<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Load Sharing &amp;amp; Asymetric Routing in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Load-Sharing-amp-Asymetric-Routing/m-p/84824#M17115</link>
    <description>&lt;P&gt;Thank you for your answer.&lt;/P&gt;&lt;P&gt;Ok If I correctly understanding, the reply packet is accepted by the other gw for access control policy and if three is threat prevention policy the packet is forwarded via sync interface to original member.&lt;/P&gt;&lt;P&gt;But I'm confused because as I know, if there is a access control policy and threat prevention policy on a gw, first the firewall check the access control policy to match a rule then the threat prevention policy. What is the behavior in this case ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 11 May 2020 10:52:09 GMT</pubDate>
    <dc:creator>JTE</dc:creator>
    <dc:date>2020-05-11T10:52:09Z</dc:date>
    <item>
      <title>Load Sharing &amp; Asymetric Routing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Load-Sharing-amp-Asymetric-Routing/m-p/84664#M17074</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;I have a question about load sharing clustering &amp;amp; asymetric routing because it's not clear for me (without SDF enable).&amp;nbsp;&lt;/P&gt;&lt;P&gt;When two nodes are in loadsharing clustering (Multicast or Unicast), the original packet is handle by one gateway but the reply packet may/can returns via a different security gateway. In this case, there is a asymetric routing.&lt;/P&gt;&lt;P&gt;As the connection is shared in the kernel table of the both gateway, the reply packet is accepted by the other firewall or not ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 09 May 2020 10:54:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Load-Sharing-amp-Asymetric-Routing/m-p/84664#M17074</guid>
      <dc:creator>JTE</dc:creator>
      <dc:date>2020-05-09T10:54:25Z</dc:date>
    </item>
    <item>
      <title>Re: Load Sharing &amp; Asymetric Routing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Load-Sharing-amp-Asymetric-Routing/m-p/84768#M17105</link>
      <description>Connections are shared, yes.&lt;BR /&gt;For Threat Prevention, packets are forwarded via the sync interface to the  original member (if necessary) via a mechanism called Chain Forwarding.</description>
      <pubDate>Sun, 10 May 2020 23:24:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Load-Sharing-amp-Asymetric-Routing/m-p/84768#M17105</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-05-10T23:24:41Z</dc:date>
    </item>
    <item>
      <title>Re: Load Sharing &amp; Asymetric Routing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Load-Sharing-amp-Asymetric-Routing/m-p/84824#M17115</link>
      <description>&lt;P&gt;Thank you for your answer.&lt;/P&gt;&lt;P&gt;Ok If I correctly understanding, the reply packet is accepted by the other gw for access control policy and if three is threat prevention policy the packet is forwarded via sync interface to original member.&lt;/P&gt;&lt;P&gt;But I'm confused because as I know, if there is a access control policy and threat prevention policy on a gw, first the firewall check the access control policy to match a rule then the threat prevention policy. What is the behavior in this case ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2020 10:52:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Load-Sharing-amp-Asymetric-Routing/m-p/84824#M17115</guid>
      <dc:creator>JTE</dc:creator>
      <dc:date>2020-05-11T10:52:09Z</dc:date>
    </item>
    <item>
      <title>Re: Load Sharing &amp; Asymetric Routing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Load-Sharing-amp-Asymetric-Routing/m-p/84831#M17117</link>
      <description>&lt;P&gt;Two things:&lt;/P&gt;
&lt;P&gt;1. In Unicast mode, all packets are received by pivot and then forwarded to a specific cluster member for processing. This way pivot member is responsible for perfect stickiness. No other members are receiving packets related to a particular connection, except for a case when the designated member fails in the middle of connection. FW kernel tables are synchronised through the cluster members, but do not require acknowledgement to proceed with packet forwarding.&lt;/P&gt;
&lt;P&gt;2. In multicast mode, all cluster members receive the packet, but only the designated member processes it. The other members just drop it. To ensure this behaviour, cluster performs something called "Flash and ACK", where packets are not forwarded before delta sync is done is confirmed through the cluster. Flash and ACK is causing some performance drawbacks. In some specific cases, such as Threat Prevention, where connection should be streamed and go through deeper inspection, there is a decision function providing perfect stickiness.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In all cases, FW kernel tables as synced.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Case of forwarding is not going through sync and in most cases is not related to Load Sharing at all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2020 12:48:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Load-Sharing-amp-Asymetric-Routing/m-p/84831#M17117</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-05-11T12:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: Load Sharing &amp; Asymetric Routing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Load-Sharing-amp-Asymetric-Routing/m-p/97064#M19076</link>
      <description>&lt;P&gt;Note that the Sticky Decision Function (SDF) is gone in R80.20+ due to the major overhaul of SecureXL in that revision, and has been replaced with the Cluster Correction Layer mechanism described here:&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk169154&amp;amp;partition=Advanced&amp;amp;product=ClusterXL" target="_blank"&gt;sk169154: Asymmetric connections in ClusterXL R80.20 and higher&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 19 Sep 2020 21:14:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Load-Sharing-amp-Asymetric-Routing/m-p/97064#M19076</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-09-19T21:14:54Z</dc:date>
    </item>
  </channel>
</rss>

