Rolling Back a Failed Upgrade of a Security Group to R81.20 - Zero Downtime (MVC)

This section describes the steps to roll back a failed upgrade of a Security GroupClosed A logical group of Security Appliances that provides Active/Active cluster functionality. A Security Group can contain one or more Security Appliances. Security Groups work separately and independently from each other. To the production networks, a Security Group appears a single Security Gateway. Every Security Group contains: (A) Applicable Uplink ports, to which your production networks are connected; (B) Security Appliances (the Quantum Maestro Orchestrator determines the applicable Downlink ports automatically); (C) Applicable management port, to which the Check Point Management Server is connected. from R81.20 with Zero Downtime - as a Multi-Version Cluster (MVC).

This section describes the steps for rolling back a failed upgrade of a Security Group to R81.20.

This procedure supports only these downgrade paths for Security Groups:

  • from R81.20 to R81.10

  • from R81.20 to R81

Warnings:

Important - While the Security Group still contains Security Group Members that run the R81.20 version, you can only run the script "sp_upgrade --revert" on the R81.20 Security Group Members.

Rolling Back If Only Some of the Security Group Members Were Upgraded - Zero Downtime

Important - Use this rollback procedure if you upgraded only some (not all) Security Group Members in the Security Group.

Rolling Back the Whole Security Group - Zero Downtime

Use this rollback procedure if you upgraded all Security Group Members in the Security Group and it is necessary to keep the current connections.

Important:

  • This procedure does not interrupt the traffic and does not require down time.

    However, this procedure takes more time comparing with the procedure Rolling Back a Failed Upgrade of a Security Group to R81.20 - Minimum Downtime.

  • In this rollback procedure, you divide all upgraded Security Group Members in a specific Security Group into two logical groups - denoted below as "A" and "B".

    You revert one logical group of the Security Group Members at one time.

    The other logical group of the Security Group Members continues to handle traffic.

    Each logical group should contain the same number of Security Group Members - as close as possible.

    Example 1:

    • There are 8 Security Group Members in the Security Group.

    • The Logical Group "A" contains Security Group Members from 1_1 to 1_4.

    • The Logical Group "B" contains Security Group Members from 1_5 to 1_8.

    Example 2:

    • There are 5 Security Group Members in the Security Group.

    • The Logical Group "A" contains Security Group Members from 1_1 to 1_3.

    • The Logical Group "B" contains Security Group Members 1_4 and 1_5.