Included Topics |
The following table and accompanying notes present ClusterXL Load Sharing and High Availability compatibility for OPSEC Certified cluster products. Some Check Point products and features are not supported or are only partially supported (as detailed in the footnotes) for use with ClusterXL.
Feature or Product |
Feature |
LS |
HA |
---|---|---|---|
Security Management |
|
No |
No |
firewall |
Authentication/Security Servers |
Yes (1) |
Yes (1) |
firewall |
ACE servers and SecurID |
Yes |
Yes |
firewall |
Application Intelligence protocol inspection (2) |
Yes (3) |
Yes |
firewall |
Sequence Verifier |
Yes (4) |
Yes (1) |
firewall |
UDP encapsulation |
Yes |
Yes |
firewall |
SAM |
Yes |
Yes |
firewall |
ISP Redundancy |
Yes |
Yes |
VPN |
Third party VPN peers |
Yes |
Yes |
Endpoint Security Client |
Software Distribution Server (SDS) |
No |
No |
Endpoint Security Client |
IP per user in Office Mode |
Yes |
Yes |
SecureXL or Performance Pack |
|
Yes |
Yes |
Check Point QoS |
|
Yes (4, 5) |
Yes |
SmartProvisioning |
SmartLSM Security Gateway |
No |
No |
Check Point Security Gateway |
|
Yes |
Yes |
The following IPS features are supported by ClusterXL, with the limitations listed in the notes.
Feature |
Load Sharing |
High Availability |
---|---|---|
Fragment Sanity Check |
Yes (1, 3) |
Yes (1) |
Pattern Matching |
Yes (2, 3) |
Yes (2) |
Sequence Verifier |
Yes (2, 4) |
Yes (2) |
FTP, HTTP and SMTP Security Servers |
Yes (2, 5) |
Yes (2) |
The Forwarding Layer is a ClusterXL mechanism that allows a cluster member to pass packets to other members, after they have been locally inspected by the firewall. This feature allows connections to be opened from a cluster member to an external host.
Packets originated by cluster members are hidden behind the cluster virtual IP. Thus, a reply from an external host is sent to the cluster, and not directly to the source member. This can pose problems in the following situations:
If a member decides, upon the completion of the firewall inspection process, that a packet is intended for another cluster member, it can use the Forwarding Layer to hand the packet over to that destination. This is done by sending the packet over a secured network (any subnet designated as a Synchronization network) directly to that member. It is important to use secured networks only, as encrypted packets are decrypted during the inspection process, and are forwarded as clear-text (unencrypted) data.
Packets sent on the Forwarding Layer use a special source MAC address to inform the receiving member that they have already been inspected by another Security Gateway. Thus, the receiving member can safely hand over these packets to the local Operating System, without further inspection. This process is secure, as Synchronization Networks should always be isolated from any other network (using a dedicated network).