Workflow for Setting Up a High Availability Cluster in Azure
Step 1: Deploy with a Template in Azure
Deploy this solution through the Azure Portal. If you use a different environment than the Standard Azure environment, see Using a Different Azure Cloud Environment.
-
To access the Standard Azure environment, from the Azure Marketplace, see the Azure standard portal.
-
To access the Azure US Government environment, from the Azure Marketplace, see the Azure US Government portal.
Notes:
-
Standard Load Balancers and High Availability ports are not available on the Azure Government Cloud environment.
-
By default, every Check Point Security Gateway and Security Management Server's WebUI is accessible from the internet by browsing to
http://<virtual-machine-public-ip>
. Restricting access to the WebUI is possible by configuring a Network Security Group, or by configuring the Check Point Gateway and Management Server settings.

Parameter |
Description |
---|---|
Cluster object name |
Name of the cluster object resource group. |
Credentials |
Public key or user name and password for SSH connections to the Cluster Members. |
Subscription |
Azure subscription into which the cluster object is deployed. |
Resource group |
Azure resource group into which the cluster object is deployed. |
Location |
Location into which the cluster object is deployed. |
License |
Type of license:
|
Virtual Machine size |
Size of each Virtual Machine instance in the cluster object. |
SIC |
SIC key to the Security Management Server. |
Network setting |
Notes: When you use pre-existing subnets, make sure that:
|
Network Security Group |
The Network Security Group that you attach to the Vnet. |
Availability Zones |
Use Availability Set (default) or Azure Availability Zones for your High Availability.
Notes:
|
Enable CloudGuard metrics |
Note - If the System Assigned Managed Identity is disabled, then you cannot use CloudGuard metrics. |
Deploy the Load Balancer with floating IP |
If you select: yes, the Load Balancer will be deployed with Floating IP enabled. Default value: no. |
Deploy with Public IP Prefix |
If you select yes, the Cluster will be deployed with a Public IP Prefix. |
Create new or existing Public IP Prefix |
If you select: new, select the IPv4 prefix length. |
Quick connect to Smart-1 Cloud |
If you select yes (and provide the tokens), the Cluster deploys with a secured communication tunnel to the Security Management. |
Smart-1 Cloud Token Member A |
The token you generate in Smart-1 Cloud portal. |
Smart-1 Cloud Token Member B |
The token you generate in Smart-1 Cloud portal. |
Tags |
Azure tags (Name, Value) that you attach to the selected resources. |
Components of the Check Point Solution

-
Frontend subnet
The NSG is associated with the frontend subnet and allows all inbound and outbound TCP and UDP traffic.
-
Backend subnet
-
Two Virtual Machines configured as a Check Point cluster
-
Internal Load Balancer
-
External Load Balancer
-
Public IP address for each Cluster Member
It is not possible to deploy other Virtual Machines in the solution's subnet.

-
You can create a new Virtual Network, or deploy into an existing Virtual Network.
-
Web and App subnets are not deployed automatically.
-
It does not deploy any other Virtual Machines in the solution's frontend and backend subnets.
-
Virtual Machines that are launched in the backend subnets, may need Internet access to finalize provisioning. Launch these Virtual Machines only after you have applied Hide NAT rules on the cluster object to support this type of connectivity.
-
The Check Point First Time Configuration Wizard automatically deploys after you have set up the cluster object. The cluster object is configured based on the parameters you apply.
-
After the First Time Configuration Wizard completes, the Virtual Machines automatically reboot.
![]() |
Important - If you deploy the solution to an existing Virtual Network, confirm that an NSG is associated with the frontend subnet that allows all inbound and outbound TCP and UDP traffic. An NSG is necessary to connect to Cluster Members successfully. |
Step 2: Set Credentials in Azure
By default, the automatic service principal is deployed. If you want to create your own service principal, make sure you set credentials and assign privileges to necessary resources.
Azure Credentials and the Automatic Service Principal
The Check Point cluster template automatically creates a service principal for each Virtual Machine, and assigns a Contributor role to the cluster resource group. Therefore, you do not need to create a service principal, assign it a role, and attach it to each of your individual cluster resources. For more information, see What is managed identities for Azure resources?
After you deploy a Check Point cluster, the automatic credentials can be found in Azure Portal > Resource groups > cluster_resource_group > Access control (IAM). There are two service principals for each Cluster Member, each with a Contributor role.

-
If you delete the Cluster Member's Virtual Machine, the credentials are also deleted.
-
Service principals never expire.
|
Important - When you use an existing VNet to deploy the solution, you must assign a Contributor role to the cluster VNet resource group for each cluster’s managed identity created by the deployment because they are not automatically assigned. |
Creating Your Own Service Principal

Field |
Parameter |
|
---|---|---|
Name |
Example:
|
|
Application type |
Web-App / API |
|
Sign-on URL |
Example:
|

-
Application ID
client_id
-
Key Value
client_secret
-
Tenant ID (Directory ID)
tenant
![]() |
Best Practice - We recommend that you set the key to never expire. Go to your resource. |
We recommend that you set the key to never expire. Go to your resource.

