<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HA with VSX cluster in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-with-VSX-cluster/m-p/232162#M44800</link>
    <description>&lt;P&gt;From R81.10, new VSX clusters must use VSLS.&lt;BR /&gt;I assume VSX is similar to traditional ClusterXL where bonded sync links are generally considered best practice.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 08 Nov 2024 17:00:09 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-11-08T17:00:09Z</dc:date>
    <item>
      <title>HA with VSX cluster</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-with-VSX-cluster/m-p/232101#M44775</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We have a Cluster&amp;nbsp; with VSX gateway. Let's say we run in &lt;STRONG&gt;HA mode (not VSLS).&lt;/STRONG&gt; So, &lt;STRONG&gt;all VS are active on FW1&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="image.png" style="width: 839px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28414iDCA201A685E75617/image-dimensions/839x454?v=v2" width="839" height="454" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to know if in this architecture we can face a Split Brain scenario?&lt;/P&gt;&lt;P&gt;If we loose sw1 or sw2 =&amp;gt; we loose the SYNC interface ==&amp;gt; does it mean all FW will become active? ==&amp;gt; SPLIT BRAIN&lt;/P&gt;&lt;P&gt;If this is the expected behaviour if we loose the switch 1 or 2, what can be done to avoid the split brain ?&lt;/P&gt;&lt;P&gt;- Is VSLS an option?&lt;/P&gt;&lt;P&gt;- Moving SYNC on sw3 and sw4?&lt;/P&gt;&lt;P&gt;- A bond for SYNC (if possible) (linked to sw1/sw3 and sw2/sw4)?&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2024 12:22:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-with-VSX-cluster/m-p/232101#M44775</guid>
      <dc:creator>DR_74</dc:creator>
      <dc:date>2024-11-08T12:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: HA with VSX cluster</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-with-VSX-cluster/m-p/232150#M44796</link>
      <description>&lt;P&gt;&lt;SPAN&gt;HA is now considered a subset of VSLS&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;O&lt;/SPAN&gt;&lt;SPAN&gt;n the surface simply moving Sync to sw3 &amp;amp; sw4 isn't helpful.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Sync bond is the most resilient option where available.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2024 16:08:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-with-VSX-cluster/m-p/232150#M44796</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-11-08T16:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: HA with VSX cluster</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-with-VSX-cluster/m-p/232151#M44797</link>
      <description>&lt;P&gt;Hello Chris,&lt;/P&gt;&lt;P&gt;So the design as it is, is susceptible to Split Brain when we loose the Sync interface? Correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2024 16:18:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-with-VSX-cluster/m-p/232151#M44797</guid>
      <dc:creator>DR_74</dc:creator>
      <dc:date>2024-11-08T16:18:55Z</dc:date>
    </item>
    <item>
      <title>Re: HA with VSX cluster</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-with-VSX-cluster/m-p/232153#M44798</link>
      <description>&lt;P&gt;You would also have to lose the interconnectivity for all of the monitored interfaces (by default, the highest and lowest VLAN on each physical interface in each VS. The cluster heartbeats include member status and interface information on all interfaces. Essentially, the cluster members would need to be unable to reach each other on &lt;STRONG&gt;any&lt;/STRONG&gt; interface to reliably cause both members to go active.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2024 16:24:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-with-VSX-cluster/m-p/232153#M44798</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2024-11-08T16:24:15Z</dc:date>
    </item>
    <item>
      <title>Re: HA with VSX cluster</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-with-VSX-cluster/m-p/232154#M44799</link>
      <description>&lt;P&gt;So in case sw1 is down, this means that the cluster memebrs should be able to see each other via their other interface, and so no split brain?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2024 16:31:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-with-VSX-cluster/m-p/232154#M44799</guid>
      <dc:creator>DR_74</dc:creator>
      <dc:date>2024-11-08T16:31:16Z</dc:date>
    </item>
    <item>
      <title>Re: HA with VSX cluster</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-with-VSX-cluster/m-p/232162#M44800</link>
      <description>&lt;P&gt;From R81.10, new VSX clusters must use VSLS.&lt;BR /&gt;I assume VSX is similar to traditional ClusterXL where bonded sync links are generally considered best practice.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2024 17:00:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-with-VSX-cluster/m-p/232162#M44800</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-11-08T17:00:09Z</dc:date>
    </item>
    <item>
      <title>Re: HA with VSX cluster</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-with-VSX-cluster/m-p/232217#M44809</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/6975"&gt;@DR_74&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Sync Redundancy&lt;BR /&gt;&lt;/STRONG&gt;The use of more than one physical synchronization interface (1st sync, 2nd sync, 3rd sync) for synchronization redundancy is not supported. For synchronization redundancy, you can use&lt;STRONG&gt; bond interfaces&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Here is the guide:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_ClusterXL_AdminGuide/Topics-CXLG/Sync-Redundancy.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_ClusterXL_AdminGuide/Topics-CXLG/Sync-Redundancy.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;One physical link for SYNC is not enough from my point of view nowadays.&lt;/P&gt;
&lt;P&gt;Akos&lt;/P&gt;</description>
      <pubDate>Sat, 09 Nov 2024 12:21:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-with-VSX-cluster/m-p/232217#M44809</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2024-11-09T12:21:54Z</dc:date>
    </item>
    <item>
      <title>Re: HA with VSX cluster</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-with-VSX-cluster/m-p/232399#M44848</link>
      <description>&lt;P&gt;A few points:&lt;/P&gt;
&lt;P&gt;1) As PhoneBoy said, VSX R81.10 and up only use VSLS&lt;/P&gt;
&lt;P&gt;2) You can still assign all VSes to a single gateway if you really want it that way&lt;/P&gt;
&lt;P&gt;3) Keep in mind which networking layer you're asking about to predict what state will occur.&lt;/P&gt;
&lt;P&gt;If you lose layer1 on FW1, via outage of SW1, that cluster member will know it is dead and unable to function, so it will fail itself. &amp;nbsp;The cluster protocol will monitor all of these interfaces. &amp;nbsp;FW2 will go to "ACTIVE Attention" (meaning its active, but its peer is not). &amp;nbsp;Likewise for SW2 and FW2.&lt;/P&gt;
&lt;P&gt;If you lose layer2 in some fashion on SW1 (because link between SW1 and SW2 died, AND link between SW1 and SW3 died, AND link between SW3 and SW4 died, ... OR someone makes a misconfiguration and breaks spanning-tree), then you might have a split-brain function, but probably not. &amp;nbsp;The cluster protocol monitors more than just interface status and its peer, &amp;nbsp;so each cluster member will be able to make a reasonable determination if it can or can't pass traffic. &amp;nbsp;If not, it will fail itself (also because RouteD will lose routes in the FIB; RouteD is a monitored operation). &amp;nbsp; One member will always remain active if it loses its peer. &amp;nbsp;The standby peer won't go active if it also can't monitor other hosts on the interfaces (this is the Interface Active Check operation).&lt;/P&gt;
&lt;P&gt;The only way to really end up with a split brain function is disconnect the SW1-SW2 link, and SW3-SW4 link, but depending on where your next-hop gateways are for each network, or any directly-attached hosts, this still might not happen.&lt;/P&gt;
&lt;P&gt;Although not directly configurable in SmartConsole, VSX clusters also use a priority-based member status to control which one becomes active. &amp;nbsp;If you have a path from FW1 to FW2 in any sort of way, such that FW1 and FW2 can see at least one interface of its peer in some manner, they will know if one or the other is in a workable state. &amp;nbsp;A split-brain function is incredibly hard to encounter unless you're trying to do something intentionally in a lab.&lt;/P&gt;
&lt;P&gt;Separately, you have a port-channel spread across 2 distinct switches, but you haven't indicated if these are using a shared control plane (virtual stacking, or whatever). &amp;nbsp;If they don't have a shared control plane, then by definition you can't use LACP. &amp;nbsp;If you're using active-backup as your bond, then this will work but sub-optimally (especially if SW1 is the active member interface). &amp;nbsp;If you are using bond mode active-backup, this will also feed into the cluster state to determine if it's workable or not.&lt;/P&gt;
&lt;P&gt;Not sure if this diagram is an academic exercise or what, but it's a very bad installation to have. &amp;nbsp;If you're just giving us all a big proficiency test, then kudos!&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt; &amp;nbsp;Otherwise, you should make some plans revise this to be more suitable for a cluster configuration and increase your resiliency.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Nov 2024 04:25:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-with-VSX-cluster/m-p/232399#M44848</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2024-11-12T04:25:39Z</dc:date>
    </item>
  </channel>
</rss>

