CP R80.10 Installation and Upgrade Guide
CP R80.10 Installation and Upgrade Guide
INSTALLATION AND
UPGRADE GUIDE
R80.10
Protected
CHAPTE R 1
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
mailto:[email protected]?subject=Feedback on Installation and
Upgrade Guide R80.10 .
Revision History
Date Description
Terms
The Check Point Security Gateway and
Security Management Server products are
deployed on different computers.
Administrator
Domain
A SmartConsole user with permissions to
A network or a collection of networks related
manage Check Point security products and
to an entity, such as a company, business
the network environment.
unit or geographical location.
ClusterXL
Domain Log Server
Cluster of Check Point Security Gateways
A Log Server for a specified Domain. It stores
that work together in a redundant
and processes logs from Security Gateways
configuration. The ClusterXL both handles
that are managed by the corresponding
the traffic and performs State
Domain Management Server.
Synchronization.
These Check Point Security Gateways are Domain Management Server
installed on Gaia OS:
A virtual Security Management Server that
• ClusterXL supports up to 5 Cluster manages Security Gateways for one Domain,
Members. as part of a Multi-Domain Security
Management environment.
• VRRP Cluster supports up to 2 Cluster
Members.
Global Policy
• VSX VSLS cluster supports up to 13
All Policies defined in the Global Domain that
Cluster Members.
can be assigned to Domains, or to specified
Note - In ClusterXL Load Sharing mode, groups of Domains.
configuring more than 4 Cluster Members
significantly decreases the cluster ICA
performance due to amount of Delta Sync Internal Certificate Authority - A component
traffic. on Check Point Management Server that
issues certificates for authentication.
Database Migration
Process of: Multi-Domain Log Server
1. Installing the latest Security Management A computer that runs Check Point software
Server or Multi-Domain Server version to store and process logs in Multi-Domain
from the distribution media on a separate Security Management environment. The
computer from the existing Security Multi-Domain Log Server consists of Domain
Management Server or Multi-Domain Log Servers that store and process logs from
Server Security Gateways that are managed by the
2. Exporting the management database corresponding Domain Management Servers.
from the existing Security Management
Multi-Domain Security Management
Server or Multi-Domain Server
3. Importing the management database to A centralized management solution for
the new Security Management Server or large-scale, distributed environments with
Multi-Domain Server many different Domain networks.
Package Repository
A SmartUpdate repository on the Security
Management Server that stores uploaded
packages. These packages are then used by
SmartUpdate to perform upgrades of Check
Point Small Office Appliances.
Security Gateway
A computer that runs Check Point software
to inspect traffic and enforces Security
Policies for connected network resources.
Security Policy
A collection of rules that control network
traffic and enforce organization guidelines
for data protection and access to resources
with packet inspection.
SmartConsole
A Check Point GUI application used to
manage Security Policies, monitor products
and events, install updates, provision new
devices and appliances, and manage a
multi-domain environment and each domain.
CHAPTE R 2
Getting Started
In This Section:
Welcome ........................................................................................................................13
R80.10 Documentation .................................................................................................13
R80.10 Software Images...............................................................................................14
For New Check Point Customers ................................................................................14
Disk Space .....................................................................................................................14
Product Deployment Scenarios ...................................................................................15
Welcome
Thank you for choosing Check Point Software Blades for your security solution. We hope that you
will be satisfied with this solution and our support services. Check Point products provide your
business with the most up to date and secure solutions available today.
Check Point also delivers worldwide technical services including educational, professional, and
support services through a network of Authorized Training Centers, Certified Support Partners,
and Check Point technical support personnel to ensure that you get the most out of your security
investment.
For additional information on the Internet Security Product Suite and other security solutions, go
to https://www.checkpoint.com https://www.checkpoint.com or call Check Point at 1(800)
429-4391. For additional technical information, visit the Check Point Support Center
https://supportcenter.checkpoint.com.
Welcome to the Check Point family. We look forward to meeting all of your current and future
network, application, and management security needs.
R80.10 Documentation
This guide is for administrators responsible for installing R80.10 on appliances and open servers
that run the Gaia Operating System.
To learn what is new in R80.10, see the R80.10 Release Notes
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_ReleaseNotes/h
tml_frameset.htm.
See the R80.10 Home Page SK http://supportcontent.checkpoint.com/solutions?id=sk111841 for
information about the R80.10 release.
Disk Space
When you install or upgrade R80.10, the installation or upgrade wizard makes sure that there is
sufficient space on the hard disk to install the Check Point products.
If there is not sufficient space on the hard disk, an error message is shown. The message states:
• The amount of disk space necessary to install the product.
• The directory where the product is installed.
• The amount of free disk space that is available in the directory.
To learn how to remove old Check Point packages and files, see sk91060
http://supportcontent.checkpoint.com/solutions?id=sk91060.
After there is sufficient disk space, install or upgrade the Check Point product.
Distributed Deployment
The Security Management Server (1) and the Security Gateway (3) are installed on different
computers, with a network connection (2).
Standalone Deployment
The Security Management Server (1) and the Security Gateway (3) are installed on the same
computer (2).
2 Save a second snapshot and a backup immediately after the Pre-Upgrade Verifier
successfully completes with no further suggestions.
3 Transfer the snapshot, backup files, and exported database files to external storage
devices. Make sure to transfer the files in the binary mode.
Important notes about backing up and restoring in Management High Availability environment:
• To back up and restore a consistent environment, make sure to collect and restore the
backups and snapshots from all servers in the High Availability environment at the same time.
(This does not apply to Multi-Domain Log Servers.)
• Make sure other administrators do not make changes in SmartConsole until the backup
operation is completed.
For more information:
• About Gaia Backup and Gaia Snapshot, see the R80.10 Gaia Administration Guide
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_Gaia_Admin
Guide/html_frameset.htm.
• About the migrate export and migrate import commands, see the R80.10 CLI Reference
Guide
https://sc1.checkpoint.com/documents/R77/CP_R77_CLI_ReferenceGuide_WebAdmin/html_fr
ameset.htm.
• About the mds_backup and mds_restore commands, see the R80.10 Multi-Domain Security
Management Administration Guide
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_Multi-Domai
nSecurityManagement_AdminGuide/html_frameset.htm.
• About Virtual Machine Snapshots, see the vendor documentation.
To install R80.10 on 2012 and 3000 series appliances that run an earlier version of
Gaia:
1. Download the Gaia Operating System ISO file from the R80.10 Home sk111841
http://supportcontent.checkpoint.com/solutions?id=sk111841.
2. See sk65205 http://supportcontent.checkpoint.com/solutions?id=sk65205 to create a USB
removable device.
3. Connect a computer to the console port on the front of the appliance through the supplied DB9
serial cable.
4. Connect to the appliance through a Serial connection, using these connection settings:
a) Connection type - Select or enter a serial port.
b) Define the serial port settings - 9600 BPS, 8 bits, no parity, 1 stop bit.
c) From the Flow control list, select None.
5. Connect the installation media to the USB port on the appliance.
6. Reboot the appliance. The appliance begins the boot process and status messages show in the
terminal emulation window.
For installation from a removable USB device - In the boot screen, enter serial at the boot
prompt and press Enter.
The R80.10 ISO file is installed on the appliance, and the version and build number show in the
terminal emulation window and on the LCD screen.
7. Reboot the appliance - Press CTRL+C.
The appliance reboots and shows the model number on the LCD screen.
2 On your connected computer, configure a static IPv4 address in the same subnet as the
IPv4 address you configured during the Gaia installation.
3 On your connected computer, in a web browser, connect to the IPv4 address you
configured during the Gaia installation:
https://<IPv4_Address_of_Gaia>
5 Click Login.
The Check Point First Time Configuration Wizard opens.
Below you can find the description of the First Time Configuration Wizard windows and their fields.
Install Install from Check Point Cloud Use these options to install a Gaia version.
Install from USB device
Recovery Import existing snapshot Use this option to import an existing Gaia
snapshot.
If in the Deployment Options window, you selected Install from Check Point Cloud, the First
Time Configuration Wizard asks you to configure the connection to Check Point Cloud. These
options appear (applies only to Check Point appliances that you configured as a Security Gateway):
• Install major version - This option let you choose and install major versions available on
Check Point Cloud. The Gaia CPUSE performs the installation.
• Pull appliance configuration - This option lets you to apply initial deployment configuration
including different OS version on the appliance. You must prepare the initial deployment
configuration with the Zero Touch Cloud Service. For more information, see sk116375
http://supportcontent.checkpoint.com/solutions?id=sk116375.
Field Description
Interface By default, First Time Configuration Wizard selects the interface you
configured during the Gaia installation (for example, eth0).
Note - After you complete the First Time Configuration Wizard and reboot, you
can select another interface as the main Gaia Management Interface and
configure its IP settings.
Configure IPv4 Select how the Gaia Management Interface gets its IPv4 address:
• Manually - You configure the IPv4 settings in the next fields.
• Off - None.
IPv4 address Enter the desired IPv4 address.
Configure IPv6 Select how the Gaia Management Interface gets its IPv6 address:
• Manually - You configure the IPv6 settings in the next fields.
• Off - None.
IPv6 Address Enter the desired IPv6 address.
Field Description
Interface Select the applicable interface on this computer.
Configure IPv4 Select how the applicable interface gets its IPv4 address:
• Manually - You configure the IPv4 settings in the next fields.
• Off - None.
IPv4 address Enter the desired IPv4 address.
Configure IPv6 Optional. Select how the applicable interface gets its IPv6 address:
• Manually - You configure the IPv6 settings in the next fields.
• Off - None.
IPv6 Address Enter the desired IPv6 address.
Field Description
Host Name Enter the desired distinct host name.
Primary DNS Enter the applicable IPv4 address of the primary DNS server.
Server
Secondary DNS Optional: Enter the applicable IPv4 address of the secondary DNS server.
Server
Tertiary DNS Optional: Enter the applicable IPv4 address of the tertiary DNS server.
Server
Use a Proxy Optional: Select this option to configure the applicable Proxy server.
server
Address Enter the applicable IPv4 address or resolvable hostname of the Proxy server.
Field Description
Set the time Select this option to configure the date and time settings manually.
manually
Use Network Select this option to configure the date and time settings automatically with
Time Protocol NTP.
(NTP)
Primary NTP Enter the applicable IPv4 address or resolvable hostname of the primary NTP
server server.
Version Select the version of the NTP for the primary NTP server.
Secondary NTP Optional: Enter the applicable IPv4 address or resolvable hostname of the
server secondary NTP server.
Version Select the version of the NTP for the secondary NTP server.
Field Description
Security Select this option to install:
Gateway
• A Single Security Gateway.
and/or
Security • A Cluster Member.
Management
• A Security Management Server, including Management High Availability.
• An Endpoint Security Management Server.
• An Endpoint Policy Server.
• CloudGuard Controller.
• A dedicated single Log Server.
• A dedicated single SmartEvent Server.
• A Standalone.
Field Description
Multi-Domain Select this option to install:
Server
• A Multi-Domain Security Management Server, including Management High
Availability.
• A dedicated single Multi-Domain Log Server.
Products window:
In this window, you continue to select which type of Check Point products you wish to install on the
Gaia computer.
If in the Installation Type window, you selected Security Gateway and/or Security
Management, these options appear:
Field Description
Security Select this option to install:
Gateway
• A single Security Gateway.
• A Cluster Member.
• A Standalone.
Security Select this option to install:
Management
• A Security Management Server, including Management High Availability.
• An Endpoint Security Management Server.
• An Endpoint Policy Server.
• CloudGuard Controller.
• A dedicated single Log Server.
• A dedicated single SmartEvent Server.
• A Standalone.
Unit is a part This option is available only if you selected Security Gateway.
of a cluster
Select this option to install a cluster of dedicated Security Gateways, or a Full
High Availability Cluster.
Select the cluster type:
• ClusterXL - For a cluster of dedicated Security Gateways, or a Full High
Availability Cluster.
• VRRP Cluster - For a VRRP Cluster on Gaia.
Field Description
Define Security Select Primary to install:
Management
• A Security Management Server.
as
• An Endpoint Security Management Server.
• An Endpoint Policy Server.
• CloudGuard Controller.
Select Secondary to install:
• A Secondary Management Server in Management High Availability.
Select Log Server / SmartEvent only to install:
• A dedicated single Log Server.
• A dedicated single SmartEvent Server.
If in the Installation Type window, you selected Multi-Domain Server, these options appear:
Field Description
Primary Select this option to install a Primary Multi-Domain Server in Management
Multi-Domain High Availability.
Server
Multi-Domain Select this option to install a dedicated single Multi-Domain Log Server.
Log Server
Note - By default, the option Automatically download Blade Contracts and other important
data is enabled. See sk111080 http://supportcontent.checkpoint.com/solutions?id=sk111080.
Field Description
Yes Select this option, if this Security Gateway gets its IP address dynamically
(DAIP gateway).
No Select this option, if you wish to configure this Security Gateway with a static
IP address.
Field Description
Activation Key Enter the desired one-time activation key (between 4 and 127 characters
long).
Field Description
Use Gaia Select this option, if you wish to use the default Gaia administrator (admin).
administrator:
admin
Define a new Select this option, if you wish to configure an administrator username and
administrator password manually.
Field Description
Any IP Address Select this option to allow all computers to connect.
This machine Select this option to allow only a specific computer to connect.
By default, the First Time Configuration Wizard uses the IPv4 address of your
computer. You can change it to another IP address.
Network Select this option to allow an entire IPv4 subnet of computers to connect.
Enter the applicable subnet IPv4 address and subnet mask.
Range of IPv4 Select this option to allow a specific range of IPv4 addresses to connect.
addresses
Enter the applicable start and end IPv4 addresses.
Field Description
Select leading Select the desired interface.
interface
Field Description
Any host Select this option to allow all computers to connect.
Notes:
• At the end of the First Time Configuration Wizard, the Gaia computer reboots and the
initialization process is performed in the background for several minutes.
• If you installed the Gaia computer as a Security Management Server or Multi-Domain Server,
only read-only access is possible with SmartConsole during this initialization time.
• To verify that the configuration is finished:
a) Connect to the command line on the Gaia computer.
b) Log in to the Expert mode.
c) Check that the bottom section of the /var/log/ftw_install.log file contains one of
these sentences: "installation succeeded" or "FTW: Complete".
Run:
# cat /var/log/ftw_install.log | egrep --color "installation succeeded|FTW:
Complete"
Syntax
• To list the command options, run one of these:
Form Command
Short form config_system -h
• To run the First Time Configuration Wizard from a specified configuration file, run one of
these:
Form Command
Short form config_system -f <Path and Filename>
• To run the First Time Configuration Wizard from a specified configuration string, run one of
these:
Form Command
Short form config_system -s <String>
• To create a First Time Configuration Wizard Configuration file template in a specified path, run
one of these:
Form Command
Short form config_system -t <Path>
If you do not have a configuration file, you can create a configuration template and fill in the
parameter values as necessary.
Before you run the First Time Configuration Wizard, you can validate the configuration file you
created.
Parameters
A configuration file contains the <parameter>=<value> pairs described in the table below.
Note - The config_system parameters can change from Gaia version to Gaia version. Run
config_system --help to see the available parameters.
You can change the IP address of the Gaia Management Interface after you run the Gaia First Time
Configuration Wizard.
• In Gaia Portal:
Step Description
1 In your web browser, connect the Gaia Portal to the current IP address of the Gaia
management interface:
https://<IP Address of Gaia Management Interface>
5 Click OK.
6 In the Interfaces section, select the Management Interface and click Edit.
8 Click OK.
• In Gaia Clish:
Step Description
1 Connect to the command line on the Gaia computer.
• Over SSH to the current IP address of the Gaia Management Interface
• Over a console
2 Log in to Gaia Clish.
Step Description
5 Assign another IP address to the Gaia Management Interface:
set interface <Interface Name> ipv4-address <IPv4 address> subnet-mask
<Mask>
In Gaia Portal:
1. With a web browser, connect to Gaia Portal at:
https://<IP address of Gaia Management Interface>
2. From the navigation tree, click System Management > System Configuration.
3. In the IPv6 Support section, select On.
4. Click Apply.
5. When prompted, select Yes to reboot.
In Gaia Clish:
1. Connect to the command line on the Gaia computer.
2. Log in to Gaia Clish.
3. Enable the IPv6 support:
set ipv6-state on
4. Save the changes:
save config
5. Reboot:
reboot
9. In the First Time Configuration Wizard Summary page, review your choices.
You can select Improve product experience by sending data to Check Point. Check
Point recommends that you select this option. No data is made accessible to third parties.
10. Click Finish.
License activation is automatic on Check Point appliances.
11. To start the configuration, click Yes.
A progress bar tracks the configuration of each task.
12. Click OK.
Security Management Server or Multi-Domain Server is installed on the appliance.
11. In the Appliance Activation page, get a license automatically from the User Center and
activate it, or use the 15 day trial license.
Click Next.
12. In the Summary page, review your choices. Click Finish.
Optional: Improve product experience by Sending Data to Check Point (on page 208).
13. To start the configuration, click Yes > OK.
A progress bar tracks the configuration of each task.
14. Download SmartConsole from the Gaia Portal.
a) In your web browser, connect to the Gaia Portal:
https://<management_ip_address>
b) In the Overview page, click Download Now!
Service URL
Gaia Portal Defaul
https://<Gaia IP Address>
t
https://<Management Server IP
New
Address>:4434/smartview/
https://<Management Server IP
New
Address>:4434/web_api/<command>
If you disable the Endpoint Policy Management blade, the services connection port
automatically changes back to the default 443.
To change the minimum available disk space for logs and indexes:
1. In SmartConsole, edit the Security Management Server or Log Server or SmartEvent network
object.
2. From the Gateways & Servers double-click an object. The Check Point Host window opens.
3. Click Logs > Storage.
4. Select When disk space is below <number> Mbytes, start deleting old files.
5. Change the disk space value.
6. Click OK.
Note - In a Multi-Domain Security Management environment, the disk space for logs and
indexes is controlled by the Multi-Domain Server, and applies to all Domain Management
Servers. Configure the disk space in the Multi-Domain Server object.
Installing a Standalone
In This Section:
Configuring a Standalone Appliance in Standard Mode .............................................57
Configuring a Standalone Appliance in Quick Setup Mode ........................................60
Important - These instructions apply to Open Servers and Check Point appliances except Smart-1
appliances.
See the R80.10 Release Notes
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_ReleaseNotes/h
tml_frameset.htm for the supported Check Point appliances and Open Server requirements for a
Standalone deployment.
You can configure a Check Point Standalone deployment using the Check Point First Time
Configuration Wizard.
• Standard (on page 57) - Supported on Check Point appliances, Open Servers, and VMs that
meet the requirements listed in the Release Notes.
• Quick Setup (on page 60) - Installs a Security Gateway and a Security Management Server on a
single appliance in Bridge Mode. Supported on Check Point appliances that support
Standalone configuration.
For more on Gaia Quick Standalone Setup on appliances, see sk102231
http://supportcontent.checkpoint.com/solutions?id=sk102231.
3 Click Login.
The First Time Configuration Wizard starts and the Welcome screen shows.
Click Next.
4 In the Setup section of Deployment Options view, select Install a version available
locally on your device.
Click Next.
Step Action
5 If the Available Releases view shows, select Continue with configuration of Gaia
R80.10.
Click Next.
7a Enter the IPv4 address and Subnet mask of the management interface.
Note - You can leave the IP address and the subnet mask unchanged. It is the factory
default address or the latest address that the administrator configured.
7c In Configure IPv6, select On from the drop-down menu (by default, it is off), if you have
IPv6 in your environment.
7d Enter the IPv6 address and Subnet mask of the management interface.
8 Optional: In the Internet Connection view, configure the interface to connect to the
Internet.
Click Next.
8b In Configure IPv4, select On from the drop-down menu (by default, it is off). Enter the
IPv4 address and Subnet mask of the interface.
8c If you already assigned an IPv6 address, in Configure IPv6, select On from the
drop-down menu (by default, it is Off). Enter the IPv6 address and Subnet mask of the
interface.
Step Action
10 Configure the Date and Time Settings.
Select Manually or Use Network Time Protocol (NTP).
Click Next.
11 In the Products window, select both these products: Security Gateway and Security
Management Server.
11a If you configure Security Management in High Availability, define this server as
Primary, or Secondary.
If you configure a Dedicated Server, select SmartEvent or Log Server.
Click Next.
11b Optional: If you configure a Full High Availability cluster, select Unit is a part of a
cluster and select the cluster type ClusterXL.
If you have several clusters on the same network, enter the unique Cluster Global ID.
Click Next.
13 In the Security Management GUI Clients view, define which GUI clients can connect to
the Security Management Server.
Click Next.
15 After the First Time Configuration Wizard completes and reboots the system, you can
download the SmartConsole from the Gaia Portal.
After you install the Gaia operating system, install the Security Gateways.
6. From the Device Information window, enter the host name of the server.
Optional:
• Enter the Domain Name, and IPv4 address for the DNS servers.
• Set the IP Address and port for a Proxy Server.
7. Click Next.
8. Configure the Date and Time Settings manually, or enter the hostname and IPv4 address of
the NTP server. Click Next.
9. For the Installation Type, select Security Gateway.
Optional: If you have to configure a cluster:
• Select Unit is a part of a cluster
• Select ClusterXL or VRRP Cluster
Click Next.
10. From the Dynamically Assigned IP window, answer yes or no. Click Next.
11. From the Secure Internal Communication (SIC) window, enter the Activation Key that
you will use later in the Security Gateway object in SmartConsole. Click Next.
12. The First Time Configuration Wizard Summary window shows the selected settings for
the system.
13. Click Finish.
A VSX Gateway can be installed on certain Check Point Appliances and Open Servers that meet the
minimum requirements listed in the R80.10 Release Notes
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_ReleaseNotes/h
tml_frameset.htm.
Installing SmartConsole
In This Section:
Logging in to SmartConsole.........................................................................................68
Troubleshooting SmartConsole ...................................................................................68
SmartConsole is a GUI client you use to manage the Check Point environment.
For SmartConsole requirements, see the R80.10 Release Notes
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_ReleaseNotes/h
tml_frameset.htm.
You can download the SmartConsole installation package from:
• R80.10 Home Page SK http://supportcontent.checkpoint.com/solutions?id=sk111841
• Check Point Support Center http://supportcenter.checkpoint.com
• Gaia Portal of your Security Management Server or Multi-Domain Server
Logging in to SmartConsole
Step Description
1 Open the SmartConsole application.
4 Click Login.
5 If necessary, confirm the connection using the fingerprint generated during the
installation.
You see this only the first time that you log in from a SmartConsole client.
Troubleshooting SmartConsole
Make sure the SmartConsole client can access these ports on the Management Server:
• 18190
• 18264
• 19009
For more information, see:
• sk52421: Ports used by Check Point software
http://supportcontent.checkpoint.com/solutions?id=sk52421
• sk43401: How to completely disable FireWall Implied Rules
http://supportcontent.checkpoint.com/solutions?id=sk43401
Post-Installation Configuration
After the installation is complete, and you rebooted the Check Point computer:
• Configure the applicable settings in the Check Point Configuration Tool.
• Check the recommended and available software packages in CPUSE (on page 74).
The Check Point Configuration Tool lets you configure these settings:
Check Point computer Commands Available Configuration Options
Security Management cpconfig (1) Licenses and contracts
Server, (2) Administrator
Dedicated Log Server, (3) GUI Clients
Dedicated SmartEvent (4) SNMP Extension
Server (5) Random Pool
(6) Certificate Authority
(7) Certificate's Fingerprint
(8) Automatic start of Check Point
Products
(9) Exit
(13) Exit
(11) Exit
(3) GUI Clients Configure the computers that are allowed to connect
with the SmartConsole to this server.
(5) Random Pool Configure the random data to be used for various
cryptographic operations on this server.
(7) Certificate's Show the SIC certificate's fingerprint for this server.
Fingerprint
This fingerprint verifies the identity of this server when
you connect to it with SmartConsole for the first time.
(3) Random Pool Configure the random data to be used for various
cryptographic operations on this server.
(5) Certificate's Show the SIC certificate's fingerprint for this server.
Fingerprint
This fingerprint verifies the identity of this server when
you connect to it with SmartConsole for the first time.
(7) GUI clients Configure the computers that are allowed to connect
with the SmartConsole to this server.
(11) IPv6 Support for R80.10 Multi-Domain Server does not support IPv6.
Multi-Domain Server
Do not use this option (Known Limitation PMTR-14989).
(4) Random Pool Configure the random data to be used for various
cryptographic operations on this server.
(5) Secure Internal Reset and configure the one-time activation key
Communication (between 4 and 127 characters long) for Secure Internal
Communication (SIC) with a Management Server.
For more information, see the R80.10 Security
Management Administration Guide
https://sc1.checkpoint.com/documents/R80.10/WebAd
minGuides/EN/CP_R80.10_SecurityManagement_Admi
nGuide/html_frameset.htm.
(6) Enable cluster membership Configure this Security Gateway as part of a Check
for this gateway Point cluster.
(6) Disable cluster For more information, see the R80.10 ClusterXL
membership for this gateway
Administration Guide
https://sc1.checkpoint.com/documents/R80.10/WebAd
minGuides/EN/CP_R80.10_ClusterXL_AdminGuide/htm
l_frameset.htm.
(7) Enable Check Point Per Configure the VSX Virtual System Load Sharing on this
Virtual System State VSX Gateway.
(7) Disable Check Point Per For more information, see the R80.10 VSX
Virtual System State
Administration Guide
https://sc1.checkpoint.com/documents/R80.10/WebAd
minGuides/EN/CP_R80.10_VSX_AdminGuide/html_fram
eset.htm
(10) Automatic start of Check Select which of the installed Check Point products start
Point Products automatically during boot.
This option is for Check Point Support use.
Installation Description
Local You use the CPUSE (sk92449
http://supportcontent.checkpoint.com/solutions?id=sk92449) on each Gaia
computer to install the applicable packages.
You can See the instructions for a Gaia computer that is not
perform connected to the Internet.
an offline
installation.
High Availability
In This Section:
Configuring Management High Availability .................................................................77
Understanding Full High Availability Cluster on Appliances .....................................79
Installing Full High Availability on Gaia Appliances ...................................................80
Configuring Full High Availability on Appliances ........................................................83
Upgrading Full High Availability on Appliances ..........................................................86
For about how to configure High Availability for Multi-Domain Security Management, see the
R80.10 Multi-Domain Server Administration Guide
http://downloads.checkpoint.com/dc/download.htm?ID=54841.
For information on ClusterXL functionality, see the R80.10 ClusterXL Administration Guide
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_ClusterXL_Admi
nGuide/html_frameset.htm.
For information on Security Management Servers, see the R80.10 Security Management
Administration Guide
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_SecurityManage
ment_AdminGuide/html_frameset.htm.
Important - SmartEvent Server is not supported in Management High Availability and Full High
Availability Cluster environments (sk25164
http://supportcontent.checkpoint.com/solutions?id=sk25164). For these environments, install
SmartEvent Server and SmartReporter on dedicated machines.
16. Define the Secure Internal Communication (SIC) Activation Key that is used by the gateway
object in SmartConsole and then click Next.
17. Review the summary and, if correct, click Finish.
18. To start the configuration process, click Yes.
A progress bar tracks the configuration of each task.
19. Click OK.
Gaia R80.10 is installed on the appliance.
20. Log in to the Gaia Portal with the new management IP address that you entered in the First
Time Configuration Wizard.
21. Double-click the SYNC or eth1 interface and configure the settings. This interface is used to
synchronize with the other appliance.
Use a different IP address for the SYNC or eth1 interface on the secondary appliance. Make
sure that the primary and secondary appliances are on the same subnet.
Click Apply.
22. Configure the settings for other interfaces that you are using.
23. Make sure a cross-over cable connects the SYNC or eth1 interfaces on the two appliances.
24. If necessary, download SmartConsole from the Gaia Portal.
a) In your web browser, connect to the Gaia Portal: https://<management_ip_address>
b) In the Overview page, click Download Now!
Upgrading Prerequisites
In This Section:
Before Upgrading .........................................................................................................87
Management Server Migration Tool ............................................................................91
Using the Pre-Upgrade Verifier ...................................................................................92
Upgrading Successfully ................................................................................................93
Upgrading the vSEC Controller ....................................................................................94
Service Contract Files ..................................................................................................95
Before Upgrading
Before you upgrade:
• Make sure that you have the latest version of this document.
• See the R80.10 Release Notes
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_ReleaseNote
s/html_frameset.htm for:
• Supported upgrade paths
• Minimum hardware and operating system requirements
• Supported Security Gateways
• Licenses and Service Contracts:
• Make sure you have valid licenses installed on all applicable Check Point computers -
source and target.
• Make sure you have a valid Service Contract that includes software upgrades and major
releases registered to your Check Point User Center account. (on page 96)
The contract file is stored on the Management Server and downloaded to Check Point
Security Gateways during the upgrade process.
For more information about Service Contracts, see sk33089
http://supportcontent.checkpoint.com/solutions?id=sk33089.
• Make sure that the target server meets the minimum hardware and operating system
requirements and is configured identically to the source server.
If the target server uses a different leading IP address than the source, change the target IP
address and the external interface.
• If SmartConsole connects to the Management Server (you plan to upgrade) through an R7x
Security Gateway or Cluster, then follow these steps:
a) Connect to the Management Server that manages the R7x Security Gateway or Cluster
c) Install the modified Firewall policy on the R7x Security Gateway or Cluster.
d) If later you upgrade this R7x Security Gateway or Cluster to R80.10 or higher, delete this
explicit rule.
• Upgrade all Management Servers in your deployment, including those in High Availability
configuration:
• Upgrade R80 and higher Secondary Security Management Servers.
• For Secondary Security Management Servers of R77.xx and lower, do a clean installation
and re-establish the SIC trust. Management High Availability synchronization will start
automatically.
• Upgrade Secondary Multi-Domain Security Management servers from R80, and R77.xx and
lower.
• For upgrade of Management Servers in High Availability configuration:
If the Primary management server was upgraded from R80 (with or without the Jumbo Hotfix
Accumulator) to R80.10, you must upgrade the Secondary management server in the same
way.
Important - To back up and restore a consistent environment, make sure to collect and
restore the backups and snapshots from all servers in the High Availability environment at the
same time.
• Before you upgrade a Multi-Domain Server, we recommend the steps below to optimize the
upgrade process:
Step Description
1 Delete all unused Threat Prevention Profiles on the Global Domain:
On R80.x Multi-Domain Server:
a) Connect with SmartConsole to the Global Domain.
b) From the left navigation panel, click Security Policies.
c) Open every policy.
d) In the top section, click Threat Prevention.
e) In the bottom section Threat Tools, click Profiles.
f) Delete all unused Threat Prevention Profiles.
g) Publish the session.
h) Close SmartConsole.
On R77.x Multi-Domain Server:
a) Connect with SmartDashboard to the Global Domain.
b) Go to Threat Prevention tab.
c) From the left tree, click Profiles.
d) Delete all unused Threat Prevention Profiles.
e) Save the changes (click File > Save).
f) Close SmartDashboard.
• Make sure you have valid licenses installed on all applicable Check Point computers - source
and target.
• Make sure you have a valid Service Contract that includes software upgrades and major
releases registered to your Check Point User Center account (on page 96).
The contract file is stored on the Management Server and downloaded to Check Point Security
Gateways during the upgrade process.
For more on Service Contracts, see sk33089
http://supportcontent.checkpoint.com/solutions?id=sk33089.
• Before you start an upgrade or migration procedure on your Management Servers, you must
close all GUI clients (SmartConsole applications) connected to your Check Point computers.
• Before you start an upgrade of your Security Gateway and Cluster Members, you must upgrade
the Management Server.
• On Smart-1 appliances with Multi-Domain Server or Multi-Domain Log Server installed, if you
configured an interface other than Mgmt as the Leading interface, the upgrade process or
clean install process (with CPUSE) configures the interface Mgmt to be the Leading interface.
To configure another interface as the Leading interface after the upgrade, see sk107336
http://supportcontent.checkpoint.com/solutions?id=sk107336.
Warning:
If you upgrade from R7x versions and have files in the $FWDIR/lib/ directory and/or the
$FWDIR/conf/ directory that you changed manually, the changes will be lost. Make sure you
save the customized INSPECT files on an external storage and understand how to replicate the
required changes.
Important - If you use the Mobile Access Software Blade and you edited the configurations,
review the edits before you upgrade to R80.10.
1. Open these files on the computer to upgrade and make note of custom changes:
$CVPNDIR/conf/cvpnd.C (Gateway configuration)
$CVPNDIR/conf/httpd.conf (Apache configuration)
$CVPNDIR/conf/includes/* (Apache configuration)
$CVPNDIR/var/ssl/ca-bundle/ (Local certificate authorities)
$CVPNDIR/conf/SmsPhones.lst (DynamicID - SMS OTP - Local Phone List)
/var/ace/sdconf.rec (RSA configuration)
All PHP files
All replaced image files (*.gif, *.jpg)
2. Upgrade to R80.10.
3. Update Mobile Access Endpoint Compliance:
a) In SmartConsole, from the left Navigation Toolbar, click Security Policies.
b) In the Shared Policies section, click Mobile Access > Open Mobile Access Policy in
SmartConsole.
c) In SmartConsole, click Mobile Access tab > expand Endpoint Security On Demand >
click Endpoint Compliance Updates > click Update Databases Now.
d) Close SmartConsole.
4. Manually edit the new versions of the files, to include your changes.
Do not overwrite the R80.10 files with your customized files!
Before an upgrade, a set of utilities search your installation for known upgrade issues. The output
of the utilities is saved to a log file and an HTML file, with these message types:
• Action items before the upgrade: Errors that you must repair before the upgrade (for
example, an invalid policy name), and warnings of issues for you to decide whether to fix before
upgrade. Some messages recommend that you run utilities to fix an issue. In most cases, you
must fix the issues manually.
• Action items after the upgrade: Errors and warnings, to be handled after the upgrade.
• Information messages: Items to be aware of. For example, an object type is not supported in
the upgraded version but is in your database and is converted during the upgrade.
When you open the Management Server Migration Tool package, you see these files:
Package Description
migrate Exports and imports the management database and applicable
Check Point configuration.
Note - This is required only when you upgrade from R77.30 (or lower) version to R80.10.
Upgrading Successfully
• When upgrading a Security Management Server, IPS profiles remain in effect on earlier
Gateways and can be managed from the IPS tab. When the gateway is upgraded, install the
policy to get the new IPS profile.
• When upgrading a Security Gateway, remember to change the gateway object in SmartConsole
to the new version.
If you encounter unforeseen obstacles during the upgrade process, consult the Support Center
http://supportcontent.checkpoint.com/solutions?id=sk111841 or contact your Reseller.
Important Information
1. When you upgrade the vSEC Controller to R80.10 the following files are overwritten with
default values:
• vSEC Controller v1
$VSECDIR/conf/vsec.conf
• vSEC Controller v2
$VSECDIR/conf/vsec.conf
$MDS_FWDIR/conf/tagger_db.C
Before you begin the upgrade, back up any files that you have changed.
2. A Multi-Domain Server that contains imported Data Center objects in the Global Domain is not
supported in the upgrade to R80.10. You must remove objects from the Global Domain before
you install the upgrade.
3. Before you perform the upgrade on the Management server, if you have a Cisco APIC server,
keep only one URL. After the upgrade, add the other URLs.
4. For upgrades from the vSEC Controller v1, manually connect again to each Data Center
Server. For those servers that communicate with HTTPS, in SmartConsole double-click the
Data Center object and trust the certificate again.
Note - During the upgrade, the vSEC Controller does not communicate with the Data Center.
Therefore, Data Center objects are not updated on the Security Management Server or the
Security Gateways.
Option Description
Download a If you have Internet access and a valid User Center
contract file from https://usercenter.checkpoint.com account, download a Contract File
the User Center directly from your User Center account:
Import a local If the Management Server does not have Internet access:
contract file
a) On a computer with Internet access, log in to your User Center
https://usercenter.checkpoint.com account.
b) In the top menu, click Assets/Info > Download Contract File and
follow the instructions on the screen.
c) Transfer the downloaded contract file to your Management Server.
d) Select Import a local contracts file.
e) Enter the full path to the location where you stored the contract file.
Continue without Select this option, if you intend to get and install a valid Contract File later.
contract Note that at this point your managed Security Gateways are not strictly
information eligible for an upgrade. You may be in violation of your Check Point
Licensing Agreement, as shown in the final message of the upgrade
process.
After you complete the upgrade of all secondary Multi-Domain Servers and the Multi-Domain Log
Servers, you must update the version of the Domain Management Server and the Domain Log
Server objects.
To update the version of the Domain Management Server and Domain Log Server
objects on the Multi-Domain Servers:
1. Connect to the command line on the Primary Multi-Domain Server, and make sure that all the
Domain Management Servers are up. Run:
# mdsstat
2. Make sure to disconnect all SmartConsoles.
3. Go to the main Multi-Domain Server context:
# mdsenv
4. On each Domain Management Server and Domain Log Server that you import, upgrade the
attributes of all managed objects:
# $MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL -n <Name of Domain
Management Server or Domain Log Server>
Note - Because the command prompts you for a 'yes/no' for each Domain and each object in
the Domain, you can explicitly provide the 'yes' answer to all questions with this command:
# yes | $MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL -n <Name of Domain
Management Server or Domain Log Server>
5. Open SmartConsole and make sure that the version for each of the upgraded objects is
R80.10.
This upgrade method is supported only when you upgrade from R7x versions.
We recommend to upgrade the entire Multi-Domain Server at once with one of these methods:
• Upgrading Multi-Domain Security Management with CPUSE (on page 101)
• Upgrading an R77.xx Multi-Domain Security Management with Migration (on page 102)
Because upgrade of the entire Multi-Domain Server at once is the default recommended method,
use the Gradual Migration of Domain Management Servers only in these cases:
• The entire Multi-Domain Server cannot be upgraded at once because of a business impact.
• During the upgrade, you need to rename some or all of the Domain Management Servers.
• In Multi-Domain Server High Availability deployment, you need to change the number of
Domain Management Servers on Multi-Domain Servers.
Notes:
In a gradual upgrade, you export each Domain Management Server one at a time from the source
Multi-Domain Server to a target Multi-Domain Server of the latest version.
The gradual upgrade does not keep all data.
Data that is not exported To get this data in the new environment
Multi-Domain Server administrators and Redefine and reassign to Domains after the upgrade.
management consoles
This command updates the database schema before it imports. First, the command runs
pre-upgrade verification. If no errors are found, migration continues. If there are errors, you
must change the source Domain Management Server according to instructions in the error
messages. Then do this procedure again.
7. Upgrade the attributes of all managed objects in each target Domain Management Server:
# mdsenv
# $MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL -n <Name of Domain
Management Server>
Note - Because the command prompts you for a 'yes/no' for each Domain and each object in
the Domain, you can explicitly provide the 'yes' answer to all questions with this command:
# yes | $MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL -n <Name of Domain
Management Server>
8. If the R80.10 server has a different IP address than the R77.xx server, establish trust with the
Security Gateways (on page 110).
9. If the R77.xx server managed VPN gateways, configure the keys (on page 111).
Important - To do a Domain Management Server migration on a Secondary Multi-Domain Server,
you must set the state of its Global Domain to Active.
Procedure:
1. Connect to the command line on the Secondary Multi-Domain Server.
2. Log in to Expert Mode.
3. Run this command before you perform the first migration on the Secondary Multi-Domain
Server:
# mdsenv && $CPDIR/bin/cpprod_util CPPROD_SetValue FW1 LastIpsUpdate 1
`date +%s` 1
4. Connect with SmartConsole to the Secondary Multi-Domain Server.
5. From the left Navigation Toolbar, click Multi Domain > Domains.
6. Right-click the global domain of the Secondary Multi-Domain Server and click Connect to
Domain.
A window shows for the global domain.
7. Click Menu > Management High Availability.
8. In the Management High Availability status window, select Actions > Set Active for the
Connected Domain.
Before migrating:
1. Make sure that the target Domain Management Server IP address can communicate with all
Gateways.
2. Add an object to represent the Domain Management Server (name and IP address) and define
it as a Secondary Security Management Server.
3. Install policy on all managed Gateways.
4. Delete all objects or access rules created in Steps 1 and 2.
5. If the Standalone computer already has Security Gateway installed:
• Clear the Firewall option in the Check Point Products section of the gateway object. You
may have to first remove it from the Install On column of your Rule Base (and then add it
again).
• If the gateway participates in a VPN community, remove it from the community and erase
its certificate. Note these changes, to undo them after the migration.
6. Save and close SmartConsole. Do not install policy.
15. From the Domain Management Server SmartConsole, edit the Security Gateway object, define
its topology, and establish trust between the Domain Management Server and the Security
Gateway.
16. Install the policy on the Security Gateway.
4. After running the command and before synchronizing the Standby domains, run:
mdsstop;mdsstart. See sk121718
http://supportcontent.checkpoint.com/solutions?id=sk121718.
5. Synchronize all Standby Domain Management Servers.
6. Install the database in SmartConsole for the applicable Domain Management Server.
Preliminary steps:
1. Enable the IPv6 support in Gaia (on page 44).
2. Assign an IPv6 address and default gateway to the Leading Interface (typically, eth0).
3. Assign an IPv6 address and default gateway to the management interfaces.
4. Write down the Multi-Domain Server IPv6 address, the host names and IPv6 addresses for all
Domain Management Servers.
This is necessary because the system restarts after you enable IPv6 support.
Important - Before you upgrade your Security Gateways, you must upgrade your Security
Management Server (on page 99) or Multi-Domain Server (on page 100). You can also upgrade
your High Availability system (on page 115).
You can upgrade all Security Gateways with CPUSE.
Best Practice - Before you upgrade, back up your configuration (on page 17).
6. If you are using CPUSE to upgrade the VSX Gateway / VSX Cluster Member, enter n and follow
these instructions:
a) In Gaia Clish, switch to the main VSX context:
set virtual-system 0
b) Import the upgrade file into the CPUSE repository:
installer import local <file_name>
c) Make sure that the file is in the repository:
show installer packages
d) Start the upgrade. Enter:
installer upgrade <package_number>
e) Press the Tab key to see the upgrade options.
f) From the list, select the file to install.
To upgrade Full High Availability for cluster members in Standalone configurations, there are
different options:
• Upgrade one machine and synchronize the second machine with minimal downtime.
• Upgrade with a clean installation on one machine and synchronize the second machine with
system downtime.
Note - If configuration customizations are lost during the upgrade, different issues can occur in
the upgraded cluster. Cluster members can stop detecting each other, cluster members can move
to undesired state, and traffic can be dropped.
For more information, see sk42096: Cluster member is stuck in 'Ready' state
http://supportcontent.checkpoint.com/solutions?id=sk42096.
Upgrade to version
Upgrade from
R76 R77 R77.10 R77.20 R77.30 R80.10
version
R77.30 x x x x x OSU
Notes:
• For supported upgrade paths, see the Release Notes for the version, to which you wish to
upgrade.
• "x" denotes that such upgrade path is not supported.
• "OSU" denotes Optimal Service Upgrade.
7. Move traffic to the new cluster member that is connected to the network. Do these steps:
a) Make sure the new cluster member is in Ready state. Run: cphaprob state
b) Connect the other new cluster member interfaces to the network.
c) On the new cluster member, run cphaosu start
d) On the old cluster member, run cphaosu stat
The network traffic statistics are shown.
e) When the old cluster member does not have many connections, run cphaosu finish
8. On the new cluster member, run cphaosu finish
9. Disconnect the old cluster member from the network.
10. Reconnect the other new cluster members to the network one at a time. Do these steps on
each cluster member:
a) Run cphastop
b) Connect the new cluster member to the network.
c) Run cphastart
d) In SmartConsole, change the version of the cluster object to R80.10 and install the Policy.
11. Upgrade the old cluster member and reconnect it to the network.
12. If the cluster has two members: In SmartConsole, change the version to R80.10.
13. Install the Access Control Policy.
To use the Optimal Service Upgrade to upgrade the VSX cluster members from
R67.10:
1. Install the Optimal Service Upgrade Hotfix on a cluster member. This is the old cluster
member with Hotfix.
For instructions and download links, refer to sk74300
http://supportcontent.checkpoint.com/solutions?id=sk74300.
2. Disconnect all old cluster members from the network, except for one cluster member.
Make sure that the management interfaces are not connected to the network.
3. On the old cluster member, configure kernel parameters:
• Upgrade to R77.30:
Run: cphaconf cluster_id get
If the cluster ID value is not as expected, run: cphaconf cluster_id set <value>
Make sure all cluster members have the same cluster ID. If a member has a different ID,
run this set command to configure the correct value.
