Network

Use this network diagram to configure your system. Make sure to replace the IP addresses in the sample environment with the IP addresses in your environment.

Network Diagram

In the diagram:

  • The cluster protects two web applications.

Each web application has:

  • Web server

  • Application server

You must manually configure these components:

Diagram Components

Check Point High Availability consists of two Cluster Members - Member 1 and Member 2.

Failover

Note - This usually happens in less than 40 seconds. This affects East-West, inbound-outbound and VPN tunnel failover.

Traffic Flows

Note - Other Virtual Machines cannot be deployed in the Check Point solution subnets.