Cluster Xl
Administration Guide
Version R70
703326 April 23, 2009
© 2003-2009 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying,
distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or byany means without prior written
authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or
omissions. This publication and features described herein are subject to change without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as setforth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer
Software clause at DFARS 252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Please refer to http://www.checkpoint.com/copyright.html for a list of our trademarks
For third party notices, see http://www.checkpoint.com/3rd_party_copyright.html.
Contents
Preface
Chapter 1
Who Should Use ThisGuide.............................................................................. 12
Summary of Contents ....................................................................................... 13
Appendices ................................................................................................ 13
Related Documentation ....................................................................................14
More Information ............................................................................................. 16
Feedback ........................................................................................................ 16
Introduction to ClusterXL
The Need for Gateway Clusters.......................................................................... 18
Reliability through HighAvailability .............................................................. 18
Enhanced Reliability and Performance through Load Sharing .......................... 18
Check Point ClusterXL Gateway Clustering Solution............................................. 19
The Cluster Control Protocol ............................................................................. 20
Installation,Licensing and Platform Support ...................................................... 21
Clock Synchronization in ClusterXL.................................................................... 21
Clustering Definitions and Terms....................................................................... 22
Chapter 2
Synchronizing Connection Information Across the Cluster
The Need to SynchronizeCluster Information ..................................................... 26
The Check Point State Synchronization Solution ................................................. 27
Introduction to State Synchronization ........................................................... 27
The Synchronization Network ....................................................................... 28
How StateSynchronization Works................................................................. 29
Non-Synchronized Services .......................................................................... 30
Choosing Services That Do Not Require Synchronization................................. 31
Duration Limited Synchronization................................................................. 32
Non-StickyConnections............................................................................... 32
Non-Sticky Connection Example: TCP 3-Way Handshake ................................ 34
Synchronizing Non-Sticky Connections.......................................................... 35
Synchronizing Clusters over a Wide Area Network........................................... 36
Synchronized Cluster...
Regístrate para leer el documento completo.