Configuring High Availability For Embedded NGX Gateways in Smartcenter
Configuring High Availability For Embedded NGX Gateways in Smartcenter
Configuring High Availability For Embedded NGX Gateways in Smartcenter
February 2008
Contents
Introduction...........................................................................................................................................1 High Availability Basics and Terminology .........................................................................................2 Active and Passive Gateway States.....................................................................................................2 Priority ................................................................................................................................................2 Heartbeats and Synchronization Interface...........................................................................................4 Virtual IP Address...............................................................................................................................5 High Availability Configuration Types...............................................................................................6 How High Availability Works..............................................................................................................9 Prerequisites ..........................................................................................................................................9 Workflows............................................................................................................................................10 High Availability with Separate WAN Connections Workflow .......................................................10 High Availability with Single WAN Connection Workflow ............................................................11 High Availability with WAN Virtual IP Address Workflow ............................................................12 Adding UTM-1 Edge Appliances to SmartCenter ...........................................................................13 Configuring the LAN Network's Encryption Domain .....................................................................15 Configuring a Backup Gateway.........................................................................................................17 Configuring VPN Communities for Permanent Tunnels ................................................................18 Simple High Availability Configuration Scenarios ..........................................................................19 Scenario 1: Simple High Availability with Separate WAN Connections and High Availability with Single WAN Connection ......................................................................................19 Scenario 2: High Availability with Separate WAN Connections and High Availability with Single WAN Connection Including Backup Internet Connection.....................................................22 Scenario 3: High Availability with Separate WAN Connections and High Availability with WAN Virtual IP Address ..................................................................................................................25
Introduction
Introduction
It is a well-known fact that in order to keep business transactions working smoothly, it is necessary to have a reliable Internet connection, and keep the network downtime to a minimum, since a period with no Internet connection or access to critical business network resources means loss of business, money, and worker productivity. Therefore, it is important to ensure that your Internet connection is working at all times. The Check Point UTM-1 Edge appliance's High Availability (HA) feature enables you to create a HA cluster consisting of multiple UTM-1 Edge appliances. All network traffic is routed through one appliance in the cluster, while the rest of the appliances act as backups, so that if the Internet connection fails, the network remains protected and connected to the Internet. Configuring a HA cluster enables you to: Keep your network protected, even in the event of a hardware malfunction Ensure that the connection to your email provider is working at all times Ensure that remote users and mobile workers have reliable access to internal network resources for business information and transaction Allow external users from the Internet to access to your internal Web servers and Web applications
This document explains how to configure High Availability for a cluster of UTM-1 Edge appliances that are managed by SmartCenter.
Note: This document refers to Check Point UTM-1 Edge appliances version 7.0 or later.
Introduction
Priority
Each UTM-1 Edge security appliance in a HA cluster is configured with a priority: a value that determines whether the gateway is active or passive at a given time. The live gateway with the highest priority on the network is automatically elected as the Active Gateway. If this gateway fails, the gateway with the next-highest priority gateway is elected as the new Active Gateway.
Priority
The following table lists the various values that influence a gateway's priority.
Table 1: Values Influencing the Gateway Priority Value
Priority My Priority This value represents the priority you assigned to a particular gateway. This must be an integer between 1 and 255. Internet Connection Tracking Values Internet-Primary This value is the amount that will be deducted from the My Priority value if the primary Internet connection goes down. This must be an integer between 0 and 255. Internet-Secondary If you configured the gateway with a secondary Internet connection, then this value is the amount that will be deducted from the My Priority value if the secondary Internet connection goes down. This must be an integer between 0 and 255. Port Tracking Values LAN1/LAN2/LAN3/L AN4 This value is the amount that will be deducted from the My Priority value if the relevant LAN port's Ethernet link is lost. This must be an integer between 0 and 255. DMZ This value is the amount that will be deducted from the My Priority value if the DMZ port's Ethernet link is lost. This must be an integer between 0 and 255.
Description
Normally, the gateway's priority is equal to the My Priority value. However, if one or both of the following things happens: The primary and/or secondary Internet connection goes down. One or more LAN ports and/or the DMZ port link status is down.
Then the gateway's priority is calculated as follows: Priority = My Priority - (Internet-Primary + InternetSecondary) - (LAN1 + LAN2 + LAN3 + LAN4 + DMZ)
Note: The appliance detects loss of Internet connectivity based on the Dead Connection Detection (DCD) methods configured for each Internet connection. Note: Some appliance models do not support link status detection for the LAN ports.
The UTM-1 Edge security appliances' synchronization interface ports must be connected to each other, either directly, or via a hub or a switch. For example, in a HA configuration where the LAN is the synchronization interface, the appliance's LAN ports must be connected to each other. Heartbeats from the Active Gateway will not reach the internal network, or the Active Gateway will stop sending heartbeats if: The Active Gateway is not powered on. The Active Gateway is not responding, due to a hardware failure.
Virtual IP Address
The synchronization interface is disconnected or not working. The Active Gateway's priority changed (that is, it was lowered). A gateway with a higher priority was added to the network and connected to the synchronization interface.
Virtual IP Address
Normally, all enabled interfaces of a UTM-1 Edge appliance in a HA cluster are assigned a dedicated unique IP address. In addition, cluster gateways can share a virtual IP address (VIP) for each internal interface. The Active Gateway in the cluster always uses virtual IP addresses in the following manner: The virtual IP address shared by the internal network interfaces is used as the default gateway for the internal network hosts. The virtual IP address assigned to the primary Internet connection is used by the Active Gateway in the cluster to connect to the Internet through the interface assigned to the primary Internet connection. The virtual IP address assigned to the secondary Internet connection is used by the Active Gateway in the cluster to connect to the Internet through the interface assigned to the secondary Internet connection.
Description
Hosts on the internal UTM-1 Edge appliance networks use the Active Gateway in the HA cluster as the default gateway to the Internet and other subnets. Advantages: If the Active Gateway fails, a Passive Gateway will take control of the virtual IP address and become the new Active Gateway. Thus this configuration provides full redundancy to the Internet and UTM-1 Edge appliance subnets.
Disadvantages: The new Active Gateway cannot take over the previous Active Gateways WAN IP address, because although the previous Active Gateway is now passive, its WAN Internet connection remains active. Therefore, the new Active Gateway will have a different WAN IP address than the old Active Gateway, and external users will be unable to access internal servers at UTM-1 Edge appliance networks without knowing the WAN IP address of the new Active Gateway.
Type
High Availability with Single WAN Connection
Description
Only the Active Gateway in the HA cluster is connected to the Internet. Passive Gateways will not connect to the Internet, unless their status changes to Active. Advantages: Allows using a single WAN IP address for all gateways in the HA cluster without IP conflicts. Inbound communications are enabled through a single IP address, which is handled by the current Active Gateway. Therefore, changes in cluster gateways' status (active or passive) are transparent to external users.
Disadvantages: Since only the Active Gateway is connected to the Internet, Passive Gateways are not dynamically updated by SmartCenter in real time. They are only updated when their status changes to active, and they obtain an Internet connection. Passive Gateways cannot be remotely configured through the Internet.
Type
High Availability with WAN Virtual IP Address
Description
All gateways in the HA cluster share an additional virtual IP address on the WAN interface. The Active Gateway uses the WAN virtual IP address for Internet connections, while the Passive Gateways use their original IP addresses. Advantages: All cluster gateways can connect to the Internet simultaneously. Inbound communications are enabled through a single IP address (the Virtual WAN IP address), which is handled by the current Active Gateway. Therefore, changes in cluster gateways' status (active or passive) are transparent to external users. Passive Gateways can be reached via their WAN IP addresses. Cluster gateways remain connected to SmartCenter and therefore are always updated with the latest software versions, security policies, and SmartDefense signatures.
Disadvantages: Requires an additional IP address as the shared WAN virtual IP address. This option is supported only when the UTM-1 Edge appliance is configured with an Internet connection of the Local Area Network (LAN) type.
4.
5. 6.
Prerequisites
Before configuring HA, the following requirements must be met: You must have at least two identical UTM-1 Edge security appliances. The UTM-1 Edge security appliances must have identical firmware versions and firewall rules. The UTM-1 Edge security appliances' internal networks must be the same. In WAN High Availability with Virtual IP Address, the UTM-1 Edge security appliances' Internet IP addresses must be different, but they must share the same virtual IP address.
Each internal network segment must be connected to a separate hub or switch. In other words, the Active and Passive Gateways' LAN segments must be connected to one hub/switch, and the Active and Passive Gateways' DMZ segments must be connected to another hub/switch, and so on. In WAN High Availability with Virtual IP Address, both WAN ports must be connected to a hub/switch. The UTM-1 Edge security appliances' synchronization interface ports must be connected either directly, or via a hub or a switch. For example, if the DMZ is the synchronization interface, then the DMZ/WAN2 ports on the appliances must be connected to each other. The UTM-1 Edge security appliances must use the same credentials to connect to SmartCenter.
Workflows
High Availability with Separate WAN Connections Workflow
To configure High Availability with Separate WAN Connections
1.
Configure the UTM-1 Edge appliances for High Availability with Separate WAN Connections. For information, refer to the User Guide. Add each UTM-1 Edge appliance to SmartCenter as a gateway object with a static IP address. See Adding UTM-1 Edge Appliances to SmartCenter on page 13. Configure each gateway object with the same LAN network encryption domain. See Configuring the LAN Network's Encryption Domain on page 15.
2.
3.
10
4.
On each gateway object, configure the other gateway object as the backup gateway. See Configuring a Backup Gateway on page 17. Add the gateway objects as satellites in a single VPN community. For information, refer to SmartCenter documentation.
5.
1.
Configure the UTM-1 Edge appliances for WAN HA, by doing the following: a. b. Configure the UTM-1 Edge appliances for High Availability with Separate WAN Connections.
In the Passive Gateway's Network > Internet > Internet Setup page, select the Do not connect if this gateway is in passive state check box. For information, refer to the User Guide. 2. Add a single gateway object to SmartCenter, with either a static or dynamic IP address. See Adding UTM-1 Edge Appliances to SmartCenter on page 13. 3. 4. Configure the gateway object's LAN network encryption domain. See Configuring the LAN Network's Encryption Domain on page 15. Add the gateway object as a satellite in a VPN community. For information, refer to SmartCenter documentation.
Workflows
11
1.
Configure the UTM-1 Edge appliances for High Availability with WAN Virtual IP Address, by doing the following: a. b. Configure the UTM-1 Edge appliances for High Availability with Separate WAN Connections.
In each appliance's Setup > High Availability page, in the Virtual IP field next to the desired Internet connection, type the shared virtual IP address. For information, refer to the User Guide. 2. Add each UTM-1 Edge appliance to SmartCenter as a gateway object with a dynamic IP address. See Adding UTM-1 Edge Appliances to SmartCenter on page 13. 3. Configure each gateway object with the same LAN network encryption domain. See Configuring the LAN Network's Encryption Domain on page 15. 4. On each gateway object, configure the other gateway object as the backup gateway. See Configuring a Backup Gateway on page 17. 5. 6. Add the gateway objects as satellites in a single VPN community. For information, refer to SmartCenter documentation. Configure the VPN community for permanent tunnels. See Configuring VPN Communities for Permanent Tunnels on page 18.
12
1.
In SmartDashboard, in the left pane under Network Objects, right-click on Check Point and select New Check Point > VPN-1 UTM Edge Gateway. The VPN-1 UTM Edge Gateway window opens displaying the General Properties node.
13
2. 3.
In the Name field, type a name for the gateway object that will represent the UTM-1 Edge appliance. Do one of the following: To configure a static IP address, in the IP Address field, type the static IP address of the UTM-1 Edge appliance.
To configure a dynamic IP address, select the Dynamic Address check box. Reminder: For High Availability with Separate WAN Connections, you must configure a static IP address. For High Availability with Single WAN Connection, you can configure either a static or dynamic IP address. For High Availability with WAN Virtual IP Address, you must configure a dynamic IP address. 4. 5. Select the VPN check box. Complete the rest of the fields as desired. For information, refer to SmartCenter documentation. 6. To close the gateway object, click OK.
14
1.
In SmartDashboard, in the desired gateway object, click the Topology node. The Topology node appears.
2.
15
The Interface Properties dialog box appears displaying the General tab.
3. 4. 5.
In the IP Address field, type the LAN network's internal IP address. In the Net Mask field, type the LAN network's subnet mask. Click the Topology tab. The Topology tab appears.
6.
16
7. 8.
1.
In SmartDashboard, in the desired gateway object, click the VPN node. The VPN node appears.
2. 3. 4.
Select the Use Backup Gateway check box. In the Use Backup Gateway drop-down list, select the other gateway object. Click OK.
17
1.
In SmartDashboard, in the desired VPN community, click the Tunnel Management node. The Tunnel Management node appears.
2. 3.
Select the Set Permanent Tunnels check box. Do not change the other settings. Click OK.
18
Scenario 1: Simple High Availability with Separate WAN Connections and High Availability with Single WAN Connection
Figure 1: Simple High Availability with Separate WAN Connections and High Availability with Single WAN Connection
19
Scenario 1: Simple High Availability with Separate WAN Connections and High Availability with Single WAN Connection
GOAL OF THIS CONFIGURATION The goal of this configuration is to ensure the following: The internal networks always have an accessible default gateway for outbound Internet communications, in case the Active Gateway fails (for example, due to a hardware problem). Any failure on the Active Gateway is transparent to external users, and access to the internal networks is available at all times through a single IP address Ensure only the Active Gateway is connected to the Internet and using the allocated WAN IP address.
1. 2.
Configure High Availability with Separate WAN Connections. See High Availability with Separate WAN Connections Workflow on page 10. Configure High Availability with Single WAN Connection on the Passive Gateway. See High Availability with Single WAN Connection Workflow on page 11.
CONFIGURATION NOTES In this configuration, the Passive and Active Gateways can share the same Internet (WAN) IP address. The assumption in this configuration is that only a single WAN IP address can be allocated by the ISP for the cluster gateways to allow Internet connection. WHAT WE WANT TO HAPPEN A failover will take place in the following cases: The Active Gateway fails to generate heartbeats to the internal network.
The Active Gateway's Internet connection is detected as down, causing the gateway's priority to decrease. Only the Active Gateway is connected to the Internet at a given time.
20
Scenario 1: Simple High Availability with Separate WAN Connections and High Availability with Single WAN Connection
Passive Gateway
192.168.10.100 / 255.255.255.0 192.168.10.254 / 255.255.255.0 192.168.20.100 / 255.255.255.0 192.168.10.254 / 255.255.255.0 62.90.31.1 n/a
30 20
20 0 0 Checked
Track Secondary Internet 0 Don't connect to the Internet if passive Synchronization Interface LAN Interface
Unchecked
21
Scenario 2: High Availability with Separate WAN Connections and High Availability with Single WAN Connection Including Backup Internet Connection
Scenario 2: High Availability with Separate WAN Connections and High Availability with Single WAN Connection Including Backup Internet Connection
Figure 2: High Availability with Separate WAN Connections and High Availability with Single WAN Connection Including Backup Internet Connection
GOAL OF THIS CONFIGURATION The goal of this configuration is to ensure the following: The internal networks always have an accessible default gateway for outbound Internet communications, in case the Active Gateway fails (for example, due to a hardware problem).
Configuring High Availability for Embedded NGX Gateways in SmartCenter
22
Scenario 2: High Availability with Separate WAN Connections and High Availability with Single WAN Connection Including Backu
The internal networks are connected to the Internet using the broadband lines as much as possible, and the cheap and slow dialup connection is used only if all broadband connections are down. Any failure on the Active Gateway is transparent to external users, and access to the internal networks is available at all times.
1. 2.
Configure High Availability with Separate WAN Connections. See High Availability with Separate WAN Connections Workflow on page 10. Configure High Availability with Single WAN Connection on the Passive Gateway. See High Availability with Single WAN Connection Workflow on page 11. Configure a secondary Internet connection for the Active and Passive Gateways, using dialup, ISDN, or GPRS modems to serve as a backup. Refer to the UTM-1 Edge appliance's User Guide.
3.
WHAT WE WANT TO HAPPEN A failover will take place immediately if the Active Gateway fails to generate heartbeats to the internal network. In this case, all connections will revert to the Passive Gateway, until the Active Gateway is available again. If the Active Gateway's primary Internet connection fails, a failover to the Passive Gateway will take place, and its broadband primary connection will be used. So long as the broadband primary Internet connection on the Active Gateway has not recovered, the following things will happen: If the Passive Gateway's broadband primary Internet connection also fails, then the Passive Gateway will use its backup dialup Internet connection. If the Passive Gateway's dialup backup Internet connection fails, a failover to the Active Gateway will take place, and its dialup backup Internet connection will be used.
23
Scenario 2: High Availability with Separate WAN Connections and High Availability with Single WAN Connection Including Backup Internet Connection
Passive Gateway
192.168.10.100 / 255.255.255.0 192.168.10.254 / 255.255.255.0 192.168.20.100 / 255.255.255.0 192.168.10.254 / 255.255.255.0 62.90.31.1
n/a
n/a
My Priority Track Primary Internet Track Secondary Internet Don't connect to the Internet if passive
100 80 30
45 20 10
Unchecked
Checked
Synchronization Interface
LAN Interface
24
Scenario 3: High Availability with Separate WAN Connections and High Availability with WAN Virtual IP Address
Scenario 3: High Availability with Separate WAN Connections and High Availability with WAN Virtual IP Address
Figure 3: High Availability with Separate WAN Connections and High Availability with WAN Virtual IP Address
GOAL OF THIS CONFIGURATION The goal of this configuration is to ensure the following: The internal networks always have an accessible default gateway for outbound Internet communications, in case the Active Gateway fails (for example, due to a hardware problem).
25
Scenario 3: High Availability with Separate WAN Connections and High Availability with WAN Virtual IP Address
Enable sharing the same IP address on the WAN interface of active and passive gateways with no IP conflicts. Enable inbound communications for VPN and internal Web server access from the Internet for external users and teleworkers through a single IP address. Any failure on the Active Gateway is transparent to external users, and access to the internal networks is available at all times. All cluster gateways must be connected to a SMART management server to get security and software updates.
1. 2.
Configure High Availability with Separate WAN Connections. See High Availability with Separate WAN Connections Workflow on page 10. Configure High Availability with WAN Virtual IP Address. See High Availability with Virtual WAN IP Address Workflow on page 12.
WHAT WE WANT TO HAPPEN A failover will take place immediately if the Active Gateway fails to generate heartbeats to the internal network. In this case, all connections will revert to the Passive Gateway, until the Active Gateway is available again. Only the active gateway answers the virtual shared WAN IP address, enabling the passive gateway to remain connected to the Internet, for central management and updating.
26
Scenario 3: High Availability with Separate WAN Connections and High Availability with WAN Virtual IP Address
Passive Gateway
192.168.10.100 / 255.255.255.0 192.168.10.254 / 255.255.255.0 192.168.20.100 / 255.255.255.0 192.168.10.254 / 255.255.255.0 62.90.31.1
192.168.10.254 / 255.255.255.0
192.168.20.1 / 255.255.255.0
62.90.31.3
62.90.31.3
My Priority Track Primary Internet Track Secondary Internet Don't connect to the Internet if passive Synchronization Interface
30 0 0
20 0 0
Unchecked
Unchecked
LAN Interface
27