Step |
Description |
||
---|---|---|---|
1 |
Click Access control (IAM) > Add. |
||
2 |
Select your role. |
||
3 |
Select your AD application. |
||
4 |
Click Save. |
||
5 |
Set the From Expert Mode, run this command on each Cluster Member:
Example:
Note - Use single quotes to avoid shell expansion. |
||
6 |
Make sure the file syntax is correct. From Expert Mode, run this command on each Cluster Member:
|
||
7 |
Reload the cluster Azure configuration. From Expert Mode, run this command on each Cluster Member:
|

Step |
Description |
|
---|---|---|
1 |
Remove your service principal. |
|
2 |
From Expert Mode, run this command on each Cluster Member:
|
|
3 |
Assign the two service principals to each resource and to Cluster Members. For more information, see Components of the Check Point Solution > Notes about the template. |
|
4 |
The service principal deploys automatically. If you want to create a new service principal, assign the privileges to the necessary resources and to Cluster Members. For more information, see Manage access using RBAC and the Azure portal. |
Step 3: Set Up Internal Subnets and Route Tables
You can use the Azure portal or the CLI to add internal subnets. You will now add the Web and App subnets to your Virtual Network.
For each internal subnet, you have to create an Azure routing table with these UDRs:

# |
Name |
Address prefix |
Nexthop-type |
Nexthop-address |
---|---|---|---|---|
1 |
|
<10.0.3.0/24>
|
Virtual Network | - |
2 |
|
10.0.0.0/16
|
Virtual appliance | ILB-internal-address 10.0.2.4 |
3 |
|
0.0.0.0/0
|
Virtual appliance | ILB-internal-address 10.0.2.4 |

# |
Name |
Address prefix |
Nexthop-type |
Nexthop-address |
---|---|---|---|---|
1 |
|
10.0.4.0/24
|
Virtual Network | - |
2 |
|
<10.0.0.0/16>
|
Virtual appliance | ILB-internal-address 10.0.2.4 |
3 |
|
0.0.0.0/0
|
Virtual appliance | ILB-internal-address 10.0.2.4 |

If traffic inspection is needed inside the Web/App subnets, override Rule 1 in the route tables, "<web-subnet>-local
", and "<app-subnet>-local
".
![]() |
Important - Associate the newly created routing table with the subnet to which it belongs. |
If the subnet houses the Security Management Server that manages the Cluster Members, add these routes below as well. This allows the Security Management Server to communicate directly with each Cluster Member, without passing through the Active Cluster Member.

Name |
Address prefix |
Nexthop-type |
Nexthop-address |
---|---|---|---|
|
|
Virtual appliance |
|
|
|
Virtual appliance |
|
Step 4: Set Up Routes on Cluster Members to the Internal Subnets

Step |
Description |
|||
---|---|---|---|---|
1 |
Connect over SSH to each of the Cluster Members. |
|||
2 |
Log in to Gaia Clish, or Expert mode. |
|||
3 |
Add this route:
Example:
|

Parameter |
Description |
---|---|
<Virtual-Network-IP-address/Prefix> |
Specifies the prefix of the entire Virtual Network. Example: 10.0.0.0/16 |
<eth1-router-IP-address> |
Specifies the first unicast IP address on the subnet, to which the Example: 10.0.2.1 |

-
Routes to the private address space IP ranges specified in RFC 1918 are configured automatically.
-
If the Virtual Network comprises several non-contiguous address prefixes, repeat the command for each prefix.
-
For vNET Peering:
-
Add a compatible route on each peer network.
-
Add the route for vNET peering to each Cluster Member.
-
Step 5: Configure Cluster Objects in SmartConsole

Step |
Description |
|
---|---|---|
1 |
Click the Objects menu > More object types > Network Object > Gateways and Servers > Cluster > New Cluster. |
|
2 |
Select Classic Mode. The Gateway Cluster Properties window opens. |
|
3 |
Enter a Name. Example:
|
|
4 |
In the IPv4 Address field, enter the public address allocated for the cluster. Note - You can find the cluster IP address in the Azure portal when you select the Active Cluster Member's primary NIC > IP configuration > "cluster-vip". |
|
5 |
Select the Cluster Members tab.
|
|
6 |
Repeat the Step 6 to add the second Cluster Member. |
|
7 |
Click Network Management > Get Interfaces > Get Interfaces With Topology. If this warning appears: "Topology and Anti-Spoofing settings that are already defined will be overwritten. by results of this operation that contradict them, if any. Do you want to continue?" Click Yes. |
|
8 |
Configure the interfaces eth0 and eth1.
|
|
9 |
Remove VPN blade if not needed. |
|
10 |
Install the applicable Access Control Policy on the cluster object. |
Step 6: Configure NAT Rules
Note - See Creating Objects in SmartConsole.

