- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
I have a Checkpoint vsec Cluster in AWS on R80.40. Recently i upgraded it to R81.20 however somehow the HA functionality is not working on R81.20
As in AWS ..default route is pointed towards eni of active member (say Member A) and when a failover occurs eni changes automatically to that of secondary member (Mem B). However this is not happening on R81.20 in my case , even after simulating the failover default route still points to eni of Member A even though Member B is active. Is there any specific config required to be done on R81.20 wrt failover ?
any help is appreciated.
Issue is resolved now..turned out there was an issue with the GW DNS due to which it wasnt able to connect to AWS Services which would have led to a route swithover.
as soon as DNS was resolved route switch is working as expected.
Thank you to everyone who replied to this thread 🙂
Have not heard of issue like this yet. What happens if you run cphaprob commands on both members, does it show correct state as it should after failover? It would make sense that ENI would automatically switch over to other member upon failover, I agree 100%.
Do you see any relevant info/logs on AWS side at all?
Cphaprob commands show the correct state after i simulate the failover.. its just that the eni isnt switching.. at aws side also i didnt find anything.
There is one thing though ..in r80.40 i used to run these as Active active.. but in r80.20 documentation for cloudguard its specifically mentioned to work as an active standby unit with an additonal option in smartconsole as "use in geo cloud mode".
I wonder if thats the issue and it isnt supposed to run in active active in a way as it did in r80.40
Im pretty sure in R81+, you can only run as A-P, NOT A-A
Yea in the documentation also only A/P is mentioned but i configured my R81 with A/A and it seems to work fine.
I think may b the A/P option with "use Geo Mode" in R81 serves the same purpose as an A/A cluster as the external routing also is similar
It doesn't matter if it's A/A or A/P , both work in the same way with the external route table.
Check $FWDIR/log/aws_had.elg log file if there are any exceptions there
Hi,
That would depend on which solution did you upgrade from - single az or cross az cluster.
R81.20 cross az cluster uses a different Active-Standby architecture.
Please refer to the updated upgrading documentation index and specifically to the following document:
In case of upgrading a cross-az cluster, additional steps are required to complete the upgrade.
Regards,
Dmitry
I followed this exact same document while upgrding..however i tried to configure my cluster as A/A as well as A/S and both seem to work fine. In R80.40 use geo cluster with A/S wasnt an option which is available in R81. I wonder why A/A is not mentioned in the document there as it seems to be working fine.
Issue is resolved now..turned out there was an issue with the GW DNS due to which it wasnt able to connect to AWS Services which would have led to a route swithover.
as soon as DNS was resolved route switch is working as expected.
Thank you to everyone who replied to this thread 🙂
Good job and tx for sharing!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 3 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Wed 20 May 2026 @ 11:00 AM (CEST)
The New DDoS Reality: Autonomy, Scale, and the Future of DefenceFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesWed 20 May 2026 @ 11:00 AM (CEST)
The New DDoS Reality: Autonomy, Scale, and the Future of DefenceTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 12 Jun 2026 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 47: Continuous Threat Exposure ManagementFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY