[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Check Point Firewall Appliances
- Subject: Check Point Firewall Appliances
- From: darden at armc.org (Darden, Patrick S.)
- Date: Wed, 19 Dec 2012 14:52:56 -0500
- In-reply-to: <[email protected]local>
- References: <[email protected]local>
Watch out for licensing gotchyas.
In active/active ClusterXL situations (load sharing multicast mode) be
careful of multicast--make sure any traversed switches and routers are
compatible with Ethernet Multicast (make sure they don't partition ports
due to high broadcast traffic). Active/Active clustering can also make
troubleshooting a pain--which unit has state for which flow, etc..
Also, minimize lag time between State Synchronization nodes or suffer
myriad hard to isolate problems. I advise you to minimize the number of
cluster nodes per vlan or you will effectively DOS your attached
network--think broadcast storms.
If you use unicast active/active clusterxl, you can run into pivot
They are great firewalls, but like all systems they have their
From: Blake Pfankuch [mailto:blake at pfankuch.me]
Sent: Wednesday, December 19, 2012 2:36 PM
To: NANOG (nanog at nanog.org)
Subject: Check Point Firewall Appliances
I am just getting into an environment with a large Check
Point deployment and I am looking for a little bit of feedback from
other real world admins. Looking for what people like, what people
don't (why hopefully). Also for those of you who might run Check Point
devices in your environments what to dig into first as far as getting
more experience on the devices and a better understanding of how not to
break them. I am slowly going through all of the official
documentation, but would also like to hear a real world opinion.
Thanks in advance!