- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi all,
I'm struggling to remember or find the answer to how you manually fail over a 1400 cluster. The normal "clusterXL_Admin down" doesn't work on 1400's.
I've set the other member to the higher priority in SmartDashboard and set ClusterXL to switch to higher priority member, then installed, but it hasn't switched.
Any ideas how I can manually fail over between cluster members on 1400's?
Thanks,
Matt
Are you able to physically unplug one of the Ethernet cables in the 1400 and force fail over?
The SMB devices are a little bit different as they run Gaia embedded. Performing the following will perform the failover in the same manner as the Gaia full devices (3000 series and above).
# Complete in Expert mode
cd $FWDIR/bin
clusterXL_admin.csh down
That is all documeted here: sk65060: How to cause a manual fail-over in ClusterXL on SG-8x appliances.
The actual simplest way to do so, is by using the priority in the SmartConsole, as it is centrally managed, that is where it should be, open the cluster object, Cluster members and adjust the priority and push the policy.
For the quick switch the only way is to use the CLI as described in the previous posts.
If it is centrally managed - even 14x0 SMBs can be used locally managed.
When using the priorities (with central management with SMS) if the failover settings within advanced settings are set to "Maintain Current Active Cluster Member" then the unit won't failover based on the priorities.
If you want to perform failover using the priorities you will need to change to "Switch to higher priority cluster member" and then install policy.
Correct. You need to change option to "Switch to higher priority cluster member" in clusterXL setting.
Thanks everyone.
I've already set to highest priority and installed (as mentioned in the original post) but this did not switch members. I don't know why not.
I'll try the clusterXL_admin.csh command tonight during a maintenance window
Matt
Not a problem at all.
Just to confirm within your SMS have you set the "Switch to higher priority Cluster Member" option as pictured earlier?
If it's easier, feel free to post a screenshot and we can see if we can see anything that may be causing the issue.
Hey Matt, how did you get on within your maintenance window and the failover with the command clusterXL_admin.csh?
Here's my settings:
However, even after multiple installs, FWA is still Standby. It should now be Active.
Very Interesting, it looks ok to me from a clusterXL configuration point of view. What firmware version are you running?
I have a pair of 1450 for lab use so I'll see if I can replicate the same results.
Thanks. I'm currently running on R77.20.70.
There is no option in SmartView Monitor to perform failover ? Try to right click on active member within Monitor.
Please see below for SK for Best Practices on Manual Check Point failover.
Best Practices - Manual fail-over in ClusterXL
I would always recommend this method of a fail over. As from the CLI you can also obtain more detailed data quickly around clustered interfaces and cluster health etc.
The clusterXL_admin.csh down worked a treat
One day the commands might be consistent between CP appliance models
in expert mode, ip link set dev LANx down/up
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
18 | |
11 | |
7 | |
7 | |
6 | |
6 | |
6 | |
4 | |
4 | |
3 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY