Print Download PDF Send Feedback

Previous

Next

Sticky Connections

Included Topics

Introduction to Sticky Connections

The Sticky Decision Function

VPN Tunnels with 3rd Party Peers and Load Sharing

Third-Party Gateways in Hub and Spoke Deployments

Configuring the Sticky Decision Function

Establishing a Third-Party Gateway in a Hub and Spoke Deployment

Introduction to Sticky Connections

A connection is considered sticky, when all of its packets are handled, in either direction, by a single cluster member.
This is the case in High Availability mode, where all connections are routed through the same cluster member, and hence, are sticky.
This is also the case in Load Sharing mode, when there are no VPN peers, Static NAT rules, or SIP traffic.

In Load Sharing mode, there are cases, where it is necessary to ensure that a connection that starts on a specific cluster member will continue to be processed by the same cluster member in both directions. Certain connections can be made sticky by enabling the Sticky Decision Function in the cluster object in SmartConsole.

The Sticky Decision Function

The Sticky Decision Function enables certain services to operate in a Load Sharing deployment. For example, it is required for L2TP traffic, or when the cluster participates in a Site-to-Site VPN tunnel with a third-party VPN peer.

The following services and connection types are now supported by enabling the Sticky Decision Function:

The Sticky Decision Function has the following limitations:

VPN Tunnels with 3rd Party Peers and Load Sharing

Check Point provides interoperability with third-party vendor gateways by enabling them to peer with Check Point gateways. A special case occurs when certain third-party peers (Microsoft LT2P, IPSO Symbian, and Cisco gateways and clients) attempt to establish VPN tunnels with ClusterXL Security Gateways in the Load Sharing mode. These peers are limited in their ability to store SAs, which means that a VPN session that begins on one cluster member and, due to Load Sharing, is routed on the return trip through another, is unrecognized and dropped.

In this scenario:

The third-party peers, lacking the ability to store more than one set of SAs, cannot negotiate a VPN tunnel with multiple cluster members, and therefore the cluster member cannot complete the routing transaction.

This issue is resolved for certain third-party peers or gateways that can save only one set of SAs by making the connection sticky. Enabling the Sticky Decision Function sets all VPN sessions initiated by the same third-party gateway to be processed by a single cluster member.

To enable the Sticky Decision Function:

  1. In SmartDashboard edit the cluster object > ClusterXL page > Advanced.
  2. Enable the property Use Sticky Decision Function.

Third-Party Gateways in Hub and Spoke Deployments

Another case where Load Sharing mode requires the Sticky Decision Function is when integrating certain third-party gateways into a hub and spoke deployment. Without the ability to store more than one set of SAs, a third-party gateway must maintain its VPN tunnels on a single cluster member in order to avoid duplicate SAs.

The following diagram illustrates this deployment:

In this scenario:

Spokes A and B must be set to always communicate using the same cluster member. Enabling the Sticky Decision Function solves half of this problem, in that all VPN sessions initiated by either third-party gateway are processed by a single cluster member.

To make sure that all communications between Spokes A and B are always using the same cluster member, you must make some changes to the user.def file (see sk98239). This second step ensures that both third-party gateways always connect to the same cluster member.

Configuring the Sticky Decision Function

To configure the Sticky Decision Function:

  1. Select a cluster object from the Network Object tree.
  2. Select ClusterXL from the tree and click Advanced.
  3. In the Advanced Load Sharing window, select one of the following options:
    • IPs, Ports, SPIs (default) provides the best sharing distribution, and is recommended for use. It is the least "sticky" sharing configuration.
    • IPs, Ports should be used only if problems arise when distributing IPsec packets to a few members although they have the same source and destination IP addresses.
    • IPs should be used only if problems arise when distributing IPsec packets or different port packets to a few members although they have the same source and destination IP addresses. It is the most "sticky" sharing configuration.
  4. Enable the Sticky Decision Function option to enable its functionality or clear to disable. By default the Sticky Decision Function is disabled.

    If enabled, the connection will pass through a single cluster member on both inbound and outbound directions.

Establishing a Third-Party Gateway in a Hub and Spoke Deployment

To establish a third-party gateway as a spoke in a hub and spoke deployment, perform the following on the Security Management Server:

  1. Enable the Sticky Decision Function if not already enabled. In SmartDashboard, edit the cluster object > ClusterXL page > Advanced, and enable the property Use Sticky Decision Function.
  2. Create a Tunnel Group to handle traffic from specific peers. Use a text editor to edit the file $FWDIR/lib/user.def (see sk98239), and add a line similar to the following:

    all@{member1,member2} vpn_sticky_gws = {<10.10.10.1;1>, <20.20.20.1;1>};

    The elements of this configuration are as follows:

    • all - All cluster interfaces
    • member1,member2 - Names of cluster members in SmartDashboard
    • vpn_sticky_gws - Table name
    • 10.10.10.1 - IP address of Spoke A
    • 20.20.20.1 - IP address of Spoke B
    • ;1 - Tunnel Group Identifier, which indicates that the traffic from these IP addresses should be handled by the same cluster member
  3. Other peers can be added to the Tunnel Group by including their IP addresses in the same format as shown above. To continue with the example above, adding Spoke C would look like this:

    all@{member1,member2} vpn_sticky_gws = {<10.10.10.1;1>, <20.20.20.1;1>,<30.30.30.1;1>};

    Note that the Tunnel Group Identifier ;1 stays the same, which means that the listed peers will always connect through the same cluster member.

    Note - More tunnel groups than cluster members may be defined.

    This procedure in essence turns off Load Sharing for the connections affected. If the implementation is to connect multiple sets of third-party Security Gateways one to another, a form of Load Sharing can be accomplished by setting Security Gateway pairs to work in tandem with specific cluster members. For instance, to set up a connection between two other spokes (C and D), simply add their IP addresses to the line and replace the Tunnel Group Identifier ;1 with ;2. The line would then look something like this:

    all@{member1,member2} vpn_sticky_gws = {<10.10.10.1;1>, <20.20.20.1;1>,<192.168.15.5;2>,<192.168.1.4;2>,};

    Note that there are now two peer identifiers: ;1 and ;2. Spokes A and B will now connect through one cluster member, and Spokes C and D through another.

    Note - The tunnel groups are shared between active cluster members. In case of a change in cluster state (e.g., failover or member attach/detach), the reassignment is performed according to the new state.