Network

Follow this network diagram to configure your system. Make sure to replace the IP addresses in the sample environment with the IP addresses in your environment.

Network Diagram

Routing Table for Web and App - User Defined Routes (UDR)

Web and App routing tables have the same Virtual Network address, but different subnet addresses.

Diagram Components

The diagram shows:

  • Virtual Network in Azure that is divided into four subnets

    • Frontend

    • Backend

    • Web

    • App

  • On-premises network with these components

    • Security Gateway

    • Hosts

Check Point High Availability consists of two Cluster Members, Member 1 and Member 2. Each Cluster Member has two interfaces.

When the Cluster Members are in the same Availability Set, it guarantees that the two Cluster Members are in separate fault domains. For more information, see Manage the availability of Windows virtual machines in Azure.

In the diagram:

  • The cluster protects two web applications.

  • There is Site-to-Site VPN connectivity between the Cluster Members and on-premises Security Gateways.

Each web application has:

  • Public IP address

  • Web server

  • Application server

You must manually configure these components:

  • Backend hosts

  • Subnets

  • Routing tables for Web and App servers

Failover

Traffic Flows

If the Management Server is in the Virtual Network, make sure to have specific routes to allow traffic between the Management Server Virtual Machine and the Cluster Members.

Note - It is not possible to deploy other Virtual Machines in the Check Point solution subnets.

Inbound Traffic

There are two options for inbound traffic:

  1. Traffic travels into the External Load Balancer:

    1. Packet enters into the External Load Balancer via low port (80/443/etc.).

    2. The External Load Balancer forwards the packet to the Active Cluster Member and translates the port to the back-end high port (8081/4433/etc.).

    3. The Active Cluster Member inspects the packet and forwards it to the destination performing NAT translation back to the original low port.

  2. Traffic travels into the front-end network interface (VIP):

    1. Packet enters the front-end network interface (eth0) of the Active Cluster Member.

    2. The Active Cluster Member inspects the packet and forwards it to the destination.

Intra-Subnet Traffic

Traffic travels freely in the subnet without inspection.