Abstract

This chapter briefly discusses the Check Point High Availability (CPHA) and Check Point Load Sharing (CPLS) modules, as well as a few network configuration models in which Check Point allows virtual private networks (VPNs) to fail over. Even when not using or implementing a high availability (HA) solution within the network, it is a good idea to be aware of the capabilities that Check Point VPN-1/Firewall (FW)-1 offers. While most of the focus of the chapter is on the VPN aspects of HA solutions, it is important to note that HA is also a valuable solution for any mission-critical network boundary with clear text traffic as well. The chapter also gives some attention to third-party solutions for HA, such as the Virtual Router Redundancy Protocol (VRRP) and the hardware options for high availability.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call