<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Converting a Security Gateway to a ClusterXL in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Converting-a-Security-Gateway-to-a-ClusterXL/m-p/99863#M10271</link>
    <description>&lt;P&gt;Hi all.&lt;/P&gt;
&lt;P&gt;What are the best practices for converting a Security Gateway to a ClusterXL en HA?&lt;/P&gt;
&lt;P&gt;There is a guide in&amp;nbsp; ClusterXL Administration Guide, the steps are the following:&lt;/P&gt;
&lt;P&gt;-Install a new Security Gateway.&amp;nbsp;Use the standard procedure&amp;nbsp;to create a new Cluster Member.&amp;nbsp;Different IP from old fw.&lt;BR /&gt;-In SmartConsole,&amp;nbsp;create a new cluster object. Configuration same as old fw. In topology, virtual IP would be the same address of original fw.&lt;BR /&gt;-Replace old fw object with new cluster object in policy rules, VPNs, etc.&lt;BR /&gt;-In the&amp;nbsp;Cluster Members&amp;nbsp;page, click&amp;nbsp;Add &amp;gt; Add Existing Gateway. Select the newly installed Security gateway as cluster member and define topology.&lt;BR /&gt;-Then Install policy.&lt;/P&gt;
&lt;P&gt;-In old fw, change the IP addresses of interfaces&lt;BR /&gt;-In the&amp;nbsp;Cluster Members&amp;nbsp;page, click&amp;nbsp;Add &amp;gt; Add Existing Gateway. Select the old Security gateway as cluster member and define topology.&lt;BR /&gt;-Then Install policy.&lt;/P&gt;
&lt;P&gt;What happens to VPNs?&amp;nbsp; Should i define a different Office Mode network in the new cluster object? If there is a VTI numbered VPN to AWS, could I configure any address in the field "&lt;STRONG&gt;Local Address"&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 28 Oct 2020 09:41:13 GMT</pubDate>
    <dc:creator>GioH</dc:creator>
    <dc:date>2020-10-28T09:41:13Z</dc:date>
    <item>
      <title>Converting a Security Gateway to a ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Converting-a-Security-Gateway-to-a-ClusterXL/m-p/99863#M10271</link>
      <description>&lt;P&gt;Hi all.&lt;/P&gt;
&lt;P&gt;What are the best practices for converting a Security Gateway to a ClusterXL en HA?&lt;/P&gt;
&lt;P&gt;There is a guide in&amp;nbsp; ClusterXL Administration Guide, the steps are the following:&lt;/P&gt;
&lt;P&gt;-Install a new Security Gateway.&amp;nbsp;Use the standard procedure&amp;nbsp;to create a new Cluster Member.&amp;nbsp;Different IP from old fw.&lt;BR /&gt;-In SmartConsole,&amp;nbsp;create a new cluster object. Configuration same as old fw. In topology, virtual IP would be the same address of original fw.&lt;BR /&gt;-Replace old fw object with new cluster object in policy rules, VPNs, etc.&lt;BR /&gt;-In the&amp;nbsp;Cluster Members&amp;nbsp;page, click&amp;nbsp;Add &amp;gt; Add Existing Gateway. Select the newly installed Security gateway as cluster member and define topology.&lt;BR /&gt;-Then Install policy.&lt;/P&gt;
&lt;P&gt;-In old fw, change the IP addresses of interfaces&lt;BR /&gt;-In the&amp;nbsp;Cluster Members&amp;nbsp;page, click&amp;nbsp;Add &amp;gt; Add Existing Gateway. Select the old Security gateway as cluster member and define topology.&lt;BR /&gt;-Then Install policy.&lt;/P&gt;
&lt;P&gt;What happens to VPNs?&amp;nbsp; Should i define a different Office Mode network in the new cluster object? If there is a VTI numbered VPN to AWS, could I configure any address in the field "&lt;STRONG&gt;Local Address"&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Oct 2020 09:41:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Converting-a-Security-Gateway-to-a-ClusterXL/m-p/99863#M10271</guid>
      <dc:creator>GioH</dc:creator>
      <dc:date>2020-10-28T09:41:13Z</dc:date>
    </item>
    <item>
      <title>Re: Converting a Security Gateway to a ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Converting-a-Security-Gateway-to-a-ClusterXL/m-p/100071#M10272</link>
      <description>&lt;P&gt;Are the VPN endpoints managed by the same management, third party, or?&lt;BR /&gt;There will be different certificates used for the cluster but they would be signed by the same CA.&lt;BR /&gt;Assuming the cluster IP is the same as the original gateway, the remote end probably won’t need a configuration change.&lt;BR /&gt;That said, the change is likely to be disruptive to the VPN due to the policy install, so it should be done during an appropriate maintenance window.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 24 Oct 2020 23:47:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Converting-a-Security-Gateway-to-a-ClusterXL/m-p/100071#M10272</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-10-24T23:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: Converting a Security Gateway to a ClusterXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Converting-a-Security-Gateway-to-a-ClusterXL/m-p/100208#M10273</link>
      <description>&lt;P&gt;Yes, VPN endpoints are managed by the same security management. Remote access users IP addressess are assigned following file configuration $FWDIR/conf/ipassignment.conf, so first column is updated to new cluster object name.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 04:37:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Converting-a-Security-Gateway-to-a-ClusterXL/m-p/100208#M10273</guid>
      <dc:creator>GioH</dc:creator>
      <dc:date>2020-10-27T04:37:59Z</dc:date>
    </item>
  </channel>
</rss>

