Thanks everyone for the valuable inputs and special appreciation to @the_rock for assisting with a remote session to verify the setup
We have successfully completed the firewall migration activity with only 5 minutes of downtime during the second attempt.
🔧Challenges Faced & Our Approach:
1. Configuration Differences:
The bond interface details were different between the old and new gateways.
The old gateways were on R81, while the new ones were on R81.20.
2. First Cutover Attempt:
We removed the existing gateways from the cluster and added the new R81.20 gateways.
After fetching topology and entering VIP details, we attempted to push the policy.
The cluster object (still on R81) didn’t update properly after adding the new gateways and establishing SIC.
This caused policy installation to fail, leading us to roll back the activity.
3. Second Cutover Attempt:
We opted for a new cluster approach, considering the issues faced with the old R81 cluster.
Created a new cluster, pre-configured with:
Gateway topology
Static routes
NAT rules
Policy configuration
Successfully pushed policy to the new cluster.
🚀Final Cutover Steps:
Replaced the new cluster IP with the old IP (used as the default gateway behind Check Point).
Shut down old firewall and switch ports.
Enabled the new firewall ports.
Entered VIP details in SmartConsole in new cluster
Pushed the policy — everything worked smoothly.