Checkpoint Firewall R81 Installation Guide
Checkpoint Firewall R81 Installation Guide
INSTALLATION AND
UPGRADE GUIDE
R81
Check Point Copyright Notice
© 2020 - 2024 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No
part of this product or related documentation may be reproduced in any form or by any means
without prior written authorization of Check Point. While every precaution has been taken in
the preparation of this book, Check Point assumes no responsibility for errors or omissions.
This publication and features described herein are subject to change without notice.
TRADEMARKS:
Refer to the Copyright page for a list of our trademarks.
Refer to the Third Party copyright notices for a list of relevant copyrights and third-party
licenses.
Important Information
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-
date with the latest functional improvements, stability fixes, security
enhancements and protection against new and evolving attacks.
Certifications
For third party independent certification of Check Point products, see the Check
Point Certifications page.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments.
Revision History
Date Description
26 Updated:
September
2023
n Renamed the cluster upgrade method "Minimal Effort" to "Minimum
Effort"
n "Minimum Effort Upgrade of a Security Gateway Cluster" on page 453
- Added the missing step to establish SIC with Cluster Members after
Clean Install
n "Minimum Effort Upgrade of a VSX Cluster" on page 460 - Added the
missing step to establish SIC with Cluster Members after Clean Install
n Renamed the cluster upgrade method "Zero Downtime" to "Minimum
Downtime" to show better the nature of this upgrade method
Note - Multi-Version Cluster (MVC) Upgrade is the Zero Downtime
Upgrade.
n "Minimum Downtime Upgrade of a Security Gateway Cluster" on
page 471 - Added the missing steps to establish SIC with Cluster
Members after Clean Install
n "Minimum Downtime Upgrade of a VSX Cluster" on page 484 - Added
the missing steps to establish SIC with Cluster Members after Clean
Instal
25 Updated:
September
2023
n "Installing a CloudGuard Controller" on page 97 - Updated the note
about the Known Limitation VSECPC-1341
n "Multi-Version Cluster Upgrade Procedure - Gateway Mode" on
page 410
n "Minimum Downtime Upgrade of a Security Gateway Cluster" on
page 471 - Updated the notes about changing the CCP mode to
Broadcast
n "Minimum Downtime Upgrade of a VSX Cluster" on page 484 -
Updated the notes about changing the CCP mode to Broadcast
12 October Updated:
2022
n "Multi-Version Cluster Limitations" on page 407
Date Description
Date Description
23 January Updated:
2022
n "Installing Software Packages on Gaia" on page 185
n "Upgrade Options and Prerequisites" on page 188
n "Prerequisites for Upgrading and Migrating of Management Servers
and Log Servers" on page 189 - removed all references to R80.10
and lower versions
n "Prerequisites for Upgrading and Migrating of Security Gateways and
Clusters" on page 195 - removed all references to R80.10 and lower
versions
n "Upgrade Methods" on page 200
n "Upgrade Tools" on page 207
n "Upgrading one Multi-Domain Server from R80.20 and higher" on
page 249 - added a preliminary step to reassign all Global Policies to
all applicable Domains
n "Upgrading Multi-Domain Servers in High Availability from R80.20
and higher" on page 273 - added a preliminary step to reassign all
Global Policies to all applicable Domains
Removed (because upgrade or migration from versions R80 and R80.10 is
not supported):
n Prerequisites for Upgrading vSEC Controller R80.10 and lower
n Upgrading a Security Management Server or vSEC Controller from
R80.10 and lower
n Upgrading a Dedicated Log Server from R80.10 and lower
n Upgrading a Dedicated SmartEvent Server from R80.10 and lower
n Upgrading one Multi-Domain Server from R80.10 and lower
n Upgrading Multi-Domain Servers in High Availability from R80.10 and
lower
n Upgrading a Multi-Domain Log Server from R80.10 and lower
n Upgrading an Endpoint Security Management Server from R80.10
and lower
n Upgrading a Dedicated Endpoint Policy Server from R80.10 and
lower
n Upgrading a Standalone from R80.10 and lower
Date Description
05 November Updated:
2020
n "Supported Versions in Multi-Version Cluster" on page 405
03 November Updated:
2020
n "Migrating Database from an R81 Domain Management Server to an
R81 Security Management Server" on page 521
Date Description
02 November Added:
2020
n "Multi-Version Cluster Upgrade Procedure - VSX Mode" on page 426
n "Deploying a Domain Dedicated Log Server" on page 71
Updated:
n "Backing Up and Restoring" on page 20 - added link to sk127653
n "Prerequisites for Upgrading and Migrating of Management Servers
and Log Servers" on page 189
n "Upgrade Tools" on page 207
n "Upgrading a Security Management Server or Log Server from
R80.20 and higher" on page 210 - all procedures
n "Upgrading one Multi-Domain Server from R80.20 and higher" on
page 249 - all procedures
n "Upgrading Multi-Domain Servers in High Availability from R80.20
and higher" on page 273 - all procedures
n "Upgrading a Multi-Domain Log Server from R80.20 and higher" on
page 328 - all procedures
n "Upgrading an Endpoint Security Management Server or Endpoint
Policy Server from R80.20 and higher" on page 350 - all procedures
n "Migrating Database Between R81 Security Management Servers" on
page 510
n "Installing a VSX Gateway" on page 111 - updated notes
n "Installing a VSX Cluster" on page 139 - updated notes
n "Multi-Version Cluster Upgrade Procedure - Gateway Mode" on
page 410
Table of Contents
Getting Started 16
Welcome 16
R81 Documentation 16
R81 Software Images 16
For New Check Point Customers 17
Disk Space 17
Product Deployment Scenarios 17
Backing Up and Restoring 20
The Gaia Operating System 23
Installing the Gaia Operating System on Check Point Appliances 24
Installing the Gaia Operating System on Open Servers 26
Installing a Blink Image to Configure a Check Point Gateway Appliance 28
Changing Disk Partition Sizes During the Installation of Gaia Operating System 29
Running an Unattended USB Installation of Gaia on Check Point Appliances 30
Configuring Gaia for the First Time 31
Running the First Time Configuration Wizard in Gaia Portal 32
Running the First Time Configuration Wizard in CLI Expert mode 44
Configuring the IP Address of the Gaia Management Interface 55
Changing the Disk Partition Sizes on an Installed Gaia 57
Enabling IPv6 on Gaia 58
Installing a Security Management Server 60
Installing One Security Management Server only, or Primary Security Management
Server in Management High Availability 61
Installing a Secondary Security Management Server in Management High Availability 63
Installing a Dedicated Log Server or SmartEvent Server 66
Deploying a Domain Dedicated Log Server 71
Introduction 71
Procedure for an R81 Multi-Domain Environment 71
Configuring the Security Gateway in Monitor Mode Behind a Proxy Server 575
Deploying a Security Gateway or a ClusterXL in Bridge Mode 576
Introduction to Bridge Mode 576
Supported Software Blades in Bridge Mode 576
Limitations in Bridge Mode 579
Configuring a Single Security Gateway in Bridge Mode 580
Configuring a ClusterXL in Bridge Mode 590
Configuring ClusterXL in Bridge Mode - Active / Standby with Two Switches 591
Configuring ClusterXL in Bridge Mode - Active / Active with Two or Four Switches 608
Getting Started
Important - Before you install or upgrade to R81:
1. Read the R81 Release Notes.
2. Back up the current system. See "Backing Up and Restoring" on page 20.
Welcome
Thank you for choosing Check Point Software Blades for your security solution. We hope that
you will be satisfied with this solution and our support services. Check Point products provide
your business with the most up to date and secure solutions available today.
Check Point also delivers worldwide technical services including educational, professional,
and support services through a network of Authorized Training Centers, Certified Support
Partners, and Check Point technical support personnel to ensure that you get the most out of
your security investment.
For additional information on the Internet Security Product Suite and other security solutions,
go to https://www.checkpoint.com or call Check Point at 1(800) 429-4391.
For additional technical information, visit the Check Point Support Center.
Welcome to the Check Point family. We look forward to meeting all of your current and future
network, application, and management security needs.
R81 Documentation
This guide is for administrators responsible for installing R81 on appliances and open servers
that run the Gaia Operating System.
To learn what is new in R81, see the R81 Release Notes.
See the R81 Home Page SK for information about the R81 release.
Disk Space
When you install or upgrade R81, the installation or upgrade wizard makes sure that there is
sufficient space on the hard disk to install the Check Point products.
If there is not sufficient space on the hard disk, an error message is shown. The message
states:
n The amount of disk space necessary to install the product.
n The directory where the product is installed.
n The amount of free disk space that is available in the directory.
After there is sufficient disk space, install or upgrade the Check Point product.
The Security Management Server (1) and the Security Gateway (3) are installed on
different computers, with a network connection (2).
Standalone Deployment
The Security Management Server (1) and the Security Gateway (3) are installed on the
same computer (2).
A Primary Security Management Server (1) has a direct or indirect connection (2) to a
Secondary Security Management Server (3).
In a Full High Availability Cluster on two Check Point Appliances, each appliance runs both
as a ClusterXL Cluster Member and as a Security Management Server, in High Availability
mode.
Important - You can deploy and configure a Full High Availability Cluster only on
Check Point Appliances that support Standalone configuration. See the R81
Release Notes and "Installing a Standalone" on page 175.
Step Instructions
2 Immediately after the Pre-Upgrade Verifier (PUV) finishes successfully and does
not show you further suggestions:
n Save a second snapshot of your source system.
n Save a second backup of your source system.
n Collect a second CPinfo file from your source system.
3 Transfer the CPinfo file, snapshot, backup files, and exported database files to
external storage devices. Make sure to transfer the files in the binary mode.
Operating
Backup Recommendations
System
Step Instructions
3 During boot, when prompted, press any key within 4 seconds to enter the Boot
menu:
Loading the system
Press any key to see the boot menu [Booting in 5
seconds]
Step Instructions
1 Download the Gaia Operating System Clean Install ISO file from the R81
Home Page SK.
3 Run the Gaia First Time Configuration Wizard. See "Configuring Gaia for the
First Time" on page 31.
Step Instructions
1 Download the Gaia Operating System Clean Install ISO file from the R81
Home Page SK.
5 Enter the BIOS and configure the DVD-ROM to be the first boot option.
10 After Gaia installs and before the reboot, disconnect the DVD-ROM from your
Open Server.
12 Enter the BIOS and configure the Hard Disk to be the first boot option.
Step Instructions
1 Download the Gaia Operating System ISO file from R81 Home Page SK.
Note - If you add the Blink image to a USB and insert the USB into the appliance
before the First Time Configuration Wizard shows, the process begins automatically.
After the installation is complete, connect with your web browser to the Check Point appliance
to complete the simplified Blink configuration.
In addition, the Blink utility lets you use a special XML file to run an unattended installation with
predefined parameters for an appliance:
n Host name
n Gaia administrator password
n Network options - IP address, Subnet, Default Gateway
n Secure Internal Communication (SIC) key
n Cluster membership
n Upload to Check Point approval
n Download from Check Point approval
For complete information, see sk120193.
Important - Always use the latest available build of the ISOmorphic Tool. If you use
an outdated build, the installation can fail.
On Check Point appliances, the ISOmorphic tool lets an administrator run an unattended
installation.
In an unattended installation, an experienced Check Point system administrator:
Step Instructions
1 Prepares the USB with these pre-configured settings for a specified network
interface:
n IP address
n Network mask
n Default Gateway
2 Sends the USB drive to an administrator, who inserts the drive into the appliance
and reboots it.
The tool installs the Check Point Gaia OS and configures the appliance with the
predefined settings.
The LCD indicates a successful installation and interfaces blink in round-robin
fashion.
Note - The ISOmorphic tool does not support unattended installation on Open Servers.
Step Instructions
2 On your connected computer, configure a static IPv4 address in the same subnet
as the IPv4 address you configured during the Gaia installation.
3 On your connected computer, in a web browser, connect to the IPv4 address you
configured during the Gaia installation:
https://<IP address of Gaia Management Interface>
5 Click Login.
The Check Point First Time Configuration Wizard opens.
Below you can find the description of the First Time Configuration Wizard windows and their
fields.
Setup Continue with R81 Use this option to configure the installed Gaia
configuration and Check Point products.
Install Install from Check Use these options to install a Gaia version.
Point Cloud
Install from USB
device
If in the Deployment Options window, you selected Install from Check Point Cloud, the
First Time Configuration Wizard asks you to configure the connection to Check Point Cloud.
These options appear (applies only to Check Point appliances that you configured as a
Security Gateway):
n Install major version - This option let you choose and install major versions available
on Check Point Cloud. The Gaia CPUSE performs the installation.
n Pull appliance configuration - This option applies the initial deployment configuration
that includes different OS version on the appliance. You must prepare the initial
deployment configuration with the Zero Touch Cloud Service. For more information,
see sk116375.
In this window, you select and configure the main Gaia Management Interface. You connect
to this IP address to open the Gaia Portal or CLI session.
Field Description
Interface By default, First Time Configuration Wizard selects the interface you
configured during the Gaia installation (for example, eth0).
Note - After you complete the First Time Configuration Wizard and
reboot, you can select another interface as the main Gaia
Management Interface and configure its IP settings.
Configure Select how the Gaia Management Interface gets its IPv4 address:
IPv4
n Manually - You configure the IPv4 settings in the next fields.
n Off - None.
Configure Select how the Gaia Management Interface gets its IPv6 address:
IPv6
n Manually - You configure the IPv6 settings in the next fields.
n Off - None.
Optional: In this window, you configure the interface that connects the Gaia computer to the
Internet.
Configure IPv4 Select how the applicable interface gets its IPv4 address:
n Manually - You configure the IPv4 settings in the next fields.
n Off - None.
Configure IPv6 Optional. Select how the applicable interface gets its IPv6 address:
n Manually - You configure the IPv6 settings in the next fields.
n Off - None.
In this window, you configure the Host name, the DNS servers and the Proxy server on the
Gaia computer.
Field Description
Primary DNS Enter the applicable IPv4 address of the primary DNS server.
Server
Secondary DNS Optional: Enter the applicable IPv4 address of the secondary
Server DNS server.
Tertiary DNS Optional: Enter the applicable IPv4 address of the tertiary DNS
Server server.
Use a Proxy server Optional: Select this option to configure the applicable Proxy
server.
In this window, you configure the date and time settings on the Gaia computer.
Field Description
Set the time manually Select this option to configure the date and time settings
manually.
Use Network Time Select this option to configure the date and time settings
Protocol (NTP) automatically with NTP.
Primary NTP server Enter the applicable IPv4 address or resolvable hostname of
the primary NTP server.
Version Select the version of the NTP for the primary NTP server.
Version Select the version of the NTP for the secondary NTP server.
In this window, you select which type of Check Point products you wish to install on the Gaia
computer.
Field Description
Products window
In this window, you continue to select which type of Check Point products you wish to install
on the Gaia computer.
n If in the Installation Type window, you selected Security Gateway and/or Security
Management, these options appear:
Field Description
l A Cluster Member.
l A Standalone.
Field Description
l CloudGuard Controller.
l A Standalone.
l CloudGuard Controller.
High Availability.
Select Log Server / SmartEvent only to install:
l A dedicated single Log Server.
n If in the Installation Type window, you selected Multi-Domain Server, these options
appear:
Field Description
Field Description
In this window, you select if this Security Gateway gets its IP address dynamically (DAIP
gateway).
Field Description
Yes Select this option, if this Security Gateway gets its IP address dynamically
(DAIP gateway).
No Select this option, if you wish to configure this Security Gateway with a static
IP address.
In this window, you configure a one-time Activation Key. You must enter this key later in
SmartConsole when you create the corresponding object and initialize SIC.
Field Description
Activation Key Enter one-time activation key (between 4 and 127 characters
long).
In this window, you configure the main administrator for this Security Management Server.
Use Gaia Select this option, if you wish to use the default Gaia
administrator: admin administrator (admin).
In this window, you configure which computers are allowed to connect with SmartConsole to
this Security Management Server.
Field Description
This machine Select this option to allow only a specific computer to connect.
By default, the First Time Configuration Wizard uses the IPv4
address of your computer.
You can change it to another IP address.
Range of IPv4 Select this option to allow a specific range of IPv4 addresses to
addresses connect.
Enter the applicable start and end IPv4 addresses.
In this window, you select the main Leading VIP Interface on this Multi-Domain Server.
Field Description
In this window, you configure which computers are allowed to connect with SmartConsole to
this Multi-Domain Server.
Field Description
In this window, you can see the installation options you selected.
The Improve product experience section:
n By default, the option Send data to Check Point is enabled. For information about this
option, see sk111080.
n By default, the option Send crash data to Check Point that might contain personal
data is disabled.
If you enable this option, Gaia operating system uploads the detected core dump files
to Check Point Cloud.
R&D can analyze the crashes and issue fixes for them.
Notes:
n At the end of the First Time Configuration Wizard, the Gaia computer reboots and the
initialization process is performed in the background for several minutes.
n If you installed the Gaia computer as a Security Management Server or Multi-Domain
Server, only read-only access is possible with SmartConsole during this initialization
time.
n To make sure the configuration is finished:
1. Connect to the command line on the Gaia computer.
Run:
Example outputs:
l From a Security Gateway or Cluster Member:
Description
Use this command in the Expert mode to test and to run the First Time Configuration Wizard
on a Gaia system for the first time after the system installation.
Notes:
n The config_system utility is not an interactive configuration tool. It helps
automate the first time configuration process.
n The config_system utility is only for the first time configuration, and not for
ongoing system configurations.
Syntax
n To list the command options, run one of these:
Form Command
n To run the First Time Configuration Wizard from a specified configuration file, run one of
these:
Form Command
n To run the First Time Configuration Wizard from a specified configuration string, run one
of these:
Form Command
Form Command
config_system --dry-run
Form Command
Ste
Instructions
p
Step Instructions
If you do not have a configuration file, you can create a configuration template and fill in the
parameter values as necessary.
Before you run the First Time Configuration Wizard, you can validate the configuration file you
created.
Step Instructions
Parameters
A configuration file contains the <parameter>=<value> pairs described in the table below.
Note - The config_system parameters can change from Gaia version to Gaia
version. Run the "config_system --help" command to see the available
parameters.
You can change the IP address of the Gaia Management Interface after you run the Gaia First
Time Configuration Wizard.
Changing the IP address in Gaia Portal
Step Instructions
1 In your web browser, connect the Gaia Portal to the current IP address of the
Gaia management interface:
https://<IP Address of Gaia Management Interface>
5 Click OK.
6 In the Interfaces section, select the Management Interface and click Edit.
8 Click OK.
Step Instructions
To see the size of the system-root and log partitions on an installed system:
Step Instructions
3 Run:
df -h
Note - Most of the remaining space on the disk is reserved for backup images and
upgrades.
Step Instructions
Step Instructions
2 From the navigation tree, click System Management > System Configuration.
4 Click Apply.
Step Instructions
5 Reboot:
reboot
Important - IPv6 support is not
available until you reboot.
Step Instructions
3 During the First Time Configuration Wizard, you must configure these settings:
n In the Installation Type window, select Security Gateway and/or
Security Management.
n In the Products window:
1. In the Products section, select Security Management only.
2. In the Clustering section, in the Define Security Management as
field, select Primary.
n In the Security Management GUI Clients window, configure the
applicable allowed computers:
l Any IP Address - Allows all computers to connect.
connect.
l Network - Allows all computers on the specified network to
connect.
l Range of IPv4 addresses - Allows all computers in the specified
range to connect.
Step Instructions
6 Click OK.
Step Instructions
3 Select When disk space is below <number> Mbytes, start deleting old files.
5 Click OK.
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
Important - You must use the same Gaia installation version as you
used for the Primary Security Management Server.
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Security Gateway and/or
Security Management.
n In the Products window:
Step Instructions
Step Instructions
3 Create a new Check Point Host object that represents the Secondary
Security Management Server in one of these ways:
n From the top toolbar, click the New ( > More > Check Point Host.
n In the top left corner, click Objects menu > More object types >
Network Object > Gateways & Servers > New Check Point Host.
n In the top right corner, click Objects Pane > New > More >
Network Object > Gateways and Servers > Check Point Host.
6 In the IPv4 Address and IPv6 Address fields, enter the applicable IP
addresses.
11 Click OK.
12 In the SmartConsole top left corner, click Menu > Install database.
Step Instructions
14 Click Install.
15 Click OK.
16 In the SmartConsole top left corner, click Menu > Management High
Availability.
The Security Management Server with Log Indexing enabled, creates and uses index files for
fast access to log file content. Index files are located by default at $RTDIR/log_indexes/.
To make sure that there is always sufficient disk space on the Security Management Server,
the server that stores the log index deletes the oldest index entries, when the available disk
space is less than a specified minimum. The default minimum value is 5000 MB, or 15% of the
available disk space.
Configuring the applicable minimum disk space
Step Instructions
3 Select When disk space is below <number> Mbytes, start deleting old files.
5 Click OK.
Procedure:
1. Install the Log Server or SmartEvent Server
Note - You can install a dedicated SmartEvent Server and a dedicated
SmartEvent Correlation Unit.
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Security Gateway and/or
Security Management.
n In the Products window:
these options:
l Use Gaia administrator
connect.
l Network - Allows all computers on the specified network to
connect.
l Range of IPv4 addresses - Allows all computers in the
Step Instructions
3 Create a new Check Point Host object that represents the dedicated Log
Server or SmartEvent Server in one of these ways:
n From the top toolbar, click the New ( ) > More > Check Point
Host.
n In the top left corner, click Objects menu > More object types >
Network Object > Gateways & Servers > New Check Point Host.
n In the top right corner, click Objects Pane > New > More >
Network Object > Gateways and Servers > Check Point Host.
6 In the IPv4 Address and IPv6 Address fields, enter the applicable IP
addresses.
Blade
n For the SmartEvent Server, select:
l SmartEvent Server
Step Instructions
11 Click OK.
12 In the SmartConsole top left corner, click Menu > Install database.
14 Click Install.
15 Click OK.
Step Instructions
3 Select When disk space is below <number> Mbytes, start deleting old files.
5 Click OK.
Note - Connecting with SmartConsole to the Domain Dedicated Log Server to see Security
Policies is not supported.
cp -v $CPDIR/tmp/.CPprofile.sh{,_BKP}
cat >> $CPDIR/tmp/.CPprofile.sh << EOF
> export PUV_ERRORS_AS_WARNINGS=1
> EOF
e. Follow the instructions in the R80.40 Installation and Upgrade Guide to upgrade
all the servers "with CPUSE".
2. Upgrade all Multi-Domain Servers to R81.
See "Upgrade of Multi-Domain Servers and Multi-Domain Log Servers" on page 248 >
select the applicable section to upgrade "from R80.20 and higher" > select the
applicable section to upgrade "with CPUSE".
3. On each Multi-Domain Security Management Server, run this script in the Expert
mode:
$MDS_FWDIR/scripts/configureCrlDp.sh
reboot
6. On each Multi-Domain Security Management Server, run this script in the Expert
mode:
7. Reboot all the Domain Dedicated Log Servers and the SmartEvent Servers:
reboot
Advanced Upgrade
c. In your active shell window, run this command in the Expert mode:
export PUV_ERRORS_AS_WARNINGS=1
d. Follow the instructions in the R80.40 Installation and Upgrade Guide to upgrade
all the servers "with Advanced Upgrade".
2. Upgrade all Multi-Domain Servers to R81.
See "Upgrade of Multi-Domain Servers and Multi-Domain Log Servers" on page 248 >
select the applicable section to upgrade "from R80.20 and higher" > select the
applicable section to upgrade "with Advanced Upgrade".
3. On each Multi-Domain Security Management Server, run this script in the Expert
mode:
$MDS_FWDIR/scripts/configureCrlDp.sh
reboot
6. On each Multi-Domain Security Management Server, run this script in the Expert
mode:
7. Reboot all the Domain Dedicated Log Servers and SmartEvent Servers:
reboot
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Multi-Domain Server.
n In the Installation Type window, select Primary Multi-Domain
Server.
n In the Leading VIP Interfaces Configuration window, select the
applicable interface.
n In the Multi-Domain Server GUI Clients window, select one of
these options:
l Any host to allow all computers to connect
allowed computer
n In the Security Management Administrator window, select one of
these options:
l Use Gaia administrator
Step Instructions
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
Important - You must use the same Gaia installation version as you
used for the Primary Multi-Domain Server.
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Multi-Domain Server.
n In the Installation Type window, select Secondary Multi-Domain
Server.
n In the Leading VIP Interfaces Configuration window, select the
applicable interface.
n In the Secure Internal Communication window, enter the
Step Instructions
2 From the left navigation panel, click Multi Domain > Domains.
Step Instructions
7 Enter the same Activation Key you entered during the setup of First Time
Configuration Wizard of the Secondary Multi-Domain Server.
8 Click OK.
14 Click OK.
Notes:
n The new Multi-Domain Server automatically synchronizes with all
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Multi-Domain Server.
n In the Installation Type window, select Multi-Domain Log Server.
n In the Leading VIP Interfaces Configuration window, select the
applicable interface.
n In the Secure Internal Communication window, enter the
Step Instructions
2 From the left navigation panel, click Multi Domain > Domains.
3 From the top toolbar, click New > Multi-Domain Log Server.
Step Instructions
7 Enter the same Activation Key you entered during the First Time
Configuration Wizard of the Multi-Domain Log Server.
8 Click OK.
16 Click OK.
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Security Gateway and/or
Security Management.
n In the Products window:
connect.
l Network - Allows all computers on the specified network to
connect.
l Range of IPv4 addresses - Allows all computers in the
Step Instructions
6 Click OK.
7 In the SmartConsole top left corner, click Menu > Install database.
9 Click Install.
10 Click OK.
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
Important - You must use the same Gaia installation version as you
used for the Primary Endpoint Security Management Server.
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Security Gateway and/or
Security Management.
n In the Products window:
Step Instructions
Step Instructions
3 Create a new Check Point Host object that represents the Secondary
Endpoint Security Management Server in one of these ways:
n From the top toolbar, click the New ( > More > Check Point Host.
n In the top left corner, click Objects menu > More object types >
Network Object > Gateways & Servers > New Check Point Host.
n In the top right corner, click Objects Pane > New > More >
Network Object > Gateways and Servers > Check Point Host.
6 In the IPv4 Address and IPv6 Address fields, enter the applicable IP
addresses.
11 Click OK.
12 In the SmartConsole top left corner, click Menu > Install database.
Step Instructions
14 Click Install.
15 Click OK.
16 In the SmartConsole top left corner, click Menu > Management High
Availability.
Step Instructions
3 Create a new Check Point Host object that represents the Endpoint
Policy Server in one of these ways:
n From the top toolbar, click the New ( ) > More > Check Point
Host.
n In the top left corner, click Objects menu > More object types >
Network Object > Gateways & Servers > New Check Point Host.
n In the top right corner, click Objects Pane > New > More >
Network Object > Gateways and Servers > Check Point Host.
6 In the IPv4 Address and IPv6 Address fields, enter the applicable IP
addresses.
Step Instructions
10 Click OK.
11 In the SmartConsole top left corner, click Menu > Install database.
13 Click Install.
14 Click OK.
Important:
n A Security Management Server listens to SSL traffic for all services on the TCP port
443 in these cases:
l If you performed a clean installation of a Security Management Server R81 and
enabled the Endpoint Policy Management Software Blade.
l If you upgraded a Security Management Server with disabled Endpoint Policy
Management Software Blade to R81 and enabled this Software Blade after the
upgrade.
In these cases, when Endpoint Security SSL traffic arrives at the TCP port 443, the
Security Management Server automatically redirects it (internally) to the TCP port
4434.
In R81 and higher, an administrator can manually configure different TCP ports for the
Gaia Portal (and other services) and Endpoint Security - 443 or 4434. For the
applicable procedures, see the R81 Harmony Endpoint Security Server
Administration Guide > Chapter Endpoint Security Architecture > Section Connection
Port to Services on an Endpoint Security Management Server.
n When you enable the Endpoint Policy Management Software Blade on a Security
Management Server, the SSL connection port to these services automatically
changes from the default TCP port 443 to the TCP port 4434:
l Gaia Portal
n When you disable the Endpoint Policy Management Software Blade on a Security
Management Server, the SSL connection port automatically changes back to the
default TCP port 443.
Required
Instructions
Space
1 GB Logs.
Note - To make future upgrades easier, we recommend that you use a larger disk
size than necessary in this deployment.
Procedure:
1. Install the CloudGuard Controller
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Security Gateway and/or
Security Management.
n In the Products window:
connect.
l Network - Allows all computers on the specified network to
connect.
l Range of IPv4 addresses - Allows all computers in the
Step Instructions
3 Run:
cloudguard on
Enable the Identity Awareness Software Blade on the applicable Security Gateways.
Installing SmartConsole
SmartConsole is a GUI client you use to manage the Check Point environment.
For SmartConsole requirements, see the R81 Release Notes.
Downloading SmartConsole
You can download the SmartConsole installation package in several ways:
Downloading the SmartConsole package from the Home Page SK
Step Instructions
Step Instructions
2 Search for:
"R81 SmartConsole"
You can download the SmartConsole package from the Gaia Portal of your Security
Management Server or Multi-Domain Server.
Step Instructions
Installing SmartConsole
To install the SmartConsole client on Windows platforms:
Step Instructions
Logging in to SmartConsole
Step Instructions
4 Click Login.
5 If necessary, confirm the connection using the fingerprint generated during the
installation.
You see this only the first time that you log in from a SmartConsole client.
Troubleshooting SmartConsole
Make sure the SmartConsole client can access these ports on the Management Server:
n 18190
n 18264
n 19009
For more information, see:
n sk52421: Ports used by Check Point software
n sk43401: How to completely disable FireWall Implied Rules
Procedure:
1. Install the Security Gateway
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Security Gateway and/or
Security Management.
n In the Products window:
option.
n In the Secure Internal Communication window, enter the
Step Instructions
types > Network Object > Gateways and Servers > New
Gateway.
l In the top right corner, click Objects Pane > New > More >
Step Instructions
8 If during the Wizard Mode, you selected Skip and initiate trusted
communication later:
a. The Secure Internal Communication field shows
Uninitialized.
b. Click Communication.
c. In the Platform field:
l Select Open server / Appliance for all Check Point
Software Blades.
l On the Threat Prevention tab, enable the applicable
Software Blades.
10 Click OK.
Step Instructions
Step Instructions
types > Network Object > Gateways and Servers > New
Gateway.
l In the top right corner, click Objects Pane > New > More >
5 In the Name field, enter the applicable name for this Security
Gateway object.
6 In the IPv4 address and IPv6 address fields, configure the same
IPv4 and IPv6 addresses that you configured on the
Management Connection page of the Security Gateway's First
Time Configuration Wizard.
Make sure the Security Management Server or Multi-Domain
Server can connect to these IP addresses.
If this Security Gateway receives its IP addresses from a DHCP
server, select Dynamic Address.
Step Instructions
Step Instructions
10 Click OK.
3. Configure the applicable Security Policy for the Security Gateway in SmartConsole
Step Instructions
Procedure:
1. Install the VSX Gateway
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Security Gateway and/or
Security Management.
n In the Products window:
option.
n In the Secure Internal Communication window, enter the
n The steps below are only for a Clean Install of a new VSX Gateway. To
configure a VSX Gateway that failed, see the R81 VSX Administration
Guide > Chapter Command Line Reference > Section vsx_util >
Section vsx_util reconfigure.
n The steps below are for the Dedicated Management Interfaces (DMI)
configuration. For the non-DMI configuration, see the R81 VSX
Administration Guide.
Step Instructions
Network Object > Gateways and Servers > VSX > New Gateway.
n In the top right corner, click Objects Pane > New > More >
Network Object > Gateways and Servers > VSX > Gateway.
The VSX Gateway Wizard opens.
Step Instructions
If the Trust State field does not show Trust established, perform these
steps:
a. Connect to the command line on the VSX Gateway.
b. Make sure there is a physical connectivity between the VSX
Gateway and the Management Server (for example, pings can
pass).
c. Run:
cpconfig
d. Enter the number of this option:
Secure Internal Communication
e. Follow the instructions on the screen to change the Activation Key.
f. In SmartConsole, on the VSX Gateway General Properties page,
click Reset.
g. Enter the same Activation Key you entered in the cpconfig menu.
h. In SmartConsole, click Initialize.
Step Instructions
13 Enable the applicable Software Blades for the VSX Gateway object itself
(context of VS0).
Refer to:
n sk79700: VSX supported features on R75.40VS and above
n sk106496: Software Blades updates on VSX R75.40VS and above
- FAQ
n Applicable Administration Guides on the R81 Home Page.
Step Instructions
18 Configure the applicable Threat Prevention Policy for this VSX Gateway.
Step Instructions
Step Instructions
Procedure:
1. Install the Cluster Members
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Security Gateway and/or
Security Management.
n In the Products window:
l ClusterXL
You can configure the ClusterXL object in either Wizard Mode, or Classic Mode.
Step Instructions
Step Instructions
Step Instructions
If the Trust State field does not show Trust established, perform
these steps:
a. Connect to the command line on the Cluster Member.
b. Make sure there is a physical connectivity between the
Cluster Member and the Management Server (for example,
pings can pass).
c. Run:
cpconfig
d. Enter the number of this option:
Secure Internal Communication
e. Follow the instructions on the screen to change the
Activation Key.
f. In SmartConsole, click Reset.
g. Enter the same Activation Key you entered in the
cpconfig menu.
h. In SmartConsole, click Initialize.
Step Instructions
Step Instructions
Step Instructions
If the Trust State field does not show Trust established, perform
these steps:
a. Connect to the command line on the Cluster Member.
b. Make sure there is a physical connectivity between the
Cluster Member and the Management Server (for example,
pings can pass).
c. Run:
cpconfig
d. Enter the number of this option:
Secure Internal Communication
e. Follow the instructions on the screen to change the
Activation Key.
f. In SmartConsole, click Reset.
g. Enter the same Activation Key you entered in the
cpconfig menu.
h. In SmartConsole, click Initialize.
l Active-Active
Step Instructions
Step Instructions
Step Instructions
Step Instructions
Cluster+Sync.
Notes:
o We do not recommend the configuration
Cluster+Sync.
o Check Point cluster supports only these
settings:
o One Sync interface.
o One Cluster+Sync interface.
o One Sync interface and one
Cluster+Sync interface.
o For Check Point Appliances or Open
Servers:
The Synchronization Network is supported
only on the lowest VLAN tag of a VLAN
interface.
l For interfaces that do not pass the traffic between the
Step Instructions
15 Click OK.
Step Instructions
Step Instructions
Step Instructions
If the Trust State field does not show Trust established, perform
these steps:
a. Connect to the command line on the Cluster Member.
b. Make sure there is a physical connectivity between the
Cluster Member and the Management Server (for example,
pings can pass).
c. Run:
cpconfig
d. Enter the number of this option:
Secure Internal Communication
e. Follow the instructions on the screen to change the
Activation Key.
f. In SmartConsole, click Reset.
g. Enter the same Activation Key you entered in the
cpconfig menu.
h. In SmartConsole, click Initialize.
l Active-Active
Step Instructions
Step Instructions
Step Instructions
Step Instructions
Cluster+Sync.
Notes:
o We do not recommend the configuration
Cluster+Sync.
o Check Point cluster supports only these
settings:
o One Sync interface.
o One Cluster+Sync interface.
o One Sync interface and one
Cluster+Sync interface.
o For Check Point Appliances or Open
Servers:
The Synchronization Network is supported
only on the lowest VLAN tag of a VLAN
interface.
l For interfaces that do not pass the traffic between the
Step Instructions
11 Click OK.
3. Configure the applicable Access Control policy for the ClusterXL in SmartConsole
Step Instructions
Step Instructions
Step Instructions
Procedure:
1. Install the VSX Cluster Members
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Security Gateway and/or
Security Management.
n In the Products window:
l ClusterXL
Notes:
n The steps below are only for a Clean Install of a new VSX Cluster. To
configure a VSX Cluster Member that failed, see the R81 VSX
Administration Guide > Chapter Command Line Reference > Section
vsx_util > Section vsx_util reconfigure.
n The steps below are for the Dedicated Management Interfaces (DMI)
Step Instructions
Network Object > Gateways and Servers > VSX > New Cluster.
n In the top right corner, click Objects Pane > New > More >
Network Object > Gateways and Servers > VSX > Cluster.
f. Click Next.
Step Instructions
If the Trust State field does not show Trust established, perform these
steps:
a. Connect to the command line on the VSX Cluster Member.
b. Make sure there is a physical connectivity between the VSX Cluster
Member and the Management Server (for example, pings can
pass).
c. Run:
cpconfig
d. Enter the number of this option:
Secure Internal Communication
e. Follow the instructions on the screen to change the Activation Key.
f. In SmartConsole, click Reset.
g. Enter the same Activation Key you entered in the cpconfig menu.
h. In SmartConsole, click Initialize.
Step Instructions
Step Instructions
- FAQ
n Applicable Administration Guides on the R81 Home Page.
Step Instructions
set virtual-system 0
show cluster state
n In the Expert mode, run:
vsenv 0
cphaprob state
Important:
n All VSX Cluster Members must show the same
set virtual-system 0
show cluster members interfaces all
n In the Expert mode, run:
vsenv 0
cphaprob -a if
Step Instructions
Step Instructions
set virtual-system 0
show cluster state
n In the Expert mode, run:
vsenv 0
cphaprob state
Important:
n All VSX Cluster Members must show the same
set virtual-system 0
show cluster members interfaces all
n In the Expert mode, run:
vsenv 0
cphaprob -a if
Procedure:
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Security Gateway and/or
Security Management.
n In the Products window:
l VRRP Cluster
6 Reboot.
2. Perform the initial VRRP configuration in Gaia on the VRRP Cluster Members
Follow the instructions in the R81 Gaia Administration Guide - Chapter High
Availability.
In addition, refer to:
n sk105170: Configuration requirements / considerations and limitations for VRRP
cluster on Gaia OS
n sk92061: How to configure VRRP on Gaia
Step Instructions
Step Instructions
Step Instructions
If the Trust State field does not show Trust established, perform
these steps:
a. Connect to the command line on the Cluster Member.
b. Make sure there is a physical connectivity between the
Cluster Member and the Management Server (for example,
pings can pass).
c. Run:
cpconfig
d. Enter the number of this option:
Secure Internal Communication
e. Follow the instructions on the screen to change the
Activation Key.
f. In SmartConsole, click Reset.
g. Enter the same Activation Key you entered in the
cpconfig menu.
h. In SmartConsole, click Initialize.
Step Instructions
Step Instructions
Step Instructions
If the Trust State field does not show Trust established, perform
these steps:
a. Connect to the command line on the Cluster Member.
b. Make sure there is a physical connectivity between the
Cluster Member and the Management Server (for example,
pings can pass).
c. Run:
cpconfig
d. Enter the number of this option:
Secure Internal Communication
e. Follow the instructions on the screen to change the
Activation Key.
f. In SmartConsole, click Reset.
g. Enter the same Activation Key you entered in the
cpconfig menu.
h. In SmartConsole, click Initialize.
Step Instructions
Cluster+Sync.
Notes:
o We do not recommend the configuration
Cluster+Sync.
o Check Point cluster supports only these
settings:
o One Sync interface.
o One Cluster+Sync interface.
o One Sync interface and one
Cluster+Sync interface.
o For Check Point Appliances or Open
Servers:
The Synchronization Network is supported
only on the lowest VLAN tag of a VLAN
interface.
l For interfaces that do not pass the traffic between the
Step Instructions
15 Click OK.
Step Instructions
Step Instructions
Step Instructions
If the Trust State field does not show Trust established, perform
these steps:
a. Connect to the command line on the Cluster Member.
b. Make sure there is a physical connectivity between the
Cluster Member and the Management Server (for example,
pings can pass).
c. Run:
cpconfig
d. Enter the number of this option:
Secure Internal Communication
e. Follow the instructions on the screen to change the
Activation Key.
f. In SmartConsole, click Reset.
g. Enter the same Activation Key you entered in the
cpconfig menu.
h. In SmartConsole, click Initialize.
Step Instructions
Cluster+Sync.
Notes:
o We do not recommend the configuration
Cluster+Sync.
o Check Point cluster supports only these
settings:
o One Sync interface.
o One Cluster+Sync interface.
o One Sync interface and one
Cluster+Sync interface.
o For Check Point Appliances or Open
Servers:
The Synchronization Network is supported
only on the lowest VLAN tag of a VLAN
interface.
l For interfaces that do not pass the traffic between the
Step Instructions
11 Click OK.
Ste
Instructions
p
Ste
Instructions
p
If the VRRP Cluster Members use dynamic routing protocols (such as OSPF
or RIP), create new rules for each multicast destination IP address.
Alternatively, you can create a Network object to represent all multicast
network IP destinations:
n Name: MCAST.NET (this is an example name)
n IP Address: 224.0.0.0
n Net mask: 240.0.0.0
You can use one rule for all multicast protocols you agree to accept, as
shown in this example:
Services
Inst
N Nam Sour Destinat VP & Acti Trac
all
o e ce ion N Applicati on k
On
ons
7 Configure and install the applicable Threat Prevention Policy on the VRRP
Cluster object.
Step Instructions
show vrrp
n In the Expert mode, run:
clish -c "show vrrp"
Important - You can deploy and configure a Full High Availability Cluster only on
Check Point Appliances that support Standalone configuration. See the R81 Release
Notes and "Installing a Standalone" on page 175.
For information on ClusterXL functionality, see the R81 ClusterXL Administration Guide.
For information on Security Management Servers, see the R81 Security Management
Administration Guide.
Procedure:
1. Install the first Cluster Member of the Full High Availability Cluster that runs the Primary
Security Management Server
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Security Gateway and/or
Security Management.
n In the Products window:
ClusterXL.
l In the Define Security Management as field, select
Primary.
n In the Security Management Administrator window, select one of
these options:
l Use Gaia administrator
connect
l Network - Allows all computers on the specified network to
connect
l Range of IPv4 addresses - Allows all computers in the
Step Instructions
2. Install the second Cluster Member of the Full High Availability Cluster that runs the
Secondary Security Management Server
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Security Gateway and/or
Security Management.
n In the Products window:
ClusterXL.
l In the Define Security Management as field, select
Secondary.
n In the Secure Internal Communication window, enter the
Step Instructions
Step Instructions
Step Instructions
1 Connect with SmartConsole to the Cluster Member that runs the Primary
Security Management Server.
4 Click Next.
5 Configure the settings for the Full High Availability Cluster Member that
runs the Secondary Security Management Server:
a. In the Secondary Member Name field, enter the hostname that you
entered during the First Time Configuration Wizard.
b. In the Secondary Member Name IP Address field, enter the IP
address of the Gaia Management Interface that you entered during
the First Time Configuration Wizard.
c. Enter and confirm the SIC Activation Key that you entered during
the First Time Configuration Wizard.
6 Click Next.
interface.
8 Click Next.
10 Click Finish.
Note - You can also control the Full High Availability Cluster Members in Gaia Portal
> High Availability > Cluster page.
Best Practice - We recommend that you install a dedicated Log Server and configure
the Cluster Members to forward their logs to that dedicated Log Server.
Step Instructions
2 Connect with SmartConsole to the Full High Availability Cluster Member that runs
the Primary Security Management Server.
5 From the left navigation tree, click Logs > Additional Logging Configuration.
6 Select Forward log files to Log Server and select the object of the dedicated Log
Server.
7 In the Log forwarding schedule field, select or define a Scheduled Event object.
8 Click OK.
Installing a Standalone
In a Standalone deployment, a Check Point computer runs both the Security Gateway and
Security Management Server products.
Important:
n These instructions apply only to Check Point Appliances that support a
Standalone deployment.
n These instructions apply to all Open Servers.
n These instructions apply to Virtual Machines.
See the R81 Release Notes for the requirements for a Standalone deployment.
Step Instructions
Appliances" on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Security Gateway
Primary.
n In the Security Management Administrator window, select one
of these options:
l Use Gaia administrator
to connect
l Network - Allows all computers on the specified network to
connect
l Range of IPv4 addresses - Allows all computers in the
Step Instructions
Step Instructions
7 Click OK.
3. Configure the applicable Access Control policy for the Standalone in SmartConsole
Step Instructions
This method is supported only on Check Point appliances that support a Standalone
deployment.
This method installs a Standalone on a Check Point appliance in Bridge Mode.
For more information on Gaia Quick Standalone Setup on Check Point appliances, see
sk102231.
Post-Installation Configuration
After the installation is complete, and you rebooted the Check Point computer:
n Configure the applicable settings in the Check Point Configuration Tool.
n Check the recommended and available software packages in CPUSE (see "Installing
Software Packages on Gaia" on page 185).
The Check Point Configuration Tool lets you configure these settings:
Check Point
Commands Available Configuration Options
computer
(9) Exit
(13) Exit
Check Point
Commands Available Configuration Options
computer
(11) Exit
Explanation about the Configuration Options on a Security Management Server, dedicated Log
Server or SmartEvent Server
For more information, see the R81 Security Management Administration Guide.
Note - The options shown depend on the configuration and installed products.
Licenses and Manages Check Point licenses and contracts on this server.
contracts
GUI Clients Configures the GUI clients that can use SmartConsole to connect
to this server.
Random Pool Configures the RSA keys, to be used by Gaia Operating System.
Automatic start of Shows and controls which of the installed Check Point products
Check Point start automatically during boot.
Products
For more information, see the R81 Multi-Domain Security Management Administration
Guide.
Leading VIP Interfaces The Leading VIP Interfaces are real interfaces connected
to an external network.
These interfaces are used when you configure virtual IP
addresses for Domain Management Servers.
GUI Clients Configures the GUI clients that can use SmartConsole to
connect to this server.
Start Multi-Domain Server Configures a password to control the start of the Multi-
Password Domain Server.
IPv6 Support for Multi- Enables or disables the IPv6 Support on the Multi-
Domain Server Domain Server.
Important - R81 Multi-Domain Server does not
support IPv6 address configuration (Known
Limitation PMTR-14989).
IPv6 Support for Existing Enables or disables the IPv6 Support on the Domain
Domain Management Management Servers.
Servers Important - R81 Multi-Domain Server does not
support IPv6 address configuration (Known
Limitation PMTR-14989).
Note - The options shown depend on the configuration and installed products.
Licenses and contracts Manages Check Point licenses and contracts on this
Security Gateway or Cluster Member.
Enable Check Point Per Enables Virtual System Load Sharing on the VSX
Virtual System State Cluster Member.
For more information, see the R81 VSX Administration
Guide.
Disable Check Point Per Disables Virtual System Load Sharing on the VSX
Virtual System State Cluster Member.
For more information, see the R81 VSX Administration
Guide.
Enable Check Point Enables Check Point ClusterXL for Bridge mode.
ClusterXL for Bridge This change requires a reboot of the Cluster Member.
Active/Standby For more information, see the R81 ClusterXL
Administration Guide.
Disable Check Point Disables Check Point ClusterXL for Bridge mode.
ClusterXL for Bridge This change requires a reboot of the Cluster Member.
Active/Standby For more information, see the R81 ClusterXL
Administration Guide.
Automatic start of Check Shows and controls which of the installed Check Point
Point Products products start automatically during boot.
n Use the Central Deployment Tool on the Management Server to deploy the applicable
packages to the managed Security Gateways and Clusters.
For more information, see sk111158.
You use the CPUSE on each Gaia computer to install the applicable packages.
For more information, see sk92449.
Installation
Action Plan
Method
Offline See the instructions for a Gaia computer that is not connected to
the Internet.
Installation
Action Plan
Method
l Upgrade Wizard
l Upgrade Wizard
Important:
When you perform an upgrade to R81 with CPUSE from R80.20.M1, R80.20,
R80.20.M2, R80.30, or higher versions, you can see the upgrade report in Gaia
Portal:
1. From the left navigation tree, click Upgrades (CPUSE) > Status and Actions.
2. In the Major Versions section, select the R81 Upgrade package.
3. In the right pane Package Details, click the link To see a detailed upgrade
report.
4. A pop up opens and shows the upgrade progress in real time.
The report supports only these configurations:
n Security Management Servers
n Endpoint Security Management Servers
n CloudGuard Controllers
n Multi-Domain Servers
n Log Servers
n Endpoint Policy Servers
n Multi-Domain Log Servers
n Standalone Servers
Note - Use these to download the applicable installation and upgrade images:
n The Upgrade/Download Wizard.
n The Central Deployment in SmartConsole.
For more information, see the R81 Security Management Administration Guide
> Chapter Managing Gateways > Section Central Deployment of Hotfixes and
Version Upgrades.
Procedure
1. Connect to the Management Server that manages the R7x Security Gateway or
Cluster
2. Add a new explicit Firewall rule:
Install
Source Destination VPN Service Action
On
3. Install the modified Firewall Policy on the R7x Security Gateway or Cluster.
4. If you upgrade this R7x Security Gateway or Cluster to R80.10 or higher, delete
this explicit rule.
The upgrade process replaces all existing files with default files. You must not copy the
customized configuration files from the current version to the upgraded version, because
these files can be unique for each version. You must make all the custom configurations
again after the upgrade.
l $FWDIR/lib/
l $FWDIR/conf/
l $CVPNDIR/conf/
l /opt/CP*/lib/
l /opt/CP*/conf/
l $MDSDIR/conf/
l $MDSDIR/customers/<Name_of_Domain>/CP*/lib/
l $MDSDIR/customers/<Name_of_Domain>/CP*/conf/
n For your Management Servers in High Availability configuration, plan the upgrade.
Action Plan for Security Management Servers in High Availability
Important - To back up and restore a consistent Security Management
environment, make sure to collect and restore the backups and snapshots
from all servers in the High Availability environment at the same time.
Upgrade to
Action Plan
R81
Upgrade to
Action Plan
R81
Important - You must upgrade your Management Servers before you can
upgrade these dedicated servers.
Note - SmartEvent Server can run the same version or higher than the Log Server.
n If your Multi-Domain Server manages Multi-Domain Log Servers, you must upgrade the
Multi-Domain Log Servers to the same version as the Multi-Domain Server.
Important - You must upgrade your Multi-Domain Servers before you can
upgrade the Multi-Domain Log Servers.
n Before you upgrade a Multi-Domain Server, we recommend the steps below to optimize
the upgrade process.
Procedure
Step Instructions
n Before you start an upgrade or migration procedure on your Management Servers, you
must close all GUI clients (SmartConsole applications) connected to your Check Point
computers.
n Before you start an upgrade of your Security Gateway and Cluster Members, you must
upgrade the Management Server.
n On Smart-1 appliances with Multi-Domain Server or Multi-Domain Log Server installed, if
you configured an interface other than Mgmt as the Leading interface, the upgrade
process or clean install process (with CPUSE) configures the interface Mgmt to be the
Leading interface. To configure a different interface as the Leading interface after the
upgrade, see sk107336.
n If an external storage device is connected to a Management Server or Log Server, you
must follow sk66003.
Action Plan
l $FWDIR/conf/discntd.if
l $FWDIR/conf/cpha_bond_ls_config.conf
l $FWDIR/conf/resctrl
l $FWDIR/conf/vsaffinity_exception.conf
l $FWDIR/database/qos_policy.C
l simkern.conf
o In R80.20 and higher: $PPKDIR/conf/simkern.conf
o In R80.10 and lower: $PPKDIR/boot/modules/simkern.conf
l sim_aff.conf
o In R80.20 and higher: $PPKDIR/conf/sim_aff.conf
o In R80.10 and lower: $PPKDIR/boot/modules/sim_aff.conf
l /var/ace/sdconf.rec
l /var/ace/sdopts.rec
l /var/ace/sdstatus.12
l /var/ace/securid
Prerequisites:
n Make sure you use the latest version of this document (see the "Important Information"
on page 3 page for links).
n See the R81 Release Notes for:
l Supported upgrade paths
l Minimum hardware and operating system requirements
l Supported Security Gateways
n Make sure to read all applicable known limitations in the R81 Known Limitations SK.
n Before starting an upgrade of your Security Gateway and Cluster Members, you must
upgrade the Management Server.
n Licenses and Service Contracts:
l Make sure you have valid licenses installed on all applicable Check Point
computers - source and target.
l Make sure you have a valid Service Contract that includes software upgrades and
major releases registered to your Check Point User Center account (see "Contract
Verification" on page 205).
The contract file is stored on the Management Server and downloaded to Check
Point Security Gateways during the upgrade process.
For more information about Service Contracts, see sk33089.
Procedure:
Step Instructions
1 Open these files on the Management Server and write down all custom changes
in the applicable files:
Step Instructions
n Apache configuration:
$CVPNDIR/conf/httpd.conf
$CVPNDIR/conf/includes/*
n Local certificates:
$CVPNDIR/var/ssl/ca-bundle/*
n RSA configuration:
/var/ace/sdconf.rec
n Mobile Access Gaia Portal configuration (run these commands in the Expert
mode to see the applicable files):
find $CVPNDIR/ -name *.php -type f -exec ls {} \;
find $CVPNDIR/ -name *.gif -type f -exec ls {} \;
find $CVPNDIR/ -name *.jpg -type f -exec ls {} \;
2 Upgrade the Management Server to R81 using one of the supported methods
(see "Upgrade Methods" on page 200).
4 Manually edit the default files on the upgraded the Management Server to include
your custom changes.
Upgrade Methods
You can use this method to upgrade your Security Gateways and Cluster Members:
Central
Central
Gateway Deployment CPUSE
Deployment
Tool
You can use these methods to upgrade your Management Servers and Log Servers:
With Central Deployment in SmartConsole, you can install software packages to upgrade or
to perform a clean install on Security Gateways and Cluster Members.
You can Deploy a Hotfix or Upgrade Package from:
Upgrade of Security Gateways and Cluster Members with Central Deployment Tool
With Central Deployment Tool on the Management Server, you can install software
packages to upgrade or to perform a clean install on Security Gateways and Cluster
Members.
For more information, see sk111158.
With CPUSE, you can install software packages to upgrade or to perform a clean install on
Check Point computers that run on the Gaia Operating System.
For more about CPUSE, see sk92449.
