- Products
- Learn
- Local User Groups
- Partners
- More
Maestro Masters
Round Table session with Maestro experts
So it would appear that Layer 4 Distribution is enabled by default but the overall consensus seems to be to disable it unless you need it. Is that still true in R81.10 or is that an outdated recommendation? The issues that lead to that recommendation seemed to involve messing up the availability of SGM-offered web portals like UserChecks and the Captive Portal/Identity Awareness. Looks like at one point L4 would mishandle fragmented traffic but that got fixed recently.
Assuming this recommendation to disable L4 unless needed still holds true, would these scenarios be an accurate and complete representation of why you would need L4 in R81.10:
There is a small amount of diverse source and destination IP addresses traversing the Security Group, but there are large amount of source ports in use by protocols such as HTTP, HTTPS, and possibly DNS. This results in the Security Group’s load becoming heavily unbalanced between the SGMs.
The Security Group is NATting a very high percentage of traffic passing through it which is typical of a perimeter gateway, but not for a gateway inside the internal network or located in a Data Center.
Thanks!
Interesting topic, I also would like to know what is recommended setting(enable or disable), and if R&D will try to change the mechanism in the roadmap?
Hi Tim,
Current recommendation is to keep L4 distribution disabled unless there is a specific reason to enable it. The first scenario you mentioned is usually the case when you should consider enabling it. In a network with diverse IP-address space, L4 distribution doesn't give much benefit anyway.
In the second scenario the question is about the distribution mode. In the perimeter environment you should use auto-topology (default) and in internal gateway general mode.
That's what I thought, thanks. Just seems a little odd that L4 is enabled by default but the recommendation is to disable it.
I agree, seems odd to me too. 🙂
I think what @Lari_Luoma said makes perfect sense. If you think about it logically, really, even in complex environment, there is probably no need to enable this unless really necessary.
Maybe in a dual site active-active configuration (not multi room, nor dual site active-backup) which was promised to us about 4 years ago, when Maestro was implemented, it could be beneficial to use L4.
In our case, as far as I understand, it would, as we could preferably process traffic on a source network basis - we use different networks for end user's access layer in two separate, but very well interconnected DCs.
Nevertheless still It's not officially supported, but was promised to us on a stage (!) on last's year CPX 😞
You're absolutely right—this is something that has been promised for quite some time, and it’s understandable that there’s anticipation for a dual site active-active configuration with Maestro. As you mentioned, using L4 in such a setup could indeed be beneficial, especially for processing traffic based on source networks in environments with well-interconnected data centers. This approach could optimize traffic distribution and improve redundancy, which is critical for high-availability architectures.
That said, I trust that Check Point is taking the time to ensure this feature is truly robust and functional before releasing it to the public. Implementing an active-active dual site configuration is inherently complex, and it’s crucial to avoid potential pitfalls that could arise in production environments. Rushing such a feature could lead to instability or unexpected issues, which would be far more detrimental in the long run.
From what I understand, Check Point has been working diligently on this, and while it’s not officially supported yet, it’s possible we might see progress or even a release next year. The complexity of synchronizing state tables, ensuring seamless failover, and maintaining performance across two active sites requires thorough testing and validation.
In the meantime, it’s worth keeping an eye on updates from Check Point, as they’ve been gradually improving Maestro’s capabilities. Hopefully, the wait will result in a solution that meets the high expectations of the community and delivers the reliability we need for such critical deployments.
Yea, sounds in case you described, it would be beneficial.
Andy
Dual site A/A is supported and has been available via a special R81.10 release for a while now. It's also in R82, currently not yet GA but supported via RnD. If you would like to get involved and help us validate and direct development of it, please let us know via your local sales office.
Via the Solutions Center?
I'm not sure if it's Solution Centre directly or not, but they would know.
Could you elaborate more on Active/Active? Any SK? Limitations etc?
Considerations
That's exactly what we need, but I would like to know more. Is there a thread where we can see the tests that have been done so far, or perhaps a recording of a webinar that shows things like implementation, traffic management, recommended scenarios, etc.?
I think we could arrange such a webinar. @PhoneBoy
Of course, let's talk 🙂
Thank you Lari for those valuable information, your webinaries about Maestro were always extremely helpful to me!
I will reach out our CP representatives then in this subject. I am just wondering how those UIPS are collected/configured? What puzzles me the most, is how to relate a VMware HA cluster, whose VLANs are stretched between those two DCs, to such Maestro active-active dual site topology. We would have to divide the networks of these VLANs between these DCs beforehand?
UIPS addresses are configured in gclish and all routing information in local CLISH per site. As you might have figured A/A dual site does not require networks to be stretched between the sites. If you do have such networks, they will work as with Active/Backup solution and the gateway for them will be on one site only. To make them work as active/active my understanding is that you would have to divide them between the DCs as you mentioned. If you need detailed configuration information, contact your account team and they are able to get you the most up-to-date instructions and help from R&D.
Hi emmpap,
As a customer, we were aware of the support for Dual site A/A via the special R81.10 release and its inclusion in R82, although not yet GA but supported via RnD. Unfortunately, only a few individuals within Check Point are aware of this, and this information has not been shared with partners where customers typically seek support.
Due to this lack of widespread knowledge and official communication, we decided to hold off on pursuing this topic until Check Point makes it publicly available.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
2 | |
1 | |
1 | |
1 |
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY