<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic First time clustering HA on SMB in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/First-time-clustering-HA-on-SMB/m-p/260940#M13360</link>
    <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;I am preparing to create a cluster of two Quantum Spark 2000 devices with the same installed firmware 81.10.17. Currently, while comparing various entries in different official documentation or video tutorials, I have questions that I cannot answer myself.&lt;/P&gt;&lt;P&gt;The first Spark 2000 device, designated as Primary, has been operating in production for a long time (let's assume more than several months). Some time ago, I unpacked the second Spark 2000 device, activated the licenses, and updated the firmware to version 81.10.17. I would like to prepare it for connection in an HA configuration using the dedicated LAN2/SYNC interface. Do I need to import the same configuration from the primary device to the secondary device, or do I only need to configure the LAN and VLAN interfaces on the secondary device and nothing else?&lt;/P&gt;&lt;P&gt;Another question concerns clustering LAN and VLAN interfaces. I have a trunk connected to the primary device on port X1 and a VLAN configured with ID 10 and its addressing is 192.168.1.0/24 with default gateway 192.168.1.1. When I use Wizard in GUI web mdoe, in the Cluster IP address field, I enter 192.168.1.1 as the VIP gateway for client stations, and from the pool, I additionally designate two highest addresses: 192.168.1.252 for the primary X1 interface and 192.168.1.253 for the secondary device's X1 interface. Is this the correct configuration? Does it make sense to cluster each individual VLAN, or is it sufficient to cluster the physical trunk interface and monitor it? Or maybe it's enough to only monitor the VLANs?&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ss1.png" style="width: 481px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31875i961380D2F3C72DB4/image-size/large?v=v2&amp;amp;px=999" role="button" title="ss1.png" alt="ss1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The final question concerns the addressing for the clustered WAN interface for internet access. Let's assume I only have one WAN interface, and its true public one IP address received from the operator is 200.110.100.44/32. When configuring this interface in HA using the Wizard, in the Cluster IP address field I enter the true address 200.110.100.44, while in the primary and secondary physical IP fields I enter fictitious addresses, e.g., 223.0.113.1 and 223.0.113.2. Is this a correct assumption that should be made here?&lt;/P&gt;&lt;P&gt;Example&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ss2.png" style="width: 481px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31876iADD376521A7AB20E/image-size/large?v=v2&amp;amp;px=999" role="button" title="ss2.png" alt="ss2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much for any suggestions &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 26 Oct 2025 23:11:07 GMT</pubDate>
    <dc:creator>Askey_oot</dc:creator>
    <dc:date>2025-10-26T23:11:07Z</dc:date>
    <item>
      <title>First time clustering HA on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/First-time-clustering-HA-on-SMB/m-p/260940#M13360</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;I am preparing to create a cluster of two Quantum Spark 2000 devices with the same installed firmware 81.10.17. Currently, while comparing various entries in different official documentation or video tutorials, I have questions that I cannot answer myself.&lt;/P&gt;&lt;P&gt;The first Spark 2000 device, designated as Primary, has been operating in production for a long time (let's assume more than several months). Some time ago, I unpacked the second Spark 2000 device, activated the licenses, and updated the firmware to version 81.10.17. I would like to prepare it for connection in an HA configuration using the dedicated LAN2/SYNC interface. Do I need to import the same configuration from the primary device to the secondary device, or do I only need to configure the LAN and VLAN interfaces on the secondary device and nothing else?&lt;/P&gt;&lt;P&gt;Another question concerns clustering LAN and VLAN interfaces. I have a trunk connected to the primary device on port X1 and a VLAN configured with ID 10 and its addressing is 192.168.1.0/24 with default gateway 192.168.1.1. When I use Wizard in GUI web mdoe, in the Cluster IP address field, I enter 192.168.1.1 as the VIP gateway for client stations, and from the pool, I additionally designate two highest addresses: 192.168.1.252 for the primary X1 interface and 192.168.1.253 for the secondary device's X1 interface. Is this the correct configuration? Does it make sense to cluster each individual VLAN, or is it sufficient to cluster the physical trunk interface and monitor it? Or maybe it's enough to only monitor the VLANs?&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ss1.png" style="width: 481px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31875i961380D2F3C72DB4/image-size/large?v=v2&amp;amp;px=999" role="button" title="ss1.png" alt="ss1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The final question concerns the addressing for the clustered WAN interface for internet access. Let's assume I only have one WAN interface, and its true public one IP address received from the operator is 200.110.100.44/32. When configuring this interface in HA using the Wizard, in the Cluster IP address field I enter the true address 200.110.100.44, while in the primary and secondary physical IP fields I enter fictitious addresses, e.g., 223.0.113.1 and 223.0.113.2. Is this a correct assumption that should be made here?&lt;/P&gt;&lt;P&gt;Example&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ss2.png" style="width: 481px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31876iADD376521A7AB20E/image-size/large?v=v2&amp;amp;px=999" role="button" title="ss2.png" alt="ss2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much for any suggestions &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Oct 2025 23:11:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/First-time-clustering-HA-on-SMB/m-p/260940#M13360</guid>
      <dc:creator>Askey_oot</dc:creator>
      <dc:date>2025-10-26T23:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: First time clustering HA on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/First-time-clustering-HA-on-SMB/m-p/260943#M13361</link>
      <description>&lt;P&gt;Maybe better to confirm with TAC to be 100% sure, though Im positive someone here will know. FWIW, here is what AI gave...&lt;/P&gt;
&lt;P&gt;***********************&lt;/P&gt;
&lt;P&gt;Excellent and very thoughtful questions — you’re clearly preparing this Spark 2000 HA setup properly. Let’s go through each part carefully because the SMB clustering (HA) behavior on &lt;STRONG&gt;Quantum Spark 1500–2000 series&lt;/STRONG&gt; (R81.10.17) differs slightly from standard Gaia clusters.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2&gt;🧩 &lt;span class="lia-unicode-emoji" title=":keycap_1:"&gt;1️⃣&lt;/span&gt; Do you need to clone/import configuration to the secondary?&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;No, you do not manually import or duplicate the full configuration.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;When you create an HA pair on SMB appliances:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;The &lt;STRONG&gt;Primary&lt;/STRONG&gt; unit is considered the configuration master.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;The &lt;STRONG&gt;Secondary&lt;/STRONG&gt; unit will &lt;STRONG&gt;synchronize all settings automatically&lt;/STRONG&gt; once HA is established and synchronization completes.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;So, what you should do on the &lt;STRONG&gt;Secondary&lt;/STRONG&gt; before starting the HA Wizard:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; Steps:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;Reset to factory defaults (to avoid residual settings).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Assign only:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Management IP (temporarily, on LAN or WAN so you can access the WebUI).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;The &lt;STRONG&gt;same firmware&lt;/STRONG&gt; version as the Primary (you already did this).&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Run the &lt;STRONG&gt;High Availability Wizard&lt;/STRONG&gt; and choose &lt;EM&gt;Secondary&lt;/EM&gt;.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;During the wizard, specify the same Sync interface (e.g. LAN2/SYNC).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;The wizard will detect the Primary and pull the configuration once the sync starts.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;So you don’t manually configure LAN/VLANs on the secondary — they are replicated after sync.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2&gt;&lt;span class="lia-unicode-emoji" title=":globe_with_meridians:"&gt;🌐&lt;/span&gt; &lt;span class="lia-unicode-emoji" title=":keycap_2:"&gt;2️⃣&lt;/span&gt; LAN / VLAN clustering design (VIPs)&lt;/H2&gt;
&lt;P&gt;Let’s analyze your example:&lt;/P&gt;
&lt;TABLE&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH&gt;Role&lt;/TH&gt;
&lt;TH&gt;Interface&lt;/TH&gt;
&lt;TH&gt;IP&lt;/TH&gt;
&lt;TH&gt;Comment&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;Cluster VIP&lt;/TD&gt;
&lt;TD&gt;VLAN 10 (on X1 trunk)&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;192.168.1.1&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;Virtual IP used by clients as gateway&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Primary member&lt;/TD&gt;
&lt;TD&gt;VLAN 10&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;192.168.1.252&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;Local IP of member A&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Secondary member&lt;/TD&gt;
&lt;TD&gt;VLAN 10&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;192.168.1.253&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;Local IP of member B&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; &lt;STRONG&gt;Yes — that is exactly correct.&lt;/STRONG&gt;&lt;BR /&gt;This is how HA interfaces are designed on SMB:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Each interface in the cluster has three IPs: one virtual (VIP) + one per member.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;The VIP is the gateway seen by your LAN clients.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Monitoring and VLANs&lt;/H3&gt;
&lt;P&gt;You can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Either cluster the &lt;EM&gt;trunk port&lt;/EM&gt; itself (e.g. X1) &lt;STRONG&gt;and&lt;/STRONG&gt; include all VLANs under it.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Or cluster &lt;EM&gt;individual VLAN interfaces&lt;/EM&gt; (e.g. X1.10, X1.20, etc.) depending on how your design looks.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; &lt;STRONG&gt;Best practice:&lt;/STRONG&gt;&lt;BR /&gt;Cluster &lt;STRONG&gt;each VLAN interface&lt;/STRONG&gt; if you’re using multiple VLANs, so that the HA mechanism can track them individually.&lt;BR /&gt;The physical trunk (X1) doesn’t need its own cluster IP if you only use VLAN-tagged subinterfaces — it’s just the carrier.&lt;/P&gt;
&lt;P&gt;If you have only one VLAN, your current setup (X1 trunk + VLAN10) is perfect.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2&gt;&lt;span class="lia-unicode-emoji" title=":globe_showing_europe_africa:"&gt;🌍&lt;/span&gt; &lt;span class="lia-unicode-emoji" title=":keycap_3:"&gt;3️⃣&lt;/span&gt; WAN interface and public IPs&lt;/H2&gt;
&lt;P&gt;This part is the most commonly misunderstood, so let’s clear it up precisely.&lt;/P&gt;
&lt;P&gt;You said:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Only one true public IP 200.110.100.44/32&lt;BR /&gt;In the Wizard, I enter VIP = 200.110.100.44, and physicals 223.0.113.1 / 223.0.113.2.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; &lt;STRONG&gt;Yes — that’s correct and required.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Here’s why:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;The &lt;STRONG&gt;VIP&lt;/STRONG&gt; (200.110.100.44) is the address the Internet “sees” and your ISP routes to.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Each cluster member still needs its own &lt;STRONG&gt;local unique IP&lt;/STRONG&gt; on that interface for internal HA communication (health checks, sync tracking, etc.).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;These “member” IPs (223.0.113.1 / 223.0.113.2 in your example) are &lt;EM&gt;not used externally&lt;/EM&gt; and can be any RFC5737 test addresses or even private ones if the link partner doesn’t care (but it’s cleaner to stay in the same subnet if the ISP allows /29).&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":light_bulb:"&gt;💡&lt;/span&gt; If you truly have a /32 (single IP only), you can assign the “real” address only to the VIP and assign &lt;EM&gt;fictitious /29-style IPs&lt;/EM&gt; as members, exactly as you described. This is the recommended workaround in Check Point’s SMB HA documentation.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2&gt;🧭 &lt;span class="lia-unicode-emoji" title=":keycap_4:"&gt;4️⃣&lt;/span&gt; TL;DR Summary&lt;/H2&gt;
&lt;TABLE&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH&gt;Task&lt;/TH&gt;
&lt;TH&gt;What to Do&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;Secondary setup&lt;/TD&gt;
&lt;TD&gt;Factory default → same firmware → run HA Wizard as Secondary&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Config sync&lt;/TD&gt;
&lt;TD&gt;Automatic from Primary via SYNC interface&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;VLANs&lt;/TD&gt;
&lt;TD&gt;Define VIP + Primary + Secondary IPs per VLAN (clustered VLANs, not just trunk)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;WAN / Public IP&lt;/TD&gt;
&lt;TD&gt;Use real public IP as VIP, fictitious ones for members (if only one real IP available)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Cluster Sync&lt;/TD&gt;
&lt;TD&gt;Use dedicated LAN2/SYNC interface (make sure it’s isolated from production traffic)&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;HR /&gt;
&lt;H2&gt;🧱 &lt;span class="lia-unicode-emoji" title=":keycap_5:"&gt;5️⃣&lt;/span&gt; Bonus Tips&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Ensure &lt;STRONG&gt;both devices have identical license sets&lt;/STRONG&gt; (same services, same contract) — otherwise sync may fail.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;After forming the cluster, go to &lt;STRONG&gt;Device &amp;gt; High Availability &amp;gt; Status&lt;/STRONG&gt; — ensure it shows &lt;EM&gt;“Active/Standby (synchronized)”&lt;/EM&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;You can test failover safely with &lt;STRONG&gt;Device &amp;gt; High Availability &amp;gt; Force Failover&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Don’t forget to adjust any DHCP, VPN, or static routes that reference the interface IPs — always point to the &lt;STRONG&gt;Cluster VIP&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Oct 2025 23:59:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/First-time-clustering-HA-on-SMB/m-p/260943#M13361</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-26T23:59:28Z</dc:date>
    </item>
  </channel>
</rss>

