- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
I currently have a 5200 (standalone on r81.10).
I am looking to utilize the same name/IP and replace this gateways with two 6500s on R81.10.
I just wanted to brain storm on the easiest way to accomplish this.
Also, seems like this should be a common ask. Are there any Check Point guides for something like this?
In that case, please follow below process that TAC gave me for customer that wanted to do EXACT same thing. Version makes no difference, so would not sweat about that.
Link to a document:
The documentation mentions the Standalone deployment for those who have a Standalone firewall and would like to convert it to ClusterXL. In your situation, you can go straight to page 151. "Creating the ClusterXL Object"
Computer B refers to your new firewall and Computer A is your current firewall.
Basically here are the steps:
Yes, this is a pretty common operation.
Prepare the new cluster in the lab. You can either re-apply Gaia config or re-build it manually. Mind, interface names may be changing between the GWs.
Set up a service window, disconnect the management interfaces only from the old cluster, and connect to the new cluster members. Re-establish SIC, push policy, and re-cable the rest of the network.
Should be straight forward.
Indeed - Its a straight forward. Even further I used to setup a L3 switch and replicate the exact customer scenario. Establish SIC, policy push, license install everything same that I would do at customer place and then just plug the devices out and put the devices in. You are out of DC in flat 30 mins.
He has to deploy a new SMS from the StandAlone first, so not really easy...
Well here is the approach that I had taken and I use to take.
Once the mgmt in network - Install the policy and install database.
hi,
sorry, I misspoke.
When I say it's a stand alone, it's a single gateway. The smartcenter is already detached on a VM.
In that case, please follow below process that TAC gave me for customer that wanted to do EXACT same thing. Version makes no difference, so would not sweat about that.
Link to a document:
The documentation mentions the Standalone deployment for those who have a Standalone firewall and would like to convert it to ClusterXL. In your situation, you can go straight to page 151. "Creating the ClusterXL Object"
Computer B refers to your new firewall and Computer A is your current firewall.
Basically here are the steps:
Btw, I would follow process I gave you, as I did it with 3 customers, never a single problem. TAC guy I worked with on it 2 years ago was AMAZING!
sk154033: How to migrate R80.x standalone management environment to a distributed environment
Regardless of the title of the SK, this is also applicable for R81.10, assuming that by Standalone 5200 you mean what the Check Point terminology assumes.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 37 | |
| 14 | |
| 11 | |
| 10 | |
| 10 | |
| 10 | |
| 7 | |
| 7 | |
| 7 | |
| 6 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY