- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
How can we ensure fallback in the case where the customer uses multiple supernodes but wants to distribute agent connections to the supernode based on location (IP address)? How does this fallback work if a group of endpoints has more than one supernode defined? Does an architecture exist for such a solution?
I believe when you configure multiple, it's "first to respond" similar to how it works for Endpoint Management.
I had TAC case for this before and what Phoneboy said is exactly what support advised as well, first to respond.
Best,
Andy
It looks like it is random, as per the documentation.
I also thought that it was first to respond but I think we've confused the Policy Server and Super Node solutions.
It's a good question because if you had all three cities' Super Nodes in all the relevant Client Settings > Rules > Super Nodes > Assigned Super Nodes then I would assume it is random, as per the documentation, which is counter to the advantage of Reduced site bandwidth usage.
That would put the responsibility on the administrator to configure Client settings rules for each site and group the machines, but then you could either exclude Super Nodes for the mobile users or need to include all Super Nodes for all users and see some clients on one site actually using the Super Node on another site, assuming your scenario of all endpoints having visibility of all three Super Nodes.
I guess the questions are:
- How does Check Point actually do it (randomly it seems, based on rules with more than one Super Node)?
- How does it work in a multi-site deployment with full connectivity across sites?
- How often does that happen?
- How many users do you have that will roam regularly between sites?
- Is there a manual configuration option for the case of just a few roaming clients?
- Is there an access control solution that can control access to the Super Nodes, if that extra work (workaround) can be part of a possible solution?
What is a Super Node?
A Super Node is a Windows device running a specially configured Endpoint Security Client that also consists of server-like and proxy-like capabilities, and which listens on port 4434 and port 3128 to proxy by default. Super Node is a light-weight proxy (based on NGNIX) that allows admins to reduce their bandwidth consumption and enable offline updates, where only the Super Node needs connectivity to the update servers.
Super Node Workflow
When a device is assigned as a super node and has the supported blades installed, it downloads signatures from the sources defined in the policy and stores a local copy. This local copy serves as the signature source for other Endpoint Security Clients.
When an Endpoint Security Client initiates an update, it follows this process:
The Endpoint Security client checks for the latest signatures from a randomly selected super node listed in the Client Settings > General policy.
If the update fails with the chosen super node, the Endpoint Security client attempts the update with another super node in the list.
If the update fails with all the super nodes listed in the General Client Settings policy, the Endpoint Security client will update directly from the sources specified in the policy.
Primary Advantages:
Reduces site bandwidth usage.
Reduces server workload.
Reduces customer expense on server equipment, as there is no need for a local appliance.
Improved scale.
https://support.checkpoint.com/results/sk/sk171703
When an Endpoint Security client launches an update, it first checks the "Common Client Settings" policy for a "Super Node" list. If such a list is found, a random Super Node is selected for update. If update of the selected node fails, the next entry is taken from the list. Sources defined in the Anti-Malware policy are only used if all the Super Node options have failed.
Starting with E85.30 client uses "Super Node List" global policy when it is available on server in combination with "Common Client Settings" policy to determine if current computer is Super Node or if it should use one of configured "Super Nodes" as a download location for supported file type.
Note: An update is considered to be successful if the local signatures are newer than the remote signatures. Make sure all Super Nodes are continuously updated. Policy and Software Deployment features in E85.30 and newer Endpoint Security clients require a connection to the Endpoint Manager to process sync requests regarding policy and software deployment changes.
I believe when you configure multiple, it's "first to respond" similar to how it works for Endpoint Management.
Okay, but let’s say I have three cities, and in each city there will be one supernode. If an endpoint has visibility of all three supernodes, that means all of them can respond to it. How can I ensure that when a laptop moves from City 1 to City 2, it will only be answered by the supernode assigned in City 2 and not by the one in City 1?
I think this is good illustration.
Andy
********************
City 1 Supernode = SN1 (10.1.0.10)
City 2 Supernode = SN2 (10.2.0.10)
City 3 Supernode = SN3 (10.3.0.10)
Agent Configuration Options:
DNS approach:
From City 1 → supernode.company.com
→ 10.1.0.10
From City 2 → supernode.company.com
→ 10.2.0.10
From City 3 → supernode.company.com
→ 10.3.0.10
Subnet mapping approach:
If agent’s IP = 10.2.x.x → select SN2
Else if IP = 10.1.x.x → select SN1
Else fallback → nearest reachable supernode
This ensures laptops dynamically “follow” the local supernode without manual intervention.
So to answer your question:
You ensure this behavior by using split-horizon DNS or subnet-based supernode selection rules. That way, when the laptop moves to City 2, it automatically resolves/selects SN2 as its primary, and only fails over to SN1/SN3 if SN2 is unavailable.
Ye, but this is not possible for our customer to do it, we had this idead before. 😕
What exactly was the problem?
Customer declined this solution, it doesnt matter whats the problem honestly 🙂 if you know what i mean.
I do know what you mean ; - )
upajmo, da bodo našli najboljšo rešitev
Andy
Upajmo, mislim, da nismo prvi dobavitelj, ki se je lotil te težave.
That's an interesting solution but it does pass responsibility to the network and DNS teams to fix what should be an option/feature in the Endpoint solution.
That's how it seems.
Yea, agree.
It looks like it is random, as per the documentation.
I also thought that it was first to respond but I think we've confused the Policy Server and Super Node solutions.
It's a good question because if you had all three cities' Super Nodes in all the relevant Client Settings > Rules > Super Nodes > Assigned Super Nodes then I would assume it is random, as per the documentation, which is counter to the advantage of Reduced site bandwidth usage.
That would put the responsibility on the administrator to configure Client settings rules for each site and group the machines, but then you could either exclude Super Nodes for the mobile users or need to include all Super Nodes for all users and see some clients on one site actually using the Super Node on another site, assuming your scenario of all endpoints having visibility of all three Super Nodes.
I guess the questions are:
- How does Check Point actually do it (randomly it seems, based on rules with more than one Super Node)?
- How does it work in a multi-site deployment with full connectivity across sites?
- How often does that happen?
- How many users do you have that will roam regularly between sites?
- Is there a manual configuration option for the case of just a few roaming clients?
- Is there an access control solution that can control access to the Super Nodes, if that extra work (workaround) can be part of a possible solution?
What is a Super Node?
A Super Node is a Windows device running a specially configured Endpoint Security Client that also consists of server-like and proxy-like capabilities, and which listens on port 4434 and port 3128 to proxy by default. Super Node is a light-weight proxy (based on NGNIX) that allows admins to reduce their bandwidth consumption and enable offline updates, where only the Super Node needs connectivity to the update servers.
Super Node Workflow
When a device is assigned as a super node and has the supported blades installed, it downloads signatures from the sources defined in the policy and stores a local copy. This local copy serves as the signature source for other Endpoint Security Clients.
When an Endpoint Security Client initiates an update, it follows this process:
The Endpoint Security client checks for the latest signatures from a randomly selected super node listed in the Client Settings > General policy.
If the update fails with the chosen super node, the Endpoint Security client attempts the update with another super node in the list.
If the update fails with all the super nodes listed in the General Client Settings policy, the Endpoint Security client will update directly from the sources specified in the policy.
Primary Advantages:
Reduces site bandwidth usage.
Reduces server workload.
Reduces customer expense on server equipment, as there is no need for a local appliance.
Improved scale.
https://support.checkpoint.com/results/sk/sk171703
When an Endpoint Security client launches an update, it first checks the "Common Client Settings" policy for a "Super Node" list. If such a list is found, a random Super Node is selected for update. If update of the selected node fails, the next entry is taken from the list. Sources defined in the Anti-Malware policy are only used if all the Super Node options have failed.
Starting with E85.30 client uses "Super Node List" global policy when it is available on server in combination with "Common Client Settings" policy to determine if current computer is Super Node or if it should use one of configured "Super Nodes" as a download location for supported file type.
Note: An update is considered to be successful if the local signatures are newer than the remote signatures. Make sure all Super Nodes are continuously updated. Policy and Software Deployment features in E85.30 and newer Endpoint Security clients require a connection to the Endpoint Manager to process sync requests regarding policy and software deployment changes.
The term "Common Client Settings" (in sk171703 and the R82 Harmony Endpoint Server Administration Guide) should be something like:
Client Settings > General > Super Nodes
or
Client Settings > {selected rule} > Capabilities & Exclusions > General > Super Nodes > Assigned Super Nodes
I've left feedback on the sk about the old and new terms both being used. So that should get updated.
Check Point is not supporting SmartEndpoint from end of 2025 - https://support.checkpoint.com/results/sk/sk183410
I hope that will be followed by an update in the documentation.
I don't like having to go back and forward between R82 Harmony Endpoint Web Management Administration Guide & R82 Harmony Endpoint Server Administration Guide looking for information and finding SmartConsole and Infinity Portal terms/wording.
[EDIT]
There is a third guide that I was just reminded of:
Harmony Endpoint EPMaaS Administration Guide
And then there are the Client documentation buried away in each Clients SK...
It's fair enough to have a list of documentation (various separate documents) but on the management side I would like to see consolidation of documents, a bit like with the Quantum Security Management Admin Guide.
Rant over. 🛑
https://support.checkpoint.com/results/sk/sk183380
I had TAC case for this before and what Phoneboy said is exactly what support advised as well, first to respond.
Best,
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
5 | |
4 | |
3 | |
2 | |
2 | |
1 | |
1 | |
1 | |
1 | |
1 |
Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY