<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Implementing High-Availability Firewall Clusters with Single Public IP Connectivity in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/241927#M12095</link>
    <description>&lt;P&gt;Thks Chris, it solves our problem.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2025 11:40:16 GMT</pubDate>
    <dc:creator>ereche</dc:creator>
    <dc:date>2025-02-21T11:40:16Z</dc:date>
    <item>
      <title>Implementing High-Availability Firewall Clusters with Single Public IP Connectivity</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/240481#M12031</link>
      <description>&lt;P&gt;Today, we have an internal cluster with two 9100 devices, and everything is working fine.&lt;/P&gt;&lt;P&gt;Now, we are planning to implement two new clusters: &lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ClusterExternal.png" style="width: 617px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29537i643C849FEDDAA0D2/image-dimensions/617x463?v=v2" width="617" height="463" role="button" title="ClusterExternal.png" alt="ClusterExternal.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Cluster Y&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Two SMB 1575 devices&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Only one fixed ISP IP&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Cluster Z&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Two 9100 devices&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Only one fixed ISP IP&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is: how can the clusters communicate using only one public IP?&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 14:04:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/240481#M12031</guid>
      <dc:creator>SallesThiago</dc:creator>
      <dc:date>2025-02-05T14:04:52Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing High-Availability Firewall Clusters with Single Public IP Connectivity</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/240482#M12032</link>
      <description>&lt;P&gt;I have same issue to solve here.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 14:06:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/240482#M12032</guid>
      <dc:creator>ereche</dc:creator>
      <dc:date>2025-02-05T14:06:45Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing High-Availability Firewall Clusters with Single Public IP Connectivity</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/240484#M12033</link>
      <description>&lt;P&gt;The traditional method:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_ClusterXL_AdminGuide/Topics-CXLG/Cluster-IP-addresses-on-different-subnets.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_ClusterXL_AdminGuide/Topics-CXLG/Cluster-IP-addresses-on-different-subnets.htm&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 14:12:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/240484#M12033</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-02-05T14:12:28Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing High-Availability Firewall Clusters with Single Public IP Connectivity</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/240491#M12034</link>
      <description>&lt;P&gt;You may also wish to consider ElasticXL with R82 as another option (for non Spark) as it doesn't have the same IP address requirements as traditional ClusterXL.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://youtu.be/Ctx9Su0y-e0?feature=shared" target="_blank" rel="noopener"&gt;https://youtu.be/Ctx9Su0y-e0?feature=shared&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 15:19:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/240491#M12034</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-02-05T15:19:57Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing High-Availability Firewall Clusters with Single Public IP Connectivity</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/240502#M12037</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;Note that on locally managed Spark appliances running R81.10.15, you can just configure routable IP as VIP and physical (private) IPs from different subnet without the need to implement&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_ClusterXL_AdminGuide/Topics-CXLG/Cluster-IP-addresses-on-different-subnets.htm" target="_blank"&gt;Cluster IP Addresses on Different Subnets&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 15:43:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/240502#M12037</guid>
      <dc:creator>sigal</dc:creator>
      <dc:date>2025-02-05T15:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing High-Availability Firewall Clusters with Single Public IP Connectivity</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/240512#M12040</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Using the R82 for non-Spark scenarios seems like the best approach. In the case of Spark with 3 valid IPs, will it work? Is this the best practice in this situation? I’m considering requesting additional IPs from the ISP.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 17:16:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/240512#M12040</guid>
      <dc:creator>SallesThiago</dc:creator>
      <dc:date>2025-02-05T17:16:20Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing High-Availability Firewall Clusters with Single Public IP Connectivity</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/240513#M12041</link>
      <description>&lt;P&gt;Yes, for other customers, we handle this through local management in Spark and work fine. However, in this case, the manager will operates centrally.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 17:17:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/240513#M12041</guid>
      <dc:creator>SallesThiago</dc:creator>
      <dc:date>2025-02-05T17:17:30Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing High-Availability Firewall Clusters with Single Public IP Connectivity</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/241927#M12095</link>
      <description>&lt;P&gt;Thks Chris, it solves our problem.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 11:40:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/241927#M12095</guid>
      <dc:creator>ereche</dc:creator>
      <dc:date>2025-02-21T11:40:16Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing High-Availability Firewall Clusters with Single Public IP Connectivity</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/243461#M12231</link>
      <description>&lt;P&gt;Unfortunately, we recently have closed a ticket about this, and the solution is:&lt;/P&gt;&lt;P&gt;Quantum Spark Appliances in &lt;STRONG&gt;Centrally Managed&lt;/STRONG&gt; mode DO NOT fully support the configuration with Single Routable IP and interfaces on different network even if it's confirmed by documentation (&lt;A href="https://sc1.checkpoint.com/documents/SMB_R81.10.X/AdminGuides_Centrally_Managed/EN/Content/Topics/Configuring-High-Availability.htm?TocPath=Managing%20the%20Device%7CConfiguring%20High%20Availability%7C_____5#Configuring_a_Cluster_with_a_Single_Routable_IP_Address_in_Central_Management" target="_blank"&gt;https://sc1.checkpoint.com/documents/SMB_R81.10.X/AdminGuides_Centrally_Managed/EN/Content/Topics/Configuring-High-Availability.htm?TocPath=Managing%20the%20Device%7CConfiguring%20High%20Availability%7C_____5#Configuring_a_Cluster_with_a_Single_Routable_IP_Address_in_Central_Management&lt;/A&gt;), this seems to be available only for Quantum Force and higher (&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_ClusterXL_AdminGuide/Topics-CXLG/Cluster-IP-addresses-on-different-subnets.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_ClusterXL_AdminGuide/Topics-CXLG/Cluster-IP-addresses-on-different-subnets.htm&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;You can try to configure a new "local transport network" between gateway and router so you can have as many IP as you want to configure in each interface. In this case you cannot access directly each cluster member from internet, but you can do so via DNAT.&lt;/P&gt;&lt;P&gt;Something like that:&lt;/P&gt;&lt;P&gt;Router External: 1.1.1.1&lt;/P&gt;&lt;P&gt;Router Internal: 192.168.1.1/24&lt;/P&gt;&lt;P&gt;Checkpoint External: 192.168.1.2/24&lt;/P&gt;&lt;P&gt;Checkpoint External gateway: 192.168.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hoping to be useful&lt;/P&gt;</description>
      <pubDate>Wed, 12 Mar 2025 14:07:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Implementing-High-Availability-Firewall-Clusters-with-Single/m-p/243461#M12231</guid>
      <dc:creator>perfect4situa</dc:creator>
      <dc:date>2025-03-12T14:07:20Z</dc:date>
    </item>
  </channel>
</rss>

