Hi, I am new to Check Point and I am currently planning for the deployment of two Check Point Quantum Force 9700 Plus Security Gateways running R82 with ElasticXL.
The two Security Gateways will be connected, each by a single link, to a FortiGate 101F firewall. So like:
FG port 1 -> CPSG01 eth2
FG port 2 -> CPSG02 eth2
However I am having difficulties understanding how the interfaces are supposed to be configured.
Based on my understanding, combining the two FortiGate links into a Layer 3 LACP bond is not viable because the two CP links are considered separate (based on this post I read https://community.checkpoint.com/t5/Firewall-and-Security-Management/ElasticXL-Bond-Aggregate-Behavi...).
However, I'm not sure if I can configure the two FortiGate links as a redundant interface (active/backup) either because the SMO might choose the non-pivot member to forward traffic, which means both links on the FortiGate will need to be up. In that case, would ElasticXL detect the active interface automatically and forward traffic over it accordingly?
Would appreciate if anyone has insights into how I could go about configuring the interfaces.
Thanks!