<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Clustering question in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Clustering-question/m-p/110501#M15177</link>
    <description>&lt;P&gt;Did you approach it as though this was a hardware change or some other method, why the default route change?&lt;/P&gt;
&lt;P&gt;I can imagine some ARP tables might need to be cleared, but otherwise should be entirely achievable.&lt;/P&gt;</description>
    <pubDate>Thu, 11 Feb 2021 02:06:28 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2021-02-11T02:06:28Z</dc:date>
    <item>
      <title>Clustering question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Clustering-question/m-p/110476#M15173</link>
      <description>&lt;P&gt;Hey guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have unique inquiry from the customer, but not sure if this is something that can be done easily or not. Here is the situation...customer has main Internet gw (I believe 6000 model) and we upgraded it from R77.30 to R80.40 and that worked, BUT, what they wanted to do is add another brand new 6000 model into a cluster with current Internet fw, but keep the main fw IP as the clustered IP. We attempted this couple of months back, but ran into huge roadblock, where we had to change default gw, then dns was all messed up, and it turned out to be a nightmare.&lt;/P&gt;
&lt;P&gt;TAC tried helping us, but even person on the phone was stuck, so we just decided to abandon the whole idea and revert the changes.&lt;/P&gt;
&lt;P&gt;Here is my question, is there a good process or steps on how this should be done? Not sure if anyone attempted to do this before. Say, if you have main Internet fw and main IP is 50.60.70.90 and you want to keep SAME IP as the clustered VIP, is that even doable? I read the R80.40 cluster guide and could not find anything about scenario like this (unless I did not look hard enough : ))&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyway, if anyone has any ideas, suggestions, would be greatly appreciated!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2021 16:46:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Clustering-question/m-p/110476#M15173</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-02-10T16:46:36Z</dc:date>
    </item>
    <item>
      <title>Re: Clustering question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Clustering-question/m-p/110495#M15175</link>
      <description>&lt;P&gt;How large is the subnet that the existing VIP resides in and are there spare addresses as that might be a factor in determining your options...&lt;/P&gt;
&lt;P&gt;To that end sk32073 describes a similar scenario based on the limited information currently available here.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2021 00:48:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Clustering-question/m-p/110495#M15175</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2021-02-11T00:48:57Z</dc:date>
    </item>
    <item>
      <title>Re: Clustering question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Clustering-question/m-p/110498#M15176</link>
      <description>&lt;P&gt;Thanks Chris. Sadly, that sk does not apply to our scenario, as IPs would be from the same subnet.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2021 01:44:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Clustering-question/m-p/110498#M15176</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-02-11T01:44:38Z</dc:date>
    </item>
    <item>
      <title>Re: Clustering question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Clustering-question/m-p/110501#M15177</link>
      <description>&lt;P&gt;Did you approach it as though this was a hardware change or some other method, why the default route change?&lt;/P&gt;
&lt;P&gt;I can imagine some ARP tables might need to be cleared, but otherwise should be entirely achievable.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2021 02:06:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Clustering-question/m-p/110501#M15177</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2021-02-11T02:06:28Z</dc:date>
    </item>
    <item>
      <title>Re: Clustering question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Clustering-question/m-p/110503#M15178</link>
      <description>&lt;P&gt;I would have to go through all my notes from that weekend change couple of months back, but I do recall there was some IP conflict we encountered, hence the change. I specifically remember the person we spoke to from TAC kept saying that we did not have to change any routes or anything, but 2 hours later, with his instructions, vpn was not working, Internet was down...it was a hot mess, to put it bluntly. Im just trying to figure out if there is a specific method to doing this correctly...&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2021 02:15:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Clustering-question/m-p/110503#M15178</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-02-11T02:15:20Z</dc:date>
    </item>
    <item>
      <title>Re: Clustering question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Clustering-question/m-p/110505#M15180</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Possible but needs a lot of planning according to your enviroment.&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Create a table defining the ip addresses for cluster and members for every interface&lt;BR /&gt;2. Prepare script with routes, interfaces, etc for the new gateway&lt;BR /&gt;3. Install the new gateway, configure with previous script&lt;BR /&gt;4. Take captures for Network topology, IA configuration, vpn domain, remote access, etc in the old gateway object at smartconsole&lt;BR /&gt;5. Reset SIC in old gateway, NOT INITIALIZE&lt;BR /&gt;6. Remove the old gateway object from all VPN communities (do not delete the communities)&lt;BR /&gt;7. Disable VPN blade in old gateway object, publish&lt;BR /&gt;8. Change the name and ipv4 of the old gateway object, publish&lt;BR /&gt;9. Enable vpn blade again in old gateway, publish, delete VPN certificate, accept warnings, a new cert will be created. Publish&lt;BR /&gt;10. Create cluster object in smartconsole, use the IP address you want to Keep as VIP, go to cluster members and write the hostname of the new gateway, put IP and SIC password&lt;BR /&gt;11. In the cluster object Get interfaces without topology, at this moment the cluster has only one member, the new gateway.&lt;BR /&gt;12. Copy all the configuration from the captures from step 4 (IA, remote access, IA, etc)&lt;BR /&gt;13. Check all the places where old gateway was used and replace with the cluster (rigth click, where used)&lt;BR /&gt;14. Add the cluster object to VPN communities&lt;BR /&gt;15. Push policy (services outage)&lt;BR /&gt;16. Unplug old gateway, plug new gateway&lt;BR /&gt;17. Change hostname in old gateway trough CLI, reset SIC&lt;BR /&gt;18. Change interfaces IPs in old gateway according to your table in step one&lt;BR /&gt;19. Plug cables again to old gateway&lt;BR /&gt;20. Put the new SIC password in smartconsole for old gateway&lt;BR /&gt;21. Add old gateway to cluster&lt;BR /&gt;21. Get interfaces in cluster without topology&lt;BR /&gt;22. Push policy&lt;BR /&gt;23. Install licences contracts, check services.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2021 02:31:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Clustering-question/m-p/110505#M15180</guid>
      <dc:creator>RS_Daniel</dc:creator>
      <dc:date>2021-02-11T02:31:25Z</dc:date>
    </item>
    <item>
      <title>Re: Clustering question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Clustering-question/m-p/110506#M15181</link>
      <description>&lt;P&gt;Thanks a lot for taking time to write all of that up, thats actually helpful. See, when we were on the phone with TAC while doing this, we actually followed most of the steps, BUT, not necessarily exactly the way you wrote them (specially part about SIC and vpn). What makes this very tricky is that current single gateway is their main Internet firewall. I will certainly review all the steps you listed.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2021 02:37:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Clustering-question/m-p/110506#M15181</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-02-11T02:37:17Z</dc:date>
    </item>
    <item>
      <title>Re: Clustering question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Clustering-question/m-p/110509#M15182</link>
      <description>&lt;P&gt;FYI, I've run a few times in a situation where upstream service provider's (ISP's) equipment was not refreshing arp after cluster topology changes were made.&lt;/P&gt;
&lt;P&gt;If you are doing it by the book and are still running into the problem, ask ISP to clear the arp cache on their side.&lt;/P&gt;
&lt;P&gt;Other than that, it is entirely doable. Backups are your friends on both, management and the existing gateway, to assure safe fallback.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2021 04:46:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Clustering-question/m-p/110509#M15182</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2021-02-11T04:46:30Z</dc:date>
    </item>
  </channel>
</rss>

