Network

Use this network diagram to configure your system. Make sure to replace the IP addresses in the sample environment with the IP addresses in your environment.

Network Diagram

Network routing diagram.

In the diagram:

The clusterClosed Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. in this diagram protects two web applications.

Each web application has:

  • Public IP address

  • Web server

  • Application server

Note - Use this network diagram to configure your system. Make sure to replace the IP addresses in the sample environment with the IP addresses in your environment.

(See the Routing Tables).

Diagram Components

Check Point High Availability consists of two Cluster Members, Member 1 and Member 2. Each Cluster MemberClosed Security Gateway that is part of a cluster. has two interfaces.

When the Cluster Members are in the same Availability Set, it guarantees that the two Cluster Members are in separate fault domains. For more information, see Manage the availability of Windows Virtual Machines in Azure Stack.

Use the Azure Stack Hub Load Balancer rules to forward traffic that comes from the Internet:

Important - You cannot use ports 80, 443, 444, 8082, or 8117.

Routing Table for Web and App - User Defined Routes (UDR)

Web and App routing tables have the same Virtual Network address, but different subnet addresses.

Failover

This is what happens during cluster failover:

The Cluster Member that is promoted to Active member, uses the Azure Stack Hub API to update the route tables routes to its Internal Private IP address. This affects outbound, inbound and East-West traffic inspection.

Traffic Flows

If the Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. is in the Virtual Network, make sure to have specific routes to allow traffic between the Management Server Virtual Machine and the Cluster Members.

Important - You cannot deploy other Virtual Machines in the Check Point solution subnets.

Intra-Subnet Traffic

Traffic travels freely in the subnet without inspection.