-
Rule 1 - You have to define this NAT rule manually.
-
Rules 2 - 5 - SmartConsole creates these NAT rules automatically.
-
Traffic between the Web-subnet and the App-subnet is based on the UDR rules. Each subnet has its own routing table.

Step |
Description |
---|---|
1 |
Double-click the Web-subnet object. The Web-subnet object window shows. |
2 |
Select the NAT tab > Add automatic address translation rules. |
3 |
In the Translation method field, select Hide > Hide Behind Gateway. |
4 |
In the Install on Gateway field, select the cluster object. |
5 |
Click OK. This creates the automatic NAT rules. |
6 |
Install the applicable Access Control Policy on the cluster object. |
Step 7: Set Up the External Load Balancer in Azure
By default, the template you deploy creates an External Load Balancer, with the name frontend-lb
, which faces the Internet.
The External Load Balancer sends health probes to TCP port 8117 to determine the health of the CloudGuard Network Security Gateways.
Create the load balancing rules in the Azure portal to allow incoming connections:
-
Go to External Load Balancer > Load balancing rules > Add.
-
Click Add.

-
You cannot use these ports for forwarded traffic:
-
80
-
443
-
444
-
8082
-
8080
-
8117
-
-
Do not change the health probe port.
-
In the Floating IP field, use the same value used in Deploy the Load Balancer with floating IP from step 1.
-
The Check Point cluster resource group includes an NSG associated with the frontend subnet. By default, the NSG allows all outbound and inbound traffic.
-
The Load Balancer can be set up to listen on additional ports or on additional public IP addresses.
For more information, see Multiple Frontends for Azure Load Balancer. For an example, go to Step 9: Configure the Load Balancer to Listen on Multiple IP Addresses in Azure.
Step 8: Create Dynamic Object LocalGatewayExternal in SmartConsole
In SmartConsole, create the Dynamic object called LocalGatewayExternal.
This object represents the private Cluster Member's IP addresses.
You use this Dynamic object in the next step.
-
In SmartConsole, click the Objects menu > Object Explorer.
-
From the top toolbar, click New > Network Object > Dynamic Objects > Dynamic Object.
- In the Enter Object Name field, enter (case-sensitive):
LocalGatewayExternal
-
Click OK.
-
Close the Object Explorer.
Step 9: Configure the Load Balancer to Listen on Multiple IP Addresses in Azure
Configure the Load Balancer to listen on additional public IP addresses. This setup is useful if you want the Security Gateway to secure multiple web applications, each with its own public IP address.
Configure the Load Balancer to listen on a second public IP address on TCP port 80, and then forward the traffic to the Check Point CloudGuard Security Gateway to TCP port 8083.

Step |
Description |
---|---|
1 |
In the Azure portal, select the Load Balancer called Note - The Load Balancer is in the resource group you created. |
2 |
Allocate a new public IP address:
|
3 |
Add a load balancing rule.
|
Configure Access Control Rule in SmartConsole

Rule Name |
Meaning / Value |
---|---|
Rule No | 1 |
Name |
Desired rule name |
Source | *Any
|
Destination | LocalGatewayExternal
When Floating IP is enabled, use the External Load Balancer Frontend IP Address |
VPN | *Any
|
Service and Applications |
The service object that represents the internal port |
Data |
*Any
|
Action |
|
Track |
|
Install On |
|
Load Balancer Conditions
The Active Cluster Member uses NAT to forward traffic that belongs to the two web applications, to the right web server.
NAT rules are defined with the special Dynamic Object.
The Dynamic object LocalGatewayExternal
represents the private IP addresses of the external interface of Member 1 and Member 2.
For more information, see Step 8: Create Dynamic Object LocalGatewayExternal in SmartConsole.
|
Note - When Floating IP is enabled, set Original Destination to be the External Load Balancer Frontend IP Address. |
Step 10: Configure VPN
In SmartConsole, create a Network Group object to represent the encryption domain for the cluster.

For more information, see the Check Point Security Management Administration Guide for your Management Server version.
Step |
Description |
---|---|
1 |
Create a Network Group object to represent the encryption domain of the cluster:
|
2 |
Edit the cluster object:
|
3 |
Define your Network Group as the encryption domain of the cluster object:
|
4 |
Define the VPN community:
|
5 |
Define the outgoing VPN interface:
|
6 |
Configure the VPN Community to use Permanent Tunnels:
|
7 |
Install the applicable Access Control Policy on the cluster object. |