10-18T04:19:25Z</dc:date>
    <item>
      <title>External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158546#M826</link>
      <description>&lt;P&gt;Background: We use Google Cloud Global HTTP(S) load balancers in front of a CheckPoint CloudGuard HA cluster to handle SSL termination and give each service a different external IP addresses.&amp;nbsp; The CheckPoint cluster members are the load balancer's backend and we're left with a fundamental problem:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The load balancer does a basic TCP check on port 443 to detect a down member.&lt;/LI&gt;&lt;LI&gt;Since both members pass the check regardless of active/standby state, the traffic is distributed 50/50 assuming both are up.&lt;/LI&gt;&lt;LI&gt;The max NAT sessions are 16384/66 which obviously is 99/1, not 50/50&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;That NAT issue is described &lt;A href="https://www.reddit.com/r/checkpoint/comments/sn2qp0/why_does_a_standby_gateway_show_a_capacity_of/" target="_self"&gt;here&lt;/A&gt; and I still don't have a fix for it.&amp;nbsp; So I'm thinking if I can somehow just get the traffic to go 100/0, this fixes the issue.&lt;/P&gt;&lt;P&gt;Is there a way to externally check the active/standby status?&amp;nbsp; Perhaps there's a service that runs only on the active and is shutdown when it goes standby?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 20:23:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158546#M826</guid>
      <dc:creator>johnnyringo</dc:creator>
      <dc:date>2022-09-30T20:23:44Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158620#M827</link>
      <description>&lt;P&gt;Something seems off with this deployment, would suggest investigating the details/specifics further with TAC.&lt;/P&gt;
&lt;P&gt;Also tagging &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/12733"&gt;@Shay_Levin&lt;/a&gt; in case he has any ideas&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Oct 2022 03:23:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158620#M827</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-10-03T03:23:23Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158627#M828</link>
      <description>&lt;P&gt;Ahh yes, the old "surely, this problem is the customer's fault" response.&amp;nbsp; Good 'ol CheckPoint, lol.&lt;/P&gt;&lt;P&gt;I'm currently on my 3rd support case.&amp;nbsp; The NAT sessions issue was identified over 9 months ago:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/R80-40-NAT-port-exhaustion-why-do-cluster-members-show-vastly/m-p/140417#M27006" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/R80-40-NAT-port-exhaustion-why-do-cluster-members-show-vastly/m-p/140417#M27006&lt;/A&gt;&lt;/P&gt;&lt;P&gt;There's been a series of "bug fixes" for this in R80.40, but none that address the root issue&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Oct 2022 19:05:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158627#M828</guid>
      <dc:creator>johnnyringo</dc:creator>
      <dc:date>2022-10-02T19:05:39Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158630#M829</link>
      <description>&lt;P&gt;That's not the intent of my response. Actually it seems we have a mix of HA &amp;amp; Active/Active architectures in play.&lt;/P&gt;
&lt;P&gt;We typically have different templates depending on HA or Active/Active (Autoscale) requirements per:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_IaaS_HighAvailabilty_for_GCP/Default.htm" target="_blank" rel="noopener"&gt;CloudGuard Network &lt;STRONG&gt;High Availability&lt;/STRONG&gt; R80.30 and above for Google Cloud Platform Administration Guide&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_and_Above_CG_Autoscaling_Managed_Instance_Group_for_GCP/AdminGuide/Default.htm" target="_blank" rel="noopener"&gt;CloudGuard GCP &lt;STRONG&gt;Auto Scaling&lt;/STRONG&gt; Managed Instance Group (MIG) for R80.30 and Higher Administration Guide&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;If the Cluster is a true HA cluster only the "VIP" (Cluster's External IP) should be a backend target of the LB, not the individual gateway / cluster member IPs (standby won't process traffic).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally (but not so relevant to a load-balancer discussion) with normal cluster XL HA gateways you could query via SNMP to determine the active state i.e.&lt;/P&gt;
&lt;P&gt;The OID 1.3.6.1.4.1.2620.1.5.6.0&lt;/P&gt;
&lt;P&gt;The expected output is:&lt;/P&gt;
&lt;P&gt;From the Active member:&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.5.6.0 = STRING: "Active"&lt;/P&gt;
&lt;P&gt;From the Standby member:&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.5.6.0 = STRING: "Standby"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 04:19:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158630#M829</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-10-18T04:19:25Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158641#M830</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;We typically have different templates depending on HA or Active/Active (Autoscale) requirements per:&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;It's standard active/standby HA deployment (no auto-scaling or active/active)&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;If the Cluster is a true HA cluster only the "VIP" should be a backend target of the LB, not the individual gateway / cluster member IPs&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN&gt;Not quite following here.&amp;nbsp; &amp;nbsp;I known in AWS, you can set an IP address for the backend server.&amp;nbsp; But as far as I know, GCP only allows instance groups, target pools, or NEGs.&amp;nbsp; In all cases, these would reference instance vNICs, not just an IP address.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;(standby won't process traffic).&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN&gt;I'd have to disagree with that, based on experience.&amp;nbsp; The standby will load the same policy as the active and run all services.&amp;nbsp; It definitely&amp;nbsp;processes traffic just fine as long as asymmetric&amp;nbsp;routing is accounted for.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;Additionally with normal cluster XL HA gateways you could query via SNMP to determine the active state i.e.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;That's good to know, but GCP load balancers definitely don't support use of SNMP polls for healthchecks.&amp;nbsp; Perhaps I could create a Python script via 1-minute cron job to do the query and then update the LB backend accordingly, but that's a really ugly hack.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Oct 2022 02:31:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158641#M830</guid>
      <dc:creator>johnnyringo</dc:creator>
      <dc:date>2022-10-03T02:31:35Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158644#M831</link>
      <description>&lt;P&gt;The admin guide for HA talks specifically about directing traffic for the&amp;nbsp;&lt;SPAN&gt;Cluster's External IP&lt;/SPAN&gt;&amp;nbsp;towards the "Active" member, not both.&lt;/P&gt;
&lt;P&gt;Therefor the "standby" node in HA shouldn't receive traffic, load-sharing is not supported in this mode.&lt;/P&gt;
&lt;P&gt;Your load-balancer pool configuration should be such that it takes this into account.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Oct 2022 05:23:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158644#M831</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-10-03T05:23:01Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158693#M832</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;The admin guide for HA talks specifically about directing traffic for the&amp;nbsp;&lt;SPAN&gt;Cluster's External IP&lt;/SPAN&gt;&amp;nbsp;towards the "Active" member, not both...Your load-balancer pool configuration should be such that it takes this into account.&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Again, this is not possible with GCP load balancers, because there's no way to direct traffic to a specific IP address.&amp;nbsp; If CheckPoint is expecting this to work, they need to submit a feature request to Google.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FortiGate doesn't have this problem because the two members act in very strict active/standby mode (i.e. the data plane on the standby is essentially shut down and won't even respond with a SYN+ACK)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Oct 2022 15:42:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158693#M832</guid>
      <dc:creator>johnnyringo</dc:creator>
      <dc:date>2022-10-03T15:42:06Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158722#M833</link>
      <description>&lt;P&gt;With using TCP/443 for the health-probe from the LB, my assumption is it's likely being accepted by implied rules for multi-portal infrastructure including GAiA web portal etc.&lt;/P&gt;
&lt;P&gt;In the firewall logs what do you see as the destination for the TCP/443 health probes coming from the LB?&lt;/P&gt;
&lt;P&gt;There is a way to influence the implied rule behavior via kernel parameter (sk105740) but whether this will assist may depend on the target of the health probe and the ability to create specific rules to handle this traffic in a more granular way.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Otherwise the standby member of a clusterXL cluster shouldn't forward traffic&amp;nbsp; (&lt;SPAN&gt;sk63942)&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;and if you see something contrary to this it's definitely something for TAC.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="standby.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18005i507246615FDB60D2/image-size/large?v=v2&amp;amp;px=999" role="button" title="standby.png" alt="standby.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Source:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_ClusterXL_AdminGuide/Topics-CXLG/Viewing-Cluster-State.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_ClusterXL_AdminGuide/Topics-CXLG/Viewing-Cluster-State.htm&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Oct 2022 04:50:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158722#M833</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-10-23T04:50:19Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158726#M835</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;P&gt;the standby member of a clusterXL cluster shouldn't forward traffic&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Here's what a non-443 TCP healthcheck looks like:&lt;/P&gt;&lt;LI-CODE lang="python"&gt;[Expert@xxx-member-b:0]# tcpdump -i eth0 -n  port 29413
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
21:27:07.494666 IP 35.191.11.202.59692 &amp;gt; 100.64.100.29413: Flags [S], seq 2790787222, win 65535, options [mss 1420,sackOK,TS val 2593715553 ecr 0,nop,wscale 8], length 0
21:27:07.495411 IP 100.64.100.29413 &amp;gt; 35.191.11.202.59692: Flags [S.], seq 3524699649, ack 2790787223, win 65535, options [mss 1420,nop,nop,sackOK,nop,wscale 6,nop,nop,TS val 616471966 ecr 2593715553], length 0
21:27:07.495563 IP 35.191.11.202.59692 &amp;gt; 100.64.100.29413: Flags [.], ack 1, win 256, options [nop,nop,TS val 2593715554 ecr 616471966], length 0
21:27:07.495584 IP 35.191.11.202.59692 &amp;gt; 100.64.100.29413: Flags [F.], seq 1, ack 1, win 256, options [nop,nop,TS val 2593715554 ecr 616471966], length 0
21:27:07.495766 IP 100.64.100.29413 &amp;gt; 35.191.11.202.59692: Flags [.], ack 1, win 4096, options [nop,nop,TS val 616471966 ecr 2593715554], length 0
21:27:07.495779 IP 100.64.100.29413 &amp;gt; 35.191.11.202.59692: Flags [F.], seq 1, ack 2, win 4096, options [nop,nop,TS val 616471966 ecr 2593715554], length 0
21:27:07.496021 IP 35.191.11.202.59692 &amp;gt; 100.64.100.29413: Flags [.], ack 2, win 256, options [nop,nop,TS val 2593715555 ecr 616471966], length 0
^C
7 packets captured
7 packets received by filter
0 packets dropped by kernel

[Expert@xxx-member-b:0]# cphaprob state

ID         Unique Address  Assigned Load   State          Name                                              
1          10.12.34.68    100%            ACTIVE         xxx-01
2 (local)  10.12.34.69    0%              STANDBY        xxx-02&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2022 01:36:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158726#M835</guid>
      <dc:creator>johnnyringo</dc:creator>
      <dc:date>2022-10-04T01:36:12Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158786#M836</link>
      <description>&lt;P&gt;From what I can see you will need to use HTTP LB on TCP port 8117 for the health probe with the supporting configuration per: sk114577 (Section 7)&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk114577&amp;amp;partition=Basic&amp;amp;product=CloudGuard#Setting%20up%20a%20load%20balancer" target="_self"&gt;Check Point CloudGuard IaaS reference architecture for Google Cloud Platform - [7] Setting up a load balancer&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Oct 2022 22:58:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158786#M836</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-10-05T22:58:29Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158856#M837</link>
      <description>&lt;P&gt;hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can I ask, why do you have traffic routed specifically through the secondary appliance?&lt;/P&gt;
&lt;P&gt;Shouldn't you route through HSRP IP of the cluster ?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Ty,&lt;/P&gt;</description>
      <pubDate>Wed, 05 Oct 2022 20:31:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158856#M837</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-10-05T20:31:00Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158858#M838</link>
      <description>&lt;P&gt;yes, but not HTTP , it's TCP 8117.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Oct 2022 21:39:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158858#M838</guid>
      <dc:creator>Nir_Shamir</dc:creator>
      <dc:date>2022-10-05T21:39:29Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158859#M839</link>
      <description>&lt;P&gt;Google Clusters don't have an Internal VIP address. all the interfaces are configured as private.&lt;/P&gt;
&lt;P&gt;So we can use an LB to route traffic to the ACTIVE member in the Cluster.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Oct 2022 21:40:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158859#M839</guid>
      <dc:creator>Nir_Shamir</dc:creator>
      <dc:date>2022-10-05T21:40:37Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158865#M840</link>
      <description>&lt;P&gt;Yeah that was a reference to the type of LB, edited for clarity.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2022 00:53:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158865#M840</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-10-06T00:53:45Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158886#M841</link>
      <description>&lt;P&gt;Understood, and initially you said "&lt;SPAN&gt;We use&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Google Cloud Global HTTP(S) load balancers in front of a CheckPoint CloudGuard HA cluster to handle SSL&lt;/SPAN&gt;" and that the "&lt;SPAN&gt;load balancer does a basic TCP check on port 443 to detect a down member" .&lt;BR /&gt;So you are stating that Google Cloud Load Balancer checks the HTTPS response from each CheckPoint Cluster Member ? Why ???&lt;BR /&gt;I was expecting that Google Cloud Balancer would address smth behind the CheckPoint Cluster, therefore your routing from Google LB to the devices behind CKP Cluster should go through the CKP Cluster VIP .&amp;nbsp;&lt;BR /&gt;Like in our case, our cluster on LAN side has 10.xx.3.2 (on CKP node A) and 10.xx.3.2 (on CKP node B)&amp;nbsp; and the HA is&amp;nbsp;10.xx.3.1 (on CKP ACTIVE node) . So we route internal towards the 10.x.3.1 and we don't care about which&amp;nbsp;node is active or standby .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So don't you have a similar situation ? Can you sketch smth in paint ?&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ty,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2022 09:47:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/158886#M841</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-10-06T09:47:15Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/159069#M842</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/12733"&gt;@Shay_Levin&lt;/a&gt;&amp;nbsp;can you advise please?&lt;/P&gt;</description>
      <pubDate>Sat, 08 Oct 2022 14:13:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/159069#M842</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-10-08T14:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/159076#M843</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/16983"&gt;@Sorin_Gogean&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Understood, and initially you said "&lt;SPAN&gt;We use&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Google Cloud Global HTTP(S) load balancers in front of a CheckPoint CloudGuard HA cluster to handle SSL&lt;/SPAN&gt;" and that the "&lt;SPAN&gt;load balancer does a basic TCP check on port 443 to detect a down member" .&lt;BR /&gt;So you are stating that Google Cloud Load Balancer checks the HTTPS response from each CheckPoint Cluster Member ? Why ???&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Ummm...TCP healthchecks work at Layer 4/5 of the OSI model.&amp;nbsp; They don't care about the HTTPS response.&amp;nbsp; &amp;nbsp;But the &lt;EM&gt;standby&lt;/EM&gt; checkpoint responses to either type, any port, so it's a moot point anyway.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's a diagram of the setup.&amp;nbsp; Note that the standby receiving traffic wouldn't be an issue if not for the max of 66 NAT connections&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="checkpoint_ha_cluster_basic_diagram.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18074i5F42E4CB513AAB13/image-size/large?v=v2&amp;amp;px=999" role="button" title="checkpoint_ha_cluster_basic_diagram.png" alt="checkpoint_ha_cluster_basic_diagram.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 08 Oct 2022 18:03:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/159076#M843</guid>
      <dc:creator>johnnyringo</dc:creator>
      <dc:date>2022-10-08T18:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/159078#M844</link>
      <description>&lt;P&gt;Have you reviewed / tried TCP 8117 with the supporting config as suggested above?&lt;/P&gt;</description>
      <pubDate>Sun, 09 Oct 2022 01:35:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/159078#M844</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-10-09T01:35:55Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/159086#M845</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Have you reviewed / tried TCP 8117 with the supporting config as suggested above?&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;It's my understanding this only works on R81.10.&amp;nbsp; We're on R80.40, and in cloud deployments, the upgrade to R81.10 is non trivial.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Even under R81.10, I'm really not down the the whole tweaking kernel parameters thing. There's too much of a risk of that setting being reset upon subsequent upgrades.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Oct 2022 04:00:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/159086#M845</guid>
      <dc:creator>johnnyringo</dc:creator>
      <dc:date>2022-10-09T04:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: External check to determine active/standby state of cluster members?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/159089#M846</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The GCP HA solution was released with a reference architecture describing Site-to-Site VPN use case and egress/E-W inspection via routing rule updates to forward traffic to the Active member, and VIP for ingress. A Load Balancer use case for ingress/egress was not designed nor certified.&lt;/P&gt;
&lt;P&gt;For ingress inspection we recommend using the auto-scaling MIG solution.&lt;/P&gt;
&lt;P&gt;Having said that, as Chris mentioned, with R81.10 we have firewall-kernel code that replies to GCP load balancer health probes - it is in use by the auto-scaling MIG solution from R81.10. On HA, only the Active will respond to the probes on port 8117.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For 2023 roadmap, we are evaluating the possibility to update the HA architecture to rely on load balancers for ingress/egress, or officially support ingress architecture with Load Balancers. In that case, the health probe will automatically be configured during deployment (as happens on other platforms).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 09 Oct 2022 11:01:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/External-check-to-determine-active-standby-state-of-cluster/m-p/159089#M846</guid>
      <dc:creator>Dmitry_Gorn</dc:creator>
      <dc:date>2022-10-09T11:01:57Z</dc:date>
    </item>
  </channel>
</rss>

