Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
HeikoAnkenbrand
MVP Gold
MVP Gold

Maestro Dual Site Active/Active

Check Point is planning to operate the Maestro environment in Dual Site mode as Active-Active. Are there any further details available on this? In another forum post, Check Point published the following:

av11_435345.jpg

The following information is already known*:

  • Active/Active mode allows two geographically remote data centers to be protected behind a single Security Group.
  • Both sites can handle traffic simultaneously
  • Traffic is synchronized between both sites
  • Inter-site asymmetric traffic is supported due to inter-site correction
  • Based on UIPS addresses (Unique IP-address per site)
  • UIPS enables configuration of multiple addresses for each interface, with one address designated for each site. The UIPS configuration is set as an alias interface unique to all members within the same site.
  • Traffic is distributed between the sites based on dynamic routing and UIPS.
  • Each site has its DR Manager responsible for communicating with a third-party peer using its own UIPS.
  • Through this communication, the third-party peer constructs its routing table, enabling it to accurately forward traffic to the appropriate site.

    Limitations
  • IPv6 is not supported
  • vsx_util reconfigure is not supported
  • Proxy arp is not supported
  • Anti-spoofing is supported only if defined by routes is used
  • Bridge mode (L2) is not supported
  • All limitations of ClusterXL Active/Active apply here except VSX, which is supported
  • Managing via an uplink is not supported
  • Since this is a new technology,  all deployments must be done in coordination with Check Point R&D until further notice.

Considerations

  • Think if you really need active/active dual site or if you'd be good with two single sites. Two single site deployment would be simpler, but the connections are not synchronized.
  • The main benefit in my opinion with A/A dual site is the support for asymmetric connections.

Has Check Point already made an official statement regarding the following points?

  1. Will this be introduced with R82.10, or possibly with a JHF under R82?

  2. What additional information is available about Active/Active mode?

  3. Will this also be supported with ElasticXL?

  4. What inter-site correction traffic can be expected?

*reference

 

➜ CCSM Elite, CCME, CCTE ➜ www.checkpoint.tips
8 Replies
Mark_Gabert
Explorer

We’re also using Maestro with version R81.20. Is it already possible to use the active/active mode?

When we purchased our Maestro environment, the active/active mode was announced. When will it be possible to switch to this mode, and will it be possible to make the change after an update without any downtime for the security group?

0 Kudos
emmap
MVP Gold CHKP MVP Gold CHKP
MVP Gold CHKP

It's already considered a GA option in R82, it's just sort of tucked away. I don't know if there's a roadmap to fully make it public, that probably depends on how many people take it up. It's tucked away because it is a niche solution that we don't really feel is necessary for most architectures. Generally, when different datacentres are not sharing layer 2 address spaces and are being managed via diverse routing, they are also split at the application layer and hence there is not a requirement to sync state between them. We would not recommend adding complexity when it is not fully justified. If it's a multiple DCs sharing the same layer 2 spaces situation, A/A is not a fit because it's a layer 3 failover architecture (different IP addressing per site, dynamic routing to manage traffic paths).

As for inter-site correction, if a connection was established on site 1 and then the routing changes so that it's routed through site 2, its packets will correct back over to site 1 to continue processing that connection. Any new connections between the same IPs will process on site 2. The site_sync connections will be utilised for this correction, so it's a rare case where production data is carried over Sync.

HeikoAnkenbrand
MVP Gold
MVP Gold

@emmap , thank you very much for the information.

Many of our customers operate their data centers across two separate locations, often 40–50 km apart. Since 10G, 25G, or 100G Layer 2 connections are quite expensive, a single-site installation with long-range transceivers is usually very costly and not economically viable. Therefore, we typically have to use the dual-site option, which, however, comes with the limitation of active/standby operation. A dual-site active/active solution would therefore be a very good and interesting option in this case.

If it is already considered GA in R82, is there a possibility to test it together with you, the local Check Point SEs, or your Maestro team, or to obtain more detailed information?

➜ CCSM Elite, CCME, CCTE ➜ www.checkpoint.tips
0 Kudos
emmap
MVP Gold CHKP MVP Gold CHKP
MVP Gold CHKP

If you contact your local sales team they will be able to assist with more information. 

Again though, it has to fit the architecture. You won't be spanning a VIP across two sites, each site will have its own IP addressing and routing. So it's not conceptually similar to a stretched single site setup.

0 Kudos
HeikoAnkenbrand
MVP Gold
MVP Gold

Hi @emmap,

If I understand correctly, each site will have its own IP address scheme.
Within a security group, each site will have its own IP address on each interface of the security group.
Traffic between site 1 and site 2 will be routed through a dedicated internal network.
Incorrectly sent packets will be forwarded via a correction layer.

For the forwarding of IPs between site 1 and site 2, dynamic routing will likely be used.

Can it be visualized schematically like in this picture?

Is that correct?

av12_435546.jpg

➜ CCSM Elite, CCME, CCTE ➜ www.checkpoint.tips
0 Kudos
emmap
MVP Gold CHKP MVP Gold CHKP
MVP Gold CHKP

The dynamic routing would be up to and across the surrounding network devices. Between the MHOs directly we just have site sync, like any dual site deployment. The two sites don't form routing adjacencies directly with each other.

It's basically like two separate single site deployments, only with state sync and correction.

0 Kudos
HeikoAnkenbrand
MVP Gold
MVP Gold

Ok, then it would look more like this. The dynamic routing takes place between the different IP pools on both sides.
av14_435546.jpg

➜ CCSM Elite, CCME, CCTE ➜ www.checkpoint.tips
0 Kudos
RS_Daniel
Advisor
Advisor

Hello,

I would say that data centers sharing Layer 2 address spaces are actually quite common. In these cases, an Active/Active deployment becomes a necessary feature, since a failover between DCs would otherwise result in connection loss. 

In fact, this is the recommended deployment for Cisco ACI architectures using stretched bridge domains, but using ClusterXL in Active/Active mode, since Maestro Active/Active is not GA yet.

The main concern is that customers already running Maestro feel a bit unsure about relying on a feature that’s disabled by default and needs several approval steps before it can even be tested.
You have to go through multiple stages — submit a request, wait for approval, apply a specific hotfix — and at each step there are warnings about design alignment, involving PS, or getting R&D directly engaged. It doesn’t really inspire confidence for production use 😅.

Regards

0 Kudos