- Products
- Learn
- Local User Groups
- Partners
- More
Check Point Jump-Start Online Training
Now Available on CheckMates for Beginners!
Why do Hackers Love IoT Devices so Much?
Join our TechTalk on Aug 17, at 5PM CET | 11AM EST
Welcome to Maestro Masters!
Talk to Masters, Engage with Masters, Be a Maestro Master!
ZTNA Buyer’s Guide
Zero Trust essentials for your most valuable assets
The SMB Cyber Master
Boost your knowledge on Quantum Spark SMB gateways!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
CheckFlix!
All Videos In One Space
Hello
Is any way to manually force split brain on 2 VSes created on 2 VSXes on VSLS mode?
I want to achieve 2 VSes active on VSXA and the same 2 VSes active on VSXB in a lab environment.
BR,
Kostas
I'm pretty sure the answer is no.
You can certainly load share between different VSX Nodes but you can't have any one VS active on two different nodes, at least too my knowledge.
If you want true resource balancing then perhaps Maestro may be a better option.
Another idea, would be to have two different VS's using the same policy file but perhaps an external load balancing to share the load (a bit over kill, but could also be an option with some design considerations).
I do not think that you can selectively achieve that, but to have all VSes running in split brain, move the networks of one of the unit to the separate vSwitches, (loose the sync) and reboot the unit.
In theory, it'll come up looking for other cluster member and, not finding one, run VSes to Active mode.
If there are other VSs which you don't want to try to become active on both members, this isn't possible. Sync and cluster monitoring on VSX is a whole-box thing.
If you're okay with all VSs trying to become active on two or more members, you just have to prevent those members from seeing each other.
Hello all
Finally i have managed to cause split brain by preventing those members from seeing each other.
Apart from preventing VSes to see each other through their interfaces (inside,outside,DMZ etc) I had to disable SYNC connectivity and also shutdown the management interface of the 2 VSXes. By disabling the management interfaces of the 2 VSXes i had no logging towards the log server (management server),
BR,
Kostas
What is achieved by this outside a lab? In a production environment you could not really do the above and most certainly Checkpoint would not support it.
A DR scenario that cuts layer 2 connectivity between MAIN DC and REMOTE DC for example. Why Check point wouldn't support it?
I don't believe this is a supported scenario, but Checkpoint would be better to respond.
Technically if VSX nodes lose L2 completely then both will become Active as they will assume that other node is dead based on clustering protocol. So your two DCs should continue to work independently. Obviously you won't be able to manage them i.e push rules our routing. But I suggest you test in the lab
That depends. Other problems such as monitored interfaces which don't have anything available to ping (e.g, a new highest VLAN or lowest VLAN which doesn't have any endpoints on it yet) can cause both members to refuse to become active because they each think they are the device with the failure.
Spanning layer 2 between datacenters is a really bad idea.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY