- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello together,
I am planning a new installation of two 6500 Appliances in a ClusterXL deployment. The Appliances will each be connected to a VPC-Domain consisting of two Nexus 9K.
I would like to create a BOND / LACP Interface on each Appliance, where NIC 1 is connected to VPC Member 1 and NIC 2 is connected to VPC Member 2. The goal of this approach would be to increase bandwith and to increase resilience (I would like to update one VPC Member without failing over the firewall cluster).
My question: Shall I configure the bond interface as HA or can I use Load Sharing? According to the R80.20 Admin Guide and ClusterXL Guide, both are valid configurations. The thing I don't understand is that one supports "switch redundancy" and the other not:
- High Availability (Active/Backup): Gives redundancy when there is an interface or a link failure. This strategy also supports switch redundancy. Bond High Availability works in Active/Backup mode - interface Active/Standby mode. When an Active slave interface is down, the connection automatically fails over to the primary slave interface. If the primary slave interface is not available, the connection fails over to a different slave interface.
- Load Sharing (Active/Active): All slave interfaces in the UP state are used simultaneously. Traffic is distributed among the slave interfaces to maximize throughput. Bond Load Sharing does not support switch redundancy
Unfortunately I can't find any further explenation about this. What is meant with 'switch redundancy' in this context? Logically the VPC-Domain acts as a single Switch anyway....
Thanks for your help and many greetings from Germany.
Thomas
Hi Thomas,
what you need is the Load-Sharing Active/Active setup. The checkpoint Load-Sharing works perfectly with a Cisco vPC.
The "switch redundancy" part is indeed a bit confusing. I think what they mean is that you can not connect a bond in HA mode to 2 different (separate) switches, thus 'not' making it redundant.
The explanation seems to exclude switch stacks or vPC setups.
If you configure your vPC on the Cisco and Checkpoint side, just make sure you use the same hashing algorithm (preferably Layer3+4) and the same LACP rate (preferably fast rate).
if you are working with Nexus, also double check the used frame size.
Dear team ,
We have two checkpoint(R80.10) In Active - Passive (HA ) Setup .
Destination side Nexus 9K (with latest version firmware), so we have configured Bond Checkpoint side and nexus side ether channel with VPC configuration .
Checkpoint Side 2 10G interface and we have created Bond and after that In this interface there are multiple vlan subinterface we have created .
we have tried to setup but cluster showing down becuase of communication is not happening to pri checkpoint to sec checkpoint by that specific sub interface .
Can you please help us that vpc should work or any limitation is there ?
Hello Vincent,
thanks a lot for your detailled and spot on answer, this was exactly the information I needed 😉
question from my side though:
- are you planning VSX or stand-alone Manged deployment?
- do you need LACP or it can really be just a "bond"-ing approach? I bet Cisco will figure both just fine
- how do you levarage the traffic flow throughout the gateways? what's your plan? is the redundancy the only aspect you've been thinking about really?
once you answer those I could share some of my experiences with not-really-any-longer favorite LSM mode ...
Jerry
ps. search our community and see why LSM on R80.20 is no longer a best-possible-option for most of the deployments.
Hi Jerry,
I don't plan on using LSM/Smart Provisioning. I will only have one virtualiued Mgmt-Server, a Cluster of 6500 (no Maestro) and maybe a few CloudGuaed IaaS in the future.
LACP/Bonding is only there to increase bandwith and increase resiliance.
Best regards,
Thomas
excellent, so now you need to read this thread mate
Thanks for the great link!
I think we are speaking about different things here though. AFAIK: ClusterXL Load Share != LACP Interface Load Share.
Or have I missunderstood the different technologies/terms here? I don't want to do ClusterXL Load-Sharing ( I consider this a bad idea in regards to Complexity <> Performance), just LACP-Interface-Active-Active.
nop. we don't. see your 1st line: "I am planning a new installation of two 6500 Appliances in a ClusterXL deployment".
I was just referring to the LSM A/A and your approach to the aggregation. Think about it.
A gotcha! Ok, thanks.
Hi Thomas,
Could you please tell me what was the solution to your configuration? We are having exactly the same setup with VSX and experiencing multiple issues.
If I understood correctly - you can't have bond with active-active setup configured on cluster in HA mode?
Thanks,
Ivan
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
29 | |
16 | |
4 | |
4 | |
4 | |
3 | |
3 | |
3 | |
3 | |
2 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY