<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Adventures in Clustering in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Adventures-in-Clustering/m-p/214630#M40978</link>
    <description>&lt;P&gt;The reason we block Load Sharing in SmartConsole is that in some R80.x versions, Load Sharing with IPSec VPN isn't supported.&lt;BR /&gt;A bunch of changes were needed to incorporate the Maestro code into maintrain that broke Load Sharing with VPN starting in R80.20.&lt;BR /&gt;This is fixed in currently supported versions.&lt;BR /&gt;However, the "bump in the road" is still present.&lt;/P&gt;
&lt;P&gt;Thanks for sharing this!&lt;/P&gt;</description>
    <pubDate>Fri, 17 May 2024 02:40:28 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-05-17T02:40:28Z</dc:date>
    <item>
      <title>Adventures in Clustering</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Adventures-in-Clustering/m-p/214597#M40966</link>
      <description>&lt;P&gt;&lt;FONT size="4"&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-01.jpg" style="width: 888px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25738iA0066A1B0C141C9C/image-size/large?v=v2&amp;amp;px=999" role="button" title="Post2-01.jpg" alt="Post2-01.jpg" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;SPAN&gt;“It’s a dangerous business, Frodo, setting up a lab. You step onto that cyber road, and if you don’t keep your feet, there’s no knowing where you might be swept.” - Gandalf&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;Hello friends. Today we are stepping out into the unknown, on a wild adventure in borderlands of what is possible with ClusterXL.&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;I have setup a lot of clusters in my time, from files servers to load balancers to firewalls, a wide variety of deployments from all sorts of vendors. However, in most of these cases, the nature of my job role and the limitations of budgets meant that I usually had to focus on the basics: standardized configs and quick deployments. There wasn't time to experiment or test out what might be possible, we had to get it up and running as fast as possible, and as simple as possible.&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;One of the blessings in my current role is that now I do have time, and support, to go farther and try new things and really understand the art of what is possible. So when I got a chance recently to play around in advanced lab with many networks, multiple gateways, and over a dozen VMs, well I realized this was the time to push some boundaries and see what kind of an adventure we could have.&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;Then it came to me; awhile back I came across a reference that it is possible to convert an failover cluster to a Load Sharing cluster without having to rebuild anything… Now, if you came up in IT as a Check Point guy, this might seem trivial to you. Maybe the true Check Point wizards have known all along, but as someone who learned clustering on the other platforms, well this sounds crazy! Change the type and function of a cluster without having to tear the whole thing down and rebuild it from scratch? What sort of magic is this?&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-02.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25739i2D2DFC6294F6F3B1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Post2-02.png" alt="Post2-02.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I did a little digging through the scrolls and SK articles but there isn't much documentation to be found about how to harness this power, (probably due in part to some of the limitations of Load Sharing mode) , but knowing it was possible sparked my curiosity and now I found myself with the perfect setup to test it out.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;Some foundational concepts&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;Before we hit the road it is important to pack our bags and make sure we are prepared. Here are some key items it will be helpful to be familiar with:&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;A review of Check Point Cluster Types.&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;STRONG&gt;&lt;FONT size="4"&gt;High Availability mode (HA or A/S)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;The traditional approach most often seen in firewall clusters. In this type of cluster only one node is active at any given time. The second node sits in a passive or standby state and only starts handling traffic in the event of a fail over.&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;STRONG&gt;&lt;FONT size="4"&gt;Load Sharing mode (LS)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;This is a proprietary approach provide by Check Point. This setup allows the pair of gateways to share the load of traffic, balanced across the gateways so that both nodes are active. The cool thing here is that it will still use a single shared virtual IP (VIP). This simplifies the network side of things considerably. This mode has two variations that behave slightly differently.&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;STRONG&gt;&lt;FONT size="4"&gt;LS - Multicast mode&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;As you may have guessed, uses multicast addressing. Each member receives traffic packets and then runs algorithms to determine which node will handle each packet. This mode will give you a roughly 50/50 traffic split.&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;STRONG&gt;&lt;FONT size="4"&gt;LS - Unicast mode&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;Can't do multicast in your environment, no problem. In this mode the primary gateway will function as a "pivot", receiving traffic requests as they come in and handing off some of those connections to the secondary node. This will result in a roughly 70/30 traffic split.&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;STRONG&gt;&lt;FONT size="4"&gt;Active/Active Mode (A/A)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;This is similar to traditional A/A clusters from other vendors. Both gateways are active and synchronize connections to provide availability in the event of a failure but there is no load sharing or balancing. Typically they will have unique IPs and rely on dynamic routing updates to achieve failover. Not part of today's scenario, so not going to elaborate on this mode.&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;Link to good resource if you are interested in basics of setting up an HA cluster:&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ClusterXL_AdminGuide/Content/Topics-CXLG/Using-Classic-Mode-in-SmartConsole.htm?tocpath=Configuring%20ClusterXL%7CConfiguring%20the%20Cluster%20Object%20and%20Members%7C_____2" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ClusterXL_AdminGuide/&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;Another good resource, this one on how to convert an existing gateway to an HA cluster:&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;&lt;A href="https://martin.frlicka.net/articles/check-point-r81-ha-cluster-configuration-with-existing-gateway-how-to-tutorial/" target="_blank" rel="noopener"&gt;https://martin.frlicka.net/articles/check-point-r81-ha-cluster-configuration-with-existing-gateway-how-to-tutorial/&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;Keep in Mind:&lt;/STRONG&gt; Different types of clusters will have different advantages or limitations. One limitation of note is you cannot land IPSec VPNs on a LS cluster, so keep that in mind if you are considering this for a&amp;nbsp; production environment.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;Link to SK on Load Sharing Limitations:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk101539" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk101539&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;H1 lang="en-US"&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;Let the Adventure Begin&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;Here is a quick drawing of the section of the lab I carved out for this test:&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-03.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25740i22F5134D2A01F61D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Post2-03.png" alt="Post2-03.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Everything is running R81.20&lt;/SPAN&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;Gateways 01 and 02 are already setup as an A/S Failover cluster (HA mode), using ClusterXL and VMAC.&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;Our basic configuration details:&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-04.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25741iA03A410044CF01D8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Post2-04.png" alt="Post2-04.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-05.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25742iF2EAAE0ACA905C66/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Post2-05.png" alt="Post2-05.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So with the lab up and running, it is time to generate some traffic so we can see which gateways are actively handling traffic. Spinning up a browser in both my server VMs I started some classic YouTube streams.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-06.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25743i3EBB192797529188/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Post2-06.png" alt="Post2-06.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Using MobaXterm I connected out via SSH to my gateways launched cpview to take a look at how the traffic is distributed.&lt;/P&gt;
&lt;P lang="en-US"&gt;(By the way, if you are not familiar with it, play around with MultiExec mode, it is super handy.)&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-07.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25744i78FC9BFDBF1F9B33/image-size/large?v=v2&amp;amp;px=999" role="button" title="Post2-07.png" alt="Post2-07.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;SPAN&gt;As you can see Gateway01 is handling virtually all the traffic, which is what we expect in HA mode.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1 lang="en-US"&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;Stepping into the unknown&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;Now as I said, the cool thing about LS is that is still uses the same VIP as the current HA setup. So if I currently have an HA cluster working and I can fail over to the secondary node, then everything should "just work" from a network perspective when I switch modes. I tested this in my lab without issue and just in case you are wondering, did this whole exercise without ever connecting the virtual switches/routers or making any network changes.&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;That being said, keep in mind that ARP tables on networks are mysterious enigmas that store values in quasi-quantum states next to Schrodinger's cat, so while there was virtually no traffic disruption in my tests, your mileage may vary.&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-08.png" style="width: 374px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25745i1E9C2C0BDB5E5CA1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Post2-08.png" alt="Post2-08.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;SPAN&gt;So with my lab prepped and my backups taken, I hopped into smart console to try flipping the switch on the cluster definition to see what happens.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-09.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25746i180704B7183E5B3D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Post2-09.png" alt="Post2-09.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;&lt;FONT size="4"&gt;Error Note: ClusterXL in Load Sharing mode is not supported with IPSEC VPN&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;Drats. I was immediately denied. Now, don't be deceived by this pop up warning. (I had to read it twice.) It can be confusing because it mentions IPSec VPN and then when you click OK, you are switched back to HA mode. This is Not failing because an IPSec VPN is present. (My lab setup doesn't have any) This is just the primary limitation the system wants to make you aware of. It is programmed by default with a speed bump of sorts here in the GUI.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;So while it is not a configuration issue, what we do have is something strange.&amp;nbsp; The SK article gives you all the details on how to fix it but not the why this is in place. Basically, for some reason we have an extra protection built into both the Smart Console and the Management Server itself. This means that by default, with no customization, you cannot turn on LS mode! (This is true even if you build it from scratch.)&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;The way around this is fairly simple, if annoying. You have to create a variable on the computer running the Smart Console and update a script value on the management server. Nothing major, and no permanent damage done if you make these changes, just a hoop we have to jump through as a prerequisite. Consider it a test of character to keep out those faint hearted adventures who lack the courage to launch vi.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-10.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25747i7584B960BDBBFC60/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Post2-10.png" alt="Post2-10.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Link to the details:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk162637" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk162637&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;Key points:&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-11.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25748i1B0B2CBE626D4150/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Post2-11.png" alt="Post2-11.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;SPAN&gt;AND&lt;/SPAN&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-12.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25749i5DD02F453F564778/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Post2-12.png" alt="Post2-12.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Yes I know what you are thinking "Shouldn't I change that value to match my version, say R81_20 in this case?" The answer is No. It is forever locked in time at the version level it was created for as a memorial to forgotten code snippets that will never be updated.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;The entire experience here, from the GUI pop-up to the fix just leaves you shaking your head. I don't have access to source but if I did I imagine I would find a comment in this section similar to: "Remember to fix this later"&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-13.jpg" style="width: 392px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25750iAA31858FB1FD8173/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Post2-13.jpg" alt="Post2-13.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;SPAN&gt;Anyway, after a short detour I finished prepping my system according to the SK article, I went back to try again.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-14.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25751iAF96C5D4547327EA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Post2-14.png" alt="Post2-14.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Boom, now we are talking!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;Note: For my test I went with Multicast mode for the 50/50 traffic distribution. I also selected the IP/Port/SPI connection sharing method. This has to do with which components of each connection request that will be used to calculate which gateway will own it. Rule of thumb here is more components considered the better the traffic distribution, but the lower the overall stickiness of connections. So if stickiness is more important to you than evenly balancing the load, you might pick IP only.&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-15.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25752i796B8185FC5B69EE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Post2-15.png" alt="Post2-15.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;SPAN&gt;Right, well that was easy. Time to push policy…&lt;/SPAN&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-16.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25753i3C06884571E97E75/image-size/large?v=v2&amp;amp;px=999" role="button" title="Post2-16.png" alt="Post2-16.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Oops, looks like I stumbled over another limitation of LS mode. Simple enough to resolve in a test environment. Popped back into the cluster object and switched from Autonomous Threat Prevention to Custom so I could turn off Threat Extraction.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;Note: Threat Extraction is an awesome protection feature and I don't recommend running without it in production environments. More info here:&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk114807" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk114807&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-17.