<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Achieving Zero downtime in Active-Active setup while a Firewall goes for a Reboot. in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Achieving-Zero-downtime-in-Active-Active-setup-while-a-Firewall/m-p/125004#M18051</link>
    <description>&lt;P&gt;Both Load Sharing Unicast or Load Sharing Multicast Mode should also provide high availability, so you could try to temporary "disable" the cluster node manually with "clusterxl_admin down" before restarting it.&lt;BR /&gt;&lt;BR /&gt;If uptime is mission critical you might want to migrate to a maestro setup.&lt;/P&gt;</description>
    <pubDate>Tue, 27 Jul 2021 12:46:03 GMT</pubDate>
    <dc:creator>Benedikt_Weissl</dc:creator>
    <dc:date>2021-07-27T12:46:03Z</dc:date>
    <item>
      <title>Achieving Zero downtime in Active-Active setup while a Firewall goes for a Reboot.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Achieving-Zero-downtime-in-Active-Active-setup-while-a-Firewall/m-p/124996#M18048</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN&gt;&lt;STRONG&gt;Query&lt;/STRONG&gt; : We are running a pair of Check Point Firewall with ClusterXL in active-active mode. We want to achieve zero downtime when rebooting 1 Checkpoint&amp;nbsp;Firewall which is active as the pair of firewalls is supporting 24 x7 service which we cannot afford downtime during rebooting of firewalls. The consideration is the packets-in-transit passing through the Checkpoint firewall during the reboot. &lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN&gt;How to ensure these&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;packets-in-transit has flowed through this particular firewall gracefully and no new packets come in to this firewall before the firewall is reboot?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN&gt;Version: R80.10&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in Advance.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jul 2021 10:19:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Achieving-Zero-downtime-in-Active-Active-setup-while-a-Firewall/m-p/124996#M18048</guid>
      <dc:creator>bookman</dc:creator>
      <dc:date>2021-07-27T10:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: Achieving Zero downtime in Active-Active setup while a Firewall goes for a Reboot.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Achieving-Zero-downtime-in-Active-Active-setup-while-a-Firewall/m-p/125004#M18051</link>
      <description>&lt;P&gt;Both Load Sharing Unicast or Load Sharing Multicast Mode should also provide high availability, so you could try to temporary "disable" the cluster node manually with "clusterxl_admin down" before restarting it.&lt;BR /&gt;&lt;BR /&gt;If uptime is mission critical you might want to migrate to a maestro setup.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jul 2021 12:46:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Achieving-Zero-downtime-in-Active-Active-setup-while-a-Firewall/m-p/125004#M18051</guid>
      <dc:creator>Benedikt_Weissl</dc:creator>
      <dc:date>2021-07-27T12:46:03Z</dc:date>
    </item>
    <item>
      <title>Re: Achieving Zero downtime in Active-Active setup while a Firewall goes for a Reboot.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Achieving-Zero-downtime-in-Active-Active-setup-while-a-Firewall/m-p/125025#M18054</link>
      <description>&lt;P&gt;Precisely what kind of traffic is it and what blades are enabled?&lt;BR /&gt;In General, even in an Active/Passive setup, active connections should survive failover, though there are a few exceptions.&lt;BR /&gt;And there is also this bug in R80.40 (not relevant for your version):&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&amp;amp;eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk170163" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&amp;amp;eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk170163&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;That said, if you try to do this during a period where both gateways are in heavy use, you WILL have issues as one gateway tries to deal with the increased load.&lt;BR /&gt;Active/Active setups in general are better served by either a Maestro setup or a properly-sized Active/Standby cluster.&lt;BR /&gt;You’re also better off (most likely) on a newer release since R80.10 is nearing End of Support.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jul 2021 15:56:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Achieving-Zero-downtime-in-Active-Active-setup-while-a-Firewall/m-p/125025#M18054</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-07-27T15:56:50Z</dc:date>
    </item>
    <item>
      <title>Re: Achieving Zero downtime in Active-Active setup while a Firewall goes for a Reboot.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Achieving-Zero-downtime-in-Active-Active-setup-while-a-Firewall/m-p/125027#M18055</link>
      <description>&lt;P&gt;I recently upgraded a number of clusters during the working day.&amp;nbsp; The Gateways where originally running R77.30, and they are now running R80.40.&lt;/P&gt;
&lt;P&gt;In my case I failed over from active(N1) to standby(N2), I rebuilt N1 as R80.40 and ensured MVC was enabled, then simply failed over from N2 to N1.&amp;nbsp; I believe we had 1 or 2 ping drops.&amp;nbsp; I then repeated the process for N2.&lt;/P&gt;
&lt;P&gt;Also as indicated below, suggest you go to R80.40 (with a minimum JHFA of T118) or R81.x&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jul 2021 16:35:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Achieving-Zero-downtime-in-Active-Active-setup-while-a-Firewall/m-p/125027#M18055</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2021-07-27T16:35:10Z</dc:date>
    </item>
    <item>
      <title>Re: Achieving Zero downtime in Active-Active setup while a Firewall goes for a Reboot.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Achieving-Zero-downtime-in-Active-Active-setup-while-a-Firewall/m-p/125033#M18057</link>
      <description>&lt;P&gt;This, administratively down the member you are about to reboot first.&amp;nbsp; This will cause all traffic to shift off this member immediately with practically no disruption.&amp;nbsp; If you just reboot or pull power on an active member, it may take the surviving member 2-2.5 seconds to figure out the other member is gone and start handling its traffic.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jul 2021 17:17:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Achieving-Zero-downtime-in-Active-Active-setup-while-a-Firewall/m-p/125033#M18057</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-07-27T17:17:16Z</dc:date>
    </item>
    <item>
      <title>Re: Achieving Zero downtime in Active-Active setup while a Firewall goes for a Reboot.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Achieving-Zero-downtime-in-Active-Active-setup-while-a-Firewall/m-p/125046#M18060</link>
      <description>&lt;P&gt;And depending on how they are set up, the surviving member may think it has failed and may refuse to take over. This is fairly common when using a simple cable for sync. Sync should always be over a switch.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jul 2021 19:08:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Achieving-Zero-downtime-in-Active-Active-setup-while-a-Firewall/m-p/125046#M18060</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2021-07-27T19:08:44Z</dc:date>
    </item>
    <item>
      <title>Re: Achieving Zero downtime in Active-Active setup while a Firewall goes for a Reboot.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Achieving-Zero-downtime-in-Active-Active-setup-while-a-Firewall/m-p/125916#M18279</link>
      <description>&lt;P&gt;Thank you all for taking your time to answer the query .&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 07 Aug 2021 06:22:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Achieving-Zero-downtime-in-Active-Active-setup-while-a-Firewall/m-p/125916#M18279</guid>
      <dc:creator>bookman</dc:creator>
      <dc:date>2021-08-07T06:22:22Z</dc:date>
    </item>
  </channel>
</rss>