For detailed CPUSE upgrade instructions, see:
n "Upgrading a Security Management Server or Log Server from R80.20 and higher
with CPUSE" on page 211
n "Upgrading one Multi-Domain Server from R80.20 and higher" on page 249
n "Upgrading Multi-Domain Servers in High Availability from R80.20 and higher" on
page 273
n "Upgrading a Multi-Domain Log Server from R80.20 and higher with CPUSE" on
page 329
n "Upgrading an Endpoint Security Management Server or Endpoint Policy Server from
R80.20 and higher with CPUSE" on page 351
Note - When you perform an upgrade to R81 with CPUSE from R80.20.M1,
R80.20, R80.20.M2, R80.30, or higher versions, you can see the upgrade report in
Gaia Portal. See "Installing Software Packages on Gaia" on page 185.
In an advanced upgrade scenario, perform these steps on the same Check Point
computer:
Step Instructions
1 Take a full backup and snapshot of the current Check Point computer.
2 Export the entire management database with the R81 Management Server
Migration Tool.
In a migration and upgrade scenario, perform these steps on the source Check Point
computer and the different target Check Point computer:
Step Instructions
1 Export the entire management database from the source Check Point
computer with the R81 Management Server Migration Tool.
3 Import the entire management database on the new target R81 Check Point
computer.
Contract Verification
Before you upgrade your Management Server to R81, you must have a valid Support Contract
that includes software upgrades and major releases registered to your Check Point User
Center account.
By verifying your status with the User Center, the contract file enables you to remain compliant
with current Check Point licensing standards.
As in all upgrade procedures, first upgrade your Security Management Server or Multi-Domain
Server before upgrading the Security Gateways.
When you upgrade a Management Server, the upgrade process checks to see whether a
Contract File is already present.
If a Contract File is not present, later you can download a Contract File manually from the
Check Point User Center and import it.
If a Contract File does not cover the Management Server, a message informs you that the
Management Server is not eligible for upgrade.
Important - The absence of a valid Contract File does not prevent upgrade.
Note - In most cases, you do not need to worry about your Service Contract File. Your
Management Server is configured to communicate with the User Center
automatically, and download the most current file. This allows the Management
Server to enable the purchased services properly.
Option Instructions
Download a contract If you have Internet access and a valid Check Point User Center
file from the User account, download a Contract File directly from your User Center
Center account:
Import a local If the Management Server does not have Internet access:
contract file
1. On a computer with Internet access, log in to your Check
Point User Center account.
2. In the top menu, click Assets/Info > Download Contract File
and follow the instructions on the screen.
3. Transfer the downloaded contract file to your Management
Server.
4. Select Import a local contracts file.
5. Enter the full path to the location where you stored the
contract file.
Option Instructions
Continue without Select this option, if you intend to get and install a valid Contract
contract information File later.
Note that at this point your managed Security Gateways are not
strictly eligible for an upgrade.
You may be in violation of your Check Point Licensing Agreement,
as shown in the final message of the upgrade process.
Upgrade Tools
Important - You must always use the latest version of the R81 Upgrade Tools from
sk135172 to:
n Upgrade from R80.20.M1, R80.20, R80.20.M2, R80.30, or higher versions
n Migrate a Domain Management Server between Multi-Domain Servers
n Migrate a Domain Management Server from a Multi-Domain Server to a
Security Management Server
n Migrate a Security Management Server to a Domain on a Multi-Domain Server
n Back up and restore a Domain on a Multi-Domain Server
Notes:
n If the Management Server / Log Server is connected to the Internet and you
enabled the "Allow Download" consent flag (see sk111080), then the server
downloads and installs the latest version of the Upgrade Tools automatically.
To enable the "Allow Download" consent flag:
l In the Gaia First Time Configuration Wizard, you selected the option
Contracts and other important data in Menu > Global properties >
Security Management.
n If the Management Server / Log Server is not connected to the Internet, then
you must install the latest version of the Upgrade Tools manually.
Message
Instructions
Category
Action items Errors and warnings that you must fix after the upgrade.
after the upgrade
The most important files in the Management Server Migration Tool and Upgrade Tools
packages:
Package Instructions
migrate_ Exports and imports the management database and applicable Check
server Point configuration.
For details, see the R81 CLI Reference Guide - Chapter Security
Management Server Commands > Section migrate_server.
Notes:
n This procedure is supported only for servers that run R80.20.M1, R80.20,
R80.20.M2, R80.30, or higher versions.
n These instructions equally apply to:
l Security Management Server
l CloudGuard Controller
4 You must close all GUI clients (SmartConsole applications) connected to the
source Security Management Server.
6 Run the Pre-Upgrade Verifier on all source servers and fix all detected issues
before you start the upgrade.
Procedure:
1. Get the required Upgrade Tools on the server
Important - See "Upgrade Tools" on page 207 to understand if your server
can download and install the latest version of the Upgrade Tools
automatically.
Step Instructions
See "Installing Software Packages on Gaia" on page 185 and follow the applicable
action plan.
This step is part of the upgrade procedure of a Management Server. If you upgrade a
dedicated Log Servers or SmartEvent Servers, then skip this step.
5. Update the object version of the dedicated Log Servers and SmartEvent Servers
Important - If your Security Management Server manages dedicated Log
Servers or SmartEvent Servers, you must update the version of the
corresponding objects in SmartConsole.
Step Instructions
6 Click OK.
Step Instructions
Step Instructions
4 Click Install.
5 Click OK.
Step Instructions
2 In the SmartConsole, from the left navigation panel, click Logs & Monitor.
4 In the bottom left corner, in the External Apps section, click SmartEvent
Settings & Policy.
The Legacy SmartEvent client opens.
5 In the top left corner, click Menu > Actions > Install Event Policy.
6 Confirm.
8 Click Close.
Step Instructions
For more information, see the R81 Logging and Monitoring Administration Guide >
Chapter Log Exporter.
Step Instructions
Step Instructions
Notes:
n This procedure is supported only for servers that run R80.20.M1, R80.20,
R80.20.M2, R80.30, or higher versions.
n These instructions equally apply to:
l Security Management Server
l CloudGuard Controller
4 You must close all GUI clients (SmartConsole applications) connected to the
source Security Management Server.
6 Run the Pre-Upgrade Verifier on all source servers and fix all detected issues
before you start the upgrade.
Procedure:
1. Get the required Upgrade Tools on the source server
Important - See "Upgrade Tools" on page 207 to understand if your server
can download and install the latest version of the Upgrade Tools
automatically.
Step Instructions
2. On the current Security Management Server, run the Pre-Upgrade Verifier and export the
entire management database
Step Instructions
run:
./migrate_server verify -v R81
n If this Security Management Server is not connected to the Internet,
run:
./migrate_server verify -v R81 -skip_upgrade_
tools_check
For details, see the R81 CLI Reference Guide - Chapter Security
Management Server Commands - Section migrate_server.
run:
./migrate_server export -v R81 [-l | -x]
/<Full Path>/<Name of Exported File>
n If this Security Management Server is not connected to the Internet,
run:
./migrate_server export -v R81 -skip_upgrade_
tools_check [-l | -x] /<Full Path>/<Name of
Exported File>
For details, see the R81 CLI Reference Guide - Chapter Security
Management Server Commands - Section migrate_server.
Step Instructions
Step Instructions
2 Perform the clean install in one of these ways (do not perform initial
configuration in SmartConsole):
n Follow "Installing Software Packages on Gaia" on page 185 - select
the R81 package and perform Clean Install. See sk92449 for
detailed steps.
n Follow "Installing One Security Management Server only, or
Step Instructions
If you installed the target R81 Security Management Server with a different IP
address than the source Security Management Server, you must create a special
JSON configuration file before you import the management database from the
source Security Management Server. Note that you have to issue licenses for the
new IP address.
Important:
n If none of the servers in the same Security Management environment
Step Instructions
Step Instructions
Example
There are 2 servers in the R80.30 Security Management environment
- the Security Management Server and the Log Server. The Security
Management Server migrates to a new IP address. The Log Server
remains with the original IP address.
a. The current IPv4 address of the source R80.30 Security
Management Server is:
192.168.10.21
b. The name of the source R80.30 Security Management Server
object in SmartConsole is:
MySecMgmtServer
c. The new IPv4 address of the target R81 Security Management
Server is:
172.30.40.51
d. The required syntax for the JSON configuration file you must use
on the Security Management Server and on the Log Server:
[{"name":"MySecMgmtServer","newIpAddress4":"172
.30.40.51"}]
Important - All servers in this environment must get this
same information.
Step Instructions
Step Instructions
run:
./migrate_server import -v R81 [-l | -x]
/<Full Path>/<Name of Exported File>.tgz
n If this Security Management Server is not connected to the
Internet, run:
./migrate_server import -v R81 -skip_
upgrade_tools_check [-l | -x] /<Full
Path>/<Name of Exported File>.tgz
Important - The "migrate_server import" command
automatically restarts Check Point services (runs the "cpstop"
and "cpstart" commands).
For details, see the R81 CLI Reference Guide - Chapter Security
Management Server Commands - Section migrate_server.
Step Instructions
1 Issue licenses for the new IP address in your Check Point User Center
account.
Step Instructions
This step is part of the upgrade procedure of a Management Server. If you upgrade a
dedicated Log Servers or SmartEvent Servers, then skip this step.
9. Update the object version of the dedicated Log Servers and SmartEvent Servers
Important - If your Security Management Server manages dedicated Log
Servers or SmartEvent Servers, you must update the version of the
corresponding objects in SmartConsole.
Step Instructions
6 Click OK.
Step Instructions
4 Click Install.
5 Click OK.
Step Instructions
2 In the SmartConsole, from the left navigation panel, click Logs & Monitor.
4 In the bottom left corner, in the External Apps section, click SmartEvent
Settings & Policy.
The Legacy SmartEvent client opens.
5 In the top left corner, click Menu > Actions > Install Event Policy.
6 Confirm.
8 Click Close.
Step Instructions
For more information, see the R81 Logging and Monitoring Administration Guide >
Chapter Log Exporter.
Step Instructions
Step Instructions
Notes:
n This procedure is supported only for servers that run R80.20.M1, R80.20,
R80.20.M2, R80.30, or higher versions.
n These instructions equally apply to:
l Security Management Server
4 You must close all GUI clients (SmartConsole applications) connected to the
source Security Management Server.
6 Run the Pre-Upgrade Verifier on all source servers and fix all detected issues
before you start the upgrade.
Procedure:
1. Get the required Upgrade Tools on the source server
Important - See "Upgrade Tools" on page 207 to understand if your server
can download and install the latest version of the Upgrade Tools
automatically.
Step Instructions
2. On the current Security Management Server, run the Pre-Upgrade Verifier and export the
entire management database
Step Instructions
run:
./migrate_server verify -v R81
n If this Security Management Server is not connected to the Internet,
run:
./migrate_server verify -v R81 -skip_upgrade_
tools_check
For details, see the R81 CLI Reference Guide - Chapter Security
Management Server Commands - Section migrate_server.
run:
./migrate_server export -v R81 [-l | -x]
/<Full Path>/<Name of Exported File>
n If this Security Management Server is not connected to the Internet,
run:
./migrate_server export -v R81 -skip_upgrade_
tools_check [-l | -x] /<Full Path>/<Name of
Exported File>
For details, see the R81 CLI Reference Guide - Chapter Security
Management Server Commands - Section migrate_server.
Step Instructions
Step Instructions
2 Perform the clean install in one of these ways (do not perform initial
configuration in SmartConsole):
n Follow "Installing Software Packages on Gaia" on page 185 - select
the R81 package and perform Clean Install. See sk92449 for
detailed steps.
n Follow "Installing One Security Management Server only, or
Step Instructions
If you installed the target R81 Security Management Server with a different IP
address than the source Security Management Server, you must create a special
JSON configuration file before you import the management database from the
source Security Management Server. Note that you have to issue licenses for the
new IP address.
Important:
n If none of the servers in the same Security Management environment
Step Instructions
Step Instructions
Example
There are 2 servers in the R80.30 Security Management environment
- the Security Management Server and the Log Server. The Security
Management Server migrates to a new IP address. The Log Server
remains with the original IP address.
a. The current IPv4 address of the source R80.30 Security
Management Server is:
192.168.10.21
b. The name of the source R80.30 Security Management Server
object in SmartConsole is:
MySecMgmtServer
c. The new IPv4 address of the target R81 Security Management
Server is:
172.30.40.51
d. The required syntax for the JSON configuration file you must use
on the Security Management Server and on the Log Server:
[{"name":"MySecMgmtServer","newIpAddress4":"172
.30.40.51"}]
Important - All servers in this environment must get this
same information.
Step Instructions
Step Instructions
run:
./migrate_server import -v R81 [-l | -x]
/<Full Path>/<Name of Exported File>.tgz
n If this Security Management Server is not connected to the
Internet, run:
./migrate_server import -v R81 -skip_
upgrade_tools_check [-l | -x] /<Full
Path>/<Name of Exported File>.tgz
Important - The "migrate_server import" command
automatically restarts Check Point services (runs the "cpstop"
and "cpstart" commands).
For details, see the R81 CLI Reference Guide - Chapter Security
Management Server Commands - Section migrate_server.
Step Instructions
1 Issue licenses for the new IP address in your Check Point User Center
account.
Step Instructions
This step is part of the upgrade procedure of a Management Server. If you upgrade a
dedicated Log Servers or SmartEvent Servers, then skip this step.
9. Update the object version of the dedicated Log Servers and SmartEvent Servers
Important - If your Security Management Server manages dedicated Log
Servers or SmartEvent Servers, you must update the version of the
corresponding objects in SmartConsole.
Step Instructions
6 Click OK.
Step Instructions
4 Click Install.
5 Click OK.
Step Instructions
2 In the SmartConsole, from the left navigation panel, click Logs & Monitor.
4 In the bottom left corner, in the External Apps section, click SmartEvent
Settings & Policy.
The Legacy SmartEvent client opens.
5 In the top left corner, click Menu > Actions > Install Event Policy.
6 Confirm.
8 Click Close.
Step Instructions
For more information, see the R81 Logging and Monitoring Administration Guide >
Chapter Log Exporter.
Step Instructions
Step Instructions
15. Disconnect the old Security Management Server from the network
l CloudGuard Controllers
4 You must close all GUI clients (SmartConsole applications) connected to the
source Security Management Server.
6 Run the Pre-Upgrade Verifier on all source servers and fix all detected issues
before you start the upgrade.
Important - Before you can install Hotfixes on servers that work in Management High
Availability, you must upgrade all these servers.
Procedure:
Step Instructions
1 Upgrade the Primary Security Management Server with one of the supported
methods.
n CPUSE
See "Upgrading a Security Management Server or Log Server from R80.20
and higher with CPUSE" on page 211
n Advanced Upgrade
See "Upgrading a Security Management Server or Log Server from R80.20
and higher with Advanced Upgrade" on page 217
n Migration
See "Upgrading a Security Management Server or Log Server from R80.20
and higher with Migration" on page 229
2 Upgrade the Secondary Security Management Server with one of the supported
methods.
Important:
n Make sure the Security Management Servers can communicate with
each other and SIC works between these servers. For details, see
sk179794.
n If you upgraded the Primary Security Management Server and
changed its IPv4 address before you upgrade the Secondary Security
Management Server, then you must put the required JSON file on the
Secondary Security Management Server. See the corresponding
section below.
n CPUSE
See "Upgrading a Security Management Server or Log Server from R80.20
and higher with CPUSE" on page 211
n Advanced Upgrade
See "Upgrading a Security Management Server or Log Server from R80.20
and higher with Advanced Upgrade" on page 217
n Migration
See "Upgrading a Security Management Server or Log Server from R80.20
and higher with Migration" on page 229
Step Instructions
6 Make sure Secure Internal Communication (SIC) works correctly with the
Secondary Security Management Server:
a. From the left navigation panel, click Gateways & Servers.
b. Open the Secondary Security Management Server object.
c. On the General Properties page, click Communication.
d. Click Test SIC Status.
The SIC Status must show Communicating.
e. Click Close.
f. Click OK.
Step Instructions
a. In the SmartConsole, from the left navigation panel, click Logs & Monitor.
b. At the top, click + to open a new tab.
c. In the bottom left corner, in the External Apps section, click SmartEvent
Settings & Policy.
The Legacy SmartEvent client opens.
d. In the top left corner, click Menu > Actions > Install Event Policy.
e. Confirm.
f. Wait for these messages to appear:
SmartEvent Policy Installer installation complete
SmartEvent Policy Installer installation succeeded
g. Click Close.
h. Close the Legacy SmartEvent client.
For more information, see the R81 Logging and Monitoring Administration Guide
> Chapter Log Exporter
If you installed the target R81 Security Management Server with a different IP address than
the source Security Management Server, you must create a special JSON configuration
file before you import the management database from the source Security Management
Server. Note that you have to issue licenses for the new IP address.
Important:
n If none of the servers in the same Security Management environment
changed their original IP addresses, then you do not need to create the
special JSON configuration file.
n Even if only one of the servers migrates to a new IP address, all the other
servers (including all Log Servers and SmartEvent Servers) must get this
configuration file for the import process.
You must use the same JSON configuration file on all servers (including
Log Servers and SmartEvent Servers) in the same Security Management
environment.
Step Instructions
1 Connect to the command line on the target R81 Security Management Server.
Step Instructions
3 Create the /var/log/mdss.json file that contains each server that migrates
to a new IP address.
Format for migrating only the Primary Security Management Server to a new IP
address
Format for migrating both the Primary and the Secondary Security Management
Server to new IP addresses
Format for migrating both the Primary and the Secondary Security Management
Servers, and the Log Server to new IP addresses
Step Instructions
Example
There are 3 servers in the R80.30 Security Management environment - the
Primary Security Management Server, the Secondary Security Management
Server, and the Log Server. Both the Primary and the Secondary Security
Management Servers migrate to new IP addresses. The Log Server remains
with the original IP address.
a. The current IPv4 address of the source Primary R80.30 Security
Management Server is:
192.168.10.21
b. The current IPv4 address of the source Secondary R80.30 Security
Management Server is:
192.168.10.22
c. The name of the source Primary R80.30 Security Management Server
object in SmartConsole is:
MyPrimarySecMgmtServer
d. The name of the source Secondary R80.30 Security Management
Server object in SmartConsole is:
MySecondarySecMgmtServer
e. The new IPv4 address of the target Primary R81 Security Management
Server is:
172.30.40.51
f. The new IPv4 address of the target Secondary R81 Security
Management Server is:
172.30.40.52
g. The required syntax for the JSON configuration file you must use on both
the Primary and the Secondary Security Management Servers, and on
the Log Server:
[{"name":"MyPrimarySecMgmtServer","newIpAddress4":"17
2.30.40.51"},
{"name":"MySecondarySecMgmtServer","newIpAddress4":"1
72.30.40.52"}]
Important - All servers in this environment must get this same
information.
Notes:
n This procedure is supported only for servers that run R80.20.M1, R80.20,
R80.20.M2, R80.30, or higher versions.
n For additional information related to this upgrade, see sk163814.
Important - Do not publish any changes in the Global Domain until you
complete the upgrade to the next available version. This is necessary to
avoid any potential issues caused by different policy revisions on the
Global Domain and on other Domains.
5 You must close all GUI clients (SmartConsole applications) connected to the
source Multi-Domain Server.
7 Run the Pre-Upgrade Verifier on all source servers and fix all detected issues
before you start the upgrade.
Procedure:
1. Get the required Upgrade Tools on the server
Important - See "Upgrade Tools" on page 207 to understand if your server
can download and install the latest version of the Upgrade Tools
automatically.
Step Instructions
See "Installing Software Packages on Gaia" on page 185 and follow the applicable
action plan.
4. Upgrade the Multi-Domain Log Servers, dedicated Log Servers, and dedicated
SmartEvent Servers
Important - If your Multi-Domain Server manages Multi-Domain Log Servers,
dedicated Log Servers, or dedicated SmartEvent Servers, you must upgrade
these dedicated servers to the same version as the Multi-Domain Server.
Step Instructions
For more information, see the R81 Logging and Monitoring Administration Guide >
Chapter Log Exporter.
Step Instructions
Step Instructions
Notes:
n This procedure is supported only for servers that run R80.20.M1, R80.20,
R80.20.M2, R80.30, or higher versions.
n For additional information related to this upgrade, see sk163814.
Important - Do not publish any changes in the Global Domain until you
complete the upgrade to the next available version. This is necessary to
avoid any potential issues caused by different policy revisions on the
Global Domain and on other Domains.
5 You must close all GUI clients (SmartConsole applications) connected to the
source Multi-Domain Server.
7 Run the Pre-Upgrade Verifier on all source servers and fix all detected issues
before you start the upgrade.
Procedure:
1. Get the required Upgrade Tools on the source server
Important - See "Upgrade Tools" on page 207 to understand if your server
can download and install the latest version of the Upgrade Tools
automatically.
Step Instructions
2. On the current Multi-Domain Server, run the Pre-Upgrade Verifier and export the entire
management database
Step Instructions
$MDS_FWDIR/scripts/migrate_server verify -v
R81
n If this Multi-Domain Server is not connected to the Internet, run:
$MDS_FWDIR/scripts/migrate_server verify -v
R81 -skip_upgrade_tools_check
For details, see the R81 CLI Reference Guide - Chapter Multi-Domain
Security Management Commands - Section migrate_server.
Step Instructions
Step Instructions
2 Perform the clean install in one of these ways (do not perform initial
configuration in SmartConsole):
n Follow "Installing Software Packages on Gaia" on page 185 - select
the R81 package and perform Clean Install. See sk92449 for
detailed steps.
n Follow "Installing One Multi-Domain Server Only, or Primary Multi-
Step Instructions
Step Instructions
Step Instructions
Step Instructions
9 Make sure that all the required daemons (FWM, FWD, CPD, and CPCA)
are in the state "up" and show their PID (the "pnd" state is also
acceptable):
mdsstat
If some of the required daemons on a Domain Management Server are in
the state "down", then wait for 5-10 minutes, restart that Domain
Management Server, and check again. Run these three commands:
mdsstop_customer <IP Address or Name of Domain
Management Server>
mdsstart_customer <IP Address or Name of Domain
Management Server>
mdsstat
7. Upgrade the Multi-Domain Log Servers, dedicated Log Servers, and dedicated
SmartEvent Servers
Step Instructions
For more information, see the R81 Logging and Monitoring Administration Guide >
Chapter Log Exporter.
Step Instructions
Step Instructions
Notes:
n This procedure is supported only for servers that run R80.20.M1, R80.20,
R80.20.M2, R80.30, or higher versions.
n For additional information related to this upgrade, see sk163814.
Important - Do not publish any changes in the Global Domain until you
complete the upgrade to the next available version. This is necessary to
avoid any potential issues caused by different policy revisions on the
Global Domain and on other Domains.
5 You must close all GUI clients (SmartConsole applications) connected to the
source Multi-Domain Server.
7 Run the Pre-Upgrade Verifier on all source servers and fix all detected issues
before you start the upgrade.
Procedure:
1. Get the required Upgrade Tools on the source server
Important - See "Upgrade Tools" on page 207 to understand if your server
can download and install the latest version of the Upgrade Tools
automatically.
Step Instructions
2. On the current Multi-Domain Server, run the Pre-Upgrade Verifier and export the entire
management database
Step Instructions
$MDS_FWDIR/scripts/migrate_server verify -v
R81
n If this Multi-Domain Server is not connected to the Internet, run:
$MDS_FWDIR/scripts/migrate_server verify -v
R81 -skip_upgrade_tools_check
For details, see the R81 CLI Reference Guide - Chapter Multi-Domain
Security Management Commands - Section migrate_server.
Step Instructions
Step Instructions
2 Perform the clean install in one of these ways (do not perform initial
configuration in SmartConsole):
n Follow "Installing Software Packages on Gaia" on page 185 - select
the R81 package and perform Clean Install. See sk92449 for
detailed steps.
n Follow "Installing One Multi-Domain Server Only, or Primary Multi-
Step Instructions
Step Instructions
Step Instructions
Step Instructions
9 Make sure that all the required daemons (FWM, FWD, CPD, and CPCA)
are in the state "up" and show their PID (the "pnd" state is also
acceptable):
mdsstat
If some of the required daemons on a Domain Management Server are in
the state "down", then wait for 5-10 minutes, restart that Domain
Management Server, and check again. Run these three commands:
mdsstop_customer <IP Address or Name of Domain
Management Server>
mdsstart_customer <IP Address or Name of Domain
Management Server>
mdsstat
7. Upgrade the Multi-Domain Log Servers, dedicated Log Servers, and dedicated
SmartEvent Servers
Step Instructions
For more information, see the R81 Logging and Monitoring Administration Guide >
Chapter Log Exporter.
Step Instructions
Step Instructions
Important - Before you can install Hotfixes on servers that work in Management High
Availability, you must upgrade all these servers.
Notes:
n This procedure is supported only for servers that run R80.20.M1, R80.20,
R80.20.M2, R80.30, or higher versions.
n For additional information related to this upgrade, see sk163814.
Important - Do not publish any changes in the Global Domain until you
complete the upgrade to the next available version. This is necessary to
avoid any potential issues caused by different policy revisions on the
Global Domain and on other Domains.
5 You must close all GUI clients (SmartConsole applications) connected to the
source Multi-Domain Server.
7 Run the Pre-Upgrade Verifier on all source servers and fix all detected issues
before you start the upgrade.
Important - Before you can install Hotfixes on servers that work in Management High
Availability, you must upgrade all these servers.
Procedure:
1. If the Primary Multi-Domain Server is not available, promote the Secondary Multi-Domain
Server to be the Primary
2. Make sure the Global Domain is Active on the Primary Multi-Domain Server
Step Instructions
2 From the left navigation panel, click Multi Domain > Domains.
The table shows Domains and Multi-Domain Servers:
n Every column shows a Multi-Domain Server.
n Active Domain Management Servers (for a Domain) are marked
3 In the leftmost column Domains, examine the bottom row Global for the
Primary Multi-Domain Server.
If the Global Domain is in the Standby state on the Primary Multi-Domain
Server (marked with an empty "barrel" icon), then make it Active:
a. Right-click on the Primary Multi-Domain Server and click Connect
to Domain Server.
The High Availability Status window opens.
b. In the section Connected To, click Actions > Set Active.
c. Click Yes to confirm.
d. Wait for the full synchronization to complete.
e. Close SmartConsole.
Step Instructions
Step Instructions
See "Installing Software Packages on Gaia" on page 185 and follow the applicable
action plan.
Step Instructions
See "Installing Software Packages on Gaia" on page 185 and follow the applicable
action plan.
Step Instructions
3 From the top toolbar, open the Secondary Multi-Domain Server object.
6 Click OK.
9. Upgrade the Multi-Domain Log Servers, dedicated Log Servers, and dedicated
SmartEvent Servers
Important - If your Multi-Domain Server manages Multi-Domain Log Servers,
dedicated Log Servers, or dedicated SmartEvent Servers, you must upgrade
these dedicated servers to the same version as the Multi-Domain Server.
Step Instructions
For more information, see the R81 Logging and Monitoring Administration Guide >
Chapter Log Exporter.
11. In SmartConsole of each applicable Domain Management Server, install policy on all
SmartLSM Security Profiles
Important - This step applies to each Domain Management Server that
manages SmartLSM Security Profiles.
Step Instructions
Step Instructions
Notes:
n This procedure is supported only for servers that run R80.20.M1, R80.20,
R80.20.M2, R80.30, or higher versions.
n For additional information related to this upgrade, see sk163814.
Important - Do not publish any changes in the Global Domain until you
complete the upgrade to the next available version. This is necessary to
avoid any potential issues caused by different policy revisions on the
Global Domain and on other Domains.
5 You must close all GUI clients (SmartConsole applications) connected to the
source Multi-Domain Server.
7 Run the Pre-Upgrade Verifier on all source servers and fix all detected issues
before you start the upgrade.
Important - Before you can install Hotfixes on servers that work in Management High
Availability, you must upgrade all these servers.
Procedure:
1. If the Primary Multi-Domain Server is not available, promote the Secondary Multi-Domain
Server to be the Primary
2. Make sure the Global Domain is Active on the Primary Multi-Domain Server
Step Instructions
2 From the left navigation panel, click Multi Domain > Domains.
The table shows Domains and Multi-Domain Servers:
n Every column shows a Multi-Domain Server.
n Active Domain Management Servers (for a Domain) are marked
3 In the leftmost column Domains, examine the bottom row Global for the
Primary Multi-Domain Server.
If the Global Domain is in the Standby state on the Primary Multi-Domain
Server (marked with an empty "barrel" icon), then make it Active:
a. Right-click on the Primary Multi-Domain Server and click Connect
to Domain Server.
The High Availability Status window opens.
b. In the section Connected To, click Actions > Set Active.
c. Click Yes to confirm.
d. Wait for the full synchronization to complete.
e. Close SmartConsole.
3. Get the required Upgrade Tools on the Primary and on the Secondary Multi-Domain
Servers
Important - See "Upgrade Tools" on page 207 to understand if your server
can download and install the latest version of the Upgrade Tools
automatically.
Step Instructions
Step Instructions
Step Instructions
$MDS_FWDIR/scripts/migrate_server verify -v
R81
n If this Multi-Domain Server is not connected to the Internet, run:
$MDS_FWDIR/scripts/migrate_server verify -v
R81 -skip_upgrade_tools_check
For details, see the R81 CLI Reference Guide - Chapter Multi-Domain
Security Management Commands - Section migrate_server.
Step Instructions
$MDS_FWDIR/scripts/migrate_server verify -v
R81
n If this Multi-Domain Server is not connected to the Internet, run:
$MDS_FWDIR/scripts/migrate_server verify -v
R81 -skip_upgrade_tools_check
For details, see the R81 CLI Reference Guide - Chapter Multi-Domain
Security Management Commands - Section migrate_server.
Step Instructions
Step Instructions
Step Instructions
Step Instructions
Step Instructions
Step Instructions
Step Instructions
If you installed the target R81 Multi-Domain Server with a different IP address than
the source Multi-Domain Server, you must create a special JSON configuration
file before you import the management database from the source Multi-Domain
Server. Note that you have to issue licenses for the new IP address.
Important:
n If none of the servers in the same Multi-Domain Security
Step Instructions
Format for migrating both the Primary and the Secondary Multi-Domain
Servers to new IP addresses
Format for migrating both the Primary and the Secondary Multi-Domain
Servers, and the Multi-Domain Log Server to new IP addresses
Step Instructions
Example
There are 3 servers in the R80.30 Multi-Domain Security Management
environment - the Primary Multi-Domain Server, the Secondary Multi-
Domain Server, and the Multi-Domain Log Server. Both the Primary
and the Secondary Multi-Domain Servers migrate to new IP
addresses. The Multi-Domain Log Server remains with the original IP
address.
a. The current IPv4 address of the source Primary R80.30 Multi-
Domain Server is:
192.168.10.21
b. The current IPv4 address of the source Secondary R80.30 Multi-
Domain Server is:
192.168.10.22
c. The name of the source Primary R80.30 Multi-Domain Server
object in SmartConsole is:
MyPrimaryMDS
d. The name of the source Secondary R80.30 Multi-Domain Server
object in SmartConsole is:
MySecondaryMDS
e. The new IPv4 address of the target Primary R81 Multi-Domain
Server is:
172.30.40.51
f. The new IPv4 address of the target Secondary R81 Multi-
Domain Server is:
172.30.40.52
g. The required syntax for the JSON configuration file you must use
on both the Primary and the Secondary Multi-Domain Servers,
and on the Multi-Domain Log Server:
[{"name":"MyPrimaryMDS","newIpAddress4":"172.3
0.40.51"},
{"name":"MySecondaryMDS","newIpAddress4":"172.
30.40.52"}]
Important - All servers in this environment must get this
same information.
Step Instructions
Step Instructions
Step Instructions
9 Make sure that all the required daemons (FWM, FWD, CPD, and
CPCA) are in the state "up" and show their PID (the "pnd" state is also
acceptable):
mdsstat
If some of the required daemons on a Domain Management Server are
in the state "down", then wait for 5-10 minutes, restart that Domain
Management Server, and check again. Run these three commands:
mdsstop_customer <IP Address or Name of Domain
Management Server>
mdsstart_customer <IP Address or Name of Domain
Management Server>
mdsstat
Step Instructions
12. Get the required Upgrade Tools on the Secondary R81 Multi-Domain Server
Note - This step is needed only to be able to export the entire management
database (for backup purposes) with the latest Upgrade Tools.
Important - See "Upgrade Tools" on page 207 to understand if your server
can download and install the latest version of the Upgrade Tools
automatically.
Step Instructions
If you installed the target R81 Multi-Domain Server with a different IP address than
the source Multi-Domain Server, you must create a special JSON configuration
file before you import the management database from the source Multi-Domain
Server. Note that you have to issue licenses for the new IP address.
Important:
n If none of the servers in the same Multi-Domain Security
Step Instructions
Step Instructions
Format for migrating both the Primary and the Secondary Multi-Domain
Servers to new IP addresses
Format for migrating both the Primary and the Secondary Multi-Domain
Servers, and the Multi-Domain Log Server to new IP addresses
Step Instructions
Example
There are 3 servers in the R80.30 Multi-Domain Security Management
environment - the Primary Multi-Domain Server, the Secondary Multi-
Domain Server, and the Multi-Domain Log Server. Both the Primary
and the Secondary Multi-Domain Servers migrate to new IP
addresses. The Multi-Domain Log Server remains with the original IP
address.
a. The current IPv4 address of the source Primary R80.30 Multi-
Domain Server is:
192.168.10.21
b. The current IPv4 address of the source Secondary R80.30 Multi-
Domain Server is:
192.168.10.22
c. The name of the source Primary R80.30 Multi-Domain Server
object in SmartConsole is:
MyPrimaryMDS
d. The name of the source Secondary R80.30 Multi-Domain Server
object in SmartConsole is:
MySecondaryMDS
e. The new IPv4 address of the target Primary R81 Multi-Domain
Server is:
172.30.40.51
f. The new IPv4 address of the target Secondary R81 Multi-
Domain Server is:
172.30.40.52
g. The required syntax for the JSON configuration file you must use
on both the Primary and the Secondary Multi-Domain Servers,
and on the Multi-Domain Log Server:
[{"name":"MyPrimaryMDS","newIpAddress4":"172.3
0.40.51"},
{"name":"MySecondaryMDS","newIpAddress4":"172.
30.40.52"}]
Important - All servers in this environment must get this
same information.
Step Instructions
Step Instructions
Step Instructions
9 Make sure that all the required daemons (FWM, FWD, CPD, and
CPCA) are in the state "up" and show their PID (the "pnd" state is also
acceptable):
mdsstat
If some of the required daemons on a Domain Management Server are
in the state "down", then wait for 5-10 minutes, restart that Domain
Management Server, and check again. Run these three commands:
mdsstop_customer <IP Address or Name of Domain
Management Server>
mdsstart_customer <IP Address or Name of Domain
Management Server>
mdsstat
Step Instructions
3 From the top toolbar, open the Secondary Multi-Domain Server object.
6 Click OK.
16. Upgrade the Multi-Domain Log Servers, dedicated Log Servers, and dedicated
SmartEvent Servers
Important - If your Multi-Domain Server manages Multi-Domain Log Servers,
dedicated Log Servers, or dedicated SmartEvent Servers, you must upgrade
these dedicated servers to the same version as the Multi-Domain Server.
n "Upgrading a Multi-Domain Log Server from R80.20 and higher" on page 328
n "Upgrading a Security Management Server or Log Server from R80.20 and
higher" on page 210
Step Instructions
For more information, see the R81 Logging and Monitoring Administration Guide >
Chapter Log Exporter.
18. In SmartConsole of each applicable Domain Management Server, install policy on all
SmartLSM Security Profiles
Important - This step applies to each Domain Management Server that
manages SmartLSM Security Profiles.
Step Instructions
Step Instructions
Notes:
n This procedure is supported only for servers that run R80.20.M1, R80.20,
R80.20.M2, R80.30, or higher versions.
n For additional information related to this upgrade, see sk163814.
Important - Do not publish any changes in the Global Domain until you
complete the upgrade to the next available version. This is necessary to
avoid any potential issues caused by different policy revisions on the
Global Domain and on other Domains.
5 You must close all GUI clients (SmartConsole applications) connected to the
source Multi-Domain Server.
7 Run the Pre-Upgrade Verifier on all source servers and fix all detected issues
before you start the upgrade.
Important - Before you can install Hotfixes on servers that work in Management High
Availability, you must upgrade all these servers.
Procedure:
1. If the Primary Multi-Domain Server is not available, promote the Secondary Multi-Domain
Server to be the Primary
2. Make sure the Global Domain is Active on the Primary Multi-Domain Server
Step Instructions
2 From the left navigation panel, click Multi Domain > Domains.
The table shows Domains and Multi-Domain Servers:
n Every column shows a Multi-Domain Server.
n Active Domain Management Servers (for a Domain) are marked
3 In the leftmost column Domains, examine the bottom row Global for the
Primary Multi-Domain Server.
If the Global Domain is in the Standby state on the Primary Multi-Domain
Server (marked with an empty "barrel" icon), then make it Active:
a. Right-click on the Primary Multi-Domain Server and click Connect
to Domain Server.
The High Availability Status window opens.
b. In the section Connected To, click Actions > Set Active.
c. Click Yes to confirm.
d. Wait for the full synchronization to complete.
e. Close SmartConsole.
3. Get the required Upgrade Tools on the Primary and on the Secondary Multi-Domain
Servers
Important - See "Upgrade Tools" on page 207 to understand if your server
can download and install the latest version of the Upgrade Tools
automatically.
Step Instructions
Step Instructions
Step Instructions
$MDS_FWDIR/scripts/migrate_server verify -v
R81
n If this Multi-Domain Server is not connected to the Internet, run:
$MDS_FWDIR/scripts/migrate_server verify -v
R81 -skip_upgrade_tools_check
For details, see the R81 CLI Reference Guide - Chapter Multi-Domain
Security Management Commands - Section migrate_server.
Step Instructions
$MDS_FWDIR/scripts/migrate_server verify -v
R81
n If this Multi-Domain Server is not connected to the Internet, run:
$MDS_FWDIR/scripts/migrate_server verify -v
R81 -skip_upgrade_tools_check
For details, see the R81 CLI Reference Guide - Chapter Multi-Domain
Security Management Commands - Section migrate_server.
Step Instructions
Step Instructions
Step Instructions
Step Instructions
Select the R81 package and perform Clean Install. See sk92449
for detailed steps.
n Follow "Installing One Multi-Domain Server Only, or Primary Multi-
Step Instructions
If you installed the target R81 Multi-Domain Server with a different IP address than
the source Multi-Domain Server, you must create a special JSON configuration
file before you import the management database from the source Multi-Domain
Server. Note that you have to issue licenses for the new IP address.
Important:
n If none of the servers in the same Multi-Domain Security
Step Instructions
Step Instructions
Format for migrating both the Primary and the Secondary Multi-Domain
Servers to new IP addresses
Format for migrating both the Primary and the Secondary Multi-Domain
Servers, and the Multi-Domain Log Server to new IP addresses
Step Instructions
Example
There are 3 servers in the R80.30 Multi-Domain Security Management
environment - the Primary Multi-Domain Server, the Secondary Multi-
Domain Server, and the Multi-Domain Log Server. Both the Primary
and the Secondary Multi-Domain Servers migrate to new IP
addresses. The Multi-Domain Log Server remains with the original IP
address.
a. The current IPv4 address of the source Primary R80.30 Multi-
Domain Server is:
192.168.10.21
b. The current IPv4 address of the source Secondary R80.30 Multi-
Domain Server is:
192.168.10.22
c. The name of the source Primary R80.30 Multi-Domain Server
object in SmartConsole is:
MyPrimaryMDS
d. The name of the source Secondary R80.30 Multi-Domain Server
object in SmartConsole is:
MySecondaryMDS
e. The new IPv4 address of the target Primary R81 Multi-Domain
Server is:
172.30.40.51
f. The new IPv4 address of the target Secondary R81 Multi-
Domain Server is:
172.30.40.52
g. The required syntax for the JSON configuration file you must use
on both the Primary and the Secondary Multi-Domain Servers,
and on the Multi-Domain Log Server:
[{"name":"MyPrimaryMDS","newIpAddress4":"172.3
0.40.51"},
{"name":"MySecondaryMDS","newIpAddress4":"172.
30.40.52"}]
Important - All servers in this environment must get this
same information.
Step Instructions
Step Instructions
Step Instructions
9 Make sure that all the required daemons (FWM, FWD, CPD, and
CPCA) are in the state "up" and show their PID (the "pnd" state is also
acceptable):
mdsstat
If some of the required daemons on a Domain Management Server are
in the state "down", then wait for 5-10 minutes, restart that Domain
Management Server, and check again. Run these three commands:
mdsstop_customer <IP Address or Name of Domain
Management Server>
mdsstart_customer <IP Address or Name of Domain
Management Server>
mdsstat
Step Instructions
Select the R81 package and perform Clean Install. See sk92449
for detailed steps.
n Follow "Installing a Secondary Multi-Domain Server in
12. Get the required Upgrade Tools on the Secondary R81 Multi-Domain Server
Note - This step is needed only to be able to export the entire management
database (for backup purposes) with the latest Upgrade Tools.
Important - See "Upgrade Tools" on page 207 to understand if your server
can download and install the latest version of the Upgrade Tools
automatically.
Step Instructions
If you installed the target R81 Multi-Domain Server with a different IP address than
the source Multi-Domain Server, you must create a special JSON configuration
file before you import the management database from the source Multi-Domain
Server. Note that you have to issue licenses for the new IP address.
Important:
n If none of the servers in the same Multi-Domain Security
Step Instructions
Step Instructions
Format for migrating both the Primary and the Secondary Multi-Domain
Servers to new IP addresses
Format for migrating both the Primary and the Secondary Multi-Domain
Servers, and the Multi-Domain Log Server to new IP addresses
Step Instructions
Example
There are 3 servers in the R80.30 Multi-Domain Security Management
environment - the Primary Multi-Domain Server, the Secondary Multi-
Domain Server, and the Multi-Domain Log Server. Both the Primary
and the Secondary Multi-Domain Servers migrate to new IP
addresses. The Multi-Domain Log Server remains with the original IP
address.
a. The current IPv4 address of the source Primary R80.30 Multi-
Domain Server is:
192.168.10.21
b. The current IPv4 address of the source Secondary R80.30 Multi-
Domain Server is:
192.168.10.22
c. The name of the source Primary R80.30 Multi-Domain Server
object in SmartConsole is:
MyPrimaryMDS
d. The name of the source Secondary R80.30 Multi-Domain Server
object in SmartConsole is:
MySecondaryMDS
e. The new IPv4 address of the target Primary R81 Multi-Domain
Server is:
172.30.40.51
f. The new IPv4 address of the target Secondary R81 Multi-
Domain Server is:
172.30.40.52
g. The required syntax for the JSON configuration file you must use
on both the Primary and the Secondary Multi-Domain Servers,
and on the Multi-Domain Log Server:
[{"name":"MyPrimaryMDS","newIpAddress4":"172.3
0.40.51"},
{"name":"MySecondaryMDS","newIpAddress4":"172.
30.40.52"}]
Important - All servers in this environment must get this
same information.
Step Instructions
Step Instructions
Step Instructions
9 Make sure that all the required daemons (FWM, FWD, CPD, and
CPCA) are in the state "up" and show their PID (the "pnd" state is also
acceptable):
mdsstat
If some of the required daemons on a Domain Management Server are
in the state "down", then wait for 5-10 minutes, restart that Domain
Management Server, and check again. Run these three commands:
mdsstop_customer <IP Address or Name of Domain
Management Server>
mdsstart_customer <IP Address or Name of Domain
Management Server>
mdsstat
Step Instructions
3 From the top toolbar, open the Secondary Multi-Domain Server object.
6 Click OK.
15. Upgrade the Multi-Domain Log Servers, dedicated Log Servers, and dedicated
SmartEvent Servers
Important - If your Multi-Domain Server manages Multi-Domain Log Servers,
dedicated Log Servers, or dedicated SmartEvent Servers, you must upgrade
these dedicated servers to the same version as the Multi-Domain Server.
Step Instructions
For more information, see the R81 Logging and Monitoring Administration Guide >
Chapter Log Exporter.
17. In SmartConsole of each applicable Domain Management Server, install policy on all
SmartLSM Security Profiles
Important - This step applies to each Domain Management Server that
manages SmartLSM Security Profiles.
Step Instructions
Step Instructions
If your business model cannot support management downtime during the upgrade, you can
continue to manage Domain Management Servers during the upgrade process.
If you make changes to Domain Management Server databases during the upgrade process,
this can create a risk of inconsistent Domain Management Server database content between
instances on different Multi-Domain Servers. The synchronization process cannot resolve
these database inconsistencies.
After you successfully upgrade one Multi-Domain Server, you can set its Domain Management
Servers to the Active state, while you upgrade the others. Synchronization between the
Domain Management Servers occurs after all Multi-Domain Servers are upgraded.
If, during the upgrade process, you make changes to the Domain Management Server
database on different Multi-Domain Servers, the contents of these databases will be different.
Because you cannot synchronize these databases, some of these changes will be lost. The
Domain Management Server High Availability status appears as Collision.
You must decide which database version to retain and synchronize it to the other Domain
Management Servers. Then you must re-enter the lost changes to the synchronized database
- configure the same objects and settings again.
Notes:
n This procedure is supported only for servers that run R80.20.M1, R80.20,
R80.20.M2, R80.30, or higher versions.
n For additional information related to this upgrade, see sk163814.
4 You must close all GUI clients (SmartConsole applications) connected to the
source Multi-Domain Log Server.
5 Run the Pre-Upgrade Verifier on all source servers and fix all detected issues
before you start the upgrade.
Procedure:
1. Get the required Upgrade Tools on the server
Important - See "Upgrade Tools" on page 207 to understand if your server
can download and install the latest version of the Upgrade Tools
automatically.
Step Instructions
See "Installing Software Packages on Gaia" on page 185 and follow the applicable
action plan.
Step Instructions
3 From the top toolbar, open the Multi-Domain Log Server object.
6 Click OK.
Step Instructions
For more information, see the R81 Logging and Monitoring Administration Guide >
Chapter Log Exporter.
Step Instructions
Step Instructions
Notes:
n This procedure is supported only for servers that run R80.20.M1, R80.20,
R80.20.M2, R80.30, or higher versions.
n For additional information related to this upgrade, see sk163814.
4 You must close all GUI clients (SmartConsole applications) connected to the
source Multi-Domain Log Server.
5 Run the Pre-Upgrade Verifier on all source servers and fix all detected issues
before you start the upgrade.
Procedure:
1. Get the required Upgrade Tools on the source server
Important - See "Upgrade Tools" on page 207 to understand if your server
can download and install the latest version of the Upgrade Tools
automatically.
Step Instructions
2. On the current Multi-Domain Log Server, run the Pre-Upgrade Verifier and export the
entire management database
Step Instructions
$MDS_FWDIR/scripts/migrate_server verify -v
R81
n If this Multi-Domain Log Server is not connected to the Internet, run:
$MDS_FWDIR/scripts/migrate_server verify -v
R81 -skip_upgrade_tools_check
For details, see the R81 CLI Reference Guide - Chapter Multi-Domain
Security Management Commands - Section migrate_server.
Step Instructions
Step Instructions
2 Perform the clean install in one of these ways (do not perform initial
configuration in SmartConsole):
n Follow "Installing Software Packages on Gaia" on page 185 - select
the R81 package and perform Clean Install. See sk92449 for
detailed steps.
n Follow "Installing a Multi-Domain Log Server" on page 82.
Step Instructions
Step Instructions
Step Instructions
Step Instructions
9 Make sure that all the required daemons have the correct state:
mdsstat
n The state of the FWM, FWD, and CPD daemons must be "up" on all
levels.
These daemons must show their PID, or "pnd".
n The state of the CPCA daemon must be "N/R" on the MDS level.
n The state of the CPCA daemon must be "down" on the Domain Log
Server level.
If the state of one of the required daemons (FWM, FWD, or CPD) on a
Domain Log Server is "down", then wait for 5-10 minutes, restart that
Domain Log Server, and check again. Run these three commands:
mdsstop_customer <IP Address or Name of Domain Log
Server>
mdsstart_customer <IP Address or Name of Domain
Log Server>
mdsstat
Step Instructions
3 From the top toolbar, open the Multi-Domain Log Server object.
6 Click OK.
Step Instructions
For more information, see the R81 Logging and Monitoring Administration Guide >
Chapter Log Exporter.
Step Instructions
Step Instructions
Notes:
n This procedure is supported only for servers that run R80.20.M1, R80.20,
R80.20.M2, R80.30, or higher versions.
n For additional information related to this upgrade, see sk163814.
4 You must close all GUI clients (SmartConsole applications) connected to the
source Multi-Domain Log Server.
5 Run the Pre-Upgrade Verifier on all source servers and fix all detected issues
before you start the upgrade.
Procedure:
1. Get the required Upgrade Tools on the source server
Important - See "Upgrade Tools" on page 207 to understand if your server
can download and install the latest version of the Upgrade Tools
automatically.
Step Instructions
2. On the current Multi-Domain Log Server, run the Pre-Upgrade Verifier and export the
entire management database
Step Instructions
$MDS_FWDIR/scripts/migrate_server verify -v
R81
n If this Multi-Domain Log Server is not connected to the Internet, run:
$MDS_FWDIR/scripts/migrate_server verify -v
R81 -skip_upgrade_tools_check
For details, see the R81 CLI Reference Guide - Chapter Multi-Domain
Security Management Commands - Section migrate_server.
Step Instructions
Step Instructions
2 Perform the clean install on another server in one of these ways (do not
perform initial configuration in SmartConsole):
n Follow "Installing Software Packages on Gaia" on page 185 - select
the R81 package and perform Clean Install. See sk92449 for
detailed steps.
n Follow "Installing a Multi-Domain Log Server" on page 82.
Important - The IP addresses of the source and target R81 servers must be
the same. If it is necessary to have a different IP address on the R81 server,
you can change it only after the upgrade procedure. Note that you have to
issue licenses for the new IP address. See "Changing the IP Address of a
Multi-Domain Server or Multi-Domain Log Server" on page 526.
Step Instructions
Step Instructions
Step Instructions
Step Instructions
9 Make sure that all the required daemons have the correct state:
mdsstat
n The state of the FWM, FWD, and CPD daemons must be "up" on all
levels.
These daemons must show their PID, or "pnd".
n The state of the CPCA daemon must be "N/R" on the MDS level.
n The state of the CPCA daemon must be "down" on the Domain Log
Server level.
If the state of one of the required daemons (FWM, FWD, or CPD) on a
Domain Log Server is "down", then wait for 5-10 minutes, restart that
Domain Log Server, and check again. Run these three commands:
mdsstop_customer <IP Address or Name of Domain Log
Server>
mdsstart_customer <IP Address or Name of Domain
Log Server>
mdsstat
Step Instructions
3 From the top toolbar, open the Multi-Domain Log Server object.
6 Click OK.
Step Instructions
For more information, see the R81 Logging and Monitoring Administration Guide >
Chapter Log Exporter.
Step Instructions
Step Instructions
11. Disconnect the old Multi-Domain Log Server from the network
Notes:
n This procedure is supported only for servers that run R80.20.M1, R80.20,
R80.20.M2, R80.30, or higher versions.
n These instructions equally apply to:
l Endpoint Security Management Server
4 You must close all GUI clients (SmartConsole applications) connected to the
source Endpoint Security Management Server or Endpoint Policy Server.
6 Run the Pre-Upgrade Verifier on all source servers and fix all detected issues
before you start the upgrade.
Procedure:
1. Get the required Upgrade Tools on the server
Important - See "Upgrade Tools" on page 207 to understand if your server
can download and install the latest version of the Upgrade Tools
automatically.
Step Instructions
2. Upgrade the Endpoint Security Management Server or Endpoint Policy Server with
CPUSE
See "Installing Software Packages on Gaia" on page 185 and follow the applicable
action plan.
Step Instructions
6 Click OK.
Step Instructions
Step Instructions
4 Click Install.
5 Click OK.
Step Instructions
2 In the SmartConsole, from the left navigation panel, click Logs & Monitor.
4 In the bottom left corner, in the External Apps section, click SmartEvent
Settings & Policy.
The Legacy SmartEvent client opens.
5 In the top left corner, click Menu > Actions > Install Event Policy.
6 Confirm.
8 Click Close.
Step Instructions
For more information, see the R81 Logging and Monitoring Administration Guide >
Chapter Log Exporter.
Step Instructions
Notes:
n This procedure is supported only for servers that run R80.20.M1, R80.20,
R80.20.M2, R80.30, or higher versions.
n These instructions equally apply to:
l Endpoint Security Management Server
4 You must close all GUI clients (SmartConsole applications) connected to the
source Endpoint Security Management Server or Endpoint Policy Server.
6 Run the Pre-Upgrade Verifier on all source servers and fix all detected issues
before you start the upgrade.
Procedure:
1. Get the required Upgrade Tools on the source server
Important - See "Upgrade Tools" on page 207 to understand if your server
can download and install the latest version of the Upgrade Tools
automatically.
Step Instructions
2. On the current Endpoint Security Management Server or Endpoint Policy Server, run the
Pre-Upgrade Verifier and export the entire management database
Step Instructions
uepm-msi-files" option.
n For details, see the R81 CLI Reference Guide - Chapter
Step Instructions
3. Install a new R81 Endpoint Security Management Server or Endpoint Policy Server
Step Instructions
2 Perform the clean install in one of these ways (do not perform initial
configuration in SmartConsole):
n Follow "Installing Software Packages on Gaia" on page 185 - select
the R81 package and perform Clean Install. See sk92449 for
detailed steps.
n Follow "Installing an Endpoint Security Management Server" on
page 85.
n Follow "Installing an Endpoint Policy Server" on page 90.
Step Instructions
5. On the target R81 Endpoint Security Management Server or Endpoint Policy Server,
import the databases
If you installed the target R81 Endpoint Server with a different IP address than the
source Endpoint Server, you must create a special JSON configuration file
before you import the management database from the source Endpoint Server.
Note that you have to issue licenses for the new IP address.
Important:
n If none of the servers in the same Endpoint Security environment
Step Instructions
Step Instructions
Example
There are 2 servers in the R80.30 Endpoint Security environment - the
Endpoint Security Management Server and the Log Server. The
Endpoint Security Management Server migrates to a new IP address.
The Log Server remains with the original IP address.
a. The current IPv4 address of the source R80.30 Endpoint Security
Management Server is:
192.168.10.21
b. The name of the source R80.30 Endpoint Security Management
Server object in SmartConsole is:
MyEndpointMgmtServer
c. The new IPv4 address of the target R81 Endpoint Security
Management Server is:
172.30.40.51
d. The required syntax for the JSON configuration file you must use
on the Endpoint Security Management Server and on the Log
Server:
[{"name":"MyEndpointMgmtServer","newIpAddress4"
:"172.30.40.51"}]
Important - All servers in this environment must get this
same information.
Step Instructions
Step Instructions
include-uepm-msi-files" option.
n For details, see the R81 CLI Reference Guide - Chapter
Step Instructions
1 Issue licenses for the new IP address in your Check Point User Center
account.
Step Instructions
3 Wait for a couple of minutes for the Endpoint Server to detect the new
licenses.
Alternatively, restart Check Point services:
cpstop
cpstart
Step Instructions
6 Click OK.
Step Instructions
4 Click Install.
5 Click OK.
Step Instructions
2 In the SmartConsole, from the left navigation panel, click Logs & Monitor.
4 In the bottom left corner, in the External Apps section, click SmartEvent
Settings & Policy.
The Legacy SmartEvent client opens.
5 In the top left corner, click Menu > Actions > Install Event Policy.
6 Confirm.
8 Click Close.
Step Instructions
For more information, see the R81 Logging and Monitoring Administration Guide >
Chapter Log Exporter.
Step Instructions
Notes:
n This procedure is supported only for servers that run R80.20.M1, R80.20,
R80.20.M2, R80.30, or higher versions.
n These instructions equally apply to:
l Endpoint Security Management Server
4 You must close all GUI clients (SmartConsole applications) connected to the
source Endpoint Security Management Server or Endpoint Policy Server.
6 Run the Pre-Upgrade Verifier on all source servers and fix all detected issues
before you start the upgrade.
Procedure:
1. Get the required Upgrade Tools on the source server
Important - See "Upgrade Tools" on page 207 to understand if your server
can download and install the latest version of the Upgrade Tools
automatically.
Step Instructions
2. On the current Endpoint Security Management Server or Endpoint Policy Server, run the
Pre-Upgrade Verifier and export the entire management database
Step Instructions
uepm-msi-files" option.
n For details, see the R81 CLI Reference Guide - Chapter
Step Instructions
3. Install a new R81 Endpoint Security Management Server or Endpoint Policy Server
Step Instructions
2 Perform the clean install in one of these ways (do not perform initial
configuration in SmartConsole):
n Follow "Installing Software Packages on Gaia" on page 185 - select
the R81 package and perform Clean Install. See sk92449 for
detailed steps.
n Follow "Installing an Endpoint Security Management Server" on
page 85.
n Follow "Installing an Endpoint Policy Server" on page 90.
Step Instructions
5. On the target R81 Endpoint Security Management Server or Endpoint Policy Server,
import the databases
If you installed the target R81 Endpoint Server with a different IP address than the
source Endpoint Server, you must create a special JSON configuration file
before you import the management database from the source Endpoint Server.
Note that you have to issue licenses for the new IP address.
Important:
n If none of the servers in the same Endpoint Security environment
Step Instructions
Step Instructions
Example
There are 2 servers in the R80.30 Endpoint Security environment - the
Endpoint Security Management Server and the Log Server. The
Endpoint Security Management Server migrates to a new IP address.
The Log Server remains with the original IP address.
a. The current IPv4 address of the source R80.30 Endpoint Security
Management Server is:
192.168.10.21
b. The name of the source R80.30 Endpoint Security Management
Server object in SmartConsole is:
MyEndpointMgmtServer
c. The new IPv4 address of the target R81 Endpoint Security
Management Server is:
172.30.40.51
d. The required syntax for the JSON configuration file you must use
on the Endpoint Security Management Server and on the Log
Server:
[{"name":"MyEndpointMgmtServer","newIpAddress4"
:"172.30.40.51"}]
Important - All servers in this environment must get this
same information.
Step Instructions
Step Instructions
include-uepm-msi-files" option.
n For details, see the R81 CLI Reference Guide - Chapter
Step Instructions
1 Issue licenses for the new IP address in your Check Point User Center
account.
Step Instructions
3 Wait for a couple of minutes for the Endpoint Server to detect the new
licenses.
Alternatively, restart Check Point services:
cpstop
cpstart
Step Instructions
6 Click OK.
Step Instructions
4 Click Install.
5 Click OK.
Step Instructions
2 In the SmartConsole, from the left navigation panel, click Logs & Monitor.
4 In the bottom left corner, in the External Apps section, click SmartEvent
Settings & Policy.
The Legacy SmartEvent client opens.
5 In the top left corner, click Menu > Actions > Install Event Policy.
6 Confirm.
8 Click Close.
Step Instructions
For more information, see the R81 Logging and Monitoring Administration Guide >
Chapter Log Exporter.
Step Instructions
4 You must close all GUI clients (SmartConsole applications) connected to the
source Endpoint Security Management Server or Endpoint Policy Server.
6 Run the Pre-Upgrade Verifier on all source servers and fix all detected issues
before you start the upgrade.
Important - Before you can install Hotfixes on servers that work in Management High
Availability, you must upgrade all these servers.
Procedure:
Step Instructions
1 Upgrade the Primary Endpoint Security Management Server with one of the
supported methods.
n CPUSE
See "Upgrading an Endpoint Security Management Server or Endpoint
Policy Server from R80.20 and higher with CPUSE" on page 351
n Advanced Upgrade
See "Upgrading an Endpoint Security Management Server or Endpoint
Policy Server from R80.20 and higher with Advanced Upgrade" on
page 356
n Migration
See "Upgrading an Endpoint Security Management Server or Endpoint
Policy Server from R80.20 and higher with Migration" on page 367
2 Upgrade the Secondary Endpoint Security Management Server with one of the
supported methods.
Important - Make sure the Endpoint Security Management Servers can
communicate with each other and SIC works between these servers. For
details, see sk179794.
n CPUSE
See "Upgrading an Endpoint Security Management Server or Endpoint
Policy Server from R80.20 and higher with CPUSE" on page 351
n Advanced Upgrade
See "Upgrading an Endpoint Security Management Server or Endpoint
Policy Server from R80.20 and higher with Advanced Upgrade" on
page 356
n Migration
See "Upgrading an Endpoint Security Management Server or Endpoint
Policy Server from R80.20 and higher with Migration" on page 367
Step Instructions
6 Make sure Secure Internal Communication (SIC) works correctly with the
Secondary Security Management Server:
a. From the left navigation panel, click Gateways & Servers.
b. Open the Secondary Security Management Server object.
c. On the General Properties page, click Communication.
d. Click Test SIC Status.
The SIC Status must show Communicating.
e. Click Close.
f. Click OK.
a. In the SmartConsole, from the left navigation panel, click Logs & Monitor.
b. At the top, click + to open a new tab.
c. In the bottom left corner, in the External Apps section, click SmartEvent
Settings & Policy.
The Legacy SmartEvent client opens.
d. In the top left corner, click Menu > Actions > Install Event Policy.
e. Confirm.
f. Wait for these messages to appear:
SmartEvent Policy Installer installation complete
SmartEvent Policy Installer installation succeeded
g. Click Close.
h. Close the Legacy SmartEvent client.
Step Instructions
For more information, see the R81 Logging and Monitoring Administration Guide
> Chapter Log Exporter
4 Schedule a full maintenance window to make sure you can make all the
custom configurations again after the upgrade.
The upgrade process replaces all existing files with default files.
If you have custom configurations on the Security Gateway, they are lost
during the upgrade.
As a result, different issues can occur in the upgraded Security Gateway.
Procedure:
1. On the Security Gateway, upgrade to R81 with CPUSE, or perform a Clean Install of R81
Important - You must reboot the Security Gateway after the upgrade or clean
install.
Installation
Instructions
Method
Clean Install of Follow "Installing a Security Gateway" on page 104 - only the
R81 from scratch step "Install the Security Gateway".
Important - In the Gaia First Time Configuration Wizard,
for the Management Connection IP address, you must
use the same IP address as was used by the previous
Security Gateway (prior to the upgrade).
Step Instructions
Step Instructions
6 Click Reset.
7 In the One-time password field, enter the same Activation Key you
entered during the First Time Configuration Wizard of the Security
Gateway.
8 In the Confirm one-time password field, enter the same Activation Key
again.
9 Click Initialize.
Step Instructions
6 Click OK.
Step Instructions
Step Instructions
Step Instructions
2 From the left navigation panel, click Logs & Monitor > Logs.
3 Examine the logs from this Security Gateway to make sure it inspects the
traffic as expected.
4 Schedule a full maintenance window to make sure you can make all the
custom configurations again after the upgrade.
The upgrade process replaces all existing files with default files.
If you have custom configurations on the VSX Gateway, they are lost during
the upgrade.
As a result, different issues can occur in the upgraded VSX Gateway.
1. On the Management Server, upgrade the configuration of the VSX Gateway object to
R81
Step Instructions
Select R81.
/opt/CPsuite-R81/fw1/log/vsx_util_YYYYMMDD_
HH_MM.log
n On a Multi-Domain Server:
/opt/CPmds-R81/customers/<Name_of_
Domain>/CPsuite-R81/fw1/log/vsx_util_
YYYYMMDD_HH_MM.log
Step Instructions
9 Make sure in the Platform section, the Version field shows R81.
See "Installing Software Packages on Gaia" on page 185 and follow the applicable
action plan.
Step Instructions
Step Instructions
3 From the left navigation panel, click Logs & Monitor > Logs.
4 Examine the logs from the Virtual Systems on this VSX Gateway to
make sure they inspect the traffic as expected.
1. On the Management Server, upgrade the configuration of the VSX Gateway object to
R81
Step Instructions
Select R81.
/opt/CPsuite-R81/fw1/log/vsx_util_YYYYMMDD_
HH_MM.log
n On a Multi-Domain Server:
/opt/CPmds-R81/customers/<Name_of_
Domain>/CPsuite-R81/fw1/log/vsx_util_
YYYYMMDD_HH_MM.log
Step Instructions
9 Make sure in the Platform section, the Version field shows R81.
Installation
Instructions
Method
Clean Install of Follow "Installing a VSX Gateway" on page 111 - only the
R81 from scratch step "Install the VSX Gateway".
Important - In the Gaia First Time Configuration
Wizard, for the Management Connection IP address,
you must use the same IP address as was used by the
previous VSX Gateway (prior to the upgrade).
Step Instructions
Step Instructions
Step Instructions
3 From the left navigation panel, click Logs & Monitor > Logs.
4 Examine the logs from the Virtual Systems on this VSX Gateway to
make sure they inspect the traffic as expected.
5 If you upgrade a VSX Cluster, then on the Management Server you must
upgrade the configuration of the VSX Cluster object to R81.
6 Schedule a full maintenance window to make sure you can make all the
custom configurations again after the upgrade.
The upgrade process replaces all existing files with default files.
If you have custom configurations on the Cluster Members, they are lost
during the upgrade.
As a result, different issues can occur in the upgraded cluster.
Cluster Members can stop detecting each other, Cluster Members can move
to undesired state, and traffic can be dropped.
7 Make sure the configuration and the values of the required kernel parameters
are the same on all Cluster Members.
Log in to the Expert mode on each Cluster Member and run the applicable
commands (see below).
Maintenance
Upgrade
Instructions Window Limitations
Method
(downtime)
Maintenance
Upgrade
Instructions Window Limitations
Method
(downtime)
Maintenance
Upgrade
Instructions Window Limitations
Method
(downtime)
"Minimum Select this method, if you cannot This upgrade This upgrade
Downtime have any network downtime and method method does not
Upgrade" on need to complete the upgrade requires a support Dynamic
page 470 quickly, with a minimum number of relatively short Routing
dropped connections. downtime connections.
During this type of upgrade, there window to drop
is always at least one Active old
Cluster Member in cluster that connections.
handles traffic. Duration of this
All connections that were upgrade is
initiated through a Cluster relatively short.
Member that runs the old
version, are dropped when you
upgrade that Cluster Member to
a new version, because Cluster
Members that run different Check
Point software versions, cannot
synchronize connections.
Network connectivity, however,
remains available during the
upgrade, and connections initiated
through an upgraded cluster
member are not dropped.
You can select this method, if you
upgrade a ClusterXL or a VSX
Cluster.
You can select this method, if you
upgrade a 3rd party cluster (VRRP
on Gaia).
Note - This applies only when the Multi-Version Cluster (MVC) Mechanism is
disabled (see "Multi-Version Cluster (MVC) Upgrade" on page 403).
When Cluster Members of different versions are on the same network, Cluster Members of the
new (upgraded) version remain in the state Ready, and Cluster Members of the previous
version remain in state Active Attention.
Cluster Members in the state Ready do not process traffic and do not synchronize with other
Cluster Members.
To prevent Cluster Members from being in the state "Ready":
Option Instructions
Step Instructions
2 Back up your current configuration (see "Backing Up and Restoring" on page 20).
Important - If you upgrade a VSX Cluster, then back up both the
Management Server and the VSX Cluster Members. Follow sk100395: How
to backup and restore VSX Gateway.
Step Instructions
7 Schedule a full maintenance window to make sure you can make all the
custom configurations again after the upgrade.
Member 1 Member 2
R81 Version X
"Version X" is allowed to be only one of these: R77.30, R80.10, R80.20, and so on.
For supported upgrade paths, see the R81 Release Notes.
n There are three, four, or five Cluster Members in the Multi-Version Cluster
Important - In this scenario, Jumbo Hotfix Accumulator is required:
l On Cluster Members R80.20, you must install R80.20 Jumbo Hotfix
"Version X" is allowed to be only one of these: R77.30, R80.10, R80.20, and so on.
For supported upgrade paths, see the R81 Release Notes.
n While the cluster contains Cluster Members that run different software versions (Multi-
Version Cluster), it is not supported to change specific settings of the cluster object in
SmartConsole.
l You cannot change the cluster mode.
For example, from High Availability to Load Sharing.
l In the High Availability mode, you cannot change the recovery mode.
For example, from Maintain current active Cluster Member to Switch to higher
priority Cluster Member.
l You cannot change the cluster topology.
Do not add, remove, or edit settings of cluster interfaces (IP addresses, Network
Objectives, and so on).
In a VSX Cluster object, do not add, remove, or edit static routes.
Note - You can change these settings either before or after you upgrade all the
Cluster Members.
n While the cluster contains Cluster Members that run different software versions (Multi-
Version Cluster), you must install the policy two times.
n Multi-Version Cluster (MVC) does not support Cluster Members with Dynamically
Assigned IP Addresses (DAIP).
Procedure
Important - In a VSX Cluster, it is possible to install policy only on the
upgradedVSX Cluster Members that run R81. After you change the version of
the VSX Cluster object to R81, the Management Server does not let you
change it to the previous version.
1. Make the required changes in the Access Control or Threat Prevention policy.
2. In SmartConsole, change the version of the cluster object to R81:
On the General Properties page > in the Platform section > in the Version field,
select R81 > click OK.
5. Install policy on the oldCluster Members that run the previous version:
a. In the Policy field, select the applicable policy.
b. In the Install Mode section, select these two options:
l Select Install on each selected gateway independently.
l Clear For gateway clusters, if installation on a cluster member
fails, do not install on that cluster.
c. Click Install.
The Policy installation:
l Succeeds on the oldCluster Members.
l Fails on the upgradedR81Cluster Members with a warning. Ignore
this warning.
These connections do not survive failover between Cluster Members with different versions:
n VPN:
l During a cluster failover from an R81 Cluster Member to an R77.30 Cluster
Member, all VPN connections on an R81 Cluster Member that are inspected on
CoreXL Firewall instances #1 and higher, are lost.
l Mobile Access VPN connections.
l Remote Access VPN connections.
l VPN Traditional Mode connections.
n Static NAT connections are cut off during a cluster failover from an R81 Cluster Member
to an R80.10 or R77.30 Cluster Member, if VMAC mode is enabled in this cluster.
n Identity Awareness connections.
n Data Loss Prevention (DLP) connections.
n IPv6 connections.
n Threat Emulation connections.
n PSL connections that are open during fail-over and then fail-back.
In addition, see the R81 ClusterXL Administration Guide > Chapter High Availability and Load
Sharing Modes in ClusterXL > Section Cluster Failover.
5 Schedule a full maintenance window to make sure you can make all the
custom configurations again after the upgrade.
Note - MVC supports Cluster Members with different Gaia kernel editions (R81 64-bit
and R77.30 / R80.10 32-bit).
The procedure described below is based on an example cluster with three Cluster Members
M1, M2 and M3.
However, you can use it for clusters that consist of two or more.
Action plan:
1. In SmartConsole, change the cluster object version to R81.
2. On the Cluster Member M3:
a. Upgrade to R81
Note - If you perform a Clean Install of R81, then you must establish SIC in
SmartConsole with this Cluster Member and install Access Control Policy on it
Procedure:
1. In SmartConsole, change the version of the cluster object
Step Instructions
2. On the Cluster Member M3, upgrade to R81 with CPUSE, or perform a Clean Install of R81
Important - You must reboot the Cluster Member after the upgrade or clean
install.
Installation
Instructions
Method
Installation
Instructions
Method
Clean Install of
R81 from scratch Installing a Cluster Member
Follow "Installing a ClusterXL Cluster" on page 118 - only the
step "Install the Cluster Members".
Important - In the Gaia First Time Configuration Wizard,
for the Management Connection IP address, you must
use the same IP address as was used by the previous
Cluster Member (prior to the upgrade).
Step Instructions
6 Click Edit.
8 Click Reset.
9 In the One-time password field, enter the same Activation Key you
entered during the First Time Configuration Wizard of the Cluster
Member.
10 In the Confirm one-time password field, enter the same Activation Key
again.
11 Click Initialize.
4. In SmartConsole, install the Access Control Policy on the R81 Cluster Member M3
Important - This step is required only if you performed a Clean Install of R81
on the Cluster Member M3.
Step Instructions
Step Instructions
6. In SmartConsole, install the Access Control Policy on the R81 Cluster Member M3
Step Instructions
Step Instructions
8. On the Cluster Member M2, upgrade to R81 with CPUSE, or perform a Clean Install of R81
Important - You must reboot the Cluster Member after the upgrade or clean
install.
Installation
Instructions
Method
Clean Install of
R81 from scratch Installing a Cluster Member
Follow "Installing a ClusterXL Cluster" on page 118 - only the
step "Install the Cluster Members".
Important - In the Gaia First Time Configuration Wizard,
for the Management Connection IP address, you must
use the same IP address as was used by the previous
Cluster Member (prior to the upgrade).
Step Instructions
6 Click Edit.
8 Click Reset.
9 In the One-time password field, enter the same Activation Key you
entered during the First Time Configuration Wizard of the Cluster
Member.
10 In the Confirm one-time password field, enter the same Activation Key
again.
11 Click Initialize.
10. In SmartConsole, install the Access Control Policy on the R81 Cluster Member M3 and M2
Important - This step is required only if you performed a Clean Install of R81
on the Cluster Member M2.
Step Instructions
warning.
11. On the R81 Cluster Member M2, enable the MVC mechanism
Step Instructions
12. In SmartConsole, install the Access Control Policy on the R81 Cluster Members M3 and
M2
Step Instructions
warning.
Step Instructions
14. On the old Cluster Member M1, upgrade to R81 with CPUSE, or perform a Clean Install of
R81
Important - You must reboot the Cluster Member after the upgrade or clean
install.
Installation
Instructions
Method
Clean Install of
R81 from scratch Installing a Cluster Member
Follow "Installing a ClusterXL Cluster" on page 118 - only the
step "Install the Cluster Members".
Important - In the Gaia First Time Configuration Wizard,
for the Management Connection IP address, you must
use the same IP address as was used by the previous
Cluster Member (prior to the upgrade).
Step Instructions
6 Click Edit.
8 Click Reset.
9 In the One-time password field, enter the same Activation Key you
entered during the First Time Configuration Wizard of the Cluster
Member.
10 In the Confirm one-time password field, enter the same Activation Key
again.
11 Click Initialize.
16. In SmartConsole, install the Access Control Policy and Threat Prevention Policy on the
Cluster object
Step Instructions
Step Instructions
Step Instructions
Step Instructions
2 From the left navigation panel, click Logs & Monitor > Logs.
3 Examine the logs from this Cluster to make sure it inspects the traffic as
expected.
5 Schedule a full maintenance window to make sure you can make all the
custom configurations again after the upgrade.
Note - MVC supports VSX Cluster Members with different Gaia kernel editions (R81
64-bit and R77.30 / R80.10 32-bit).
The procedure described below is based on an example cluster with three VSX Cluster
Members M1, M2 and M3.
However, you can use it for clusters that consist of two or more.
Action plan:
1. On the Management Server, upgrade the VSX Cluster object to R81.
2. On the VSX Cluster Member M3:
a. Upgrade to R81
Note - If you perform a Clean Install of R81, then push the VSX configuration from
the Management Server to this VSX Cluster Member
Note - If you perform a Clean Install of R81, then push the VSX configuration from
the Management Server to this VSX Cluster Member
7. In SmartConsole, install the Access Control Policy and the Threat Prevention Policy on
the VSX Cluster object.
8. In SmartConsole, install the Access Control Policy and the Threat Prevention Policy on
each Virtual System object.
Procedure:
1. On the Management Server, upgrade the VSX Cluster object to R81
Follow the R81 VSX Administration Guide > Chapter Command Line Reference >
Section vsx_util > Section vsx_util upgrade.
2. On the VSX Cluster Member M3, upgrade to R81 with CPUSE, or perform a Clean Install
of R81
Important - You must reboot the VSX Cluster Member after the upgrade or
clean install.
Installation
Instructions
Method
Installation
Instructions
Method
files.
n Applicable Check Point configuration files.
Installation
Instructions
Method
files.
n Applicable Check Point configuration files.
3. On each VSX Cluster Member, examine the VSX configuration and cluster state
Step Instructions
loaded.
n Make sure all Virtual Systems and Virtual Routers
set virtual-system 0
show cluster state
n In the Expert mode, run:
vsenv 0
cphaprob state
set virtual-system 0
show cluster members interfaces all
n In the Expert mode, run:
vsenv 0
cphaprob -a if
Important:
n The upgraded VSX Cluster Member M3 shows its cluster state as Ready.
n Other VSX Cluster Members M2 and M1 show the cluster state of the
Virtual Systems.
4. On the R81 VSX Cluster Member M3, enable the MVC mechanism
Step Instructions
set virtual-system 0
n In the Expert mode:
vsenv 0
5. In SmartConsole, install the Access Control Policy on the R81 VSX Cluster Member M3
Step Instructions
6. On each VSX Cluster Member, examine the VSX configuration and cluster state
Step Instructions
loaded.
n Make sure all Virtual Systems and Virtual Routers
set virtual-system 0
show cluster state
n In the Expert mode, run:
vsenv 0
cphaprob state
set virtual-system 0
show cluster members interfaces all
n In the Expert mode, run:
vsenv 0
cphaprob -a if
Important:
n In High Availability mode:
l The upgraded VSX Cluster Member M3 changes its cluster state to
Active.
l Other VSX Cluster Members change their state to Standby.
Active.
l Other VSX Cluster Members change their state to Standby and
Backup.
n All Virtual Systems must show the same information about the states of all
Virtual Systems.
7. On the VSX Cluster Member M2, upgrade to R81 with CPUSE, or perform a Clean Install
of R81
Important - You must reboot the VSX Cluster Member after the upgrade or
clean install.
Installation
Instructions
Method
files.
n Applicable Check Point configuration files.
Installation
Instructions
Method
files.
n Applicable Check Point configuration files.
8. On each VSX Cluster Member, examine the VSX configuration and cluster state
Step Instructions
loaded.
n Make sure all Virtual Systems and Virtual Routers
set virtual-system 0
show cluster state
n In the Expert mode, run:
vsenv 0
cphaprob state
set virtual-system 0
show cluster members interfaces all
n In the Expert mode, run:
vsenv 0
cphaprob -a if
Important:
n In the High Availability mode:
l One of the upgraded VSX Cluster Members has the cluster state
Active.
l Other VSX Cluster Members have the cluster state Standby.
Active.
l Other VSX Cluster Members have the cluster states Standby and
Backup.
n All Virtual Systems must show the same information about the states of all
Virtual Systems.
9. On the R81 VSX Cluster Member M2, enable the MVC mechanism
Step Instructions
set virtual-system 0
n In the Expert mode:
vsenv 0
10. In SmartConsole, install the Access Control Policy on the R81 VSX Cluster Members M3
and M2
Step Instructions
this warning.
11. On each VSX Cluster Member, examine the VSX configuration and cluster state
Step Instructions
loaded.
n Make sure all Virtual Systems and Virtual Routers
set virtual-system 0
show cluster state
n In the Expert mode, run:
vsenv 0
cphaprob state
set virtual-system 0
show cluster members interfaces all
n In the Expert mode, run:
vsenv 0
cphaprob -a if
Important:
n In the High Availability mode:
l One of the upgraded VSX Cluster Members has the cluster state
Active.
l Other VSX Cluster Members have the cluster state Standby.
Active.
l Other VSX Cluster Members have the cluster states Standby and
Backup.
n All Virtual Systems must show the same information about the states of all
Virtual Systems.
12. On the VSX Cluster Member M1, upgrade to R81 with CPUSE, or perform a Clean Install
of R81
Important - You must reboot the VSX Cluster Member after the upgrade or
clean install.
Installation
Instructions
Method
files.
n Applicable Check Point configuration files.
Installation
Instructions
Method
files.
n Applicable Check Point configuration files.
13. On each VSX Cluster Member, examine the VSX configuration and cluster state
Step Instructions
loaded.
n Make sure all Virtual Systems and Virtual Routers
set virtual-system 0
show cluster state
n In the Expert mode, run:
vsenv 0
cphaprob state
set virtual-system 0
show cluster members interfaces all
n In the Expert mode, run:
vsenv 0
cphaprob -a if
Important:
n In the High Availability mode:
l One of the VSX Cluster Members has the cluster state Active.
l Other VSX Cluster Members have the cluster states Standby and
Backup.
n All Virtual Systems must show the same information about the states of all
Virtual Systems.
14. In SmartConsole, install the Access Control Policy and Threat Prevention Policy on the
Cluster object
Step Instructions
15. On each VSX Cluster Member, examine the VSX configuration and cluster state
Step Instructions
loaded.
n Make sure all Virtual Systems and Virtual Routers
set virtual-system 0
show cluster state
n In the Expert mode, run:
vsenv 0
cphaprob state
Important:
n All VSX Cluster Members must show the same
Step Instructions
set virtual-system 0
show cluster members interfaces all
n In the Expert mode, run:
vsenv 0
cphaprob -a if
Important:
n In the High Availability mode:
l One of the VSX Cluster Members has the cluster state Active.
l Other VSX Cluster Members have the cluster states Standby and
Backup.
n All Virtual Systems must show the same information about the states of all
Virtual Systems.
Step Instructions
set virtual-system 0
n In the Expert mode:
vsenv 0
17. In SmartConsole, install the Access Control Policy and the Threat Prevention Policy on
each Virtual System object
Step Instructions
Step Instructions
2 From the left navigation panel, click Logs & Monitor > Logs.
3 Examine the logs from the Virtual Systems on this VSX Cluster to make
sure they inspect the traffic as expected.
Step Instructions
For more information, see the R81 ClusterXL Administration Guide > Chapter
Monitoring and Troubleshooting Clusters - Section ClusterXL Monitoring
Commands > Section Viewing Delta Synchronization.
Important - You can use this upgrade method for all supported versions as described
in the R81 Release Notes.
5 Schedule a full maintenance window to make sure you can make all the
custom configurations again after the upgrade.
Procedure:
1. On each Cluster Member, Upgrade to R81 with CPUSE, or perform a Clean Install of R81
Important - You must reboot the Cluster Member after the upgrade or clean
install.
Installation
Instructions
Method
Installation
Instructions
Method
Step Instructions
Step Instructions
6 Click Edit.
8 Click Reset.
9 In the One-time password field, enter the same Activation Key you
entered during the First Time Configuration Wizard of the Cluster
Member.
10 In the Confirm one-time password field, enter the same Activation Key
again.
11 Click Initialize.
4. In SmartConsole, install the Access Control Policy and Threat Prevention Policy on the
Cluster object
Step Instructions
Step Instructions
Step Instructions
Step Instructions
2 From the left navigation panel, click Logs & Monitor > Logs.
3 Examine the logs from this Cluster to make sure it inspects the traffic as
expected.
5 Schedule a full maintenance window to make sure you can make all the
custom configurations again after the upgrade.
Procedure:
1. On the Management Server, upgrade the configuration of the VSX Cluster object to R81
Step Instructions
Select R81.
/opt/CPsuite-R81/fw1/log/vsx_util_YYYYMMDD_HH_
MM.log
n On a Multi-Domain Server:
/opt/CPmds-R81/customers/<Name_of_
Domain>/CPsuite-R81/fw1/log/vsx_util_YYYYMMDD_
HH_MM.log
Step Instructions
9 Make sure in the Platform section, the Version field shows R81.
2. On each VSX Cluster Member, Upgrade to R81 with CPUSE, or perform a Clean Install of
R81
Important - You must reboot the VSX Cluster Member after the upgrade or
clean install.
Installation
Instructions
Method
Installation
Instructions
Method
files.
n Applicable Check Point configuration files.
Installation
Instructions
Method
files.
n Applicable Check Point configuration files.
Step Instructions
6 Click Edit.
8 Click Reset.
9 In the One-time password field, enter the same Activation Key you
entered during the First Time Configuration Wizard of the Cluster
Member.
10 In the Confirm one-time password field, enter the same Activation Key
again.
11 Click Initialize.
Step Instructions
5. On each VSX Cluster Member, examine the VSX configuration and cluster state
Step Instructions
Step Instructions
loaded.
n Make sure all Virtual Systems and Virtual Routers
set virtual-system 0
show cluster state
n In the Expert mode, run:
vsenv 0
cphaprob state
Important:
n All VSX Cluster Members must show the same
set virtual-system 0
show cluster members interfaces all
n In the Expert mode, run:
vsenv 0
cphaprob -a if
Step Instructions
2 From the left navigation panel, click Logs & Monitor > Logs.
3 Examine the logs from the Virtual Systems on this VSX Cluster to make
sure they inspect the traffic as expected.
Important - You can use this upgrade method for all supported versions as described
in the R81 Release Notes.
5 Schedule a full maintenance window to make sure you can make all the
custom configurations again after the upgrade.
The procedure below is based on an example cluster with three Cluster Members M1, M2, and
M3.
However, you can use it for clusters that consist of two or more Cluster Members.
Procedure:
1. On each Cluster Member, change the CCP mode to Broadcast
Important - This step applies only to R80.30 and lower with the Linux kernel
2.6 (run the "uname -r" command).
Best Practice - To avoid possible problems with switches around the cluster
during the upgrade, we recommend to change the Cluster Control Protocol
(CCP) mode to Broadcast.
Note - In R80.40 and above, the Cluster Control Protocol (CCP) runs only in
the Unicast mode. Therefore, after the upgrade, it is not necessary to change
the CCP mode.
Step Instructions
survives reboot.
2. On the Cluster Member M3, upgrade to R81 with CPUSE, or perform a Clean Install of R81
Important - You must reboot the Cluster Member after the upgrade or clean
install.
Installation
Instructions
Method
Installation
Instructions
Method
3. On the Cluster Member M2, upgrade to R81 with CPUSE, or perform a Clean Install of R81
Important - You must reboot the Cluster Member after the upgrade or clean
install.
Installation
Instructions
Method
Step Instructions
Step Instructions
6 Click Edit.
8 Click Reset.
9 In the One-time password field, enter the same Activation Key you
entered during the First Time Configuration Wizard of the Cluster
Member.
10 In the Confirm one-time password field, enter the same Activation Key
again.
11 Click Initialize.
Step Instructions
6 Click Edit.
8 Click Reset.
9 In the One-time password field, enter the same Activation Key you
entered during the First Time Configuration Wizard of the Cluster
Member.
10 In the Confirm one-time password field, enter the same Activation Key
again.
11 Click Initialize.
Step Instructions
Step Instructions
warning.
Step Instructions
M1 is:
l In R80.20 and higher - Active(!).
9. On the old Cluster Member M1, stop all Check Point services
Step Instructions
Step Instructions
Step Instructions
11. On the old Cluster Member M1, upgrade to R81 with CPUSE, or perform a Clean Install of
R81
Important - You must reboot the Cluster Member after the upgrade or clean
install.
Installation
Instructions
Method
Important - This step is required only if you performed a Clean Install of R81
on this Cluster Member M1.
Step Instructions
6 Click Edit.
8 Click Reset.
9 In the One-time password field, enter the same Activation Key you
entered during the First Time Configuration Wizard of the Cluster
Member.
10 In the Confirm one-time password field, enter the same Activation Key
again.
11 Click Initialize.
13. In SmartConsole, install the Access Control Policy and Threat Prevention Policy on the
Cluster object
Step Instructions
Step Instructions
Step Instructions
Step Instructions
2 From the left navigation panel, click Logs & Monitor > Logs.
3 Examine the logs from this Cluster to make sure it inspects the traffic as
expected.
5 Schedule a full maintenance window to make sure you can make all the
custom configurations again after the upgrade.
The procedure below describes an example VSX Cluster with three VSX Cluster Members M1,
M2, and M3.
However, you can use it for clusters that consist of two or more Cluster Members.
Procedure:
1. On the Management Server, upgrade the configuration of the VSX Cluster object to R81
Step Instructions
Select R81.
/opt/CPsuite-R81/fw1/log/vsx_util_YYYYMMDD_HH_
MM.log
n On a Multi-Domain Server:
/opt/CPmds-R81/customers/<Name_of_
Domain>/CPsuite-R81/fw1/log/vsx_util_YYYYMMDD_
HH_MM.log
Step Instructions
9 Make sure in the Platform section, the Version field shows R81.
Step Instructions
reboot.
3. On the VSX Cluster Member M3, upgrade to R81 with CPUSE, or perform a Clean Install
of R81
Important - You must reboot the VSX Cluster Member after the upgrade or
clean install.
Installation
Instructions
Method
files.
n Applicable Check Point configuration files.
Installation
Instructions
Method
files.
n Applicable Check Point configuration files.
4. On the VSX Cluster Member M2, upgrade to R81 with CPUSE, or perform a Clean Install
of R81
Important - You must reboot the VSX Cluster Member after the upgrade or
clean install.
Installation
Instructions
Method
Installation
Instructions
Method
files.
n Applicable Check Point configuration files.
Installation
Instructions
Method
files.
n Applicable Check Point configuration files.
Step Instructions
6 Click Edit.
8 Click Reset.
9 In the One-time password field, enter the same Activation Key you
entered during the First Time Configuration Wizard of the Cluster
Member.
10 In the Confirm one-time password field, enter the same Activation Key
again.
11 Click Initialize.
Step Instructions
6 Click Edit.
8 Click Reset.
9 In the One-time password field, enter the same Activation Key you
entered during the First Time Configuration Wizard of the Cluster
Member.
10 In the Confirm one-time password field, enter the same Activation Key
again.
11 Click Initialize.
Step Instructions
this warning.
8. On each VSX Cluster Member, examine the VSX configuration and cluster state
Step Instructions
loaded.
n Make sure all Virtual Systems and Virtual Routers
Step Instructions
set virtual-system 0
show cluster state
n In the Expert mode, run:
vsenv 0
cphaprob state
Important:
n The cluster states of the upgraded VSX Cluster
M1 is:
l In R80.20 and higher - Active(!).
9. On the old VSX Cluster Member M1, stop all Check Point services
Step Instructions
10. On the upgraded VSX Cluster Members M2 and M3, examine the cluster state
Step Instructions
Step Instructions
11. On the old VSX Cluster Member M1, upgrade to R81 with CPUSE, or perform a Clean
Install of R81
Important - You must reboot the VSX Cluster Member after the upgrade or
clean install.
Installation
Instructions
Method
Installation
Instructions
Method
files.
n Applicable Check Point configuration files.
Installation
Instructions
Method
files.
n Applicable Check Point configuration files.
Step Instructions
6 Click Edit.
8 Click Reset.
9 In the One-time password field, enter the same Activation Key you
entered during the First Time Configuration Wizard of the Cluster
Member.
10 In the Confirm one-time password field, enter the same Activation Key
again.
11 Click Initialize.
Step Instructions
14. On each VSX Cluster Member, examine the VSX configuration and cluster state
Step Instructions
Step Instructions
loaded.
n Make sure all Virtual Systems and Virtual Routers
set virtual-system 0
show cluster state
n In the Expert mode, run:
vsenv 0
cphaprob state
Important:
n All VSX Cluster Members must show the same
set virtual-system 0
show cluster members interfaces all
n In the Expert mode, run:
vsenv 0
cphaprob -a if
Step Instructions
2 From the left navigation panel, click Logs & Monitor > Logs.
3 Examine the logs from the Virtual Systems on this VSX Cluster to make
sure they inspect the traffic as expected.
Important - After you upgrade a Full High Availability Cluster to R81, you must
establish the Secure Internal Communication (SIC) again between the Full High
Availability Cluster Member that runs the Primary Security Management Server and
the Full High Availability Cluster Member that runs the Secondary Security
Management Server.
Important:
n You can restore a Domain only on the same Multi-Domain Server, on which you
backed it up.
n You can restore a Domain, to which a Global Policy is assigned, only if during
the Domain backup you did not purge the assigned Global Domain Revision.
Backing Up a Domain
backup-domain
For API documentation, see the Check Point Management API Reference - search for
backup-domain.
Restoring a Domain
Before you can restore a Domain, you must delete the current Domain.
Before you delete the current Domain, make sure it is possible to restore it.
restore-domain
For API documentation, see the Check Point Management API Reference - search
for restore-domain.
Before you can restore a Domain, you must delete the current Domain.
You can perform this step in one of these ways:
n In SmartConsole connected to the MDS context
n With the API delete domain (see the Check Point Management API
Reference)
restore-domain
For API documentation, see the Check Point Management API Reference - search
for restore-domain.
4. Restore the Standby Domain Management Servers and Domain Log Servers
When you restore the Standby Domain Management Servers and Domain Log
Servers, they must have the same IP addresses that were used when you collected
the Domain backup.
For API documentation, see the Check Point Management API Reference - search
for set domain
For each Standby Domain Management Server, run this API:
You must again configure the Multi-Domain Server Administrators and GUI clients
and assign them to the Domains.
a. Configure the Multi-Domain Server Administrators and GUI clients:
i. Run the mdsconfig command
ii. Configure the Administrators
iii. Configure the GUI clients
Procedure:
1. On the source Multi-Domain Server, export the Domain Management Server
migrate-export-domain
For API documentation, see the Check Point Management API Reference -
search for migrate-export-domain.
b. Calculate the MD5 of the export file:
a. Transfer the export file from the source Multi-Domain Server to the target Multi-
Domain Server, to some directory.
migrate-import-domain
For API documentation, see the Check Point Management API Reference -
search for migrate-import-domain.
b. Make sure that all the required daemons (FWM, FWD, CPD, and CPCA) are in
the state "up" and show their PID (the "pnd" state is also acceptable):
mdsstat
You must again configure the Multi-Domain Server Administrators and GUI clients and
assign them to the Domains.
a. Configure the Multi-Domain Server Administrators and GUI clients:
i. Run the mdsconfig command
ii. Configure the Administrators
iii. Configure the GUI clients
iv. Exit the mdsconfig menu
a. Connect with SmartConsole to the Active Domain (to which this Domain
Management Server belongs).
b. Install the applicable policies on all managed Security Gateways and Clusters.
3 You must close all GUI clients (SmartConsole applications) connected to the
source Security Management Server.
Procedure:
1. On the source R81 Security Management Server, export the entire management database
Step Instructions
For details, see the R81 CLI Reference Guide - Chapter Security
Management Server Commands - Section migrate_server.
Step Instructions
Step Instructions
Step Instructions
Step Instructions
run:
./migrate_server import -v R81 [-l | -x]
/<Full Path>/<Name of Exported File>.tgz
n If this Security Management Server is not connected to the Internet,
run:
./migrate_server import -v R81 -skip_upgrade_
tools_check [-l | -x] /<Full Path>/<Name of
Exported File>.tgz
Important - The "migrate_server import" command
automatically restarts Check Point services (runs the "cpstop" and
"cpstart" commands).
For details, see the R81 CLI Reference Guide - Chapter Security
Management Server Commands - Section migrate_server.
Step Instructions
cpwd_admin list
The "STAT" column must show "E" (executing) for all processes.
n Close the active Security log ($FWDIR/log/fw.log) and Audit log
($FWDIR/log/fw.adtlog) files:
fw logswitch
fw logswitch -audit
n If the target Domain Management Server must have a different IP address than the
source Security Management Server, then you must prepare the source database before
the export.
Instructions in SmartConsole
1. Create a new Host object with the new IP address of the target Domain
Management Server.
2. In each Security Policy, add a new Access Control rule to allow specific traffic
from the Host object with new IP address to all managed Security Gateways and
Clusters.
Services
Sour Destinat VP & Actio Trac Insta
No Name
ce ion N Applicati n k ll On
ons
Notes:
l You must use the pre-defined Check Point services.
Procedure:
1. On the source R81 Security Management Server, export the database
migrate-export-domain
For API documentation, see the Check Point Management API Reference -
search for migrate-export-domain.
Example:
a. Transfer the export file from the source Security Management Server to the
target Multi-Domain Server, to some directory.
Calculate the MD5 for the transferred file and compare it to the MD5 that you
calculated on the source Security Management Server:
3. On the target Multi-Domain Server, import the Security Management Server database into
a Domain Management Server
migrate-import-domain
For API documentation, see the Check Point Management API Reference -
search for migrate-import-domain.
Make sure the name of the Domain you create does not conflict with the name of
an existing Domain.
Example:
mdsstat
You must again configure the Multi-Domain Server Administrators and GUI clients and
assign them to the new Domain.
cpstop
9. Delete the special Access Control rule you added before migration
Important - This step applies only if the target Domain Management Server
has a different IP address than the source Security Management Server.
c. Delete the Host object you added on the source Security Management Server
before migration.
d. Install the applicable policies on all managed Security Gateways and Clusters.
n If the target Security Management Server must have a different IP address than the
source Domain Management Server, then you must prepare the source database before
the export.
Instructions in SmartConsole
1. Create a new Host object with the new IP address of the target Security
Management Server.
2. In each Security Policy, add a new Access Control rule to allow specific traffic
from the Host object with new IP address to all managed Security Gateways and
Clusters.
Services
Sour Destinat VP & Actio Trac Insta
No Name
ce ion N Applicati n k ll On
ons
Notes:
l You must use the pre-defined Check Point services.
Procedure:
1. On the source R81 Multi-Domain Server, export the Domain Management Server
migrate-export-domain
For API documentation, see the Check Point Management API Reference -
search for migrate-export-domain.
Example:
2. Transfer the export file to the target R81 Security Management Server
a. Transfer the export file from the source Multi-Domain Server to the target
Security Management Server, to some directory.
Calculate the MD5 for the transferred file and compare it to the MD5 that you
calculated on the source Multi-Domain Server:
3. On the target R81 Security Management Server, import the Domain Management Server
database
Step Instructions
Step Instructions
5 Make sure that all the required daemons (FWM, FWD, CPD, and CPM)
are in the state "E" and show their PID:
cpwd_admin list
If some of the required daemons on the Security Management Server are
in the state "T", then wait for 5-10 minutes, restart the Security
Management Server and check again. Run these two commands:
cpstop
cpstart
You must again configure the Security Management Server Administrators and GUI
clients.
a. Run the cpconfig command.
b. Configure the Administrators.
c. Configure the GUI clients.
d. Exit the cpconfig menu.
Make sure you backed up the Multi-Domain Server. See "Backing Up and Restoring"
on page 20.
a. Connect with SmartConsole to the source Multi-Domain Server to the MDS
context.
b. From the left navigation panel, click Multi Domain > Domains.
c. Right-click the Domain Management Server object you migrated and select
Delete.
9. Delete the special Access Control rule you added before migration
Important - This step applies only if the target Security Management Server
has a different IP address than the source Domain Management Server.
Procedure:
1. Back up the current R81 Multi-Domain Server or Multi-Domain Log Server
See the R81 Gaia Administration Guide > Chapter Network Management > Section
Network Interfaces > Section Physical Interfaces.
Step Instructions
2 Issue a new license for the new IP address of your Multi-Domain Server
or Multi-Domain Log Server.
4 Install the new license and Support Contract in the MDS context on your
Multi-Domain Server or Multi-Domain Log Server.
See "Working with Licenses" on page 657.
4. Connect to the command line on the Multi-Domain Server or Multi-Domain Log Server
Step Instructions
Step Instructions
Step Instructions
Step Instructions
Step Instructions
physical interface.
n This step applies if you migrated the entire management database from
Step Instructions
3 Change the current interface name to the name of the applicable main
interface.
This is the interface, on which you configured the main IPv4 address of
your Multi-Domain Server or Multi-Domain Log Server.
8 Change the current interface name to the name of the applicable main
interface.
This is the interface, on which you configured the main IPv4 address of
your Multi-Domain Server or Multi-Domain Log Server.
Step Instructions
Step Instructions
Step Instructions
Step Instructions
Step Instructions
Step Instructions
Step Instructions
13. Change the IP addresses of all existing Domain Management Servers and Domain Log
Servers
Important Notes
n If you just installed the Secondary Multi-Domain Server or Multi-Domain Log Server,
and it is necessary to change the server's IP address, you only need to change the
$MDSDIR/conf/LeadingIP file.
n After you change the IP address of the Multi-Domain Server or Multi-Domain Log
Server, you have to synchronize the local log database again on these servers (see
sk116335):
Important:
n See "Changing the IP Address of a Multi-Domain Server or Multi-Domain Log
Server" on page 526.
n On Multi-Domain Servers in a Management High Availability environment, you
must perform the procedure below in this order:
1. Change the IP address on the Active Domain Management Server on the
Primary Multi-Domain Server
2. On the Primary Multi-Domain Server, change the state of the Active
Domain Management Server to Standby
3. On the Secondary Multi-Domain Server, change the state of the
applicable Domain Management Server to Active
4. Change the IP address on the Active Domain Management Server on the
Secondary Multi-Domain Server
n On Multi-Domain Log Servers in a Management High Availability environment,
you must perform the procedure below in this order:
1. Change the IP address on the Active Domain Log Server on the Primary
Multi-Domain Log Server
2. On the Primary Multi-Domain Log Server, change the state of the Active
Domain Log Server to Standby
3. On the Secondary Multi-Domain Log Server, change the state of the
applicable Domain Log Server to Active
4. Change the IP address on the Active Domain Log Server on the
Secondary Multi-Domain Log Server
Procedure:
1. Back up the current R81 Multi-Domain Server or Multi-Domain Log Server
You must close all GUI clients (SmartConsole applications) connected to the Multi-
Domain Server or Multi-Domain Log Server.
3. Connect to the command line on the Multi-Domain Server or Multi-Domain Log Server
Step Instructions
Step Instructions
Step Instructions
Step Instructions
Step Instructions
Step Instructions
Step Instructions
Step Instructions
2 Make sure that all the required daemons (FWM, FWD, CPD, and CPCA)
are in the state "up" and show their PID (the "pnd" state is also
acceptable):
mdsstat
If some of the required daemons on a Domain Management Server
(Domain Log Server) are in the state "down", then wait for 5-10 minutes,
restart that Domain Management Server (Domain Log Server), and check
again. Run these three commands:
mdsstop_customer <IP Address or Name or IP of
Domain Management Server or Domain Log Server>
mdsstart_customer <IP Address or Name or IP of
Domain Management Server or Domain Log Server>
mdsstat
Important Note
If SmartLog does not work for a Domain Management Server with the modified IP address:
1. Connect with SmartConsole to that Domain Management Server.
2. From the left navigation panel, click Gateways & Servers.
3. Open the Domain Management Server object.
4. Make any change in the Domain Management Server object (for example, in the
Comment field).
5. Click OK.
Notes:
n If you manage IPS globally, you must reassign the Global Policies before
installing the policy on the managed Security Gateways.
n Starting in R80, the IPS subscription has changed. All Domains subscribed to
IPS, are automatically assigned to an "Exclusive" subscription. "Override" and
"Merge" subscriptions are no longer supported.
n For more on IPS in Multi-Domain Server environment, see the R81 Multi-
Domain Security Management Administration Guide.
Item Description
1 Switch with a mirror or SPAN port that duplicates all incoming and outgoing
packets.
The Security Gateway connects to a mirror or SPAN port on the switch.
2 Servers.
3 Clients.
Important - Check Point Cluster does not support the Monitor Mode.
Note - This procedure applies to both Check Point Appliances and Open Servers.
Procedure:
1. Install the Security Gateway
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Management Connection window, select the interface,
Security Management.
n In the Products window:
You can configure the Monitor Mode on an interface either in Gaia Portal, or Gaia
Clish.
Configuring the Monitor Mode in Gaia Portal
Step Instructions
3 Select the applicable physical interface from the list and click Edit.
5 In the Comment field, enter the applicable comment text (up to 100
characters).
6 On the IPv4 tab, select Use the following IPv4 address, but do not
enter an IPv4 address.
7 On the IPv6 tab, select Use the following IPv6 address, but do not
enter an IPv6 address.
Important - This setting is available only after you enable the IPv6
Support in Gaia and reboot.
9 Click OK.
Step Instructions
You can configure the Security Gateway object in SmartConsole either in Wizard
Mode, or in Classic Mode.
Step Instructions
Step Instructions
8 If during the Wizard Mode, you selected Skip and initiate trusted
communication later:
a. The Secure Internal Communication field shows Uninitialized.
b. Click Communication.
c. In the Platform field:
n Select Open server / Appliance for all Check Point models
d. Enter the same Activation Key you entered during the Security
Gateway's First Time Configuration Wizard.
e. Click Initialize.
Make sure the Certificate state field shows Established.
f. Click OK.
9 On the Network Security tab, make sure to enable only the Firewall
Software Blade.
Step Instructions
12 Click OK.
Step Instructions
Step Instructions
5 In the Name field, enter the applicable name for this Security Gateway
object.
6 In the IPv4 address and IPv6 address fields, configure the same IPv4
and IPv6 addresses that you configured on the Management
Connection page of the Security Gateway's First Time Configuration
Wizard.
Make sure the Security Management Server or Multi-Domain Server
can connect to these IP addresses.
c. Enter the same Activation Key you entered during the Security
Gateway's First Time Configuration Wizard.
d. Click Initialize.
e. Click OK.
Step Instructions
9 On the Network Security tab, make sure to enable only the Firewall
Software Blade.
12 Click OK.
4. Configure the Security Gateway to process packets that arrive in the wrong order
Step Instructions
Step Instructions
Notes:
n This configuration helps the Security Gateway process packets that
better for the first 10-30 minutes when processing connections, in which
the TCP-SYN packet did not arrive.
n It is not possible to set the value of the kernel parameters "psl_tap_
5. Configure the required Global Properties for the Security Gateway in SmartConsole
Step Instructions
Step Instructions
3 From the left tree, click the Stateful Inspection pane and configure:
a. In the Default Session Timeouts section:
i. Change the value of the TCP session timeout from the
default 3600 to 60 seconds.
ii. Change the value of the TCP end timeout from the default 20
to 5 seconds.
b. In the Out of state packets section, you must clear all the boxes.
Otherwise, the Security Gateway drops the traffic as out of state
(because the traffic does not pass through the Security Gateway, it
does not record the state information for the traffic).
4 From the left tree, click the Advanced page > click the Configure button,
and configure:
a. Click FireWall-1 > Stateful Inspection.
b. Clear reject_x11_in_any.
c. Click OK to close the Advanced Configuration window.
6. Configure the required Access Control Policy for the Security Gateway in SmartConsole
Ste
Instructions
p
Ste
Instructions
p
5
Best Practice
We recommend these Aggressive Aging settings for the most common TCP
connections:
a. In the SmartConsole, click Objects menu > Object Explorer.
b. Open Services and select TCP.
c. Search for the most common TCP connections in this network.
d. Double-click the applicable TCP service.
e. From the left tree, click Advanced.
f. At the top, select Override default settings.
On Domain Management Server, select Override global domain
settings.
g. Select Match for 'Any'.
h. In the Aggressive aging section:
Select Enable aggressive aging.
Select Specific and enter 60.
i. Click OK.
j. Close the Object Explorer.
7. Make sure the Security Gateway enabled the Monitor Mode for Software Blades
Step Instructions
Step Instructions
On the Security Gateway, connect the interface in the Monitor Mode to the mirror or
SPAN port on the switch.
Note - This procedure applies to both Check Point Appliances and Open Servers.
Procedure:
1. Install the VSX Gateway
Important - Make sure the VSX Gateway has enough physical interfaces.
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Management Connection window, select the interface,
Security Management.
n In the Products window:
You can configure the Monitor Mode on an interface either in Gaia Portal, or Gaia
Clish.
Configuring the Monitor Mode in Gaia Portal
Step Instructions
3 Select the applicable physical interface from the list and click Edit.
5 In the Comment field, enter the applicable comment text (up to 100
characters).
6 On the IPv4 tab, select Use the following IPv4 address, but do not
enter an IPv4 address.
7 On the IPv6 tab, select Use the following IPv6 address, but do not
enter an IPv6 address.
Important - This setting is available only after you enable the IPv6
Support in Gaia and reboot.