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25754i0555A2FC0DDD636E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Post2-17.png" alt="Post2-17.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;SPAN&gt;Then we try again:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-18.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25755iBDEC194896AC7030/image-size/large?v=v2&amp;amp;px=999" role="button" title="Post2-18.png" alt="Post2-18.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That's better.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;Went back to my test VM's, made sure internet access still worked, everything was good. Videos were still running as if nothing happened. To be safe, I relaunched my browsers and started up the streams again. Then reconnected to my gateways to see how my traffic is being handled.&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-19.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25756i7172A024418A8E67/image-size/large?v=v2&amp;amp;px=999" role="button" title="Post2-19.png" alt="Post2-19.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Very nice! Now we have traffic seamlessly balanced across both gateways.&lt;/P&gt;
&lt;P lang="en-US"&gt;I even went back in and switched it back and forth between LS/AP a couple times, really just a matter of pushing policy. The magic is real! Lol. I will say that eventually my border router got mad (probably an ARP issue) and did start dropping traffic until I rebooted it, but overall really impressed with how easy it is to switch between these modes.&lt;/P&gt;
&lt;P lang="en-US"&gt;By the way if you think this is cool, you are going to love the new ElasticXL coming in R82!&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R82-ElasticXL/td-p/192459" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/R82-ElasticXL/td-p/192459&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P lang="en-US"&gt;&lt;FONT size="4"&gt;Thanks for tagging along, hope you had fun. Safe travels out their my fellow cyber adventurers.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Post2-20.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25757i91269B6E1BFF9F27/image-size/large?v=v2&amp;amp;px=999" role="button" title="Post2-20.png" alt="Post2-20.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 20:28:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Adventures-in-Clustering/m-p/214597#M40966</guid>
      <dc:creator>FuzzyLogic</dc:creator>
      <dc:date>2024-05-16T20:28:10Z</dc:date>
    </item>
    <item>
      <title>Re: Adventures in Clustering</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Adventures-in-Clustering/m-p/214602#M40967</link>
      <description>&lt;P&gt;Wow...FANTASTIC!!&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2024 01:19:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Adventures-in-Clustering/m-p/214602#M40967</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-17T01:19:49Z</dc:date>
    </item>
    <item>
      <title>Re: Adventures in Clustering</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Adventures-in-Clustering/m-p/214630#M40978</link>
      <description>&lt;P&gt;The reason we block Load Sharing in SmartConsole is that in some R80.x versions, Load Sharing with IPSec VPN isn't supported.&lt;BR /&gt;A bunch of changes were needed to incorporate the Maestro code into maintrain that broke Load Sharing with VPN starting in R80.20.&lt;BR /&gt;This is fixed in currently supported versions.&lt;BR /&gt;However, the "bump in the road" is still present.&lt;/P&gt;
&lt;P&gt;Thanks for sharing this!&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2024 02:40:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Adventures-in-Clustering/m-p/214630#M40978</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-05-17T02:40:28Z</dc:date>
    </item>
    <item>
      <title>Re: Adventures in Clustering</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Adventures-in-Clustering/m-p/214632#M40980</link>
      <description>&lt;P&gt;I always found HA was way better option, even in older versions.&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2024 02:42:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Adventures-in-Clustering/m-p/214632#M40980</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-17T02:42:04Z</dc:date>
    </item>
    <item>
      <title>Re: Adventures in Clustering</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Adventures-in-Clustering/m-p/214688#M40987</link>
      <description>&lt;P&gt;In older versions, ClusterXL Load Sharing also had a lot more limitations to it.&lt;BR /&gt;The Cluster Correction Layer (developed for Scalable Platforms/Maestro) solved a lot of those issues:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk169154" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk169154&lt;/A&gt;&lt;BR /&gt;Implementing CCL "broke"&amp;nbsp;ClusterXL Load Sharing with VPN in R80.x versions.&lt;BR /&gt;This has been fixed in R81.10 (or R81 JHF 34).&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2024 15:06:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Adventures-in-Clustering/m-p/214688#M40987</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-05-17T15:06:03Z</dc:date>
    </item>
    <item>
      <title>Re: Adventures in Clustering</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Adventures-in-Clustering/m-p/214715#M40994</link>
      <description>&lt;P&gt;Thank you, Great article!&lt;/P&gt;&lt;P&gt;Haven't seen LS much in the wild.&lt;BR /&gt;&lt;BR /&gt;Looking forward to elasticXL getting some more adoption.&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2024 19:23:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Adventures-in-Clustering/m-p/214715#M40994</guid>
      <dc:creator>Machine_Head</dc:creator>
      <dc:date>2024-05-17T19:23:13Z</dc:date>
    </item>
  </channel>
</rss>

