Workflow for Setting Up a High Availability Cluster in Azure Stack

Step 1: Download the Marketplace Template

To deploy this solution through the Azure Stack user portal, use the Check Point CloudGuard Network Security High Availability and Management packages.

Do these steps:

  1. Register Azure Stack with Azure. This lets you add images from Azure Marketplace Management to your on-premises environment. See Azure Stack Operator Azure-Stack Registration.

  2. Download the Check Point CloudGuard image from the Marketplace Management.
    1. Search for Check Point and click on the Check Point vSEC (now called CloudGuard) image link.

    1. Click Download.

  3. Download the Azure Gallery Package *.azpkg to the Azure Stack environment using the following command in the PowerShell CLI:

    No

    Description

    3.a

    Add endpoints for an instance of Azure Resource Manager by executing:

    Add-AzureRmEnvironment -Name AzureStackAdmin –ARMEndpoint https://adminmanagement.<REGION>.<DOMAIN>

    Notes:

    Replace <REGION> with your Azure Stack region.

    Replace <DOMAIN> with your Azure Stack domain.

    3.b

    Adds an Azure Resource Manager account to run cmdlets for the specified environment and tenant by default. This is done by executing:

    Add-AzureRmAccount -EnvironmentName "AzureStackAdmin" -TenantId <TENANT>

    Note:

    Replace <TENANT> with your tenant ID.

    3.c

    Gallery item

    • Add High Availability package gallery item:

      Add-AzsGalleryItem -GalleryItemUri https://chkpazurestack.blob.core.windows.net/azpkg-stack-ha/checkpoint.CloudGuard-stack-ha.1.0.0.azpkg -VERBOSE

    • Add Management package gallery item:

      Add-AzsGalleryItem -GalleryItemUri https://chkpazurestack.blob.core.windows.net/azpkg-stack-management/checkpoint.CloudGuard-stack-management.1.0.0.azpkg -VERBOSE

    3.d

    Make sure that the Marketplace items downloaded successfully:

    • For High Availability Gallery item, run:

      Get-AzsGalleryItem | select name

    • Detect High Availability package in the output list, run:

      checkpoint.CloudGuard-stack-ha.1.0.0.azpkgkg

    • Detect Management package in the output list, run:

      checkpoint.CloudGuard-stack-management.1.0.0.azpkg

    3.e

    Locate High Availability solution in your Azure Stack Admin portal:

    1. Click on create new resource.

    1. Confirm that HA Marketplace successfully downloaded.

Step 2: High Availability Deployment

Deploying with a Template in Azure

Deploy this solution through the Azure Stack User Portal.

Components of the Check Point Solution

The Check Point deployed solution has these components:

  • Frontend subnet

  • Backend subnet

  • Two Virtual Machines configured as a Check Point cluster

  • Internal Load Balancer

  • External Load Balancer

  • Public IP address for each Cluster Member

Important - Other Virtual Machines cannot be deployed in the solution's subnet.

Notes about the template:

  • You can create a new Virtual Network, or deploy into an existing Virtual Network.

  • Web and App subnets are not deployed automatically.

  • It does not deploy any other Virtual Machines in the solution's frontend and backend subnets.

  • Virtual Machines that are launched in the backend subnets, may require Internet access to finalize provisioning. Launch these Virtual Machines only after you have applied Hide NAT rules on the cluster object to support this type of connectivity.

  • The Check Point First Time Configuration Wizard automatically deploys after you have set up the cluster object. The cluster object is configured based on the parameters that you applied.

  • After the First Time Configuration Wizard completes, the Virtual Machines automatically reboot.

Step 3: Configuring Cluster Objects in SmartConsole

Notes:

  • SmartConsole must be installed on the Windows VM host and not on your Azure Stack host.

  • Deploy your Windows VM host from the Azure Stack portal.

Step 4: Configuring Cluster Members for Azure Stack Environment

Step 5 : Setting Credentials in Azure

Creating Your Own Service Principal

See How to Use the portal to create an Azure AD application and service principal that can access resources.

For Azure Stack Federation Services (AD FS) create service principal. see Create a service principal that uses client secret credentials.

After you create the application, write down these values:

  • ApplicationId

    client_id

    To create a new application secret:

    1. Select Certificates & secrets.

    2. Select Client secrets > New client secret.

    3. Enter a description of the secret, and a duration, click Add.
      We recommend to set the key to never expire.

    4. Important - After saving the client secret, the value of the client secret is displayed. Copy and save this value. Otherwise, you will not be able to retrieve the key later.

  • Key Value

    client_secret

Step 6: Set up Internal Subnets and Route Tables Settings

You can use the Azure portal or the CLI to add internal subnets. This section describes how to add the Web and App subnets to a Virtual Network.

For each internal subnet, you must create an Azure Stack routing table with these UDRs:

Important - Associate the newly created routing table with the subnet to which it belongs.

If the subnet houses the Security Management Server that manages the Cluster Member, add these routes in the example table below as well. This allows the Security Management Server to communicate directly with each Cluster Member - without passing through the Active Cluster Member.

Step 7: Setting Up Routes on Cluster Member to the Internal Subnets

Note - If the Virtual Network comprises several non-contiguous address prefixes, then repeat the command for each prefix.

Step 8: Configuring NAT Rules

Note - See Creating Objects in SmartConsole

In SmartConsole, create these NAT rules to provide Internet connectivity from the internal subnets.

Step 9: Setting Up the
External Load Balancer in Azure Stack

By default, the template you deploy creates an External Load Balancer, with the name frontend-lb, which faces the Internet.

The External Load Balancer sends health probes to TCP port 8081 to determine the health of the CloudGuard Network Security Security Gateways. You can create the load balancing rules in the Azure portal to allow incoming connections.

Configuring the Load Balancer in Azure Stack

You can configure the Load Balancer to listen on the TCP port 443, and forward this traffic to the Check Point CloudGuard Security Gateways on the TCP port 8081.

Creating Dynamic Objects 'LocalGatewayExternal' and 'LocalGatewayInternal'

You must create these Dynamic Objects in SmartConsole:

  • LocalGatewayExternal

  • LocalGatewayInternal

Configuring the Load Balancer to Listen on Additional Public IP Addresses and Ports

When using multiple web applications, each with its own public IP address, you need to configure the Load Balancer to listen on an additional public IP address on the TCP port 80. Forward this traffic to the Check Point CloudGuard Security Gateways on TCP port 8083.

Step 10: Configuring Inbound Protection

Configure Access Control and NAT rules for North-South inbound traffic.