- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello CheckMates,
We are currently in a process of migrating x 2 5100 GW appliances in ClusterXL into x 2 QF 9100 GW appliances which will be running in ElasticXL mode.
Since there is no official procedure or steps to do this migration, i would appreciate any advisory help regarding the steps needed to be taken to be successful.
It would be great if we were moving to completely new infrastructure, but customer wants to keep exact interface and gateway setups as it is currently.
1. Upgrade current management server to R82
2. Add ElasticXL pivot gateway
3. Clone current access policy & adapt it to ElasticXL
4. Creating interfaces on ElasticXL
4a I am unsure on this part if i can use the same exact ip address for gateway or do i need to use different ones, eg 192.168.1.1 and 192.168.1.9 for the same VLAN.
5. Mirror copy the same configuration of cluster ( IPSEC tunnels, logging, other etc..)
6. Unplug old gateways.
7. Physically connect external connections to ElasticXL devices
8. Install policy
First two steps are obviously done, but i am unsure on what is the best course of action for this, i am concerned about the interface gateways, and to not get cut off from management server, since they do not have an out of bounds management vlan network, but it is on one of the production networks.
Also original plan was to use a different new management server which we booted and configured, but we fell back to the old one because the user must be able to migrate IPSEC tunnels without having to reconfigure anything again.
What would your advice be to make this as smooth as possible?
Any help would be appreciative 😊
3. I wouldn't clone the policy. I would just install the same policy to both. Find anywhere the old cluster object is used and add the new ElasticXL object.
4. You use the old cluster VIPs. Once you move to the ElasticXL cluster, the unique member IPs can be deallocated, though I would personally keep them in case I needed to move away from ElasticXL to a traditional cluster or even to another vendor. I really hate having my present options limited by old design decisions, so I try very hard not to do things which will limit future flexibility.
4. How would you failover to ElasticXL cluster, i am a bit confused on how am i going to configure ElasticXL cluster IP's to be the exact same as ClusterXL VIP, won't i cut myself off? We will reserve the leftover ip addresses as you recommended.
For instance what if i do as follow:
ClusterXL VIP ip address 192.168.1.13 (.11 GW1 .12 GW2)
ElasticXL ip address 192.168.1.10
Fetch toplogy, add elasticXl object to policies, disconnect old gateways and install policy.
After that, ssh to pivot gateway and change the ip address to 192.168.1.13, fetch topology and install policy?
Would this be good workflow?
That would probably be fine, though I would just treat it like moving from one vendor to another (from an ASA to Check Point, for example). I normally do that by using all the same IPs on the new boxes, and shutting down most of the switchports to them. For the cutover, shutdown the ports to the old boxes, 'no shutdown' the ports to the new boxes, push policy.
This was my original plan as well with deploying a new management server, but sadly they need IPSEC tunnels migrated that are critical for which they do not have shared secrets anymore......as well as not having addition for ports on their switches for the new tunnel connection. Basically we will be reusing the same ports on the switch, just unplugging the old ClusterXL.
What will be tricky is that their management server is in their production VLAN, lets say 192.168.99.0/24.
MGMT IP is 192.168.99.20
Currently the management port of the new ElasticXL GW is in VLAN 192.168.1.0/24.
I need to change this port to vlan 192.168.99.X in order to not be cut off when i turn off the old ClusterXL GWs
Meanwhile i am unable to create these VIP addreses on the ElasticXL since they are used for management port.
After migrating to to ElasticXL i have to create a dummy ip address for management port and then recreate the VIP of VLAN 192.168.99.13
Any advice regarding this?
As long as they're okay with a hard outage, it's easy enough. You can build the ElasticXL cluster object on the management with a different address (say, 192.168.99.14) and build the first ElasticXL member offline (all interfaces disconnected) with the real address. When it's time to cut over, unplug the old cluster members, plug in the first ElasticXL member, change the object's address to the real address, establish SIC, and push policy. This should get traffic working through the first ElasticXL member. There shouldn't be any more outages unless you roll back.
Once traffic is working through the first ElasticXL member, you can plug in the second member and add it to the ElasticXL cluster. There's no outage for that.
They're ok with a hard outage, i feel pushed into a corner since on their previous implementation they did not use proper management ports, but used real sub interfaces for management.
Basically as i see it now, what i can do is:
1. Create the same .99 VLAN on first ElasticXL as sub interface, using a fake address 192.168.99.14
2. Fetch interface and topology, publish.
3. Have Console access to pivot GW
4. Disconnect trunk link to CLusterXL
5. Connect pivot GW by trunk to core sw
6. Change object's ip in SmartConsole to real ip address 192.168.99.13
7. Establish SIC and push policy.
8. Change the magg1 interface ip to dummy network, and recreate the same network as vlan.
9. Push policy.
I guess this would be the workflow then, if i forgot something feel free to add, i appreciate the help so far 🙂
I try to avoid using the interface named Mgmt because people expect it to work like a management interface on an ASA or a Palo Alto. It doesn't. Unless you use VSX (or MDPS, which is related to VSX), the interface named Mgmt isn't special in any way. It's in the same routing table as all the other interfaces. Every environment I've seen which uses the interface named Mgmt and doesn't use VSX has asymmetric routing all over.
Excellent point.
Second that. No need to clone policy, and also new SMO with the old VIPs should be just fine as well.
Thank you for your advice from both of you,
I have recreated the old VIPs on new SMO without pushing policy without issues, except one vlan 192.168.99.13/24
Basically the flow during migration is as follows:
What will be tricky is that their management server is in their production VLAN, lets say 192.168.99.0/24.
MGMT IP is 192.168.99.20
Currently the management port of the new ElasticXL GW is in VLAN 192.168.1.0/24.
I need to change this port to vlan 192.168.99.X in order to not be cut off when i turn off the old ClusterXL GWs
Meanwhile i am unable to create these VIP addreses on the ElasticXL since they are used for management port.
After migrating to to ElasticXL i have to create a dummy ip address for management port and then recreate the VIP of VLAN 192.168.99.13
Any advice regarding this?
Can you have LOM or Console access to the SMO gateway during the cutover? If so you can shut the ports to the old cluster, set the IP on the new magg1 interface via LOM/Console and go from there.
Yes we will have Console access, this was my original plan but @Bob_Zimmerman suggested i could create the same vlan with a fake ip address, and just change the object during failover.
There was another post on the tool that will be available for it, bit not official yet. Maybe ask your local SE about it.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 35 | |
| 16 | |
| 8 | |
| 7 | |
| 7 | |
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 3 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY