60000/40000 SECURITY Platforms R76SP.50: Upgrade Guide
60000/40000 SECURITY Platforms R76SP.50: Upgrade Guide
60000/40000 SECURITY
PLATFORMS
R76SP.50
Upgrade Guide
Classification: [Protected]
CHAPTE R 1
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
mailto:[email protected]?subject=Feedback on 60000/40000
Security Platforms R76SP.50 Upgrade Guide.
Revision History
Date Description
28 May 2020 Updated:
Upgrading the N+1 Chassis CMM Firmware (on page 36)
Upgrading the N+N Chassis CMM Firmware (on page 42)
27 July 2019 Updated:
Upgrading the N+1 Chassis CMM Firmware (on page 36)
Upgrading the N+N Chassis CMM Firmware (on page 42)
27 May 2019 Improved:
Formatting and layout
19 February 2018 Updated:
Multiple Security Groups (on page 26)
Upgrading the N+1 Chassis CMM Firmware (on page 36)
18 February 2018 Improved:
Formatting and layout
Added:
Multiple Security Groups (on page 26)
29 April 2018 General updates.
22 January 2018 Updated:
Upgrading the N+N Chassis CMM Firmware (on page 42)
16 October 2017 Updated:
Upgrading the N+1 Chassis CMM Firmware (on page 36)
Upgrading the N+N Chassis CMM Firmware (on page 42)
01 October 2017 Updated:
Upgrading the N+1 Chassis CMM Firmware (on page 36)
12 July 2017 Added:
Upgrading SSM160 to SSM440 (on page 46)
21 June 2017 Added:
Uninstalling a Hotfix on SGMs (on page 34)
23 April 2017 First release of this document
Contents
Important Information................................................................................................... 3
Introduction ................................................................................................................... 6
Syntax Notation ......................................................................................................... 6
R76SP.50 Upgrade Overview ..................................................................................... 6
Upgrading from Major Releases ................................................................................... 7
Preliminary Steps ..................................................................................................... 7
Upgrading Chassis B ................................................................................................. 8
Failing Over to Chassis B .......................................................................................... 9
Upgrading Chassis A ............................................................................................... 10
Failing Over to Chassis A......................................................................................... 11
Completing the Upgrade ......................................................................................... 11
Upgrading from a Minor Release ................................................................................ 12
Upgrading a Dual-Chassis System from a Minor Release ...................................... 12
Preliminary Steps ..........................................................................................................13
Upgrading Chassis B .....................................................................................................13
Failing Over to Chassis B ...............................................................................................14
Upgrading Chassis A......................................................................................................14
Failing Over to Chassis A ...............................................................................................15
Completing the Upgrade ................................................................................................15
Upgrading a Single Chassis System from a Minor Release .................................... 16
Preliminary Steps ..........................................................................................................16
Upgrading SGMs in Group B ..........................................................................................17
Failing Over to SGMs in Group B ....................................................................................17
Upgrading SGMs in Group A...........................................................................................18
Completing the Upgrade ................................................................................................19
Installing a Jumbo Hotfix Accumulator ....................................................................... 20
Installation on a Dual-Chassis System.................................................................... 20
Preliminary Steps ..........................................................................................................20
Installing the Jumbo Hotfix Accumulator on Chassis B .................................................21
Failing Over to Chassis B ...............................................................................................21
Installing the Jumbo Hotfix Accumulator on Chassis A .................................................22
Failing Over to Chassis A ...............................................................................................23
Completing the Installation ...........................................................................................23
Installing a Jumbo Hotfix Accumulator on a Single Chassis System ...................... 24
Multiple Security Groups............................................................................................. 25
Description .............................................................................................................. 25
Preliminary Steps ................................................................................................... 26
Upgrading Chassis B ............................................................................................... 27
Failing Over to Chassis B ........................................................................................ 28
Upgrading Chassis A ............................................................................................... 28
Failing Over to Chassis A......................................................................................... 30
Verification .............................................................................................................. 30
Enabling Multiple Security Groups.......................................................................... 30
Installing and Uninstalling a Hotfix on SGMs .............................................................. 31
Installing a Hotfix on SGMs ..................................................................................... 31
Uninstalling a Hotfix on SGMs ................................................................................. 33
Upgrading Hardware Components .............................................................................. 35
Upgrading the CMM Firmware on N+1 Chassis....................................................... 35
Procedure 1 - With Physical Access to the Chassis .......................................................36
Procedure 2 - No Physical Access to the Chassis ..........................................................38
Upgrading the CMM Firmware on N+N Chassis ...................................................... 41
Procedure 1 - With Physical Access to the Chassis .......................................................41
Procedure 2 - No Physical Access to the Chassis ..........................................................43
Upgrading SSM160 to SSM440 ................................................................................ 45
Upgrading SSM Firmware ....................................................................................... 46
CHAPTE R 2
Introduction
In This Section:
Syntax Notation ...............................................................................................................6
R76SP.50 Upgrade Overview ..........................................................................................6
Introducing the Check Point Scalable Platform, the world's fastest Threat Prevention platforms.
The carrier-class next generation Threat Prevention and Firewall solutions, provide the security
you need today and into the future.
Already supporting fast networking connectivity such as 40 GbE and 100 GbE, the 64000 and 44000
can be integrated with new and advanced solutions, both on premises or in the cloud.
These scalable platforms enable you to continue to grow your business, so when traffic volume or
security requirements increase, you can easily scale up the system capacity.
Welcome to the future of Cyber Security!
Syntax Notation
This table shows the syntax characters.
Use these procedures to upgrade a Dual-Chassis system from R75.0x, R75.40VS, and R76SP.10 to
R76SP.50. One Chassis is always Active during the upgrade, except for a brief period during a
manual failover.
Preliminary Steps
Step Operation Command
1 Make sure that your Security Management # fwm ver
Servers are version R76 or higher.
If not, upgrade your Security Management
Servers.
2 Back up your Scalable Platform.
2a Create a snapshot of one SGM. > set global-mode 0
> add snapshot pre_upgrade
2b Make sure that the snapshot was created > show snapshots
successfully.
2c Export the snapshot. > set snapshot export pre_upgrade
path /var/log/
> show snapshots
> set global-mode 1
2d Copy the exported snapshot to external
media or a remote server:
/var/log/pre_upgrade.tgz
Upgrading Chassis B
Notes:
When the command includes -c, enter the Chassis ID only, not the word chassis.
For example: # asg chassis_admin -c 1 down
When the command includes -b, enter the word Chassis and its ID of Chassis1 or Chassis2.
For example: # g_reboot -a -b chassis1
Upgrading Chassis A
Step Operation Command
25 Connect a console to the serial port on SGM1
on Chassis A.
Use a terminal emulation utility to open a
console session.
26 Install the R76SP.50 image from a Install the image on all SGMs at the same
removable media on each SGM. time, or create a bootable USB media for
each SGM.
27 Manually upgrade the SSMs on Chassis A.
27a Activate the private shell. unhide private (password = private)
Connect to the SSM with over SSH. show private shell
Press Ctrl+C to close the private shell. mount -rw -o remount /batm/
Enter log to close the SSM console session.
27b Copy the firmware upgrade file to both scp -P 2024
SSMs. /opt/CPsuite-R76/fw1/conf/hw_fi
rmware/2.4.C20.1.T-ATCA404.tar
When prompted, enter this password:
.bz2
thmhetafbzh
root@<SSM_IP>:/batm/current_ver
sion/
Where <SSM_IP>:
198.51.100.32 for SSM1
198.51.100.232 for SSM2
27c From a console session to an SSM, overwrite T-HUB4# file ls os-image
the default configuration. T-ATCA404# file
activate-os-image <Specify File
Name>
T-HUB4# config terminal
Entering configuration mode
terminal
T-HUB4(config)# system reload
manufacturing-defaults
Are you sure that you want to
delete existing configuration
and
reload manufacturing default
configuration (yes/no)? yes
27d Make sure that the firmware upgrade is # asg_version -v
successful.
27e Do these steps again on the other SSM.
28 Upgrade CMM firmware (on page 35) on
Chassis A.
29 Connect the Sync interface to Chassis B and
wait for all SGMs on Chassis A to reboot.
To upgrade from a minor release, use an HFA Upgrade package. Download it from the R76SP.50
60000/40000 Security Platforms Home Page
http://supportcontent.checkpoint.com/solutions?id=sk115735.
Preliminary Steps
Step Operation Command
1 Make sure that all SGMs and SSMs are up to # asg diag verify
date and that the system is configured
correctly.
2 Copy the HFA Upgrade package to the SMO. Check_Point_R76SP_50_upgrade.linux.tgz
Upgrading Chassis B
Step Operation Command
6 Set Chassis B to administratively DOWN > asg chassis_admin -c
state. <Chassis_B_ID> down
7 Make sure that Chassis B is in > asg monitor -all
administratively DOWN state.
8 Upgrade Chassis B. # cd /home/admin/temp/
Note - Make sure to run the script from # ./AsgInstallScript –b
Chassis A and not Chassis B. chassis<Chassis_B_ID>
Upgrading Chassis A
Step Operation Command
16 Copy the HFA Upgrade package to the SMO. Check_Point_R76SP_50_upgrade.li
nux.tgz
17 Create a temporary directory on the SMO in: # mkdir -v /home/admin/temp
/home/admin/ If a temporary directory already exists,
delete it first with this command:
# g_all rm -rf /home/admin/temp
18 Extract the HFA Upgrade package to the # tar -xvzf
temporary directory. /home/admin/Check_Point_R76SP_5
0_upgrade.linux.tgz -C
/home/admin/temp/
Best Practice - Connect over a console to the SMO and run the next steps through the console
connection.
19 Make sure that Chassis A is in > asg monitor -all
administratively DOWN state.
20 Upgrade Chassis A. # cd /home/admin/temp/
Note - Make sure to run the script from # ./AsgInstallScript -b
Chassis B and not Chassis A. chassis<Chassis_A_ID>
21 If the installation was successful: If you do not upgrade the firmware now at
a. You are prompted to upgrade the SSM the prompt, upgrade it later with:
firmware. You can do this now or later. # asg_ssm_upgrade
b. Reboot the SGMs when prompted. Wait
until all SGMs are UP.
Preliminary Steps
Step Operation Command
1 Make sure that all SGMs and SSMs are up to > asg diag verify
date, and that the system is configured
correctly.
2 Divide the SGMs into two groups (A and B).
SGMs in Group A remain Active and continue
to handle traffic while you upgrade SGMs in
Group B. Then, fail over between SGMs from
Group A to Group B, which handles traffic
while you upgrade SGMs in Group A.
3 Copy the HFA Upgrade package to the SMO:
Check_Point_R76SP_50_upgrade.linu
x.tgz
Important - The SMO must be an SGM of
Group A.
4 Create a temporary directory on the SMO in: # mkdir -v /home/admin/temp
/home/admin/ If a temporary directory already exists,
delete it first with this command:
# g_all rm -rf /home/admin/temp
Note - You can run the SSM firmware upgrade now. Press Y at the prompt. This will cause some
downtime.
Preliminary Steps
Step Operation Command
1 Connect a console to the Active Chassis. # asg diag verify
Make sure that all SGMs and SSMs are up to
date and that the system is configured
correctly.
2 Upload the Jumbo Hotfix Accumulator
installation file to /home/admin/ directory
on the Active Chassis.
3 Make a temporary directory. # mkdir -v /home/admin/temp
Best Practice - Connect a console to the SMO and run the next steps through the console
connection.
For more information about the Multiple Security Groups, see the R76SP.50 Administration Guide
https://sc1.checkpoint.com/documents/R76SP.50/CP_R76SP.50_Security_System_AdminGuide/ht
ml_frameset.htm.
This section provides specific upgrade steps from the existing release to the new release with the
support of Multiple Security Groups.
Description
The Multiple Security Groups feature lets you configure more than one Security Group on the
same Scalable Platform.
Up to 12 Security Groups are supported.
All configured Security Groups share the same chassis resources.
Each configured Security Group runs an independent SMO.
Each configured Security Group runs as a Security Gateway or VSX Gateway.
Different Security Groups can run with different types of SGMs.
Example:
SecurityGroup1: SGM260
SecurityGroup2: SGM400
Different Security Groups can have different Chassis High Availability modes.
Example:
SecurityGroup1: Active UP
SecurityGroup2: VSLS
Different Security Groups can share the same Trunk interface with different VLANs.
Each Security Group uses its own independent license.
To support Multiple Security Groups in R76SP.50, it is mandatory to install these on your Scalable
Platform:
1. R76SP.50 Take 148 and above. See sk115735
http://supportcontent.checkpoint.com/solutions?id=sk115735.
2. R76SP.50 Jumbo Hotfix Accumulator Take 161 and above. See sk117633
http://supportcontent.checkpoint.com/solutions?id=sk117633.
Important - Multiple Security Groups feature is not supported in R76SP.50 Build 84 and R76SP.50
Jumbo Hotfix Accumulator Takes 16 - 105. It is mandatory to re-image the SGMs with the required
R76SP.50 Take and install the required Jumbo Hotfix Accumulator Take. If you only install the
required Jumbo Hotfix Accumulator on top of R76SP.50 Build 84, attempt to enable Multiple
Security Groups is blocked.
Preliminary Steps
Important Note for VSX Virtual System Load Sharing mode - The upgrade procedure requires to
change the configuration from the VSX Virtual System Load Sharing mode to the VSX High
Availability mode. After the upgrade procedure is complete, manually configure the system from
the VSX High Availability mode back to the VSX Virtual System Load Sharing mode.
The upgrade procedure below applies to Dual Chassis setup.
Upgrading Chassis B
Step Operation Command
5 Set Chassis B to administratively DOWN # asg chassis_admin –c
state. <Chassis_B_ID> down
6 On Chassis B, perform a Clean Install of the Install the image on all the SGMs at the
required R76SP.50 ISO on each SGM. same time, or create a bootable USB
media for each SGM.
7 On Chassis B, wait until all members are in > asg monitor
UP state and enforcing policy.
8 On Chassis B, reset the SSMs to factory > asg_chassis_ctrl
default. reload_ssm_default 1
Important - Run these commands from a > asg_chassis_ctrl
reload_ssm_default 2
serial connection on Chassis B. This reset
interrupts all traffic, including the SSH.
9 On Chassis B, install the required Jumbo
Hotfix Accumulator.
9a Copy the installation *.tgz package to the
SMO:
Check_Point_R76SP_50_upgrade.linu
x.tgz
9b Create a temporary directory on the SMO in > mkdir -v /home/admin/temp
the /home/admin/ directory. If such temporary directory already exists,
first delete it with this command:
> g_all rm -rf /home/admin/temp
9c Extract the *.tgz package to the temporary > tar -xvzf
directory. /home/admin/Check_Point_R76SP_5
0_upgrade.linux.tgz -C
/home/admin/temp/
12 On Chassis B, run the diagnostics. > asg policy verify –a [-vs all]
> asg_route -a [--vs all]
13 Make sure that Chassis B is UP and enforces > asg stat -v
security policy.
Important - You must correct all errors
shown by the diagnostics before you
continue to the next step.
Upgrading Chassis A
Step Operation Command
16 Set Chassis A to administratively DOWN # asg chassis_admin –c
state. <Chassis_A_ID> down
17 On Chassis A, perform a Clean Install of the Install the image on all the SGMs at the
required R76SP.50 ISO on each SGM. same time, or create a bootable USB
media for each SGM.
18 On Chassis A, wait until all members are in > asg monitor
UP state and enforcing policy.
23 On Chassis A, run the diagnostics. > asg policy verify –a [-vs all]
> asg_route -a [--vs all]
24 Make sure that Chassis A is UP and enforces > asg stat -v
security policy.
Important - You must correct all errors
shown by the diagnostics before you
continue to the next step.
Verification
Step Operation Command
26 Make sure all SGMs show the correct > asg_version -v
version.
27 On a Chassis in VSX VSLS mode only: > set chassis high-availability
mode 4
Change the VSX mode from the High
Availability to the VSLS.
28 Make sure all SGMs and SSMs are up to > asg diag verify
date, and that the system is configured
correctly.
Syntax
Parameters
Parameter Description
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
No <SGM_IDs> specified, or all - Applies to all SGMs and
Chassis
One SGM (for example, 1_1)
A comma-separated list of SGMs (for example, 1_1,1_4)
A range of SGMs (for example, 1_1-1_4)
One Chassis (chassis1, or chassis2)
The active Chassis (chassis_active)
install Specifies to perform the installation of the Hotfix.
file <File_Name> Specifies the Hotfix path and file name.
This must be a .tgz file.
no_confirm Installs the Hotfix without asking any questions.
no_reboot Installs the Hotfix without reboot.
force Installs the Hotfix, even if it was installed already.
no_sync Does not synchronize files listed in the /etc/xfer_file_list
file during the next reboot.
Parameter Description
sync-reg Synchronizes Check Point Registry during the next reboot.
Default: Check Point Registry is not synchronized.
admin-up Changes the state to Admin Up when you have finished the Hotfix
installation.
Default: Admin Down state.
no_admin_down Does not change the state to the Admin Down position at the
beginning of the Hotfix installation.
Default: Change to Admin Down state.
no_crs For internal Check Point use only.
Example
# asg_hf_installer -b chassis2 install file /var/log/fw1_wrapper_HOTFIX_R76SP_30_JHF.tgz
Hotfix Installation Wizard
==========================
Extracting fw1_wrapper_HOTFIX_R7... [OK]
Confirmation
============
You are about to perform Hotfix installation on blades: 2_01,2_02,2_03
Installing hotfix requires the following stages:
1. Setting to admin down SGMs: 2_01,2_02,2_03.
2. Rebooting of SGMs: 2_01,2_02,2_03.
Installing Hotfix
=================
Creating /tmp/hotfix/ on SGMS... [OK]
Copying fw1_wrapper_HOTFIX_R7 to SGMS... [OK]
Setting execution permission to fw1_wrapper_HOTFIX_R76SP_30_JHF... [OK]
Setting SGMs to down... [OK]
Installing hotfix on 2_01,2_02,2_03... [OK]
Reboot of SGMs 2_01,2_02,2_03 is necessary, reboot now?(y/n)
>y
Add registry commands to the registry commands file on requested SGMs [OK]
Deleting temp files... [OK]
Summary
=======
Syntax
# asg_hf_installer <SGMS_IDs> uninstall file <Path_and_File_Name> [no_confirm]
[no_reboot] [no_sync ] [sync_reg ] [admin_up] [no_admin_down]
# asg_hf_installer <SGMS_IDs> uninstall name <Hotfix_Name> [no_confirm]
[no_reboot] [no_sync ] [sync_reg ] [admin_up] [no_admin_down]
Parameters
Parameter Description
-b <SGMS_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
No <SGM_IDs> specified, or all - Applies to all SGMs and
Chassis
One SGM (for example, 1_1)
A comma-separated list of SGMs (for example, 1_1,1_4)
A range of SGMs (for example, 1_1-1_4)
One Chassis (chassis1, or chassis2)
The active Chassis (chassis_active)
uninstall Uninstalls the specified Hotfix.
file Specifies the Hotfix full path and file name (as saved in Check Point
<Path_and_File_Name> Registry).
name <Hotfix_Name> Specifies the legal Hotfix name.
This Hotfix must be installed on the requested SGMs.
The Hotfix name is the same as that of the Hotfix name used during
the installation, but without the .tgz postfix.
no_confirm Uninstalls the Hotfix without asking any questions.
no_reboot Uninstalls the Hotfix without reboot.
no_sync Does not synchronize files listed in the /etc/xfer_file_list
file during the next reboot.
sync-reg Synchronizes Check Point Registry during the next reboot.
Default: Check Point Registry is not synchronized.
admin-up Changes the state to Admin Up when you have finished the Hotfix
uninstall.
Default: Admin Down state.
no_admin_down Does not change the state to the Admin Down position at the
beginning of the Hotfix uninstall.
Default: Change to Admin Down state.
Syntax examples
# asg_hf_installer -b chassis2 uninstall name
fw1_wrapper_HOTFIX_R76SP_30_J50_012
# asg_hf_installer -b chassis2 uninstall file
$FWDIR/.../uninstall_fw1_wrapper_HOTFIX_R76SP_30_J50_012
Example output
# asg_hf_installer -b chassis2 uninstall name fw1_wrapper_HOTFIX_R76SP_30_J50_012
Hotfix Removal Wizard
==========================
Getting silent uninstall command on all requested SGMs [OK]
Check uninstall file exists on all requested SGMs [OK]
Confirmation
============
You are about to perform Hotfix installation on blades: 2_01,2_02,2_03
Removing hotfix requires the following stages:
1. Setting to admin down SGMs: 2_01,2_02,2_03.
2. Rebooting of SGMs: 2_01,2_02,2_03.
Are you sure? (Y - yes, any other key - no) y
Hotfix installation requires auditing
Enter your full name: <name>
Enter reason for Hotfix installation [Maintenance]:
WARNING: Hotfix installation on blades: 2_01,2_02,2_03, User: <name>, Reason: Maintenance
Removing Hotfix
=================
Setting SGMs to down... [OK]
Removing hotfix on 2_01,2_02,2_03... [OK]
Reboot of SGMs 2_01,2_02,2_03 is necessary, reboot now?(y/n)
>y
Add registry commands to the registry commands file on requested SGMs[OK]
Deleting temp files... [OK]
Summary
=======
Removal of hotfix completed successfully
Rebooting SGMs: 2_01,2_02,2_03... [OK]
Limitations
Uninstalling a hotfix without understanding the implications may break the system.
Uninstall of a Jumbo Hotfix Accumulator is not supported.
EEprom upgrading
1: Press 1 for EEProm upgrading.
2: Press 2 to skip.
11 If the Chassis ID is 2, change the Chassis ID # sed -i
setting. 's/CHASSID="1"/CHASSID="2"/g'
/etc/shmm.cfg
# reboot
14 Activate the Standby CMM, after reboot. From the Standby CMM console
This CMM will be the Active CMM. connection:
# reboot
15 Install the firmware on the Active CMM.
Do Steps 7-11.
16 Activate the Standby CMM. From the Standby CMM console
connection:
# reboot
17 Make sure that the Active and Standby CMMs # asg_version -i
both have the same firmware version.
18 Set the Standby Chassis to administratively # asg chassis_admin –c
UP state. <Chassis_B_ID> up
7 Copy the firmware files from the SGM to the # scp /var/log/sentry.shmm700.*
CMM in the /tmp/ directory. [email protected]:/tmp/
The password is: admin
13 Activate the Standby CMM, after reboot. From the Standby CMM console
This CMM will be the Active CMM. connection:
# reboot
14 Install the firmware on the Active CMM.
Do Steps 7-10.
15 Activate the Standby CMM. From the Standby CMM console
connection:
# reboot
16 Make sure that the Active and Standby CMMs # asg_version -i
both have the same firmware version.
17 Set the Standby Chassis to administratively # asg chassis_admin –c
UP state. <Chassis_B_ID> up
18 To upgrade the second (Active) Chassis
CMMs:
Perform Chassis failover to the Standby
Chassis
Repeat Steps 1 - 17 on the new Standby
Chassis
Syntax
# asg_ssm_upgrade ssm <SSM_ID> [chassis <Chassis_ID>] [file <Firmware File>]
Parameters
Parameter Description
<SSM_ID> SSM ID to be upgraded (1, 2, or all)
<Chassis_ID> Chassis ID (1, 2, or all)
<Firmware File> New firmware file name and fully qualified path
Notes:
Before you upgrade, confirm that the new firmware file checksum is valid.
You must copy the new firmware file to all SGMs.
Console is mandatory if you upgrade the local Chassis SSM.
The SSM automatically reboots after the upgrade. This can cause traffic interruption.