Adding Another Member to an Existing Cluster
|
Important - Schedule a full maintenance window to perform this procedure. |
|
Best Practice - Before you change the current configuration, export a complete management database with " |
Adding a New Cluster Member to the Cluster Object
-
Install a new Cluster Member
Install a new Cluster Member Security Gateway that is part of a cluster. you plan to add to the existing cluster Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing..
See the R81.20 Installation and Upgrade Guide > Chapter Installing a ClusterXL, VSX Cluster, VRRP Cluster.
Follow only the step "Install the Cluster Members".
Important - The new Cluster Member must run the same version with the same Hotfixes as the existing Cluster Members.
-
Configure the new Cluster Member
On the new Cluster Member you plan to add to the existing cluster:
-
Configure or change the IP addresses on the applicable interfaces to match the current cluster topology Set of interfaces on all members of a cluster and their settings (Network Objective, IP address / Net Mask, Topology, Anti-Spoofing, and so on)..
Use Gaia Portal Web interface for the Check Point Gaia operating system. or Gaia Clish The name of the default command line shell in Check Point Gaia operating system. This is a restricted shell (role-based administration controls the number of commands available in the shell)..
-
Configure or change the applicable static routes to match the current cluster topology.
Use Gaia Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems. Portal or Gaia Clish.
-
Connect to the command line.
-
Log in to Gaia Clish or the Expert mode.
-
Start the Check Point Configuration Tool. Run:
cpconfig
-
Select the option Enable cluster membership for this gateway and enter y to confirm.
-
Reboot the new Cluster Member.
-
-
Configure the cluster object in SmartConsole
-
Connect with SmartConsole Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. to the Security Management Server Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. or Domain Management Server Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. that manages this cluster.
-
From the left navigation panel, click Gateways & Servers.
-
Open the existing cluster object.
-
In the Cluster Members page, click Add > New Cluster Member.
The Cluster Members Properties window opens.
Follow the instructions on the screen to configure this new Cluster Member.
-
Click the General tab.
-
In the Name field, enter a Cluster Member name.
-
In the IPv4 Address field, enter a physical IPv4 addresses.
The Management Server must be able to connect to the Cluster Member at this IPv4 address.
This IPv4 address can be an internal, or external. You can use a dedicated management interface on the Cluster Member.
Important - You must define a corresponding IPv4 address for every IPv6 address. This release does not support the configuration of only IPv6 addresses.
-
In the IPv6 Address field, enter a physical IPv6 address, if you need to use IPv6.
The Management Server must be able to connect to the Cluster Member at this IPv6 address. This IPv6 address can be an internal, or external. You can use a dedicated management interface on the Cluster Member.
Important - You must define a corresponding IPv4 address for every IPv6 address. This release does not support the configuration of only IPv6 addresses.
-
Click Communication, and initialize Secure Internal Communication (SIC Secure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server.) trust.
Enter the same key you entered during First Time Configuration Wizard on the new Cluster Member.
-
Click the NAT tab to configure the applicable NAT settings.
-
Click the VPN tab to configure the applicable VPN settings.
-
Click OK.
-
From the left tree, click Network Management.
-
Make sure all interfaces are defined correctly.
-
Make sure all IP addresses are defined correctly.
-
-
Click OK.
-
Publish the SmartConsole session.
-
Install the Access Control Policy on this cluster object.
Policy installation must succeed on all Cluster Members.
-
Install the Threat Prevention Policy on this cluster object.
Policy installation must succeed on all Cluster Members.
-
-
Examine the cluster state
On each Cluster Member (existing and the newly added):
-
Connect to the command line.
-
Log in to Gaia Clish or the Expert mode.
-
Make sure all Cluster Members detect each other and agree on their cluster states. Run:
Shell
Command
Gaia Clish
-
set virtual-system <VSID>
-
show cluster state
Expert mode
cphaprob [-vs <VSID>] state
For more information, see Viewing Cluster State.
-
If Cluster Members do not detect each other, or do not agree on their cluster states, then restart the clustering.
Procedure-
Connect to the command line on each Cluster Member (existing and the newly added).
-
Log in to Gaia Clish or the Expert mode.
-
Restart the clustering on each Cluster Member.
Run:
cphastop
cphastart
Important - This temporarily causes the Cluster Member not to be a part of the cluster. As a result, cluster failover Transferring of a control over traffic (packet filtering) from a Cluster Member that suffered a failure to another Cluster Member (based on internal cluster algorithms). Synonym: Fail-over. can occur.
-
Make sure all Cluster Members detect each other and agree on their cluster states. Run:
Shell
Command
Gaia Clish
-
set virtual-system <VSID>
-
show cluster state
Expert mode
cphaprob [-vs <VSID>] state
-
-
Adding an Existing Security Gateway as a Cluster Member to the Cluster Object
|
Important - The existing Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. must run the same version with the same Hotfixes as the existing Cluster Members. |
-
Configure the existing Security Gateway
On the existing Security Gateway you plan to add to the existing cluster:
-
Configure or change the IP addresses on the applicable interfaces to match the current cluster topology.
Use Gaia Portal or Gaia Clish.
-
Configure or change the applicable static routes to match the current cluster topology.
Use Gaia Portal or Gaia Clish.
-
Connect to the command line.
-
Log in to Gaia Clish or the Expert mode.
-
Start the Check Point Configuration Tool. Run:
cpconfig
-
Select the option Enable cluster membership for this gateway and enter y to confirm.
-
Reboot the Security Gateway.
-
-
Configure the cluster object in SmartConsole
-
Connect with SmartConsole to the Security Management Server or Domain Management Server that manages this cluster.
-
From the left navigation panel, click Gateways & Servers.
-
Open the existing cluster object.
-
From the left tree, click Cluster Members.
-
Click Add > Add Existing Gateway.
Follow the instructions on the screen to configure this new Cluster Member.
Read the warning and click Yes:
-
In the list of Cluster Members, select the new Cluster Member and click Edit.
-
Click the NAT tab and configure the applicable NAT settings.
-
Click the VPN tab and configure the applicable VPN settings.
-
From the left tree, click Network Management.
-
Make sure all interfaces are defined correctly.
-
Make sure all IP addresses are defined correctly.
-
-
Click OK.
-
Install the Access Control Policy on this cluster object.
Policy installation must succeed on all Cluster Members.
-
Install the Threat Prevention Policy on this cluster object.
Policy installation must succeed on all Cluster Members.
-
-
Examine the cluster state
On each Cluster Member (existing and the newly added):
-
Connect to the command line.
-
Log in to Gaia Clish or the Expert mode.
-
Make sure all Cluster Members detect each other and agree on their cluster states. Run:
Shell
Command
Gaia Clish
-
set virtual-system <VSID>
-
show cluster state
Expert mode
cphaprob [-vs <VSID>] state
For more information, see Viewing Cluster State.
-
If Cluster Members do not detect each other, or do not agree on their cluster states, then restart the clustering.
Procedure-
Connect to the command line on each Cluster Member (existing and the newly added).
-
Log in to Gaia Clish or the Expert mode.
-
Restart the clustering on each Cluster Member.
Run:
cphastop
cphastart
Important - This temporarily causes the Cluster Member not to be a part of the cluster. As a result, cluster failover can occur.
-
Make sure all Cluster Members detect each other and agree on their cluster states. Run:
Shell
Command
Gaia Clish
-
set virtual-system <VSID>
-
show cluster state
Expert mode
cphaprob [-vs <VSID>] state
-
-