- Products
- Learn
- Local User Groups
- Partners
- More
Maestro Masters Series 2026
WATCH NOW| Introduction | Introduced in R82 | Hyperscale architecture (introduced earlier) |
| Architecture Type | Elastic clustering model | Hyperscale distributed security fabric |
| Load Balancing Layer | No dedicated hardware load balancer | Dedicated MHO load-balancing layer (Active/Active) |
| Traffic Processing | Pivot-based processing | Distributed traffic distribution via MHO |
| Scalability Model | Elastic scale-out (limited) | Horizontal hyperscale architecture |
| Max Members | 3 per site / dual site 6 total | It will be limited by the number of configured ports; this perspective represents the maximum possible capacity. Single Site Deployment
Dual Site Deployment
Note: Maximum scalability values are version- and platform-dependent. Always refer to the latest Release Notes, and the oficial admin guide |
| Cluster mode | Pivot-based active traffic processing (not traditional HA or Load Sharing) | Active/Active |
The maximum number of Security Gateway Modules (SGMs) depends on the MHO model and the downlink port distribution design.
Currently, the MHO-140 (48 × 10/25GbE ports and 8 × 40/100GbE ports) provides a higher number of physical interfaces, while the MHO-175 (32 × 40/100GbE ports) offers fewer ports but with consistently higher bandwidth per port.
You can review these details in my article “Maestro for Beginners: Core Concepts Explained”, or refer directly to the official datasheet for each MHO model.
Maestro is a more complex architecture and requires thorough study and proper design planning.
| Architecture Type | Elastic clustering architecture | Distributed hyperscale security fabric |
| Traffic Processing Model | Pivot-based traffic processing (with internal flow coordination) | MHO-based hardware-assisted load balancing |
| Symmetric Flow Handling | Ensured via pivot logic | Ensured via MHO distribution layer + HyperSync |
| True Hardware Load Balancer | ❌No | ✅Yes (MHO layer) |
| Scale-Out Model | Elastic scale-out (3 per site / 6 total) | Horizontal hyperscale (platform dependent) |
| Traffic Distribution Fabric | No dedicated hardware distribution layer | Dedicated MHO traffic distribution fabric |
| Hyperscale Capability | Not designed for hyperscale | Designed for hyperscale expansion |
| Configuration & Software Management Model | Automatic cloning of configuration and software from SMO | Configuration and software alignment is managed within the Security Group architecture. Upgrades follow Scalable Platforms recommended procedures. |
| OS / Jumbo Alignment | Automatically aligned across members | Coordinated within the Security Group architecture, with the SMO Master coordinating member alignment. |
| Dual Site | Supported (up to 3 members per site / 6 total) | Supported (architecture dependent on MHO design) |
| Synchronization Architecture | Auto-configured dedicated L2 sync network (default 192.0.2.0/24, clear-text) | HyperSync distributed architecture integrated with MHO |
| Traffic Distribution Layer | No dedicated hardware distribution layer | Dedicated MHO-based traffic distribution fabric |
| Deployment Model | Simplified clustering deployment | Distributed fabric architecture requiring MHO and downlink design planning |
| Scalability Scope | Elastic scale-out within defined limits | Horizontal hyperscale expansion (platform dependent) |
Environments prioritizing operational simplicity
Small to large perimeter deployments (depending on appliance model)
Limited public IP availability scenarios
Deployments that do not require hyperscale horizontal expansion
Organizations preferring simplified cluster management
Large-scale or hyperscale environments
High east-west and north-south traffic distribution
Multi-segment data center environments
Environments requiring true hardware load balancing
Designs requiring significant horizontal scalability
ElasticXL and Maestro are not direct replacements for one another. While ElasticXL introduces operational simplification to traditional clustering, Maestro is designed for hyperscale horizontal expansion with a dedicated load-balancing architecture. The choice should be based on scalability requirements, traffic patterns, and architectural design goals rather than appliance size alone.
Nice bro!
Now I'm waiting for the opportunity to have a cool project to evaluate using elasticXL haha, I found it very interesting.
I hope to work on one soon. Have not had chance to do so yet, but elasticxl looks very cool.
This is good starting reference too.
Yes, the Guide is very well explained. I took an eLearning course about it, and it showed how it works very well. I thought it was great; it simplifies and makes clustering much easier.
100%
| Configuration & Software Management Model | Automatic cloning of configuration and software from SMO | Centrally managed via Security Group with orchestrated distribution |
| OS / Jumbo Alignment | Automatically aligned across members | Managed and distributed via Security Group orchestration |
What do you mean here? Is this section talking about growing out the security group or is it about ongoing patch management?
This section refers to both adding new members and ongoing software/config alignment.
In ElasticXL, every new member always receives the current configuration and software state from the Single Management Object, ensuring instant alignment.
In Maestro, the Security Group orchestrator ensures all SGMs are kept in sync, both when scaling out and during ongoing patch management.
In EXL or Maestro (from R82 onwards), yes when you add a new member they will get the patches and the configuration, but unless you enable auto-clone (not recommended to keep enabled) new patches are not sync'd from the SMO SGM to other SGMs.
In Maestro, the orchestrator (MHO) has nothing to do with keeping the config on the SGMs in sync, other than providing the connectivity via the downlinks. In EXL this is done over the Sync links. The SMO (Single Management Object) SGM is the source of truth for other SGMs when they fetch configuration, but again ongoing patch management is not recommended to be performed via auto-clone. The Maestro or Scalable Platform Admin Guide for your version contains the full recommended patching procedure.
You are correct. In Maestro, when scaling out, new Security Group Members (SGMs) synchronize their configuration and software from the Security Group’s Single Management Object (SMO) Master. The SMO Master acts as the source of truth for configuration and software during the onboarding of new members. However, ongoing patch management and configuration alignment must be performed according to the official procedures described in the Maestro or Scalable Platform Admin Guide. The orchestrator (MHO) is responsible only for providing connectivity between SGMs and does not manage configuration or software synchronization.
SMO Master - coordinates and automatically synchronizes propagation of policy and other configuration changes to all members of SG. It obtains its initial configuration from the MHO
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY