As a Check Point Partner we are monitoring the Check Point systems of our customers via SNMPv3 over VPN.
When monitoring standby cluster nodes via VPN this of course leads to a "Clear text packet should be encrypted" error in ClusterXL as the active cluster node already decrypts the SNMP packets and forwards it in clear text to the standby member which expects the packets to be encrypted.
The solution always was sk42733:
[Expert@node1:0]# cat $FWDIR/boot/modules/fwkern.conf
fwha_forw_packet_to_not_active=1
[Expert@node2:0]# cat $FWDIR/boot/modules/fwkern.conf
fwha_forw_packet_to_not_active=1
Check Point stopped supporting this option in R80.20.
It works in all versions prior to R80.20. The official statement is that it's by design of the product as mentioned in Scenario 1 of sk93204. The interesting point is that initially Check Point Support tried to fix it by providing us with a hotfix which didn't work and only then started to argue about the product design.
This means for all Check Point users out there:
- You cannot directly login to standby cluster nodes via VPN anymore (SSH, GAiA WebUI)
- You cannot securely monitor the standby cluster nodes via VPN (ICMP, SNMP)
- You need to create workarounds that make troubleshooting times longer and raise complexity