• Upgrade to R77.20 and lower:
Make sure all cluster members use the same value for the fwha_mac_magic parameter.
Run: fw ctl get int fwha_mac_magic
The default value for the fwha_mac_magic parameter is 254. If your configuration uses a
different value, on each member, run: fw ctl set int fwha_mac_magic <value>
For more about the cluster_id and fwha_mac_magic parameters, see the
R80.10 ClusterXL Administration Guide
http://downloads.checkpoint.com/dc/download.htm?ID=54804
and sk25977 http://supportcontent.checkpoint.com/solutions?id=sk25977.
4. Install R80.10 on all the cluster members that are not connected to the network.
5. Prepare the old cluster member for synchronization of old connections with the upgraded
cluster member:
a) On the old cluster member, turn off fwaccel - run: fwaccel off -a
b) On the old cluster member, start the Optimal Serve Upgrade - run: cphaosu start
6. Reconnect the SYNC interface of one new cluster member to the network.
7. Move traffic to the new cluster member that is connected to the network. Do these steps:
a) Make sure the new cluster member is in ready state.
b) Connect the other new cluster member interfaces to the network.
c) On the new cluster member, run cphaosu start
d) On the old cluster member, run cphaosu stat
The network traffic statistics are shown.
e) When the old cluster member does not have many connections, run cphaosu finish
8. On the new cluster member, run cphaosu finish
9. Disconnect the old cluster member from the network.
10. Reconnect the other new cluster members to the network one at a time. Do these steps on
each cluster member:
a) Run cphastop
Installation and Upgrade Guide R80.10 | 144
Upgrading ClusterXL Deployments
Connectivity Upgrade
Before you run Connectivity Upgrade:
• Make sure that the cluster has two members, one Active and one Standby
• Read sk107042 ClusterXL upgrade methods and paths
http://supportcontent.checkpoint.com/solutions?id=sk107042
• Read sk101209 R77.20 Known Limitations
http://supportcontent.checkpoint.com/solutions?id=sk101209
• Read sk104860 R77.30 Known Limitations
http://supportcontent.checkpoint.com/solutions?id=sk104860
Check Point Connectivity Upgrade (CU) synchronizes existing connections to maintain connectivity
during cluster upgrades.
Connectivity Upgrade is supported during these upgrades:
R75.46 CU CU CU
R75.47 CU CU CU
R76 CU CU CU
R77 - CU CU
R77.10 - CU CU
R77.20 - CU CU
R77.30 - - CU
Notes -
• Software Blade information does not get synchronized. If a connection needs to be inspected
by a Software Blade, and this Software Blade is configured in SmartConsole to Prefer
Connectivity Over Security, then the connection is accepted without the inspection. Otherwise,
the connection is dropped.
• All member gateways must have the same number of CoreXL Firewall instances.
• All member gateways must run the same 32-bit or 64-bit kernel edition.
Upgrade to version
Upgrade from
R77.20 R77.20DR R77.30 R77.30DR R80.10
Version
R77.30DR x x x x CU + DR
R77.30 x x x x CU + DR
R77.20DR x x CU CU + DR CU + DR
R77.20 x x CU CU + DR CU + DR
R77.10 x x CU CU + DR CU + DR
R77 x x CU CU + DR CU + DR
R76 CU CU + DR CU CU + DR CU + DR
R75.47 CU CU + DR CU CU + DR CU + DR
R75.46 CU CU + DR CU CU + DR CU + DR
R75.40VS CU CU + DR CU CU + DR CU + DR
Notes:
• For supported upgrade paths, see the Release Notes for the version, to which you wish to
upgrade.
• For upgrade action plans, during which the Dynamic Routing information is synchronized, see
sk107042 http://supportcontent.checkpoint.com/solutions?id=sk107042.
• "R77.20DR" denotes R77.20 with Take 200 (or higher) of R77.20 Jumbo Hotfix Accumulator
(sk101975 http://supportcontent.checkpoint.com/solutions?id=sk101975).
• "R77.30DR" denotes R77.30 with Take 198 (or higher) of R77.30 Jumbo Hotfix Accumulator
(sk106162 http://supportcontent.checkpoint.com/solutions?id=sk106162).
• "x" denotes that such upgrade path is not supported.
• "CU" denotes Connectivity Upgrade, during which the Dynamic Routing information is not
synchronized.
• "CU with DR" denotes Connectivity Upgrade, during which the Dynamic Routing information is
synchronized.
• Notes for VRRP clusters on Gaia:
• Connectivity Upgrade without Dynamic Routing synchronization supports:
upgrades to R80.10, and above
upgrades to "R77.30DR"
upgrades to "R77.20DR"
• Connectivity Upgrade with Dynamic Routing synchronization supports only:
upgrades from R80.10 to next versions
upgrades from R77.30 to R80.10, and above
To make sure all cluster members are up and in VSX High Availability mode:
On each cluster member, run: cphaprob state
If the state of a cluster member is HA not started, run: cphastart
==============================================================================
Full Sync ended (Delta Sync is enabled)
For delayed connections (Templates) to be synchronized it is recommended to turn
off SecureXL
on the old member before doing a failover. Run: 'fwaccel off' on the old member
Please note: turning SecureXL off might slow down existing connections.
Installation and Upgrade Guide R80.10 | 153
Upgrading ClusterXL Deployments
==============================================================================
Connections table
=================
VS HOST NAME ID #VALS #PEAK #SLINKS
0 localhost connections 8158 30 103 34
2 localhost connections 8158 0 1 0
3 localhost connections 8158 1 2 2
==============================================================================
==
Full Sync ended (Delta Sync is enabled)
For delayed connections (Templates) to be synchronized it is recommended to turn
off SecureXL
on the old member before doing a failover. Run: 'fwaccel off' on the old member
Please note: turning SecureXL off might slow down existing connections.
==============================================================================
==
Connections table
=================
HOST NAME ID #VALS #PEAK #SLINKS
localhost connections 8158 34 38
37
==============================================================================
==
Full Sync ended (Delta Sync is enabled)
For delayed connections (Templates) to be synchronized it is recommended to turn
off SecureXL
on the old member before doing a failover. Run: 'fwaccel off' on the old member
Please note: turning SecureXL off might slow down existing connections.
==============================================================================
==
Connections table
=================
VS HOST NAME ID #VALS #PEAK #SLINKS
0 localhost connections 8158 28 103 30
2 localhost connections 8158 0 1 0
3 localhost connections 8158 1 2 2
cphacu stat
Description Shows the status of Connectivity Upgrade.
Syntax
cphacu stat
Example 1 - VSX High Availability
[Expert@HostName]# cphacu stat
Connection table
================
VS HOST NAME ID #VALS #PEAK #SLINKS
0 localhost connections 8158 16 56 16
1 localhost connections 8158 0 3 0
2 localhost connections 8158 0 0 0
3 localhost connections 8158 0 0 0
4 localhost connections 8158 0 0 0
5 localhost connections 8158 0 0 0
6 localhost connections 8158 0 1
Connection table
================
HOST NAME ID #VALS #PEAK #SLINKS
localhost connections 8158 16 56
Item Description
1 Switch with mirror port
2 Computers
3 Servers
Note - Make sure that one mirror port on the switch is connected to one interface on the Security
Gateway.
To enable Monitor Mode on the Security Gateway from the Gaia Portal:
1. From the navigation tree, click Network Management > Network Interfaces.
2. Select the interface and click Edit.
3. Click the Ethernet tab and check Monitor Mode.
4. Click OK.
To enable monitor mode on the Security Gateway from the Gaia Clish:
# set interface <interface name> monitor-mode on
DLP Yes No
IPsec VPN No No No
Mobile Access No No No
Notes:
1. Does not support the Anti-Virus in Traditional Mode.
2. HTTPS Inspection in Layer 2 works as Man-in-the-Middle, based on MAC addresses:
• Client sends a TCP [SYN] packet to the MAC address X.
• Security Gateway creates a TCP [SYN-ACK] packet and sends it to the MAC address X.
• Security Gateway in Bridge Mode does not need IP addresses, because CPAS takes the
routing and the MAC address from the original packet.
Note - To be able to perform certificate validation (CRL/OCSP download), Security Gateway
needs at least one interface to be assigned with an IP address. Probe bypass can have issues
with Bridge Mode. Therefore, we do not recommend Probe bypass in Bridge Mode
configuration.
3. Identity Awareness in Bridge Mode supports only the AD Query authentication.
For more information, see sk101371: Bridge Mode on Gaia OS and SecurePlatform OS
http://supportcontent.checkpoint.com/solutions?id=sk101371.
Item Description
1 Security Gateway that bridges Layer 2 traffic between the two network segments
2 and 3 Switches that connect the network segments to the Security Gateway in Bridge Mode
4 Network divided into two segments by the Security Gateway in Bridge Mode
Item Description
1 and 2 Switches
3 and 4 The slaves of the bridge interface (for example, eth1 and eth2)
Item Description
1, 2, 3, 4 Switches
5 and 6 The slaves of the bridge interface (for example, eth1 and eth2)
The workflow and detailed instructions are the same as in the Configuring ClusterXL in Bridge
Mode - Active/Active with Two Switches (on page 166).
See also: Link Aggregation with ClusterXL in Layer 2
http://supportcontent.checkpoint.com/documentation_download?ID=23341.
Step Description
1 Connect to the command line on the Security Gateway.
Step Description
3D Save the changes in the file.
Step Description
1 Connect to the command line on the Security Gateway.
Step Description
3D Save the changes in the file.
Step Description
1 Connect to the command line on the Security Gateway.
Step Description
4A Back up the current $FWDIR/boot/modules/fwkern.conf file:
# cp -v $FWDIR/boot/modules/fwkern.conf{,_BKP}
Important - If the file does not exist, create it:
# touch $FWDIR/boot/modules/fwkern.conf
You can configure the Link State Propagation in one of these modes:
Manual port pair You manually configure the assignment of bridged Line Card ports to
creation port pairs.
Note - You can configure up to four port pairs.
Important:
• In a cluster environment, you must configure all the Cluster Members in the same way.
• Link State Propagation does not support Bond interfaces.
Step Description
5 Add this line:
fw_link_state_propagation_enabled=1
8 Make sure the Security Gateway or Cluster Members loaded the new configuration:
# fw ctl get int fw_link_state_propagation_enabled
Step Description
8 Make sure the Security Gateway or Cluster Members loaded the new configuration:
# fw ctl get int fw_link_state_propagation_enabled
# fw ctl get int fw_manual_link_state_propagation_enabled
# fw ctl get str fw_lsp_pair1
# fw ctl get str fw_lsp_pair2
# fw ctl get str fw_lsp_pair3
# fw ctl get str fw_lsp_pair4
Command Description
$FWDIR/bin/control_bootsec {-r | -R} Disables the boot security
Step Description
1 Make sure to configure and install a Security Policy on the Security Gateway.
Step Description
7 Get the path of the Default Filter Policy file:
# $FWDIR/boot/fwboot bootconf get_def
Example:
[Expert@MyGW:0]# $FWDIR/boot/fwboot bootconf get_def
/etc/fw.boot/default.bin
[Expert@MyGW:0]#
8 Copy new complied Default Filter file to the path of the Default Filter Policy file.
• For IPv4 traffic, run:
# cp -v $FWDIR/state/default.bin /etc/fw.boot/default.bin
• For IPv6 traffic, run:
# cp -v $FWDIR/state/default.bin6 /etc/fw.boot/default.bin6
Step Description
1 Make sure to configure and install a Security Policy on the Security Gateway.
Step Description
6 Edit the new Default Filter Policy file to include the desired INSPECT code.
Important - Your customized Default Filter must not use these functions:
• Logging
• Authentication
• Encryption
• Content Security
7 Compile the new Default Filter file:
# fw defaultgen
• The new complied Default Filter file for IPv4 traffic is:
$FWDIR/state/default.bin
• The new complied Default Filter file for IPv6 traffic is:
$FWDIR/state/default.bin6
9 Copy new complied Default Filter file to the path of the Default Filter Policy file.
• For IPv4 traffic, run:
# cp -v $FWDIR/state/default.bin /etc/fw.boot/default.bin
• For IPv6 traffic, run:
# cp -v $FWDIR/state/default.bin6 /etc/fw.boot/default.bin6
Command Description
Step Description
1 The Security Gateway boots up.
2 The Security Gateway disables IP Forwarding and loads the Default Filter.
The Security Gateway enforces the Initial Policy until administrator installs a user-defined policy.
In subsequent boots, the Security Gateway loads the user-defined policy immediately after the
Default Filter.
There are different Initial Policies for Standalone and distributed setups:
• In a Standalone configuration, where the Security Management Server and the Security
Gateway are on the same computer, the Initial Policy allows CPMI management
communication only. This permits SmartConsole clients to connect to the Security
Management Server.
• In a distributed configuration, where the Security Management Server is on one computer and
the Security Gateway is on a different computer, the Initial Policy:
• Allows cpd and fwd daemons to communicate for SIC (to establish trust) and for Policy
installation.
• Does not allow CPMI connections through the Security Gateway. The SmartConsole will not
be able to connect to the Security Management Server, if the SmartConsole must access
the Security Management Server through a Security Gateway with the Initial Policy.
Monitoring Security
You can see that the Default Filter or the Initial Policy are loaded on a non-production Security
Gateway. Restart the computer before you install policy and run:
$FWDIR/bin/fw stat
If the output shows defaultfilter for the Default Filter status and InitialPolicy for the installed
policy, the computer is running on the default, pre-Firewall security.
Step Description
1 Connect to the Security Gateway over serial console.
Column Description
License Status The general state of the Software Blade licenses:
• OK - All the blade licenses are valid.
• Not Activated - Blade licenses are not installed. This is only possible in
the first 15 days after the establishment of the SIC with the Security
Management Server. After the initial 15 days, the absence of licenses
will result in the blade error message.
• Error with <number> blade(s) - The specified number of blade
licenses are not installed or not valid.
• Warning with <number> blade(s) - The specified number of blade
licenses have warnings.
• N/A - No available information.
CK Unique Certificate Key of the license instance.
Column Description
SKU Catalog ID from the Check Point User Center.
2 In the Summary tab below, click the object's License Status (for example: OK).
The Device & License Information window opens. It shows basic object information
and License Status, license Expiration Date, and important quota information (in the
Additional Info column) for each Software Blade.
Notes:
• Quota information, quota-dependent license statuses, and blade information messages
are only supported for R80.
• The tooltip of the SKU is the product name.
The possible values for the Software Blade License Status are:
Status Description
Active The Software Blade is active and the license is valid.
Available The Software Blade is not active, but the license is valid.
No License The Software Blade is active but the license is not valid.
About to Expire The Software Blade is active, but the license will expire in thirty days
(default) or less (7 days or less for an evaluation license).
Quota Exceeded The Software Blade is active, and the license is valid, but the quota of
related objects (gateways, files, virtual systems, and so on, depending on the
blade) is exceeded.
Quota Warning The Software Blade is active, and the license is valid, but the number of
objects of this blade is 90% (default) or more of the licensed quota.
The Gateways & Servers view in SmartConsole lets you see and export the License
Inventory report.
1. To see the License Inventory report from the Gateways & Servers view:
a) In SmartConsole, from the left Navigation Toolbar, click Gateways & Servers.
b) From the top toolbar, click Actions > License Report.
c) Wait for the SmartView to load and show this report.
By default, this report contains:
Inventory page: Blade Names, Devices Names, License Statuses
License by Device page: Devices Names, License statuses, CK, SKU, Account ID,
Support Level, Next Expiration Date
2. To export the License Inventory report from the Gateways & Servers view:
a) In the top right corner, click the Options button.
b) Select the applicable export option - Export to Excel, or Export to PDF.
The Logs & Monitor view in SmartConsole lets you see, filter and export the License
Status report.
1. To see the License Status report from the Logs & Monitor view:
a) In SmartConsole, from the left Navigation Toolbar, click Logs & Monitor
b) At the top, open a new tab by clicking New Tab, or [+].
c) In the left section, click Views.
d) In the list of reports, double-click License Status.
e) Wait for the SmartView to load and show this report.
By default, this report contains:
Names of the configured objects, License status for each object, CK, SKU, Account ID,
Support Level, Next Expiration Date
2. To filter the License Status report in the Logs & Monitor view:
a) In the top right corner, click the Options button > View Filter.
Installation and Upgrade Guide R80.10 | 187
Working with Licenses
The Logs & Monitor view in SmartConsole lets you see, filter and export the License
Inventory report.
1. To see the License Inventory report from the Logs & Monitor view:
a) In SmartConsole, from the left Navigation Toolbar, click Logs & Monitor
b) At the top, open a new tab by clicking New Tab, or [+].
c) In the left section, click Reports.
d) In the list of reports, double-click License Inventory.
e) Wait for the SmartView to load and show this report.
By default, this report contains:
Inventory page: Blade Names, Devices Names, License Statuses
License by Device page: Devices Names, License statuses, CK, SKU, Account ID,
Support Level, Next Expiration Date
2. To filter the License Inventory report in the Logs & Monitor view:
a) In the top right corner, click the Options button > Report Filter.
The Edit Report Filter window opens.
b) Select a Field to filter results. For example, Blade Name, Device Name, License
Overall Status, Account ID.
c) Select the logical operator - Equals, Not Equals, or Contains.
d) Select or enter a filter value.
Note - Click the X icon to delete a filter.
e) Optional: Click the + icon to configure additional filters.
f) Click OK to apply the configured filters.
The report is filtered based on the configured filters.
3. To export the License Inventory report in the Logs & Monitor view:
a) In the top right corner, click the Options button.
b) Select the applicable export option - Export to Excel, or Export to PDF.
To add a license:
Step Description
1 In the left navigation tree, click Maintenance > Licenses.
2 Click New.
The Add License window opens.
3 Enter the license data manually, or click Paste License to enter the data automatically.
The Paste License button only shows in Internet Explorer. For other web browsers, paste
the license strings into the empty text field.
4 Click OK.
To delete a license:
Step Description
1 In the left navigation tree, click Maintenance > Licenses.
3 Click Delete.
Using SmartUpdate
In This Section:
Accessing SmartUpdate .............................................................................................192
Licenses Stored in the Licenses & Contracts Repository ........................................193
Licensing Terms for SmartUpdate ............................................................................194
Managing Licenses Using SmartUpdate ...................................................................196
Attaching a License to a Security Gateway ...............................................................200
Detaching Licenses from a Security Gateway ...........................................................201
Upgrading with SmartUpdate for R77.30 and Below ................................................202
When Security Gateways are not connected to the Internet, you can add, delete, attach, and detach
your licenses in SmartUpdate.
When Security Gateways are connected to the Internet, they are able to get and update their
licenses and contracts without SmartUpdate.
SmartUpdate automatically distributes applications and updates for Check Point and OPSEC
Certified products and manages product licenses.
SmartUpdate provides a centralized way to guarantee that Internet security throughout the
enterprise network is always up to date.
These features and tools are available in SmartUpdate:
• Maintaining licenses
• Upgrading packages for R77.30 and below (on page 202)
• Adding packages to Package Repository for R77.30 and below (on page 204)
Important -
• The SmartUpdate GUI shows two tabs - Package Management and Licenses & Contracts.
• For versions R80.10 and above, the tools in the Package Management tab are no longer
supported.
• To install packages on Gaia OS, use CPUSE (see sk92449
http://supportcontent.checkpoint.com/solutions?id=sk92449), or Central Deployment Tool
(see sk111158 http://supportcontent.checkpoint.com/solutions?id=sk111158).
For further information, see Installing Packages on R80.10 and above (on page 74).
Accessing SmartUpdate
Step Description
1 Open the SmartUpdate in one of these ways:
• In SmartConsole, in the top left corner, click Menu > Manage licenses & packages.
• On the SmartConsole client, run this executable file directly:
• On Windows OS 32-bit:
C:\Program
Files\CheckPoint\SmartConsole\<RXX>\PROGRAM\SmartDistributor.
exe
• On Windows OS 64-bit:
C:\Program Files
(x86)\CheckPoint\SmartConsole\<RXX>\PROGRAM\SmartDistributor.
exe
2 In the top left corner, click Menu > View > Menu Bar.
The menu names appear at the top of the GUI.
• Central License
Attach a Central License to the IP address of your Management Server.
• Local License
A Local License is tied to the IP address of the specific Security Gateway. You can only use a
local license with a Security Gateway or a Security Management Server with the same address.
• Multi-License File
This is a license files that contains more than one license.
The cplic put, and cplic add commands support these files.
• Certificate Key
This is a string of 12 alphanumeric characters. The number is unique to each package.
• Features
This is a character string that identifies the features of a package.
• cplic
A CLI utility to manage local licenses on Check Point computers.
To delete a license:
1. Right-click anywhere in the Licenses & Contracts Repository and select View
Unattached Licenses.
2. Select the unattached licenses that you want to delete, and click Delete.
Upgrading a License
SmartUpdate can upgrade licenses that are in the Licenses & Contracts Repository.
SmartUpdate attempts to upgrade them with the use of the Upgrade tool.
To detach a license:
• From SmartConsole, select Licenses & Contract. Right-click and select Detach, and select
the licenses to detach.
To uninstall a package:
From the SmartUpdate Menu, select Packages > Uninstall.
Note - Uninstallation restores the gateway to the last management version distributed.
Download Center
Select Packages > New Package > Add from Download Center.
1. Accept the Software Subscription Download Agreement.
2. Enter your user credentials.
3. Select the packages to be downloaded. Use the Ctrl and Shift keys to select multiple files.
You can also use the Filter to show just the packages you need.
4. Click Download to add the packages to the Package Repository.
User Center
Use this procedure for adding OPSEC packages and Hotfixes to the Package Repository.
1. Open a browser to the Check Point Support Center http://supportcenter.checkpoint.com.
2. Select the package you want to upgrade.
3. Enter your user credentials.
4. Accept the Software Subscription Download Agreement.
5. Choose the appropriate platform and package, and save the download to the local disk.
6. Select Packages > New Package > Import File.
7. In the Add Package window, navigate to the desired .tgz file and click Open to add the
packages to the Package Repository.
Generating CPInfo
CPInfo is a support tool that gathers into one text file a wide range of data concerning the Check
Point packages in your system. When speaking with a Check Point Technical Support Engineer,
you may be asked to run CPInfo and transmit the data to the Support Center. Download the tool
from the Support Center http://supportcontent.checkpoint.com/solutions?id=sk30567.
To launch CPInfo, select Tools > Generate CPInfo.
1. Choose the directory to which you want to save the output file.
2. Choose between two methods to name the file:
• based on the SR number the technician assigns you, or
• a custom name that you define.
3. Optionally, you may choose to add:
• log files to the CPInfo output.
• the registry to the CPInfo output.
For more information about the CPInfo Utility, see sk92739
http://supportcontent.checkpoint.com/solutions?id=sk92739.
Automatic Downloads
Check Point products connect to Check Point cloud services to download and upload information.
You can enable or disable Automatic Downloads in the Gaia First Time Configuration Wizard, on
the Products page. We recommend that you enable Automatic Downloads, so that you can use
these features:
• Blade Contracts are annual licenses for Software Blades and product features. If there is no
valid Blade contract, the applicable blades and related features will work, but with some
limitations.
• CPUSE lets you manage upgrades and installations on Gaia OS. See sk92449
http://supportcontent.checkpoint.com/solutions?id=sk92449.
• Data updates and Cloud Services are necessary for the full functionality of these Software
Blades and features:
• Application & URL Filtering • Threat Prevention (Anti-Bot, • HTTPS Inspection
• Application Database Anti-Virus, Anti-Spam, IPS, Threat • Compliance
Emulation)
• URL Filtering database • SmartEndpoint
• AppWiki • ThreatWiki
Step Description
1 In the top left corner, click Menu > Global properties > Security Management
Access.
3 Click OK.
CLI Commands
In This Section:
cpconfig .......................................................................................................................210
cplic .............................................................................................................................212
cppkg ...........................................................................................................................227
cprid .............................................................................................................................230
cprinstall .....................................................................................................................231
control_bootsec ..........................................................................................................243
fwboot bootconf ..........................................................................................................244
comp_init_policy .........................................................................................................245
cpstop -fwflag default and cpstop -fwflag proc ........................................................246
All management operations can be executed via the command line. There are three main
commands:
• cppkg to work with the Packages Repository.
• cprinstall to perform remote installations of packages.
• cplic for license management.
cpconfig
Description
This command starts the Check Point Configuration Tool. This tool lets you configure specific
settings for the installed Check Point products
The options shown depend on the configuration and installed products:
Automatic start of Check Point Products Shows and controls which of the installed
Check Point products start automatically during
boot.
Syntax
cpconfig
Configuration Options:
----------------------
(1) Licenses and contracts
(2) Administrator
(3) GUI Clients
(4) SNMP Extension
(5) Random Pool
(6) Certificate Authority
(7) Certificate's Fingerprint
(8) Automatic start of Check Point Products
(9) Exit
cplic
The cplic command lets you manage Check Point licenses. The cplic command can be run in
Gaia Clish or in Expert Mode.
Best Practice - Manage licenses in the SmartUpdate GUI.
License Management is divided into three types of commands:
• Local licensing commands are executed on the Check Point computers.
• Remote licensing commands are executed on the Security Management Server, and affect the
managed Security Gateways.
• License Repository commands are executed on the Security Management Server, and affect
the licenses stored in the local license repository.
For more about managing licenses, see the R80.10 Security Management Administration Guide
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_SecurityManage
ment_AdminGuide/html_frameset.htm.
cplic check
Description
Confirms that the license includes the feature on the local Security Gateway or Security
Management Server.
Syntax
cplic check [-p <Product>] [-v <Version>] [-c | -count] [-t <Date>] [-r | -routers]
[-S | -SRusers] <Feature>
Parameters
Parameter Description
cplic db_add
Description
Adds one or more licenses to the license repository on the Security Management Server.
When local licenses are added to the license repository, they are automatically attached to the
intended Check Point Security Gateway. Central licenses have to undergo the attachment process.
This command is a license repository command and can only be executed on the Security
Management Server.
Syntax
cplic db_add -l <License File> [<Host>] [<Expiration Date>] [<Signature>]
[<SKU/Features>]
Parameters
Parameter Description
<SKU/Features> The SKU of the license summarizes the features included in the license.
For example, CPSUITE-EVAL-3DES-vNG
Example
If the file 192.0.2.11.lic contains one or more licenses, the command cplic db_add -l
192.0.2.11.lic produces output similar to:
gaia> cplic db_add -l 192.0.2.11.lic
Adding license to database ...
Operation Done
cplic db_print
Description
Displays the details of Check Point licenses stored in the license repository on the Security
Management Server.
Syntax
cplic db_print <Object Name | -all> [-n | -noheader] [-x] [-t | -type] [-a |
-attached]
Parameters
Parameter Description
Note - This command is a license repository command and can only run on the Security
Management Server.
cplic db_rm
Description
Removes a license from the license repository on the Security Management Server. It can be
executed ONLY after the license was detached using the cplic del command. Once the license
is removed from the repository, it can no longer be used.
Syntax
cplic db_rm <Signature>
Parameters
Parameter Description
Example
gaia> cplic db_rm 2f540abb-d3bcb001-7e54513e-kfyigpwn
Note - This command is a license repository command and can only run on the Security
Management Server.
cplic del
Description
Deletes a single Check Point license on a host, including unwanted evaluation, expired, and other
licenses. Used for both local and remote machines
Syntax
cplic del [-F <Output File>] <Signature> <Object Name>
Parameters
Parameter Description
-F <Output File> Sends the output to <output file> instead of the screen.
<Object Name> The name of the Check Point Security Gateway object as defined in
SmartConsole.
Syntax
cplic del <Object Name> [-F <Output File>] [-ip <Dynamic IP Address>] <Signature>
Parameters
Parameter Description
<Object Name> The name of the Check Point Security Gateway object as defined in
SmartConsole.
-F <Output File> Diverts the output to outputfile rather than to the screen.
-ip <Dynamic IP Deletes the license on the Check Point Security Gateway with the
Address> specified IP address. Use this parameter to delete a license on a DAIP
Check Point Security Gateway.
Note - If this parameter is used, then object name must be a DAIP
Security Gateway.
Note - This is a Remote Licensing command, which affects remote managed machines. It is
executed on the Security Management Server.
cplic get
Description
Retrieves all licenses from Security Gateways into the license repository on the Security
Management Server. This command helps to synchronize the repository with the Check Point
Security Gateways. When the command is run, all local changes are updated.
Syntax
cplic get {<IP Address> | <Host Name> | -all} [-v41]
Parameters
Parameter Description
<IP Address> The IP address of the Check Point Security Gateway, from which licenses are to
be retrieved.
<Host Name> The name of the Check Point Security Gateway object as defined in
SmartConsole, from which licenses are to be retrieved.
-all Retrieves licenses from all Check Point Security Gateways in the managed
network.
-v41 Retrieves version 4.1 licenses from the NF Check Point Security Gateway. Used
to upgrade version 4.1 licenses.
Example
If the Check Point Security Gateway with the object name caruso contains four Local licenses,
and the license repository contains two other Local licenses, the command cplic get caruso
produces output similar to this:
gaia> cplic get caruso
Get retrieved 4 licenses.
Get removed 2 licenses.
Note - This is a Remote Licensing Command, which affects remote machines. It is executed on the
Security Management Server.
cplic put
Description
Installs one or more local licenses on a local machine.
Syntax
cplic put [-o|-overwrite] [-c|-check-only] [-s|-select] [-F <Output File>]
[-P|-Pre-boot] [-k|-kernel-only] -l <License File> [<Host>] [<Expiration Date>]
[<Signature>] [<SKU/Features>]
Parameters
Parameter Description
-o | -overwrite On a Security Management Server, this erases all existing licenses and
replaces them with the new licenses.
On a Check Point Security Gateway, this erases only the local licenses,
but not central licenses that are installed remotely.
-c | -check-only Verifies the license. Checks if the IP of the license matches the machine
and if the signature is valid.
-s | -select Selects only the local license whose IP address matches the IP address
of the machine.
-F <Output File> Outputs the result of the command to the designated file rather than to
the screen.
-P | -Pre-boot Use this option after you have upgraded and before you reboot the
machine. Use of this option will prevent certain error messages.
<SKU/Features> The SKU of the license summarizes the features included in the license.
For example: CPSUITE-EVAL-3DES-vNG
Copy and paste the parameters from the license received from the User Center:
Parameter Description
host One of these:
• All platforms - The IP address of the external interface (in dot
notation). The last part cannot be 0 or 255.
• Solaris2 - The response to the hostid command (beginning with
0x).
expiration date The license expiration date. It can be never.
SKU/features A string listing the SKU and the Certificate Key of the license. The SKU
of the license summarizes the features included in the license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
Example
gaia> cplic put -l License.lic
Host Expiration SKU
192.168.2.3 14Jan2016 CPSB-SWB CPSB-ADNC-M CK0123456789ab
gaia>
Syntax
cplic put <Object Name> [-ip Dynamic IP] [-F <Output File>] -l <License File>
[<Host>] [<Expiration Date>] [<Signature>] [<SKU/Feature>]
Parameters
Parameter Description
<Object Name> The name of the Check Point Security Gateway object, as defined in
SmartConsole.
-ip <Dynamic IP> Installs the license on the Check Point Security Gateway with the specified
IP address. This parameter is used for installing a license on a DAIP
Check Point Security Gateway.
Note - If this parameter is used, then the object name must be a DAIP
Check Point Security Gateway.
-F <Output File> Diverts the output to <outputfile> rather than to the screen.
<SKU/Features> The SKU of the license summarizes the features included in the license.
For example: CPSUITE-EVAL-3DES-vNG
Note - This is a remote licensing command, which affects remote machines. It is executed on the
Security Management Server. More than one license can be attached.
Copy and paste the parameters from the license received from the User Center:
Parameter Description
host One of these:
• All platforms - The IP address of the external interface (in dot
notation). The last part cannot be 0 or 255.
• Solaris2 - The response to the hostid command (beginning with
0x).
expiration date The license expiration date. It can be never.
SKU/features A string listing the SKU and the Certificate Key of the license. The SKU
of the license summarizes the features included in the license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
cplic print
Description
The cplic print command prints details of Check Point licenses on the local machine.
Syntax
cplic print [-n|-noheader][-x][-t|-type][-F <Output File>] [-p|-preatures]
Parameters
Parameter Description
Note - On a Check Point Security Gateway, this command prints all licenses that are installed on
the local machine, both local and central licenses.
cplic upgrade
Description
Upgrades licenses in the license repository with licenses in a license file from the user center.
Syntax
cplic upgrade –l <Input File>
Parameters
Parameter Description
–l <Input File> Upgrades the licenses in the license repository and Check Point Security
Gateways to match the licenses in <Input File>.
Example
This example explains the procedure to upgrade the licenses in the license repository. There are
two Software Blade licenses in the file. One does not match any license on a remote Security
Gateway, the other matches a version NGX license on a Security Gateway that has to be upgraded.
• Upgrade the Security Management Server to the latest version.
Ensure that there is connectivity between the Security Management Server and the Security
Gateways with the previous product versions.
• Import all licenses into the license repository. This can also be done after upgrading the
products on the remote Security Gateways.
• Run this command:
cplic get -all
Example:
[Expert@MyMGMT]# cplic get -all
Getting licenses from all modules ...
MyGW:
Retrieved 1 licenses
Example:
[Expert@MyMGMT]# cplic db_print -all -a
Retrieving license information from database ...
• In the User Center https://usercenter.checkpoint.com, view the licenses for the products that
were upgraded from version NGX to a Software Blades license. You can also create new
upgraded licenses.
• Download a file containing the upgraded licenses. Only download licenses for the products that
were upgraded from version NGX to Software Blades.
• If you did not import the version NGX licenses into the repository, import the version NGX
licenses now. Use the command cplic get -all
• Run the license upgrade command: cplic upgrade –l <inputfile>
• The licenses in the downloaded license file and in the license repository are compared.
• If the certificate keys and features match, the old licenses in the repository and in the
remote Security Gateways are updated with the new licenses.
• A report of the results of the license upgrade is printed.
Note - This is a remote licensing command, which affects remote Security Gateways. It is
executed on the Security Management Server.
For more about managing licenses, see the R80.10 Security Management Administration Guide
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_SecurityManage
ment_AdminGuide/html_frameset.htm.
cppkg
Description Manages the product repository. It is always executed on the Security Management
Server.
Important - This command is not supported for gateways running on Gaia OS.
cppkg add
Description Adds a product package to the product repository. You can only add SmartUpdate
packages to the product repository.
Add products to the repository by importing a file downloaded from the Download Center. Add the
package file to the repository directly from a DVD or from a local or network drive.
Syntax:
> cppkg add {<package-full-path>|<CD drive> [product]}
Parameter Description
package-full-pat If the package you want to add to the repository is on a local disk or
h network drive, type the full path to the package.
Note - cppkg add does not overwrite existing packages. To overwrite existing packages, you
must first delete existing packages.
Example:
[d:\winnt\fw1\ng\bin]cppkg add l:\CPsuite-R80.10\
Enter package name:
----------------------
(1) SVNfoundation
(2) firewall
(3) floodgate
(4) rtm
(e) Exit
Enter your choice : 1
Enter package OS :
----------------------
(1) win32
(2) linux
(3) ipso
(e) Exit
Enter your choice : 1
You choose to add 'SVNfoundation' for 'win32' OS. Is this correct? [y/n] : y
cppkg delete
Description Deletes a product package from the repository. To delete a product package you
must specify a number of options. To see the format of the options and to view the contents of the
product repository, use the cppkg print command.
Syntax:
> cppkg delete <vendor> <product> <version> <os> [sp]
Parameter Description
cppkg get
Description Synchronizes the Package Repository database with the content of the actual
package repository under $SUROOT
Syntax:
> cppkg get
cppkg getroot
Description Finds the location of the product repository. The default product repository location
on Windows machines is C:\SUroot. On UNIX machines it is /var/SUroot.
Syntax:
> cppkg getroot
Example:
> cppkg getroot
Current repository root is set to : /var/suroot/
cppkg print
Description Lists the contents of the product repository.
Use cppkg print to see the product and OS strings required to install a product package
using the cprinstall command, or to delete a package using the cppkg delete
command.
Syntax:
> cppkg print
cppkg setroot
Description Creates a new repository root directory location and moves existing product
packages into the new repository.
The default product repository location is created when the Security Management Server is
installed. On Windows machines the default location is C:\SUroot and on UNIX machines it is
/var/SUroot. Use this command to change the default location.
When changing repository root directory:
• The content of the old repository is copied into the new repository.
• The $SUROOT environment variable gets the value of the new root path.
• A product package in the new location is overwritten by a package in the old location, if the
packages are the same (they have the same ID strings).
The repository root directory should have at least 200 Mbyte of free disk space.
Syntax:
> cppkg setroot <repository>
Parameter Description
<repository> The full path for the desired location for the
product repository.
Note - It is important to reboot the Security Management Server after using this command. This
sets the new $SUROOT environment variable.
Example:
cppkg setroot /var/new_suroot
Repository root is set to : /var/new_suroot/
cprid
cpridrestart
Description Stops and starts the Check Point Remote Installation Daemon cprid. This is the
daemon that is used for remote upgrade and installation of products. In Windows it is a service.
cpridstart
Description Starts the Check Point Remote Installation Daemon (cprid). This is the service
that allows for the remote upgrade and installation of products. In Windows it is a service.
Syntax:
> cpridstart
cpridstop
Description Stops the Check Point Remote Installation Daemon cprid. This is the service
that allows for the remote upgrade and installation of products. In Windows it is a service.
Syntax:
> cpridstop
cprinstall
Description Use cprinstall commands to perform remote installation of product
packages and associated operations.
Important - This command is not supported for gateways running on Gaia OS.
On the Security Management Server, cprinstall commands require licenses for
SmartUpdate.
On the remote Check Point gateways the following are required:
• Trust must be established between the Security Management Server and the Check Point
gateway.
• cpd must run.
• cprid remote installation daemon must run.
cprinstall boot
Description Boot the remote computer.
Syntax:
> cprinstall boot <object name>
Parameter Description
<object name> Object name of the Check Point Security Gateway defined in SmartConsole.
Example:
> cprinstall boot harlin
cprinstall cpstart
Description Enables cpstart to be run remotely.
All products on the Check Point Security Gateway must be of the same version.
Syntax:
> cprinstall cpstart <object name>
Parameter Description
<Object name> Object name of the Check Point Security Gateway defined in SmartConsole.
cprinstall cpstop
Description Enables cpstop to be run remotely.
All products on the Check Point Security Gateway must be the same version.
Syntax:
> cprinstall cpstop {-proc|-nopolicy} <object name>
Parameter Description
-proc Kills Check Point daemons and security servers while it maintains the active
Security Policy running in the kernel. Rules with generic allow/reject/drop
rules, based on services continue to work.
-nopolicy
Object name Object name of the Check Point Security Gateway defined in SmartConsole.
cprinstall get
Description Gets details of the products and the operating system installed on the specified
Check Point Security Gateway. It also updates the database.
Syntax:
> cprinstall get <object name>
Parameter Description
<object name> The name of the Check Point Security Gateway object defined in
SmartConsole.
Example:
cprinstall get gw1
Checking cprid connection...
Verified
Operation completed successfully
Updating machine information...
Update successfully completed
'Get Gateway Data' completed successfully
Operating system Major Version Minor Version
------------------------------------------------------------------------
SecurePlatform R75.20 R75.20
cprinstall install
Description Installs Check Point products on remote Check Point Security Gateways.
To install a product package you must specify a number of options. Use the cppkg print
command and copy the required options.
Syntax:
> cprinstall install [-boot] <Object name> <vendor> <product> <version> [sp]
Parameter Description
Object name Object name of the Check Point Security Gateway defined in SmartConsole.
Note - Before transferring any files, this command runs the cprinstall verify command
to verify that the operating system is appropriate and that the product is compatible with
previously installed products.
Example:
# cprinstall install -boot fred checkpoint firewall R70
cprinstall uninstall
Description Uninstalls products on remote Check Point Security Gateways.
To uninstall a product package you must specify a number of options. Use the cppkg print
command and copy the required options.
Syntax:
> cprinstall uninstall [-boot] <Object name> <vendor> <product> <version> [sp]
Parameter Description
Object name Object name of the Check Point Security Gateway defined in SmartConsole.
Note - Before uninstalling any files, this command runs the cprinstall verify command.
It verifies that the operating system is appropriate and that the product is installed.
After uninstalling, retrieve the Check Point Security Gateway data by running cprinstall get
Example
# cprinstall uninstall fred checkpoint firewall R75.20
cprinstall verify
Description Confirms these operations were successful:
• If a specific product can be installed on the remote Check Point Security Gateway.
• That the operating system and currently installed products are appropriate for the package.
• That there is enough disk space to install the product.
• That there is a CPRID connection.
Syntax:
> cprinstall verify <Object name> <vendor> <product> <version> [sp]
Parameter Description
Object name Object name of the Check Point Security Gateway defined in SmartConsole.
Example:
Successful - Verify succeeds
cprinstall verify harlin checkpoint SVNfoundation R75.20
cprinstall snapshot
Description Creates a snapshot <filename> on the Check Point Security Gateway.
Syntax:
> cprinstall snapshot <object name> <filename>
Parameter Description
Object name Object name of the Check Point Security Gateway defined in SmartConsole.
cprinstall show
Description Displays all snapshot (backup) files on the Check Point Security Gateway.
Syntax:
> cprinstall show <object name>
Parameter Description
Object name Object name of the Check Point Security Gateway defined in SmartConsole.
Example:
# cprinstall show GW1
SU_backup.tzg
cprinstall revert
Description Restores the Check Point Security Gateway from a snapshot.
Syntax:
> cprinstall revert <object name> <filename>
Parameter Description
<object name> Object name of the Check Point Security Gateway defined in SmartConsole.
cprinstall transfer
Description Transfers a package from the repository to a Check Point Security Gateway without
installing the package.
Syntax:
> cprinstall transfer <object name> <vendor> <product> <version> [sp]
Parameter Description
Object name Object name of the Check Point Security Gateway defined in SmartConsole.
control_bootsec
Enables or disables Boot Security. The command affects both the Default Filter and the Initial
Policy.
$FWDIR/bin/control_bootsec [-r] [-g]
Options Description
-r Removes boot security
fwboot bootconf
Configure boot security options. This command is in $FWDIR/boot.
$FWDIR/bin/fwboot bootconf <command> [value]
Get_def none Returns the full path to the Default Filter that will be used on boot.
Set_def <filename> Loads the file as the Default Filter in the next boot. The only safe and
recommended directory is $FWDIR/boot. (The default.bin
filename is a default name.)
Note - Do NOT move these files.
comp_init_policy
Use the comp_init_policy command to generate and load, or to remove, the Initial Policy.
This command generates the Initial Policy. It ensures that it will be loaded when the computer is
booted, or any other time that a Policy is fetched, for example, at cpstart, or with the fw fetch
localhost command. After running this command, cpconfig adds an Initial Policy if there is no
previous Policy installed.
$FWDIR/bin/comp_init_policy [-u | -g]
Options Description
-u Removes the Initial Policy, and makes sure that it will not be generated in the future
when cpconfig is run.
-g Generates the Initial Policy and makes sure that it is loaded the next time a policy is
fetched (cpstart, reboot, fw fetchlocalhost). After running this command,
cpconfig adds an Initial Policy when needed.
The comp_init_policy -g command will only work if there is no previous policy. If there is a policy,
make sure that after removing the policy, you delete the folder $FWDIR/state/local/FW1/. The
$FWDIR/state/local/FW1/ folder contains the policy that will be fetched when fw fetch localhost is
run.
The fw fetch localhost command is the command that installs the local policy. cpstart.
comp_init_policy creates the initial policy, but has a safeguard so that the initial policy will not
overwrite a regular user policy (since initial policy is only used for fresh installations or upgrade).
For this reason, you must delete the $FWDIR/state/local/FW1/ directory if there is a previous
policy, otherwise comp_init_policy will detect that the existing user policy and will not overwrite it.
If you do not delete the previous policy, the original policy will be loaded.
Options Description
-default Kills firewall processes (such as fwd, fwm, vpnd, snmpd). Logs, kernel traps,
resources, and security server connections stop.
The security policy in the kernel is replaced with the Default Filter.
-proc Kills firewall processes. Logs, kernel traps, resources, and security server
connections stop.
The security policy remains loaded in the kernel. Allow, reject, and drop rules
that do not use resources, only services, continue to work.