<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Migration from model 2200 R77.30 to 3200 R80.20 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Migration-from-model-2200-R77-30-to-3200-R80-20/m-p/77800#M15848</link>
    <description>You generally can't cluster different hardware models together and have it work.&lt;BR /&gt;Not sure you can do this without some minimal downtime.</description>
    <pubDate>Tue, 10 Mar 2020 01:35:47 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2020-03-10T01:35:47Z</dc:date>
    <item>
      <title>Migration from model 2200 R77.30 to 3200 R80.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Migration-from-model-2200-R77-30-to-3200-R80-20/m-p/77730#M15829</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;we are going to migrate cluster checkpoint 2200 R77.30 to checkpoint 3200 R80.20, as we have less downtime, we want to do as active/standby migrate&lt;/P&gt;&lt;P&gt;step 1 -----we will first unplug cable from standby gateway of existing and plug to gateway of one of gateway of new firewall&lt;/P&gt;&lt;P&gt;step 2----we will do failover( will it work ?, as hardware model is different)&lt;/P&gt;&lt;P&gt;step 3----and vice versa, will do same for other member&lt;/P&gt;&lt;P&gt;step---if everything goes well, new 3200 model will be in cluster&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Additional step&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;1) Establist SIC with the new Secondary-FW Gateway.&lt;BR /&gt;2) Fetch the interface with Topology table on Secondary Firewall.&lt;BR /&gt;3) Check the CCP mode of existing Firewall and keep the same in Secondary New Firewall via CLI&lt;BR /&gt;4) Check the Cluster-id of existing Firewall and New Firewall......If cluster unable to form then we have to change Cluster id of New Secondary Firewall.&lt;BR /&gt;5) Check the CoreXL status &amp;amp; fwaccel status on new secondary Firewall. If all the parameter are matched as per expextation we should see&lt;BR /&gt;"cphaprob stat" in READY state which means FW is ready for Failover&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please suggest, can we go ahead like this?? or its better to migrate as a whole&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2020 13:34:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Migration-from-model-2200-R77-30-to-3200-R80-20/m-p/77730#M15829</guid>
      <dc:creator>amitmsh1995</dc:creator>
      <dc:date>2020-03-09T13:34:53Z</dc:date>
    </item>
    <item>
      <title>Re: Migration from model 2200 R77.30 to 3200 R80.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Migration-from-model-2200-R77-30-to-3200-R80-20/m-p/77800#M15848</link>
      <description>You generally can't cluster different hardware models together and have it work.&lt;BR /&gt;Not sure you can do this without some minimal downtime.</description>
      <pubDate>Tue, 10 Mar 2020 01:35:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Migration-from-model-2200-R77-30-to-3200-R80-20/m-p/77800#M15848</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-10T01:35:47Z</dc:date>
    </item>
    <item>
      <title>Re: Migration from model 2200 R77.30 to 3200 R80.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Migration-from-model-2200-R77-30-to-3200-R80-20/m-p/77822#M15854</link>
      <description>&lt;DIV&gt;Let me comment on the steps below and update where needed:&lt;/DIV&gt;
&lt;DIV&gt;A) replace backup gateway&lt;/DIV&gt;
&lt;DIV&gt;1) Establish SIC with the new Secondary-FW Gateway, change the version of the object and push policy with the "If installation fails do not install" option un-ticked.&lt;BR /&gt;2) Fetch the interface with Topology table on Secondary Firewall.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Never ever in a working cluster do this, all you need to do is update the interface names, when you change them, as both FW's use the same naming there should be no need if you move the cables to the same ports on the new gateway.&lt;BR /&gt;3) Check the CCP mode of existing Firewall and keep the same in Secondary New Firewall via CLI&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; This could help, after the last change of the new members change it to auto or unicast.&lt;BR /&gt;4) Check the Cluster-id of existing Firewall and New Firewall......If cluster unable to form then we have to change Cluster id of New Secondary Firewall.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Cluster will not form period. This is also what&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt; said, different hardware will not work (unless they accidentally have the same number of cores.&lt;BR /&gt;5) Check the CoreXL status &amp;amp; fwaccel status on new secondary Firewall. If all the parameter are matched as per expectation we should see&lt;BR /&gt;"cphaprob stat" in READY state which means FW is ready for Failover&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;cphacu start - could be your lifesaver when you do get this right.&lt;/DIV&gt;
&lt;DIV&gt;B) Failover by cpstop on old gateway.&lt;/DIV&gt;
&lt;DIV&gt;C) Replace old gateway 1&lt;/DIV&gt;
&lt;DIV&gt;D) Repeat step 1 and change the CCP setting&lt;/DIV&gt;</description>
      <pubDate>Tue, 10 Mar 2020 06:04:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Migration-from-model-2200-R77-30-to-3200-R80-20/m-p/77822#M15854</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-03-10T06:04:13Z</dc:date>
    </item>
    <item>
      <title>Re: Migration from model 2200 R77.30 to 3200 R80.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Migration-from-model-2200-R77-30-to-3200-R80-20/m-p/77869#M15862</link>
      <description>That would be what I would try as well, but only if the number of COREs is the same between the 2200 and 3200 otherwise I do not believe it will work.</description>
      <pubDate>Tue, 10 Mar 2020 12:35:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Migration-from-model-2200-R77-30-to-3200-R80-20/m-p/77869#M15862</guid>
      <dc:creator>Tim_Spencer</dc:creator>
      <dc:date>2020-03-10T12:35:23Z</dc:date>
    </item>
    <item>
      <title>Re: Migration from model 2200 R77.30 to 3200 R80.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Migration-from-model-2200-R77-30-to-3200-R80-20/m-p/77881#M15867</link>
      <description>&lt;P&gt;As another users mentioned, manually update the interface names instead of using the fetch option.&amp;nbsp; You should only need to change the interface name, not the IP address or any other properties. And, switching from a 2200 to 3200, even those interface names *might* be the same and need no changes.&lt;/P&gt;
&lt;P&gt;And considering the difference in the number of cores will prevent firewall tables from being synchronized. But depending on your availability requirements this may be a very minor issue.&amp;nbsp; The firewalls will still failover and the new 3200&amp;nbsp; with R80.20 become active as soon as the 2200 with R77.30 is stopped.&lt;/P&gt;
&lt;P&gt;New connections can be established immediately. Old connections will be dropped and need to be reestablished. But the vast majority of Internet user traffic is HTTP / HTTPS, and the chances of a user noticing a dropped connection is small to begin with, will generally just hit reload and not think about it much when it just works the second time.&amp;nbsp; If you are supporting users going telnet / ssh sessions through the firewall, they will probably see a disconnect (assuming the number of cores in use prevents syncing) bit should be able to reconnect immediately.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2020 14:49:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Migration-from-model-2200-R77-30-to-3200-R80-20/m-p/77881#M15867</guid>
      <dc:creator>Christopher__C2</dc:creator>
      <dc:date>2020-03-10T14:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: Migration from model 2200 R77.30 to 3200 R80.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Migration-from-model-2200-R77-30-to-3200-R80-20/m-p/77882#M15868</link>
      <description>You could even disable Stateful Inspection when you push the new gateway, thus all connections that were there will continue to be allowed, when they fit the policy. before putting the second new member in you can enable Stateful Inspection again.</description>
      <pubDate>Tue, 10 Mar 2020 15:12:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Migration-from-model-2200-R77-30-to-3200-R80-20/m-p/77882#M15868</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-03-10T15:12:45Z</dc:date>
    </item>
  </channel>
</rss>