9 Click OK.
Step Instructions
3. Configure the VSX Gateway to process packets that arrive in the wrong order
Step Instructions
Step Instructions
Step Instructions
Notes:
n This configuration helps the VSX Gateway process packets that arrive
better for the first 10-30 minutes when processing connections, in which
the TCP-SYN packet did not arrive.
n It is not possible to set the value of the kernel parameters "psl_tap_
Step Instructions
Network Object > Gateways and Servers > VSX > New Gateway.
n In the top right corner, click Objects Pane > New > More >
Network Object > Gateways and Servers > VSX > Gateway.
The VSX Gateway Wizard opens.
Step Instructions
If the Trust State field does not show Trust established, perform these
steps:
a. Connect to the command line on the VSX Gateway.
b. Make sure there is a physical connectivity between the VSX
Gateway and the Management Server (for example, pings can
pass).
c. Run:
cpconfig
d. Enter the number of this option:
Secure Internal Communication
e. Follow the instructions on the screen to change the Activation Key.
f. In SmartConsole, on the VSX Gateway General Properties page,
click Reset.
g. Enter the same Activation Key you entered in the cpconfig menu.
h. In SmartConsole, click Initialize.
Step Instructions
Step Instructions
5. Configure the Virtual System object (and other Virtual Devices) in SmartConsole
Step Instructions
Step Instructions
6. Configure the required Global Properties for the Virtual System in SmartConsole
Step Instructions
3 From the left tree, click the Stateful Inspection pane and configure:
a. In the Default Session Timeouts section:
i. Change the value of the TCP session timeout from the
default 3600 to 60 seconds.
ii. Change the value of the TCP end timeout from the default 20
to 5 seconds.
b. In the Out of state packets section, you must clear all the boxes.
Otherwise, the Virtual System drops the traffic as out of state
(because the traffic does not pass through the Virtual System, it
does not record the state information for the traffic).
4 From the left tree, click the Advanced page > click the Configure button,
and configure:
a. Click FireWall-1 > Stateful Inspection.
b. Clear reject_x11_in_any.
c. Click OK to close the Advanced Configuration window.
Step Instructions
7. Configure the required Access Control policy for the Virtual System in SmartConsole
Ste
Instructions
p
Ste
Instructions
p
5
Best Practice
We recommend these Aggressive Aging settings for the most common TCP
connections:
a. In the SmartConsole, click Objects menu > Object Explorer.
b. Open Services and select TCP.
c. Search for the most common TCP connections in this network.
d. Double-click the applicable TCP service.
e. From the left tree, click Advanced.
f. At the top, select Override default settings.
On Domain Management Server, select Override global domain
settings.
g. Select Match for 'Any'.
h. In the Aggressive aging section:
n Select Enable aggressive aging.
n Select Specific and enter 60.
i. Click OK.
j. Close the Object Explorer.
8. Make sure the VSX Gateway enabled the Monitor Mode for Software Blades
Step Instructions
Step Instructions
On the VSX Gateway, connect the interface in the Monitor Mode to the mirror or SPAN
port on the switch.
Step Instructions
2 From the left navigation panel, click Security Policies > Threat Prevention.
5 From the left tree, click the General Policy page and configure:
a. In the Blades Activation section, select the applicable Software Blades.
b. In the Activation Mode section:
n In the High Confidence field, select Detect.
n In the Medium Confidence field, select Detect.
n In the Low Confidence field, select Detect.
6 From the left tree, click the Anti-Virus page and configure:
a. In the Protected Scope section, select Inspect incoming and outgoing
files.
b. In the File Types section:
n Select Process all file types.
n Optional: Select Enable deep inspection scanning (impacts
performance).
c. Optional: In the Archives section, select Enable Archive scanning
(impacts performance).
Step Instructions
7 From the left tree, click the Threat Emulation page > click General and configure:
n In the Protected Scope section, select Inspect incoming files from the
following interfaces and from the menu, select All.
9 Click OK.
Step Instructions
2 From the left navigation panel, click Manage & Settings > Blades.
3 In the Application Control & URL Filtering section, click Advanced Settings.
The Application Control & URL Filtering Settings window opens.
6 Click OK to close the Application Control & URL Filtering Settings window.
Configuring the Data Loss Prevention Software Blade for Monitor Mode
Configure the settings below, if you enabled the Data Loss Prevention Software Blade on the
Security Gateway in Monitor Mode:
Step Instructions
2 From the left navigation panel, click Manage & Settings > Blades.
4 In SmartDashboard:
a. Click the My Organization page.
b. In the Email Addresses or Domains section, configure with full list of
company's domains.
There is no need to include subdomains (for example, mydomain.com,
mydomain.uk).
c. In the Networks section, select Anything behind the internal interfaces of
my DLP gateways.
d. In the Users section, select All users.
Accuracy.
l In the Customer Names data type, we recommend to add the
Note - Before you can configure the DLP rules, you must configure the
applicable objects in SmartConsole.
Step Instructions
7 Click Launch Menu > File > Update (or press the CTRL S keys).
10 Make sure the Security Gateway enabled the SMTP Mirror Port Mode:
a. Connect to the command line on the Security Gateway.
b. Log in to the Expert mode.
c. Run this command:
dlp_smtp_mirror_port status
d. Make sure the value of the kernel parameter dlp_force_smtp_kernel_
inspection is set to 1 (one).
Run these two commands:
fw ctl get int dlp_force_smtp_kernel_inspection
grep dlp_force_smtp_kernel_inspection
$FWDIR/boot/modules/fwkern.conf
Step Instructions
2 On the Security Gateway in Monitor Mode, enable the stripping of the X-Forward-
For (XFF) field.
Follow the sk100223: How to enable stripping of X-Forward-For (XFF) field.
Support of
a Support of a
Support of VSX
Security ClusterXL
Software Blade Virtual Systems
Gateway in Bridge
in Bridge Mode
in Bridge Mode
Mode
Firewall
IPS
URL Filtering
DLP
Anti-Bot
Application Control
Support of
a Support of a
Support of VSX
Security ClusterXL
Software Blade Virtual Systems
Gateway in Bridge
in Bridge Mode
in Bridge Mode
Mode
UserCheck
QoS
(see (see (see sk79700)
sk89581) sk89581)
Client Authentication
User Authentication
Support of
a Support of a
Support of VSX
Security ClusterXL
Software Blade Virtual Systems
Gateway in Bridge
in Bridge Mode
in Bridge Mode
Mode
IPsec VPN
Mobile Access
Notes:
1. Does not support the Anti-Virus in Traditional Mode.
2. HTTPS Inspection in Layer 2 works as Man-in-the-Middle, based on MAC
addresses:
n Client sends a TCP [SYN] packet to the MAC address X.
n Security Gateway creates a TCP [SYN-ACK] packet and sends it to the
MAC address X.
n Security Gateway in Bridge Mode does not need IP addresses, because
CPAS takes the routing and the MAC address from the original packet.
Note - To be able to perform certificate validation (CRL/OCSP download),
Security Gateway needs at least one interface to be assigned with an IP
address. Probe bypass can have issues with Bridge Mode. Therefore, we do not
recommend Probe bypass in Bridge Mode configuration.
3. Identity Awareness in Bridge Mode supports only the AD Query authentication.
Item Description
3 Switch that connects the first network segment to one bridged subordinate
interface (4) on the Security Gateway in Bridge Mode.
8 Switch that connects the second network segment to the other bridged
subordinate interface (6) on the Security Gateway in Bridge Mode.
Procedure:
1. Install the Security Gateway
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Management Connection window, select the interface,
Security Management.
n In the Products window:
You configure the Bridge interface in either Gaia Portal, or Gaia Clish.
Configuring the Bridge interface in Gaia Portal
Step Instructions
2 Make sure that the subordinate interfaces, which you wish to add to the
Bridge interface, do not have IP addresses assigned.
Step Instructions
5 Select the interfaces from the Available Interfaces list and then click
Add.
Notes:
n Make sure that the subordinate interfaces do not have any
Management Interface.
n A Bridge interface in Gaia can contain only two subordinate
interfaces.
6 On the IPv4 tab, enter the IPv4 address and subnet mask.
You can optionally select the Obtain IPv4 Address automatically
option.
7 On the IPv6 tab (optional), enter the IPv6 address and mask length.
You can optionally select the Obtain IPv6 Address automatically
option.
Important - First, you must enable the IPv6 Support and reboot.
8 Click OK.
Step Instructions
Step Instructions
3 Make sure that the subordinate interfaces, which you wish to add to the
Bridge interface, do not have IP addresses assigned:
show interface <Name of Interface> ipv4-address
show interface <Name of Interface> ipv6-address
Management Interface.
n A Bridge interface in Gaia can contain only two subordinate
interfaces.
You can configure the ClusterXL object in either Wizard Mode, or Classic Mode.
Configuring the Security Gateway object in Wizard Mode
Step Instructions
Step Instructions
8 If during the Wizard Mode, you selected Skip and initiate trusted
communication later:
a. The Secure Internal Communication field shows Uninitialized.
b. Click Communication.
c. In the Platform field:
n Select Open server / Appliance for all Check Point models
d. Enter the same Activation Key you entered during the Security
Gateway's First Time Configuration Wizard.
e. Click Initialize.
Make sure the Certificate state field shows Established.
f. Click OK.
Blades.
n On the Threat Prevention tab, enable the applicable Software
Blades.
Important - See the Supported Software Blades in Bridge Mode
and Limitations in Bridge Mode sections in "Deploying a Security
Gateway or a ClusterXL in Bridge Mode" on page 576.
Step Instructions
Topology to External.
n If you use this Bridge Security Gateway object in Access
11 Click OK.
Step Instructions
5 In the Name field, enter the applicable name for this Security Gateway
object.
Step Instructions
6 In the IPv4 address and IPv6 address fields, configure the same IPv4
and IPv6 addresses that you configured on the Management
Connection page of the Security Gateway's First Time Configuration
Wizard.
Make sure the Security Management Server or Multi-Domain Server
can connect to these IP addresses.
c. Enter the same Activation Key you entered during the Security
Gateway's First Time Configuration Wizard.
d. Click Initialize.
e. Click OK.
Step Instructions
Topology to External.
n If you use this Bridge Security Gateway object in Access
11 Click OK.
4. Configure the applicable Security Policies for the Security Gateway in SmartConsole
Step Instructions
Step Instructions
4 Create the applicable rules in the Access Control and Threat Prevention
policies.
Important - See the Supported Software Blades in Bridge Mode and
Limitations in Bridge Mode sections in "Deploying a Security
Gateway or a ClusterXL in Bridge Mode" on page 576.
The Active/Standby Bridge Mode is the preferred mode in topologies that support it.
In the Active/Standby Bridge Mode, Cluster Members work in High Availability mode.
For more information, see the R81 ClusterXL Administration Guide.
Example Topology with Two Switches
Item Instructions
3 Switch that connects the first network segment to one bridged subordinate
interface (4) on the ClusterXL in Bridge Mode.
Item Instructions
6 First Cluster Member in Bridge Mode (for example, in the Active cluster
state).
8 Second Cluster Member in Bridge Mode (for example, in the Standby cluster
state).
10 Switch that connects the second network segment to the other bridged
subordinate interface (9) on the ClusterXL in Bridge Mode.
Procedure:
Best Practice - If you configure Bridge Mode Active / Standby, then disable STP,
> RSTP, and MSTP on the adjacent switches. See the applicable documentation for
your switches.
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Security Gateway and/or
Security Management.
n In the Products window:
l ClusterXL
You can configure the ClusterXL object in either Wizard Mode, or Classic Mode.
Configuring the ClusterXL object in Wizard Mode
Step Instructions
Network Object > Gateways and Servers > Cluster > New
Cluster.
n In the top right corner, click Objects Pane > New > More >
Network Object > Gateways and Servers > Cluster > Cluster.
Step Instructions
6 On the Cluster members' properties page, add the objects for the
Cluster Members.
a. Click Add > New Cluster Member.
The Cluster Member Properties window opens.
b. In the Name field, enter the applicable name for this Cluster
Member object.
c. Configure the main physical IP address(es) for this Cluster
Member object.
In the IPv4 Address and IPv6 Address fields, configure the
same IPv4 and IPv6 addresses that you configured on the
Management Connection page of the Cluster Member's First
Time Configuration Wizard.
Make sure the Security Management Server or Multi-Domain
Server can connect to these IP addresses.
Note - You can configure the Cluster Virtual IP address to be
on a different network than the physical IP addresses of the
Cluster Members. In this case, you must configure the
required static routes on the Cluster Members.
d. In the Activation Key and Confirm Activation Key fields, enter
the same Activation Key you entered during the Cluster
Member's First Time Configuration Wizard.
e. Click Initialize.
f. Click OK.
g. Repeat Steps a-f to add the second Cluster Member, and so on.
Step Instructions
If the Trust State field does not show Trust established, perform these
steps:
a. Connect to the command line on the Cluster Member.
b. Make sure there is a physical connectivity between the Cluster
Member and the Management Server (for example, pings can
pass).
c. Run:
cpconfig
d. Enter the number of this option:
Secure Internal Communication
e. Follow the instructions on the screen to change the Activation
Key.
f. In SmartConsole, click Reset.
g. Enter the same Activation Key you entered in the cpconfig
menu.
h. In SmartConsole, click Initialize.
Step Instructions
10 On the General Properties page > Platform section, select the correct
options:
a. In the Hardware field:
If you install the Cluster Members on Check Point Appliances,
select the correct appliances series.
If you install the Cluster Members on Open Servers, select Open
server.
b. In the Version field, select R81.
c. In the OS field, select Gaia.
Step Instructions
Step Instructions
If the Trust State field does not show Trust established, perform these
steps:
a. Connect to the command line on the Cluster Member.
b. Make sure there is a physical connectivity between the Cluster
Member and the Management Server (for example, pings can
pass).
c. Run:
cpconfig
d. Enter the number of this option:
Secure Internal Communication
e. Follow the instructions on the screen to change the Activation
Key.
f. In SmartConsole, click Reset.
g. Enter the same Activation Key you entered in the cpconfig
menu.
h. In SmartConsole, click Initialize.
For more information, click the (?) button in the top right
corner.
ii. Optional: Select Use Virtual MAC.
For more information, see sk50840.
iii. Select the Cluster Member recovery method.
For more information, click the (?) button in the top right
corner.
Step Instructions
Make sure the Cluster Virtual IPv4 address and its Net
Mask are correct.
n For cluster synchronization interfaces, select Sync or
Cluster+Sync.
Notes:
l We do not recommend the configuration
Cluster+Sync.
l Check Point cluster supports only these settings:
interface.
l For Check Point Appliances or Open Servers:
Step Instructions
Important:
n Make sure the Bridge interface and Bridge subordinate
External by default.
15 Click OK.
Step Instructions
Network Object > Gateways and Servers > Cluster > New
Cluster.
n In the top right corner, click Objects Pane > New > More >
Network Object > Gateways and Servers > Cluster > Cluster.
Step Instructions
6 On the General Properties page > Platform section, select the correct
options:
a. In the Hardware field:
If you install the Cluster Members on Check Point Appliances,
select the correct appliances series.
If you install the Cluster Members on Open Servers, select Open
server.
b. In the Version field, select R81.
c. In the OS field, select Gaia.
Step Instructions
Step Instructions
If the Trust State field does not show Trust established, perform these
steps:
a. Connect to the command line on the Cluster Member.
b. Make sure there is a physical connectivity between the Cluster
Member and the Management Server (for example, pings can
pass).
c. Run:
cpconfig
d. Enter the number of this option:
Secure Internal Communication
e. Follow the instructions on the screen to change the Activation
Key.
f. In SmartConsole, click Reset.
g. Enter the same Activation Key you entered in the cpconfig
menu.
h. In SmartConsole, click Initialize.
For more information, click the (?) button in the top right
corner.
ii. Optional: Select Use Virtual MAC.
For more information, see sk50840.
iii. Select the Cluster Member recovery method.
For more information, click the (?) button in the top right
corner.
Step Instructions
Make sure the Cluster Virtual IPv4 address and its Net
Mask are correct.
n For cluster synchronization interfaces, select Sync or
Cluster+Sync.
Notes:
l We do not recommend the configuration
Cluster+Sync.
l Check Point cluster supports only these settings:
interface.
l For Check Point Appliances or Open Servers:
Step Instructions
Important:
n Make sure the Bridge interface and Bridge subordinate
External by default.
11 Click OK.
Step Instructions
4 Create the applicable rules in the Access Control and Threat Prevention
policies.
Important - See the Supported Software Blades in Bridge Mode and
Limitations in Bridge Mode sections in "Deploying a Security
Gateway or a ClusterXL in Bridge Mode" on page 576.
Step Instructions
Item Instructions
2 Run:
cpconfig
4 Enter y to confirm.
Step Instructions
Cluster Mode: High Availability (Active Up, Bridge Mode) with IGMP
Membership
Notes:
n This procedure applies to both Check Point Appliances and Open Servers.
n This procedure describes ClusterXL in Active/Active Bridge Mode deployed with
two or four switches.
Item Instructions
3 Switch that connects the first network segment to one bridged subordinate
interface (4) on the ClusterXL in Bridge Mode.
Item Instructions
6 First Cluster Member in Bridge Mode (in the Active cluster state).
8 Second Cluster Member in Bridge Mode (in the Active cluster state).
10 Switch that connects the second network segment to the other bridged
subordinate interface (9) on the ClusterXL in Bridge Mode.
Item Instructions
3 Switch that connects the first network segment to one bridged subordinate
interface (6) on the ClusterXL in Bridge Mode.
4 Switch that connects between one switch (that directly connects to the first
network segment) and one bridged subordinate interface (6) on the ClusterXL
in Bridge Mode.
7 First Cluster Member in Bridge Mode (in the Active cluster state).
9 Second Cluster Member in Bridge Mode (in the Active cluster state).
11 Switch that connects the second network segment to the other bridged
subordinate interface (10) on the ClusterXL in Bridge Mode.
12 Switch that connects between one switch (that directly connects to the second
network segment) and the other bridged subordinate interface (10) on the
ClusterXL in Bridge Mode.
Procedure:
1. Install the two Cluster Members
Step Instructions
on page 24
n "Installing the Gaia Operating System on Open Servers" on
page 26
3 During the First Time Configuration Wizard, you must configure these
settings:
n In the Installation Type window, select Security Gateway and/or
Security Management.
n In the Products window:
l ClusterXL
You configure the Bridge interface in either Gaia Portal, or Gaia Clish.
Configuring the Bridge interface in Gaia Portal
Step Instructions
2 Make sure that the subordinate interfaces, which you wish to add to the
Bridge interface, do not have IP addresses assigned.
Step Instructions
5 Select the interfaces from the Available Interfaces list and then click
Add.
Notes:
n Make sure that the subordinate interfaces do not have any
Management Interface.
n A Bridge interface in Gaia can contain only two subordinate
interfaces.
6 On the IPv4 tab, enter the IPv4 address and subnet mask.
You can optionally select the Obtain IPv4 Address automatically
option.
7 On the IPv6 tab (optional), enter the IPv6 address and mask length.
You can optionally select the Obtain IPv6 Address automatically
option.
Important - First, you must enable the IPv6 Support and reboot.
8 Click OK.
Step Instructions
3 Make sure that the subordinate interfaces, which you wish to add to the
Bridge interface, do not have IP addresses assigned:
show interface <Name of Interface> ipv4-address
show interface <Name of Interface> ipv6-address
Step Instructions
interfaces.
n Do not select the interface that you configured as Gaia
Management Interface.
You can configure the ClusterXL object in either Wizard Mode, or Classic Mode.
Configuring the ClusterXL object in Wizard Mode
Step Instructions
Step Instructions
Network Object > Gateways and Servers > Cluster > New
Cluster.
n In the top right corner, click Objects Pane > New > More >
Network Object > Gateways and Servers > Cluster > Cluster.
Step Instructions
6 On the Cluster members' properties page, add the objects for the
Cluster Members.
a. Click Add > New Cluster Member.
The Cluster Member Properties window opens.
b. In the Name field, enter the applicable name for this Cluster
Member object.
c. Configure the main physical IP address(es) for this Cluster
Member object.
In the IPv4 Address and IPv6 Address fields, configure the
same IPv4 and IPv6 addresses that you configured on the
Management Connection page of the Cluster Member's First
Time Configuration Wizard.
Make sure the Security Management Server or Multi-Domain
Server can connect to these IP addresses.
Note - You can configure the Cluster Virtual IP address to be
on a different network than the physical IP addresses of the
Cluster Members. In this case, you must configure the
required static routes on the Cluster Members.
d. In the Activation Key and Confirm Activation Key fields, enter
the same Activation Key you entered during the Cluster
Member's First Time Configuration Wizard.
e. Click Initialize.
f. Click OK.
g. Repeat Steps a-f to add the second Cluster Member, and so on.
Step Instructions
If the Trust State field does not show Trust established, perform these
steps:
a. Connect to the command line on the Cluster Member.
b. Make sure there is a physical connectivity between the Cluster
Member and the Management Server (for example, pings can
pass).
c. Run:
cpconfig
d. Enter the number of this option:
Secure Internal Communication
e. Follow the instructions on the screen to change the Activation
Key.
f. In SmartConsole, click Reset.
g. Enter the same Activation Key you entered in the cpconfig
menu.
h. In SmartConsole, click Initialize.
Step Instructions
10 On the General Properties page > Platform section, select the correct
options:
a. In the Hardware field:
If you install the Cluster Members on Check Point Appliances,
select the correct appliances series.
If you install the Cluster Members on Open Servers, select Open
server.
b. In the Version field, select R81.
c. In the OS field, select Gaia.
Step Instructions
Step Instructions
If the Trust State field does not show Trust established, perform these
steps:
a. Connect to the command line on the Cluster Member.
b. Make sure there is a physical connectivity between the Cluster
Member and the Management Server (for example, pings can
pass).
c. Run:
cpconfig
d. Enter the number of this option:
Secure Internal Communication
e. Follow the instructions on the screen to change the Activation
Key.
f. In SmartConsole, click Reset.
g. Enter the same Activation Key you entered in the cpconfig
menu.
h. In SmartConsole, click Initialize.
Step Instructions
Step Instructions
Step Instructions
Step Instructions
Make sure the Cluster Virtual IPv4 address and its Net
Mask are correct.
n For cluster synchronization interfaces, select Sync or
Cluster+Sync.
Notes:
l We do not recommend the configuration
Cluster+Sync.
l Check Point cluster supports only these settings:
interface.
l For Check Point Appliances or Open Servers:
Step Instructions
Important:
n Make sure the Bridge interface and Bridge subordinate
External by default.
15 Click OK.
Step Instructions
Network Object > Gateways and Servers > Cluster > New
Cluster.
n In the top right corner, click Objects Pane > New > More >
Network Object > Gateways and Servers > Cluster > Cluster.
Step Instructions
6 On the General Properties page > Platform section, select the correct
options:
a. In the Hardware field:
If you install the Cluster Members on Check Point Appliances,
select the correct appliances series.
If you install the Cluster Members on Open Servers, select Open
server.
b. In the Version field, select R81.
c. In the OS field, select Gaia.
Step Instructions
Step Instructions
If the Trust State field does not show Trust established, perform these
steps:
a. Connect to the command line on the Cluster Member.
b. Make sure there is a physical connectivity between the Cluster
Member and the Management Server (for example, pings can
pass).
c. Run:
cpconfig
d. Enter the number of this option:
Secure Internal Communication
e. Follow the instructions on the screen to change the Activation
Key.
f. In SmartConsole, click Reset.
g. Enter the same Activation Key you entered in the cpconfig
menu.
h. In SmartConsole, click Initialize.
Step Instructions
Step Instructions
Step Instructions
Step Instructions
Make sure the Cluster Virtual IPv4 address and its Net
Mask are correct.
n For cluster synchronization interfaces, select Sync or
Cluster+Sync.
Notes:
l We do not recommend the configuration
Cluster+Sync.
l Check Point cluster supports only these settings:
interface.
l For Check Point Appliances or Open Servers:
Step Instructions
Important:
n Make sure the Bridge interface and Bridge subordinate
External by default.
11 Click OK.
Step Instructions
4 Create the applicable rules in the Access Control and Threat Prevention
policies.
Important - See the Supported Software Blades in Bridge Mode and
Limitations in Bridge Mode sections in "Deploying a Security
Gateway or a ClusterXL in Bridge Mode" on page 576.
Step Instructions
Cluster Mode: High Availability (Active Up, Bridge Mode) with IGMP
Membership
Step Instructions
By default, Security Gateway and Cluster in Bridge mode allows Ethernet frames that carry
protocols other than IPv4 (0x0800), IPv6 (0x86DD), or ARP (0x0806) protocols.
Administrator can configure a Security Gateway and Cluster in Bridge Mode to either accept,
or drop Ethernet frames that carry specific protocols.
When Access Mode VLAN (VLAN translation) is configured, BPDU frames can arrive with the
wrong VLAN number to the switch ports through the Bridge interface. This mismatch can
cause the switch ports to enter blocking mode.
In Active/Standby Bridge Mode only, you can disable BPDU forwarding to avoid such blocking
mode:
Step Instructions
1 Connect to the command line on the Security Gateway (each Cluster Member).
Example Topology
Item Description
2 Router
4 Security Gateway
Packet flow
1. The Security Management Server sends a management packet to the Management
Interface on the Security Gateway.
Procedure
Configure the Security Gateway to reroute packets on the Bridge interface.
Set the value of the kernel parameter "fwx_bridge_reroute_enabled" to 1.
The Security Gateway makes sure that the MD5 hash of the packet that leaves the
Management Interface and enters the Bridge interface is the same.
Other packets in this connection are handled by the Bridge interface without using the router.
Notes:
n To make the change permanent (to survive reboot), you configure the value of
the required kernel parameter in the configuration file.
This change applies only after a reboot.
n To apply the change on-the-fly (does not survive reboot), you configure the
value of the required kernel parameter with the applicable command.
Step Instructions
Step Instructions
7 After the reboot, make sure the Security Gateway loaded the new configuration:
fw ctl get int fwx_bridge_reroute_enabled
The output must return
fwx_bridge_reroute_enabled = 1
To configure the Security Gateway to accept only specific protocols that are not IPv4,
IPv6, or ARP:
Step Instructions
1 On the Security Gateway, configure the value of the kernel parameter fwaccept_
unknown_protocol to 0.
Important - In a Cluster, you must configure all the Cluster Members in the
same way.
Step Instructions
\\
\\ User defined INSPECT code
\\
allowed_ethernet_protocols={
<0x0800,0x86DD,0x0806>);
dropped_ethernet_protocols={ <0x8137,0x8847,0x9100>
);
endif /*__user_def__*/
Link State Propagation is supported on Check Point Appliances with these Expansion Line
Cards:
You can configure the Link State Propagation in one of these modes:
Automatic port detection and Security Gateways and Cluster Members automatically
port pair creation assign all bridged ports to port pairs.
Manual port pair creation You manually configure the assignment of bridged ports to
port pairs.
Important:
n In a Cluster, you must configure all the Cluster Members in the
same way.
n Link State Propagation does not support Bond interfaces.
Step Instructions
8 Make sure the Security Gateway or Cluster Members loaded the new
configuration:
fw ctl get int fw_link_state_propagation_enabled
The returned output must show:
fw_link_state_propagation_enabled = 1
Step Instructions
Step Instructions
Step Instructions
8 Make sure the Security Gateway or Cluster Members loaded the new
configuration:
a. Output of this command
fw ctl get int fw_link_state_propagation_enabled
must return
fw_link_state_propagation_enabled = 1
b. Output of this command
fw ctl get int fw_manual_link_state_propagation_
enabled
must return
fw_manual_link_state_propagation_enabled = 1
c. Output of this command
fw ctl get str fw_lsp_pair1
must return the names of the interfaces configured in this pair
<interface_name_1,interface_name_2>
d. Output of this command
fw ctl get str fw_lsp_pair2
must return the names of the interfaces configured in this pair
<interface_name_3,interface_name_4>
e. Output of this command
fw ctl get str fw_lsp_pair3
must return the names of the interfaces configured in this pair
<interface_name_5,interface_name_6>
f. Output of this command
fw ctl get str fw_lsp_pair4
must return the names of the interfaces configured in this pair
<interface_name_7,interface_name_8>
Baseline
Name of Policy Description
Security
Initial InitialPolicy Security before a policy is installed for the first time, or
Policy when Security Gateway failed to load the policy.
Important - If you disable the boot security or unload the currently installed policy, you
leave your Security Gateway, or a Cluster Member without protection.
Best Practice - Before you disable the boot security, we recommend to
disconnect your Security Gateway, or a Cluster Member from the network
completely.
For additional information, see these commands in the R81 CLI Reference Guide:
Command Description
Boot Security
The Boot Security protects the Security Gateway and its networks, during the boot:
n Disables the IP Forwarding in Linux OS kernel
n Loads the Default Filter Policy
Important - In a Cluster, you must configure all the Cluster Members in the same way.
The Default Filter Policy (defaultfilter) protects the Security Gateway from the time it
boots up until it installs the user-defined Security Policy.
Boot Security disables IP Forwarding and loads the Default Filter Policy.
There are three Default Filters templates on the Security Gateway:
Default Filter
Default Filter Policy File Description
Mode
Default Filter
Default Filter Policy File Description
Mode
Step Instructions
1 Make sure to configure and install a Security Policy on the Security Gateway.
Step Instructions
n The new complied Default Filter file for IPv4 traffic is:
$FWDIR/state/default.bin
n The new complied Default Filter file for IPv6 traffic is:
$FWDIR/state/default.bin6
8 Copy new complied Default Filter file to the path of the Default Filter Policy file.
n For IPv4 traffic, run:
cp -v $FWDIR/state/default.bin
/etc/fw.boot/default.bin
n For IPv6 traffic, run:
cp -v $FWDIR/state/default.bin6
/etc/fw.boot/default.bin6
Step Instructions
Administrators with Check Point INSPECT language knowledge can define customized
Default Filters.
Important - Make sure your customized Default Filter policy does not interfere with
the Security Gateway boot process.
Step Instructions
1 Make sure to configure and install a Security Policy on the Security Gateway.
Step Instructions
6 Edit the new Default Filter Policy file to include the applicable INSPECT code.
Important - Your customized Default Filter must not use these functions:
n Logging
n Authentication
n Encryption
n Content Security
n The new complied Default Filter file for IPv4 traffic is:
$FWDIR/state/default.bin
n The new complied Default Filter file for IPv6 traffic is:
$FWDIR/state/default.bin6
9 Copy new complied Default Filter file to the path of the Default Filter Policy file.
n For IPv4 traffic, run:
cp -v $FWDIR/state/default.bin
/etc/fw.boot/default.bin
n For IPv6 traffic, run:
cp -v $FWDIR/state/default.bin6
/etc/fw.boot/default.bin6
It is sometimes necessary to stop the Security Gateway for maintenance. It is not always
practical to disconnect the Security Gateway from the network (for example, if the Security
Gateway is on a remote site).
To stop the Security Gateway for maintenance and maintain security, you can run:
Command Description
cpstop -
n Shuts down Check Point processes
fwflag - n Loads the Default Filter policy (defaultfilter)
default
cpstop -
n Shuts down Check Point processes
fwflag - n Keeps the currently loaded kernel policy
proc n Maintains the Connections table, so that after you run the
cpstart command, you do not experience dropped packets
because they are "out of state"
Note - During a Check Point upgrade, a SIC certificate reset, or license expiration, the
Initial Policy overwrites the user-defined policy.
The sequence of actions during boot of the Security Gateway until a Security Policy is loaded
for the first time:
Step Instructions
2 The Security Gateway disables IP Forwarding and loads the Default Filter policy.
5 The Security Gateway fetches the Initial Policy from the local directory.
The Security Gateway enforces the Initial Policy until administrator installs a user-defined
policy.
In subsequent boots, the Security Gateway loads the user-defined policy immediately after the
Default Filter policy.
There are different Initial Policies for Standalone and distributed setups:
n In a Standalone configuration, where the Security Management Server and the Security
Gateway are on the same computer, the Initial Policy allows CPMI management
communication only.
This permits SmartConsole clients to connect to the Security Management Server.
n In a distributed configuration, where the Security Management Server is on one
computer and the Security Gateway is on a different computer, the Initial Policy:
l Allows the cpd and fwd daemons to communicate for SIC (to establish trust) and
for Policy installation.
l Does not allow CPMI connections through the Security Gateway.
The SmartConsole is not be able to connect to the Security Management Server, if
the SmartConsole must access the Security Management Server through a
Security Gateway with the Initial Policy.
Step Instructions
Step Instructions
Column Description
Step Instructions
Step Instructions
2 In the Summary tab below, click the object's License Status (for example: OK).
The Device & License Information window opens. It shows basic object
information and License Status, license Expiration Date, and important quota
information (in the Additional Info column) for each Software Blade.
Notes:
n Quota information, quota-dependent license statuses, and blade
information messages are only supported for R80 and higher.
n The tooltip of the SKU is the product name.
The possible values for the Software Blade License Status are:
Status Description
Available The Software Blade is not active, but the license is valid.
No License The Software Blade is active but the license is not valid.
About to The Software Blade is active, but the license will expire in thirty days
Expire (default) or less (7 days or less for an evaluation license).
Quota The Software Blade is active, and the license is valid, but the quota of
Exceeded related objects (Security Gateways, files, virtual systems, and so on,
depending on the blade) is exceeded.
Quota The Software Blade is active, and the license is valid, but the number of
Warning objects of this blade is 90% (default) or more of the licensed quota.
Option Instructions
License To see and export license information for Software Blades on each specific
Status view Security Management Server, Security Gateway, or Log Server object.
License To see filter and export license status information for all configured Security
Status Management Server, Security Gateway, or Log Server objects.
report
License To see filter and export license information for Software Blades on all
Inventory configured Security Management Server, Security Gateway, or Log Server
report objects.
The SmartEvent Software Blade lets you customize the License Status and License
Inventory information from the Logs & Monitor view of SmartConsole.
It is also possible to view license information from the Gateways & Servers view of
SmartConsole without enabling the SmartEvent Software Blade on Security Management
Server.
The Gateways & Servers view in SmartConsole lets you view, filter, and export different
license reports:
The "License Inventory" report
The Gateways & Servers view in SmartConsole lets you view and export the License
Inventory report.
Viewing the License Inventory report
Step Instructions
1 In SmartConsole, from the left navigation panel, click Gateways & Servers.
Step Instructions
l Devices Names
l License Statuses
l License statuses
l CK
l SKU
l Account ID
l Support Level
Step Instructions
The Logs & Monitor view in SmartConsole lets you view, filter, and export the License
Status report.
Viewing the License Status report
Step Instructions
1 In SmartConsole, from the left navigation panel, click Logs & Monitor
Step Instructions
Step Instructions
1 In the top right corner, click the Options button > click View Filter.
The Edit View Filter window opens.
Step Instructions
The Logs & Monitor view in SmartConsole lets you view, filter, and export the License
Inventory report.
Viewing the License Inventory report
Step Instructions
1 In SmartConsole, from the left navigation panel, click Logs & Monitor
l Devices Names
l License Statuses
l License statuses
l CK
l SKU
l Account ID
l Support Level
Step Instructions
1 In the top right corner, click the Options button > click Report Filter.
The Edit Report Filter window opens.
Step Instructions
Step Instructions
Step Instructions
1 In SmartConsole, from the left navigation panel, click Gateways & Servers.
2 In the top pane, select the object of the applicable Management Server or
Security Gateway.
Note - To add or remove licenses on the Licenses tab, an administrator must have
the Run One Time Script permission selected in their profile. To assign this
permission, in SmartConsole, go to Manage & Settings > Permissions &
Administrators > Permission Profiles. Open the relevant permission profile, go to
Gateways > Scripts, and select Run One-Time Scripts.
Column Description
Expiration Date Date when the Check Point support contract expires.
Step Instructions
2 In the top pane, select the object of the applicable Management Server or
Security Gateway.
Step Instructions
5 To see the license information for each Software Blade this license covers,
click the license status in the License Status field.
(Alternatively, click the Device & License Information link at the bottom and
then click the License Status page from the left.)
The Device & License Information window opens and shows the License
Status page.
This page shows:
n Object name.
n General license state.
n IP - Object main IP address.
n Account ID - User's account ID.
n CK - Unique Certificate Key of the license instance.
n Support Level - Check Point level of support for this license.
n SKU - Catalog ID from the Check PointUser Center.
n Support Expiration - Date when the Check Point support contract
expires.
n Blade Name - Software Blades this license covers.
n License Status - See the summary table below.
n Expiration Date - Date when the Check Point support contract expires for
this Software Blade.
n Additional Info - Additional information about this Software Blade
configuration.
The possible values for the Software Blade License Status are:
Status Instructions
Available The Software Blade is not active, but the license is valid.
No License The Software Blade is active, but the license is not valid.
About to The Software Blade is active, but the license will expire in 30 days
Expire (default) or less (7 days or less for an evaluation license).
Quota The Software Blade is active, and the license is valid, but the quota of
Exceeded related objects (Security Gateways, files, Virtual Systems, and so on,
depending on the blade) is exceeded.
Quota The Software Blade is active, and the license is valid, but the number of
Warning objects of this blade is 90% (default) or more of the licensed quota.
Adding a license
Step Instructions
2 Click New.
The Add License window opens.
3 Enter the license data manually, or click Paste License to enter the data
automatically.
Note - The Paste License button only shows in Internet Explorer. For
other web browsers, paste the license strings into the empty text field.
4 Click OK.
Deleting a license
Step Instructions
3 Click Delete.
Step Instructions
3 Install the new license (issued for the new IP address) on your Security
Management Server.
4 Remove the old license (issued for the old IP address) from your Security
Management Server.
6 In SmartConsole:
7 On your DNS Server, map the host name of your Security Management Server
to the new IP address.
Step Instructions
3 Install the new license (issued for the new IP address) on your Multi-Domain
Server or Multi-Domain Log Server.
4 Remove the old license (issued for the old IP address) from your Multi-Domain
Server or Multi-Domain Log Server.
6 On your DNS Server, map the host name of your Multi-Domain Server or Multi-
Domain Log Server to the new IP address.
Step Instructions
3 Install the new license (issued for the new IP address) on your Log Server or
SmartEvent Server.
4 Remove the old license (issued for the old IP address) from your Log Server or
SmartEvent Server.
Step Instructions
6 In SmartConsole:
1. Connect with SmartConsole to the applicable Management Server that
manages your dedicated Log Server or SmartEvent Server.
2. Open the object of your dedicated Log Server or SmartEvent Server.
3. In the left tree, click Network Management.
4. Make sure to update the IP Address and topology.
5. Click OK.
6. Publish the SmartConsole session.
7. Install the database:
a. In the top left corner, click Menu > Install database.
b. Select all objects.
c. Click Install.
d. Click OK.
8. Install the Access Control Policy on all managed Security Gateways that
send their logs to your dedicated Log Server or SmartEvent Server.
7 On your DNS Server, map the host name of your dedicated Log Server or
SmartEvent Server to the new IP address.
Important:
n The SmartUpdate GUI shows two tabs - Package Management and Licenses
& Contracts.
n For versions R80.10 and above, the tools in the Package Management tab are
no longer supported.
n To install packages on Gaia OS, use CPUSE (see sk92449), or Central
Deployment Tool (see sk111158).
For more information, see "Installing Software Packages on Gaia" on page 185.
Accessing SmartUpdate
Step Instructions
C:\Program
Files\CheckPoint\
SmartConsole\<Rxx>\PROGRAM\SmartDistributor.exe
l On Windows OS 64-bit:
C:\Program Files
(x86)\CheckPoint\
SmartConsole\<Rxx>\PROGRAM\SmartDistributor.exe
2 In the top left corner, click Menu > View > Menu Bar.
The menu names appear at the top of the GUI.
License
Instructions
Type
Local The Local license is an older method of licensing that is still supported.
n A Local license is tied to the IP address of the specific Security
Gateway.
n Cannot be transferred to a Security Gateway with a different IP
address.
Add You can add any license that you receive from the Check Point User Center
to the Licenses & Contracts Repository.
n You can add the licenses directly from a User Center account.
n You can add the licenses from a file that you receive from the User
Center.
n You can add the licenses manually by pasting or typing the license
details.
When you add the Local license to the Licenses & Contracts Repository, it
also attaches it to the Security Gateway with the IP address, for which the
license was issued.
See "Adding New Licenses to the Licenses & Contracts Repository" on
page 679.
Attach You can attach a license from the Licenses & Contracts Repository to a
managed Security Gateway.
See "Attaching a License to a Security Gateway" on page 683.
Detach When you detach a license from a managed Security Gateway, you have to
uninstall the license from that Security Gateway.
If this is a Central license, this operation makes that license in the Licenses
& Contracts Repository available to other managed Security Gateways.
See "Detaching a License from a Security Gateway" on page 684.
Get You can add information from your managed Security Gateways about the
licenses you installed locally.
This updates the Licenses & Contracts Repository with all local licenses
across the installation.
The Get operation is a two-way process that places all locally installed
licenses in the License & Contract Repository and removes all locally
deleted licenses from the Licenses & Contracts Repository.
See "Getting Licenses from Security Gateways" on page 685.
Delete You can delete a license from the Licenses & Contracts Repository.
See "Deleting a License from the Licenses & Contracts Repository" on
page 682.
Export You can export a license from the Licenses & Contracts Repository to a
file.
See "Exporting a License to a File" on page 686.
Term Instructions
State The license state depends on whether the license is associated with a
managed Security Gateway in the Licenses & Contracts Repository, and
whether the license is installed on that Security Gateway.
The license state definitions are:
n Attached - Indicates that the license is associated with a managed
Security Gateway in the Licenses & Contracts Repository, and is
installed on that Security Gateway.
n Unattached - Indicates that the license is not associated with
managed Security Gateways in the Licenses & Contracts
Repository, and is not installed on managed Security Gateways.
n Assigned Indicates that the license that is associated with a managed
Security Gateway in the Licenses & Contracts Repository, but has
not yet been installed on a Security Gateway.
Upgrade This is a field in the Licenses & Contracts Repository that contains an error
Status message from the User Center when the License Upgrade process fails.
Local A Local License is tied to the IP address of the specific Security Gateway.
License You can only use a local license with a Security Gateway or a Security
Management Server with the same address.
Multi- This is a license file that contains more than one license.
License File The "cplic put" and "cplic add" commands support these files.
Notes:
n Unattached Central licenses appear in the Licenses & Contracts Repository.
n When you add the Local license to the Licenses & Contracts Repository, the
Management Server attaches it to the Security Gateway with the IP address, for
which the license was issued.
n All licenses are assigned a default name in the format <SKU>@<Time Date>,
which you can modify later.
Step Instructions
3 Click Licenses & Contracts menu at the top > Add License > From User
Center.
Step Instructions
4 Click the Licenses & Contracts menu at the top > Add License > From File.
6 Click Open.
Step Instructions
4 Click the Licenses & Contracts menu at the top > Add License > Manually.
Step Instructions
Note - If you leave the Name field empty, the license is assigned a name
in the format <SKU>@<Time Date>.
6 Click OK.
Step Instructions
3 If you do not see the window License And Contract Repository, then click the
Licenses & Contracts menu at the top > click View Repository.
5 Right-click the Unattached license that you want to delete, and select Delete
License / Contract.
Step Instructions
3 Click the Licenses & Contracts menu at the top > click Attach.
4 In the Attach Licenses window, select the applicable Security Gateway or Cluster
Member.
5 Click Next.
7 Click Finish.
10 Run the "cplic print" command to make sure the license is attached.
3 Click the Licenses & Contracts menu at the top > click Detach.
5 Click Next.
7 Click Finish.
10 Run the "cplic print" command to make sure the license is detached.
Step Instructions
3 Click the Licenses & Contracts menu at the top > click Get all Licenses.
Step Instructions
3 If you do not see the window License And Contract Repository, then click the
Licenses & Contracts menu at the top > click View Repository.
5 Right-click the license that you want to export, and select Export License to
File.
6 Select the location, enter the applicable file name and click Save.
Note - If the license file with such name already exists, the new licenses are added
to the existing file.
Step Instructions
3 If you do not see the window License And Contract Repository, then click the
Licenses & Contracts menu at the top> View Repository.
8 Right-click on one of the selected licenses and select Export License to File.
Step Instructions
9 Select the location, enter the applicable file name and click Save.
Note - If the license file with such name already exists, the new licenses are added
to the existing file.
Step Instructions
3 Click the Licenses & Contracts menu at the top > click Show Expired.
Step Instructions
3 Click the Licenses & Contracts menu at the top > click Show Expired.
The Automatic Downloads feature is applicable to the Security Management Servers, Multi-
Domain Servers, Log Servers, and Security Gateways.
If you disabled Automatic Downloads in the Gaia First Time Configuration Wizard, you can
enable it again in SmartConsole Global properties:
Step Instructions
1 In the top left corner, click Menu > Global properties > Security Management
Access.
3 Click OK.
Step Instructions
1 In the top left corner, click Menu > Global properties > Security Management
Access.
3 Click OK.
Note - In some cases, the download process sends a minimal amount of required
data about your Check Point installation to the Check Point User Center.
Glossary
A
Anti-Bot
Check Point Software Blade on a Security Gateway that blocks botnet behavior and
communication to Command and Control (C&C) centers. Acronyms: AB, ABOT.
Anti-Spam
Check Point Software Blade on a Security Gateway that provides comprehensive
protection for email inspection. Synonym: Anti-Spam & Email Security. Acronyms: AS,
ASPAM.
Anti-Virus
Check Point Software Blade on a Security Gateway that uses real-time virus signatures
and anomaly-based protections from ThreatCloud to detect and block malware at the
Security Gateway before users are affected. Acronym: AV.
Application Control
Check Point Software Blade on a Security Gateway that allows granular control over
specific web-enabled applications by using deep packet inspection. Acronym: APPI.
Audit Log
Log that contains administrator actions on a Management Server (login and logout,
creation or modification of an object, installation of a policy, and so on).
Bridge Mode
Security Gateway or Virtual System that works as a Layer 2 bridge device for easy
deployment in an existing topology.
Clean Install
Installation of a Check Point Operating System from scratch on a computer.
Cluster
Two or more Security Gateways that work together in a redundant configuration - High
Availability, or Load Sharing.
Cluster Member
Security Gateway that is part of a cluster.
Compliance
Check Point Software Blade on a Management Server to view and apply the Security
Best Practices to the managed Security Gateways. This Software Blade includes a
library of Check Point-defined Security Best Practices to use as a baseline for good
Security Gateway and Policy configuration.
Content Awareness
Check Point Software Blade on a Security Gateway that provides data visibility and
enforcement. Acronym: CTNT.
CoreXL
Performance-enhancing technology for Security Gateways on multi-core processing
platforms. Multiple Check Point Firewall instances are running in parallel on multiple
CPU cores.
CoreXL SND
Secure Network Distributer. Part of CoreXL that is responsible for: Processing incoming
traffic from the network interfaces; Securely accelerating authorized packets (if
SecureXL is enabled); Distributing non-accelerated packets between Firewall kernel
instances (SND maintains global dispatching table, which maps connections that were
assigned to CoreXL Firewall instances). Traffic distribution between CoreXL Firewall
instances is statically based on Source IP addresses, Destination IP addresses, and the
IP 'Protocol' type. The CoreXL SND does not really "touch" packets. The decision to stick
to a particular FWK daemon is done at the first packet of connection on a very high level,
before anything else. Depending on the SecureXL settings, and in most of the cases, the
SecureXL can be offloading decryption calculations. However, in some other cases,
such as with Route-Based VPN, it is done by FWK daemon.
CPUSE
Check Point Upgrade Service Engine for Gaia Operating System. With CPUSE, you can
automatically update Check Point products for the Gaia OS, and the Gaia OS itself.
DAIP Gateway
Dynamically Assigned IP (DAIP) Security Gateway is a Security Gateway, on which the
IP address of the external interface is assigned dynamically by the ISP.
Data Type
Classification of data in a Check Point Security Policy for the Content Awareness
Software Blade.
Database Migration
Process of: (1) Installing the latest Security Management Server or Multi-Domain Server
version from the distribution media on a separate computer from the existing Security
Management Server or Multi-Domain Server (2) Exporting the management database
from the existing Security Management Server or Multi-Domain Server (3) Importing the
management database to the new Security Management Server or Multi-Domain Server
This upgrade method minimizes upgrade risks for an existing deployment.
Distributed Deployment
Configuration in which the Check Point Security Gateway and the Security Management
Server products are installed on different computers.
Dynamic Object
Special object type, whose IP address is not known in advance. The Security Gateway
resolves the IP address of this object in real time.
Expert Mode
The name of the elevated command line shell that gives full system root permissions in
the Check Point Gaia operating system.
Gaia
Check Point security operating system that combines the strengths of both
SecurePlatform and IPSO operating systems.
Gaia Clish
The name of the default command line shell in Check Point Gaia operating system. This
is a restricted shell (role-based administration controls the number of commands
available in the shell).
Gaia Portal
Web interface for the Check Point Gaia operating system.
Hotfix
Software package installed on top of the current software version to fix a wrong or
undesired behavior, and to add a new behavior.
HTTPS Inspection
Feature on a Security Gateway that inspects traffic encrypted by the Secure Sockets
Layer (SSL) protocol for malware or suspicious patterns. Synonym: SSL Inspection.
Acronyms: HTTPSI, HTTPSi.
ICA
Internal Certificate Authority. A component on Check Point Management Server that
issues certificates for authentication.
Identity Awareness
Check Point Software Blade on a Security Gateway that enforces network access and
audits data based on network location, the identity of the user, and the identity of the
computer. Acronym: IDA.
Identity Logging
Check Point Software Blade on a Management Server to view Identity Logs from the
managed Security Gateways with enabled Identity Awareness Software Blade.
Internal Network
Computers and resources protected by the Firewall and accessed by authenticated
users.
IPS
Check Point Software Blade on a Security Gateway that inspects and analyzes packets
and data for numerous types of risks (Intrusion Prevention System).
IPsec VPN
Check Point Software Blade on a Security Gateway that provides a Site to Site VPN and
Remote Access VPN access.
Kerberos
An authentication server for Microsoft Windows Active Directory Federation Services
(ADFS).
Log Server
Dedicated Check Point server that runs Check Point software to store and process logs.
Management Interface
(1) Interface on a Gaia Security Gateway or Cluster member, through which
Management Server connects to the Security Gateway or Cluster member. (2) Interface
on Gaia computer, through which users connect to Gaia Portal or CLI.
Management Server
Check Point Single-Domain Security Management Server or a Multi-Domain Security
Management Server.
Migration
Exporting the Check Point configuration database from one Check Point computer and
importing it on another Check Point computer.
Mobile Access
Check Point Software Blade on a Security Gateway that provides a Remote Access VPN
access for managed and unmanaged clients. Acronym: MAB.
Multi-Domain Server
Dedicated Check Point server that runs Check Point software to host virtual Security
Management Servers called Domain Management Servers. Synonym: Multi-Domain
Security Management Server. Acronym: MDS.
Network Object
Logical object that represents different parts of corporate topology - computers, IP
addresses, traffic protocols, and so on. Administrators use these objects in Security
Policies.
Open Server
Physical computer manufactured and distributed by a company, other than Check Point.
Provisioning
Check Point Software Blade on a Management Server that manages large-scale
deployments of Check Point Security Gateways using configuration profiles. Synonyms:
SmartProvisioning, SmartLSM, Large-Scale Management, LSM.
QoS
Check Point Software Blade on a Security Gateway that provides policy-based traffic
bandwidth management to prioritize business-critical traffic and guarantee bandwidth
and control latency.
Rule
Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause
specified actions to be taken for a communication session.
Rule Base
All rules configured in a given Security Policy. Synonym: Rulebase.
SecureXL
Check Point product on a Security Gateway that accelerates IPv4 and IPv6 traffic that
passes through a Security Gateway.
Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and
enforce Security Policies for connected network resources.
Security Policy
Collection of rules that control network traffic and enforce organization guidelines for
data protection and access to resources with packet inspection.
SIC
Secure Internal Communication. The Check Point proprietary mechanism with which
Check Point computers that run Check Point software authenticate each other over SSL,
for secure communication. This authentication is based on the certificates issued by the
ICA on a Check Point Management Server.
SmartConsole
Check Point GUI application used to manage a Check Point environment - configure
Security Policies, configure devices, monitor products and events, install updates, and
so on.
SmartDashboard
Legacy Check Point GUI client used to create and manage the security settings in
versions R77.30 and lower. In versions R80.X and higher is still used to configure
specific legacy settings.
SmartProvisioning
Check Point Software Blade on a Management Server (the actual name is
"Provisioning") that manages large-scale deployments of Check Point Security
Gateways using configuration profiles. Synonyms: Large-Scale Management,
SmartLSM, LSM.
SmartUpdate
Legacy Check Point GUI client used to manage licenses and contracts in a Check Point
environment.
Software Blade
Specific security solution (module): (1) On a Security Gateway, each Software Blade
inspects specific characteristics of the traffic (2) On a Management Server, each
Software Blade enables different management capabilities.
Standalone
Configuration in which the Security Gateway and the Security Management Server
products are installed and configured on the same server.
Threat Emulation
Check Point Software Blade on a Security Gateway that monitors the behavior of files in
a sandbox to determine whether or not they are malicious. Acronym: TE.
Threat Extraction
Check Point Software Blade on a Security Gateway that removes malicious content from
files. Acronym: TEX.
Updatable Object
Network object that represents an external service, such as Microsoft 365, AWS, Geo
locations, and more.
URL Filtering
Check Point Software Blade on a Security Gateway that allows granular control over
which web sites can be accessed by a given group of users, computers or networks.
Acronym: URLF.
User Directory
Check Point Software Blade on a Management Server that integrates LDAP and other
external user management servers with Check Point products and security solutions.
VSX
Virtual System Extension. Check Point virtual networking solution, hosted on a computer
or cluster with virtual abstractions of Check Point Security Gateways and other network
devices. These Virtual Devices provide the same functionality as their physical
counterparts.
VSX Gateway
Physical server that hosts VSX virtual networks, including all Virtual Devices that provide
the functionality of physical network devices. It holds at least one Virtual System, which
is called VS0.
Zero Phishing
Check Point Software Blade on a Security Gateway (R81.20 and higher) that provides
real-time phishing prevention based on URLs. Acronym: ZPH.