- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
As this is a season of R80 Upgrade, just sharing my experience of recent upgrades in the live environment from R77.30 to R80.20 without any service down
1.Upgrade the DA Agent to the latest version
2.Upload the R80.20 Image through CPUSE and verify for any errors
3. In CMA cluster Properties, Select Maintain current cluster Active member
4.Upgrade on the current standby FW(CPUSE) and let it Reboot
5. Once rebooted, Change the Gateway Object to R80.20 version(It will change for all 3 objects)
6.Install policy(Uncheck the option- For gateway clusters, if installation on a cluster member fails, do not install on that cluster)
7. Check the HA in new version FW,(HA module will be Ready)
8. Now do the upgrade in another gateway, During a reboot, the other pair on HA-Ready will become Active
9.No service Interruption and the other FW will take HA Active(Few Packet Drops-2 to 3 RTO)
Now verify both status and do a final Policy Installation by "Keep Check" the actions
10. Now Install the Hotfix.R80.20 Jumbo Hotfix Accumulator General Availability(Take 87)
This is more-or-less the shorten version of Connectivity Upgrade of a Security Gateway Cluster from R77.x to R80.x
I can not see when you initiate the first failover - after step 6 ?
I didn't do a Failover after step 6. Just went to Upgrade the other FW and during reboot, this Firewall to take Active
Interesting ! In the original document i read:
Step 13 of 19: On the Active old cluster member - Stop all Check Point services
Step |
Description |
---|---|
1 |
Connect to the command line on the Active old cluster member M1. |
2 |
Stop all Check Point services:
Important - At this moment, the connections fail over from the old cluster member M1 to the Active upgraded cluster member (M2 or M3). |
Before the upgrade, also you have to change the ccp to broadcast and after the upgrade, change ccp to auto.
Does this mean that you already had upgraded the rules set to R80?
This steps works very well in all environments but we need pay attention because some connections and features do not survive after failover to an upgraded Cluster Member.
Failover Limitations
- Connections initiated by the Cluster Member itself, do not survive failover.
- TCP connections handled by the Check Point Active Streaming (CPAS) or Passive Streaming Layer (PSL) mechanism do not survive failover. This can affect many blades as like DLP, IPS, Threat Emulation, VPN. To get more information you can see Connectivity Upgrade Limitations
- Connectivity Upgrade is supported only when CPU utilization on Cluster Members is below 50%.
- If a session that is authenticated with the Identity Awareness Software Blade is open when you start the Connectivity Upgrade, the session is terminated.
- IPv6 connections do not survive the Connectivity Upgrade.
For additional limitations related to general failover, see the section Check Point Software Compatibility in the ClusterXL Administration Guide.
Hi All,
I have upgraded my cluster R77.30 to R80.20 last week and I faced an issue after upgrading as follow:
Unix server couldn`t send files to FTP server via FTP passive mode and after 2, 3 hours troubleshooting I disabled the SecureXL and issue resolved so do you have any suggestion or thought?
Thanks
If the R77.30 cluster runs in 32 bit mode and is upgraded to R80.20, I'm pretty sure that the state table is NOT synced at failover. This implies that the upgrade is zero downtime, but existing sessions do NOT survive.
Correct?
We are not having the HA for our R77.30 management server. Can some one help us on the steps to be followed to migrate from R77.30 to R80.20 withoout any impact.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
10 | |
7 | |
7 | |
6 | |
6 | |
5 | |
5 | |
5 | |
5 | |
5 |
Thu 04 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: External Risk Management for DummiesWed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksThu 04 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: External Risk Management for DummiesWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY