- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi everyone,
I currently have an Azure-deployed Check Point ClusterXL HA environment (Active/Standby) and I’m considering enabling BGP Graceful Restart.
The current topology looks like this:
Two Check Point gateways in a ClusterXL HA setup.
Each gateway establishes a VPN tunnel (VTI) to an Azure Virtual Network Gateway.
Both firewalls are peering via BGP to a private Azure IP (<BGP Peer IP>), which belongs to the Azure Virtual Network Gateway.
The Virtual Network Gateway in turn peers with on-prem Cisco routers through another connection.
Everything is working fine as-is.
My question is:
➡️ If I enable BGP Graceful Restart on member A (which is currently active), is there any risk that this could trigger a failover in the cluster before applying the same setting to member B?
I’m concerned whether this change could:
Reset the BGP session on the active member.
Potentially cause ClusterXL to detect a failover condition (due to lost routes or VTI reachability loss).
Has anyone here performed this adjustment in a similar Azure setup with Cisco routers behind the Virtual Network Gateway?
Would you recommend applying this live, or is it better done during a maintenance window?
Appreciate any advice or shared experience.
Thanks in advance!
I tested this in Azure lab last year and was fine, enabling it did not cause any issues, it actually helped. I have a gut feeling that setting is always needed for BGP to fully function without any network outage.
Andy
The test you mention, was it also of a cluster?
According to the following sk https://support.checkpoint.com/results/sk/sk100499
I would just need to check the Graceful Restart box.
Yes and yes 🙂
I have a follow-up question regarding this setting.
Would enabling it only on the Check Point cluster side cause any impact on BGP behavior?
I’m asking because I’m not entirely sure if this option can also be enabled on the Azure VPN Gateway side.
If it cannot be enabled on Azure, would it still be safe to activate it just on the cluster side?
And if it can be enabled on both sides, should it be configured simultaneously to avoid any route synchronization or session issues?
Appreciate any insights you can share on this — I just want to make sure we don’t introduce any BGP instability.
Thanks again!
I dont have Azure cluster in the lab any more (was costing too much money to keep it on constantly), but to answer your question, when I did have it, I had VPN between on prem cluster and Azure one and my colleague and I also built BGP peering and that setting was enabled on both sides, no issues.
Hey Jenn,
Just ended up building Azure cluster today to test this (was curious if its same behavior in R82) and was fine, no problems.
Be mindful of the drawbacks of GR for BGP:
https://blog.ipspace.net/2024/01/bgp-graceful-restart-harmful/
You could be doing more harm than good unless you have other ways to detect a potential outage such as ip-reachability-detection with either BFD (single-hop or multi-hop) or ICMP echo; both of which Gaia's BGP supports. If you use BFD, be sure you enable the control plane check as well (the C-bit) so that you aren't fate-sharing BFD and BGP blindly.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 24 | |
| 20 | |
| 8 | |
| 7 | |
| 6 | |
| 5 | |
| 5 | |
| 5 | |
| 4 | |
| 4 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY