CheckPoint NGX Upgrade Guide
CheckPoint NGX Upgrade Guide
CheckPoint NGX Upgrade Guide
NGX (R60)
For additional technical information about Check Point products, consult Check Point’s SecureKnowledge at
https://secureknowledge.checkpoint.com
See the latest version of this document in the User Center at:
http://www.checkpoint.com/support/technical/documents/docs_r60.html
Table of Contents 7
SecurePlatform Backup and Restore Commands 47
Backup 47
Restore 48
SecurePlatform Snapshot Image Management 49
Snapshot 49
Revert 50
Revert to your Previous Deployment 52
8
Chapter 6 Upgrading ClusterXL
License Upgrade to NGX 97
Tools for Gateway Upgrades 97
Planning a Cluster Upgrade 99
Permanent Kernal Global Variables 99
Ready state during Cluster Upgrade/Downgrade operations 99
Upgrading OPSEC Certified Third Party Clusters Products 101
Performing a Minimal Effort Upgrade on a ClusterXL Cluster 101
Performing a Zero Down Time Upgrade on a ClusterXL Cluster 101
Supported Modes 101
Performing a Full Connectivity Upgrade on a ClusterXL Cluster 104
Understanding a Full Connectivity Upgrade 104
Supported Modes 104
Terminology 104
Implementing a Full Connectivity Upgrade 105
Table of Contents 9
Replicate and Upgrade 154
Gradual Upgrade to Another Machine 155
Migrating from a Standalone Installation to CMA 158
MDS Post Upgrade Procedures 162
Upgrading in a Multi MDS Environment 163
Pre-Upgrade Verification and Tools 163
Upgrading an NG with Application Intelligence Multi-MDS System 163
Restoring your Original Environment 166
Before the Upgrade 166
Restoring your Original Environment 167
Renaming Customers 167
Identifying Non-Compliant Customer Names 167
High-Availability Environment 168
Automatic Division of Non-compliant Names 168
Resolving the Non-compliance 168
Advanced Usage 169
Changing MDS IP address and External Interface 171
IP Address Change 171
Interface Change 172
10
CHAPTER 1
Introduction to the
Upgrade Process
In This Chapter
Upgrading Successfully
All successful upgrades begin with a solid game plan and a full understanding of the
steps you need to follow in order to succeed. This book provides tips and instructions
to make the upgrade process as clear as possible.
It is not necessary to read the entire book. In fact, there may be large portions of this
guide that may not apply to you. The guide is structured to sections of typical
deployments for easy navigation.
We hope that your upgrade goes smoothly but in the event that you run into
unexpected snags, please contact your Reseller or our SecureKnowledge support center
at: https://secureknowledge.checkpoint.com
11
Documentation
Documentation
This guide was created to explain all available upgrade paths for Check Point products
from FireWall-1 NG forward. This guide is specifically geared towards upgrading to
NGX R60.
Before you begin please:
• Make sure that you have the latest version of this document in the User Center at
0http://www.checkpoint.com/support/technical/documents/docs_r60.html
• It is a good idea to have the latest version of the NGX R60 Release Notes handy.
Download them from:
http://www.checkpoint.com/support/technical/documents/docs_r60.html
For a new features list refer to the “NGX R60 What’s New Guide”:
http://www.checkpoint.com/support/technical/documents/docs_r60.html
12
NGX License Upgrade
To upgrade to NGX R60, you must first upgrade licenses for all NG products. NGX
R60 with licenses from previous versions will not function.
The license upgrade procedure can be performed if you have purchased any of the
Enterprise Software Subscription services. License upgrade will fail for products and
accounts for which you do not have software subscription. Login to
http://usercenter.checkpoint.com to manage your accounts, licenses, and Enterprise
Support Programs coverage (under Support Programs).
License upgrade is performed by means of an easy to use tool that automatically
upgrades both locally and centrally managed licenses. Using the tool you can upgrade
all licenses in the entire managed system. License upgrade can also be done manually,
per license, in the User Center.
The automatic license upgrade tool allows you to:
1 View the status of the currently installed licenses. On a SmartCenter server (or a
CMA, for Provider-1), you can also view the licenses in the SmartUpdate license
repository.
2 Simulate the license upgrade process.
3 Perform the actual license upgrade process.
During the license upgrade, all eligible licenses are gathered and sent in SSL encrypted
format to the User Center. Upgraded licenses are returned from the User center, and
automatically installed. The license upgrade process adds only NGX licenses. Old
licenses and non-eligible licenses (e.g., evaluation licenses, or licenses that pertain to IP
addresses no longer used) remain untouched.
When running on a SmartCenter Server (or a CMA, for Provider-1), the license
upgrade process also handles licenses in the SmartUpdate license repository. After the
software upgrade, SmartUpdate is used to attach the new NGX licenses to the gateways.
• License upgrade for VPN-1 Pro/Express deployments is described in chapter 2,
“Upgrading VPN-1 Pro/Express Licenses” on page 19.
• License upgrade for Provider-1 deployments is described in
“Provider-1/SiteManager-1 License Upgrade” on page 122.
• License upgrade for SmartLSM deployments is described in “License Upgrade for a
ROBO Gateway” on page 174.
• It is recommended to check
http://www.checkpoint.com/techsupport/ngx/license_upgrade.html for up to date
information and downloads regarding NGX license upgrade.
14
Obtaining Software Installation Packages
NGX R60 software installation packages for Solaris, Windows, Linux and
SecurePlatform are available on the product CD.
NGX R60 software packages for Nokia IPSO 3.9 are available at the online download
center in the following location:
http://www.checkpoint.com/techsupport/downloads.jsp
Terminology
Security Policy - A Security Policy is created by the system administrator in order to
regulate the incoming and outgoing flow of communication.
Enforcement Module - An Enforcement module is the VPN-1 Pro engine which
actively enforces the Security Policy of the organization.
SmartCenter Server - The SmartCenter Server is used by the system administrator to
manage the Security Policy. The databases and policies of the organization are stored on
the SmartCenter Server, and are downloaded from time to time to the Enforcement
modules.
SmartConsole Clients - The SmartConsole Clients are GUI applications which are
used to manage different aspects of the Security Policy. For instance SmartView Tracker is
a GUI client used to view logs.
SmartDashboard - a GUI client that is used to create Security Policies.
Check Point Gateway - otherwise known as an Enforcement module or sometimes
module is the VPN-1 Pro engine that actively enforces your organizations Security
Policy.
SmartUpdate - allows you to centrally upgrade and manage Check Point software and
licenses.
Package Repository - This is a SmartUpdate repository on the SmartCenter Server
that stores uploaded Packages. These packages are then used by SmartUpdate to
perform upgrades of Check Point Gateways.
Standalone Deployment - A Standalone deployment is performed when the Check
Point components that are responsible for the management of the Security Policy (the
SmartCenter Server and the Enforcement Module) are installed on the same machine.
Distributed Deployment - A Distributed deployment is performed when the
Enforcement Module and the SmartCenter Server are deployed on different machines.
16
Upgrade Tools
Various upgrade tools are provided for migration and compatibility verification of your
current deployment. These tools will help you successfully upgrade to NGX R60.
The upgrade tools can be found in the following locations:
• in the NGX R60 $/FWDIR/bin/upgrade_tools directory.
• http://www.checkpoint.com/techsupport/ngx/utilities.html
18
CHAPTER 2
Upgrading VPN-1
Pro/Express Licenses
In This Chapter
19
Overview of NGX License Upgrade
20
You can see exactly the products and accounts for which you have software subscription
by looking in your User Center account at https://usercenter.checkpoint.com. In the
Accounts page, Enterprise Contract column, and in the Products page, Subscription and
Support column, if the account or product is covered, the expiration date is shown.
Otherwise, the entry says Join Now, with a link to get a quote for purchasing Enterprise
Support.
You can purchase an Enterprise Software Subscription for the whole account, in which
case all the products in the account will be covered, or you can purchase Enterprise
Software Subscription for individual products.
Licensing Terminology
The license upgrade procedures use specialized licensing terminology. It is important to
understand the terminology in order to successfully perform the license upgrade.
• License Upgrade is the process of upgrading version NG licenses to NGX.
• Software Upgrade is the process of upgrading Check Point software to version
NGX.
• License Repository is a repository on the SmartCenter Server that stores licenses
for Check Point products. It is used by SmartUpdate to install and manage licenses
on Check Point Gateways.
• Wrapper is the wizard application on the Check Point CD that allows you to
install and upgrade Check Point products and upgrade licenses.
Tool Location
The license_upgrade tool can be found in one of the following locations:
• On the NGX product CD at <Specific_platform>\
• In the Check Point Download site at
http://www.checkpoint.com/techsupport/ngx/license_upgrade.html.
• It is also part of the NGX installation, located at $CPDIR/bin.
Tool Options
The license_upgrade command line tool has a number of options. To see all the
options, run:
license_upgrade
22
Tool Options
Option Meaning
[L] View the licenses installed on your machine.
[S] Sends existing licenses to User Center Web site to simulate the license
upgrade in order to verify that it can be performed. No actual upgrade is
done and no new licenses are returned
[U] Sends existing licenses to the User Center Web site to perform upgrade
and (by default, in online mode) installs them on the machine.
[C] Reports whether or not there are licenses on the machine that need to be
upgraded.
[O] Perform license upgrade on a license file that was generated on a machine
with no Internet access to the User Center.
[V] View log of last license upgrade or last upgrade simulation.
Note - License upgrade simulation can only be performed on a machine with Internet
connectivity to the Check Point User Center.
4 Be sure to deal with all the reported issues, so that the actual license upgrade will
succeed for all licenses.
For further assistance:
• See “Troubleshooting License Upgrade” on page 37.
• Refer to SecureKnowledge at https://secureknowledge.checkpoint.com.
24
License Upgrade Methods
Note - Version 4.1 licenses cannot be upgraded directly to NGX. You must first upgrade
software and licenses to version NG.
The following table shows the Check Point licenses that are upgraded for each license
upgrade method:
What Next?
Now choose the right procedure for you:
• “Deployments with Licenses Managed Centrally Using SmartUpdate” on page 27
• “Deployments with Licenses Managed Locally” on page 33
26
Deployments with Licenses Managed Centrally Using SmartUpdate
In This Section
After the SmartCenter Server is upgraded, SmartUpdate must be used to complete the
License Upgrade process. When SmartUpdate is opened, the upgraded licenses are
imported into the license repository and are Assigned to the appropriate enforcement
module.
Note - If the license upgrade is performed before the software upgrade, Check Point
products will generate warning messages until all the software on the machine has been
upgraded. See “Error: “License version might be not compatible”” on page 37 for details.
Note - License upgrade using the CD Wrapper does not work for SmartCenter machines on
Windows platforms with via-proxy Internet connectivity.
28
Deployments with Licenses Managed Centrally Using SmartUpdate
SmartUpdate shows whether a license is Attached or Unattached, and the license State.
An:
• Attached license is associated with the enforcement module in License Repository,
and is installed on the remote enforcement module. In order for the NGX software
to work, a valid NGX license must be Attached.
• Unattached license is not installed on any enforcement module.
A license can be in one of the following States:
• Assigned is an NGX license that is associated with the enforcement module in
License Repository, but is not yet installed on the module as a replacement for an
existing NG license.
• Obsolete is an NG license for which a replacement NGX license is installed on an
NGX enforcement module.
• Requires Upgrade is an NG license that is installed on an NGX machine, and for
which no replacement upgraded license exists.
• No NGX license is an NG license that does not need to be upgraded, or one for
which the license upgrade failed.
Note - If the license upgrade is performed before the software upgrade, Check Point
products will generate warning messages until all the software on the machine has been
upgraded. See “Error: “License version might be not compatible”” on page 37 for details.
30
Deployments with Licenses Managed Centrally Using SmartUpdate
• Enter the name of the file that will be created with all the upgraded licenses
(output file name).
• Press [Y] when asked “Is this machine connected to the Internet?”.
• Press [Y] if you are connected to the internet via a proxy and supply the proxy
IP port and username password.
• Press [N] if you are not connected via proxy and continue with the upgrade.
• Enter the user and password of your User Center Account.
This fetches new licenses from the User Center and puts them in a cache file.
9 Copy the cache file (with the new licenses) to the offline SmartCenter. Copy the
file to the same directory as the license upgrade tool.
10 Run license_upgrade tool on the offline SmartCenter.
• Press [U] to run the Upgrade operation.
• Press [N] when asked “Is this machine connected to the Internet?”.
• Press [I] to import the output file with all the upgraded licenses back to the
SmartCenter.
• Enter the output file name with all the upgraded licenses.
11 Return to the main menu and press
[C] Check if currently installed licenses have been upgraded.
This shows the number of upgraded licenses on the machine and whether the
original NG licenses have a replacement NGX license.
12 Perform the software upgrade to NGX on the SmartCenter machine and on the
SmartConsole GUI machine.
13 At the SmartConsole GUI machine, open SmartUpdate and connect to the
SmartCenter Server. The updated licenses are displayed as Assigned. Use the Attach
assigned licenses option to Attach the Assigned licenses to enforcement modules.
SmartUpdate shows whether a license is Attached or Unattached, and the license State.
An:
• Attached license is associated with the enforcement module in License Repository,
and is installed on the remote enforcement module. In order for the NGX software
to work, a valid NGX license must be Attached.
• Unattached license is not installed on any enforcement module.
A license can be in one of the following States:
• Assigned is an NGX license that is associated with the enforcement module in
License Repository, but is not yet installed on the module as a replacement for an
existing NG license.
• Obsolete is an NG license for which a replacement NGX license is installed on an
NGX enforcement module.
• Requires Upgrade is an NG license that is installed on an NGX machine, and for
which no replacement upgraded license exists.
• No NGX license is an NG license that does not need to be upgraded, or one for
which the license upgrade failed.
32
Deployments with Licenses Managed Locally
In This Section
Note - If the license upgrade is performed before the software upgrade, Check Point
products will generate warning messages until all the software on the machine has been
upgraded. See “Error: “License version might be not compatible”” on page 37 for details.
Note - License upgrade using the CD Wrapper does not work for SmartCenter machines on
Windows platforms with via-proxy Internet connectivity.
7 Delete the obsolete licenses from the machine: For each obsolete license, run
cplic -del <license_signature>
Note - If the license upgrade is performed before the software upgrade, Check Point
products will generate warning messages until all the software on the machine has been
upgraded. See “Error: “License version might be not compatible”” on page 37 for details.
34
Deployments with Licenses Managed Locally
6 Copy the license_upgrade tool to the online machine. The tool is located at the
location specified in step 1.
13 Delete the obsolete licenses from the machine: For each obsolete license, run
cplic -del <license_signature>
Trial Licenses
Every Check Point product comes with a Trial License that allows unrestricted use of
the product for 15 days.
After the software upgrade, the Trial License continues to work for the remaining days
of the license. There is no need to upgrade the Trial License.
The Trial License does not work if you migrate your current SmartCenter
configuration to a new machine, and then upgrade the new machine to NGX.
36
Error: “License version might be not compatible”
In This Section
Symptoms
• Error: Warning: Can't find .... in cp.macro. License version might be
not compatible
• Error occurs with commands such as cplic print, cpstop, cpstart, and fw ver.
• The error occurs when a license upgrade is performed before a software upgrade.
The error appears in any situation where a licensed version is not compatible with
the version installed on a machine, for example, an NGX license on an NG
machine.
Cause
License on the target machine was upgraded to NGX before the software was upgraded
from a previous NG version to NGX.
If the license upgrade is performed before the software upgrade, Check Point products
will generate warning messages until all the software on the machine has been
upgraded. Refer to “License Upgrade Methods” on page 25 to determine the upgrade
path that best applies to your current configuration.
Resolution
Upgrade the software to version NGX. Errors will not appear after the upgrade.
Note that these errors do not affect the functionality of the version NG software.
Symptoms
User Center message (Error code: 106):
No license upgrade is available for evaluation product.
Cause
Evaluation licenses are not entitled to a license upgrade.
Resolution
Evaluation licenses cannot be upgraded. If you don’t need the evaluation license, delete
it. If you do need it, contact Account Services at US +1 817 606 6600, option 7 or
e-mail [email protected].
Symptoms
User Center message (Error code: 151):
Your license contains a Certificate Key (CK) which is not found in
User Center.
Cause
These evaluation licenses do not exist in the User Center. Evaluation licenses are not
entitled to a license upgrade.
An evaluation license can be identified by examining the license string. Evaluation
licenses may contain one of the following strings in the Features description:
CK-CP
or
38
Licenses of Products That Are Not Supported in NGX
CK-CHECK-POINT-INTERNAL-USE-ONLY
Resolution
Evaluation licenses cannot be upgraded. If you don’t need the evaluation license, delete
it. If you do need it, contact Account Services at US +1 817 606 6600, option 7 or
e-mail [email protected].
Symptoms
User Center Message (Error code: 154):
This product is not upgradeable to NGX version and therefore a
license upgrade is not needed. The product continues to be
supported in its NG Release
Cause
VPN-1 Net and VPN-1 SmallOffice are not supported in NGX. Therefore, if an
attempt is made to upgrade the license for these products, the User Center generates an
error message. The affected SKUs are:
VPN-1 Net Family SKUs: CPVP-VNT and LS-CPVP-VNT families
SmallOffice family SKUs: CPVP-VSO and LS- CPVP-VSO families
Resolution
Contact Account Services at US +1 817 606 6600, option 7 or e-mail
[email protected].
Symptoms
User Center Message (Error code: 132):
The license enforcement of NG gateway is now performed by the NGX
management server. Perform Change IP operation in User Center and
install the NGX license on the management server
Cause
The enforcement of NG module features is now performed by the NGX management.
For example, the licensing model of QOS (formerly FloodGate-1) for VPN-1 Express
was changed in NGX, and VPN-1 Express NGX modules with QoS require an
Resolution
If you have an NG Express gateway with a QoS (FloodGate-1) license, and in any other
case where this problem occurs, proceed as follows:
1 Perform a license upgrade at the User Center web site to generate a new license.
2 Install the new, upgraded license on the NGX management machine (even if you
do not upgrade the gateway).
3 Upgrade the gateway.
4 Delete the unneeded license from the gateway in one of two ways:
• Run the command line command at the gateway:
cplic del <license_signature>
• Using SmartUpdate, select the unneeded license, Detach it, and then Delete it.
Symptoms
User Center Message (Error Code 17):
This license is not in any of your accounts. Run the license
upgrade again with the username that owns this license in the User
Center.
Cause
This specific license does not exist in any of the accounts that belong to this user.
Resolution
Run the tool again with the appropriate username.
Note that each time you run the tool with a different username, upgraded licenses from
the User Center are added to a cache file located on your machine. This file contains
the successfully upgraded licenses from previous runs.
If the partially successful license upgrade was performed via the Wrapper, then after the
Wrapper has finished, run the license upgrade again via the command line, with the
appropriate username.
40
User Does Not Have Permissions on User Center Account
Symptoms
User Center Message (Error Code 19):
This license is in your account but you are not authorized to
upgrade licenses in this account because you have just view-only
permissions. Run license upgrade again with a username that is
authorized to change the license in the User Center.
Cause
This user is not authorized to change this license in the User Center.
Resolution
Run the tool again with the appropriate username.
Note that each time you run the tool with a different username, upgraded licenses from
the User Center are added to a cache file located on your machine. This file contains
the successfully upgraded licenses from previous runs.
If the partially successful license upgrade was performed via the Wrapper, then after the
Wrapper has finished, run the license upgrade again via the command line, with the
appropriate username.
Symptoms
User Center Message (Error code: 135):
This license is no longer needed in the version you are upgrading
to. It can be safely removed from the machine after the software
upgrade.
Cause
The NG version of SecureClient requires two licenses: one license for the module and
one for the management. In NGX only the management license is needed. The module
license (CPVP-VPS-1-NG) is no longer needed because it is incorporated in the
VPN-1 Pro license. The relevant SKU families are:
• CPVP-VSC,
• LS- CPVP-VSC,
• CPVP-VMC,
• LS-CPVP-VMC,
• CPVP-VSC-100-DES-NG
Resolution
After the software upgrade, delete the unneeded module license from the machine. Do
this in one of two ways:
• Using the command line: Run
cplic del <license_signature>
• Using SmartUpdate: Select the unneeded license, Detach it, and then Delete it.
SmartDefense Licenses
Symptoms
User Center Message (Error code: 902):
SmartDefense License is not needed on the gateway.
Cause
In NGX, enforcement of SmartDefense licenses is handled by the User Center. The
SKU families for which this issue is relevant are SU-SMRD and SU-SMDF.
Resolution
Delete the unneeded license from the machine.
Symptoms
License upgrade fails for some of the licenses but succeeds for others.
Cause
License upgrade may fail for some licenses and succeed for others. A license may fail to
upgrade for a number of reasons. For example, you may not have an Enterprise
Subscription contract for these licensed product. See some of the other items in
“Troubleshooting License Upgrade” on page 37 for more reasons why license upgrade
may fail.
Resolution
After solving all or some of the licensing problems referred to in the error log, run the
license_upgrade tool. This will upgrade the licenses for which the problem has been
solved.
The tool can be found in one of the following locations
• On the CD at <Specific_platform>
42
Upgraded Licenses Do Not Appear in the Repository
Symptoms
Upgraded license does not appear in the SmartUpdate Repository. However, the
license_upgrade tool log indicates that the license upgrade succeeded.
The license upgrade was performed on the NGX machine, after the software upgrade
to NGX.
Cause
The file with the upgraded licenses that was fetched from the User Center cannot be
imported into the SmartUpdate Repository while SmartUpdate is open.
Resolution
Close any SmartUpdate GUI client that is running, and run
license_upgrade import -r
Symptom
Failed to connect to the User Center.
Cause
Access to port HTTPS-443 is not allowed through the firewall. Access to the User
Center requires this port to be open.
Resolution
Open port HTTPS-443 in the firewall.
For example, in a deployment with one main firewalled gateway, and other gateways for
branch offices within the organization, open HTTPS-443 in the main gateway for all
the branch office gateways behind it.
44
CHAPTER 3
In This Chapter
Introduction page 45
Backup your Current Deployment page 46
Restore a Deployment page 46
SecurePlatform Backup and Restore Commands page 47
SecurePlatform Snapshot Image Management page 49
Revert to your Previous Deployment page 52
Introduction
Before you perform an Upgrade process you should backup your current configuration,
in case the Upgrade process is unsuccessful. The purpose of the backup process is to
backup the entire configuration, and to restore it when necessary.
To backup your configuration, use the Export utility tool of the version for which you
are creating a backup file (for example, if you are backing up NG with Application
Intelligence R55, use the NG with Application Intelligence Export utility tool). The
backup file created contains your current system configuration (for example, objects,
rules, users, etc.) and can be used to restore your previous configuration if the Upgrade
process fails. The restoration procedure brings the configuration to the state it was at
when the backup procedure was executed.
Note - Operating sytem level configurations (for example, network configuration) are not
exported.
45
Backup your Current Deployment
Warning - The configuration file (.tgz) file contains your product configuration. It is highly
recommended to delete it after completing the import process.
Restore a Deployment
1 Copy the exported.tgz file to the target SmartCenter Server.
2 Insert the product CD for the version being restored into the SmartCenter Server.
3 Use the provided options to perform an installation using an imported
configuration file.
46
Backup
Backup page 47
Restore page 48
Backup
Backup the system configuration. You can also copy backup files to a number of scp
and tftp servers for improved robustness of backup. The backup command, run by itself,
without any additional flags, will use default backup settings and will perform a local
backup.
Syntax
backup [-h] [-d] [-l] [--purge DAYS] [--sched [on hh:mm <-m DayOfMonth> |
<-w DaysOfWeek>] | off] [[--tftp <ServerIP> [-path <Path>] [<Filename>]] |
[--scp <ServerIP> <Username> <Password> [-path <Path>][<Filename>]] |
[--file [-path <Path>][<Filename>]]
Parameters
parameter meaning
-h obtain usage
-d debug flag
-l flag enables VPN-1 Pro log backup (By default,
VPN-1 Pro logs are not backed up.)
--purge DAYS delete old backups from previous backup attempts
[--sched [on hh:mm <-m schedule interval at which backup is to take place
DayOfMonth> | <-w
DaysOfWeek>] | off] • On - specify time and day of week, or day of
month
• Off - disable schedule
--tftp <ServerIP> [-path List of IP addresses of TFTP servers, on which the
<Path>][<Filename>] configuration will be backed up, and optionally the
filename.
--scp <ServerIP> List of IP addresses of SCP servers, on which the
<Username> <Password>[- configuration will be backed up, the username and
path <Path>] [<Filename>]
password used to access the SCP Server, and
optionally the filename.
--file [-path When the backup is performed locally, specify an
<Path>]<Filename> optional filename
Restore
Restore the system configuration.
Syntax
Parameters
parameter meaning
-h obtain usage
-d debug flag
48
Snapshot
Snapshot page 49
Revert page 50
Snapshot
This command creates a snapshot file. The snapshot command, run by itself, without
any additional flags, will use default backup settings and will create a local snapshot.
Syntax
Parameters
parameter meaning
-h obtain usage
-d debug flag
--tftp <ServerIP> IP address of the TFTP server, from which the
<Filename> snapshot is made, as well as the filename of the
snapshot.
--scp <ServerIP> IP address of the SCP server, from which the
<Username> <Password> snapshot is made, the username and password used to
<Filename>
access the SCP Server, and the filename of the
snapshot.
--file <Filename> When the snapshot is made locally, specify a filename
Revert
Reboot the system from a snapshot file. The revert command, run by itself, without
any additional flags, will use default backup settings, and will reboot the system from a
local snapshot.
revert [-h] [-d] [[--tftp <ServerIP> <Filename>] |
[--scp <ServerIP> <Username> <Password> <Filename>] |
[--file <Filename>]]
Parameters
parameter meaning
-h obtain usage
-d debug flag
50
Revert
parameter meaning
--tftp <ServerIP> IP address of the TFTP server, from which the
<Filename> snapshot is rebooted, as well as the filename of the
snapshot.
--scp <ServerIP> IP address of the SCP server, from which the
<Username> <Password> snapshot is rebooted, the username and password used
<Filename>
to access the SCP Server, and the filename of the
snapshot.
--file <Filename> When the snapshot is made locally, specify a filename
The revert command functionality can also be accessed from the Snapshot image
management boot option.
To revert to the software version prior to the active VPN-1 Pro/Express, perform the
following for each operating system:
Nokia platforms
1) Deactivate Check Point VPN-1 Pro/Express NGX R60.
2) Enter Delete Packages and delete Check Point VPN-1 Pro/Express NGX R60.
3) When uninstalling NGX R60 products, make sure that VPN-1 Pro/Express NGX
R60 is active.
4) Deactivate and delete the VPN-1 Pro/Express NGX R60 only after you have
deleted all other NGX R60 products.
Windows Platforms
In the Add/Remove Programs applet, select Check Point VPN-1 Pro NGX R60.
Solaris
1) Run the command: pkgrm CPsuite-R60.
SecurePlatform
1) For SecurePlatform machines enter expert mode to uninstall the package.
2) Run the command: rpm –e CPsuite-R60-00.
Linux
52
Revert
3 Once the Revert process is complete, use the ICA Management Tool to review
certificates created during the use of NGX R60 in the reverted environment (for
example, the NG with Application Intelligence R55 environment). For instance,
the subject to which a specific certificate was issued may no longer exist and in
such a case you may want to revoke the specific certificate.
For additional information refer to The Internal Certificate Authority (ICA) and the
ICA Management Tool chapter in the NGX R60 SmartCenter Guide.
54
CHAPTER 4
Upgrading a Distributed
VPN-1 Pro/Express
Deployment
In This Chapter
Introduction page 55
Upgrading the SmartCenter Server Component page 58
Upgrading the Enforcement Module page 71
Introduction
This chapter describes the process of upgrading a VPN-1 distributed deployment to
NGX R60.
A distributed deployment consists of at least one SmartCenter server and one or more
Enforcement Modules. The SmartCenter component should be the first component to
be upgraded. Due to backward compatibility support of previous versions, an upgraded
SmartCenter can enforce and manage enforcement modules from previous versions
even though some of the new features may not be available to Enforcement Modules
from previous versions.
55
Pre-Upgrade Considerations
Pre-Upgrade Considerations
In This Section
56
Upgrading Products on a SecurePlatform Operating System
Workaround
1 Edit the /var/opt/CPEdgecmp/conf/SofawareLoader.ini file for Unix based
platforms or the %FWDIR%\FW1_EDGE_BC\conf\SofawareLoader.ini file or
Windows.
2 In the [Server] section, add the following:
TopologyOldFormat=1
In This Section
58
Using the Pre Upgrade Verification Tool
60
SmartCenter Upgrade on a Windows Platform
Using a CD ROM
The following steps depict how to upgrade SecurePlatform R54 and later versions using
a CD ROM drive.
1 Log into SecurePlatform (Expert mode is not necessary).
2 Apply the SecurePlatform NGX R60 upgrade package:
# patch add cd.
62
SmartCenter Upgrade on SecurePlatform NG FP2, FP3, or FP3 Edition 2
4 Apply the SecurePlatform NGX R60 upgrade package by using a CD ROM drive
with the following command:
# patch add cd.
64
SmartCenter Upgrade on an IPSO Platform
4 Click Apply.
At this point you are informed that the file download and image installation can
take a long time.
5 Click Apply.
6 At this point you will receive a message that the new image installation process has
started. When you receive a Success message click UP > UP > Manage IPSO Images.
The IPSO Image Management window appears.
7 Under the title Select an image for next boot, select the last downloaded image.
8 Click Test Boot.
9 In the window that appears select Commit testboot and click Apply.
10 Access the CLI console to see when the Reboot is complete. Once the Reboot is
complete go back to Network Voyager (that is, step 10) to verify that the image was
set properly.
11 In the Network Voyager, click Refresh and Login.
12 If you are not returned to the last window you were in click
System Configuration > Manage IPSO Images.
At this point, you should be able to see that the relevant IPSO Image is selected.
19 Click Apply.
21 Click Apply.
22 Click Save.
At this point you should receive a message that states that the process was a success.
23 Return to the CLI console and type Reboot.
66
SmartCenter Upgrade on an IPSO Platform
25 Select y to reboot.
The SmartCenter Server Upgrade on an IPSO Platform is complete.
To manage R55W or NG modules install the Compatibility packages for these versions.
These packages are located in the same place as the package installed above.
In This Section
Advanced Upgrade
This section explains the steps that should be performed when performing an advanced
upgrade on an additional SmartCenter Server via a spare machine.
1 Insert the NGX R60 CD into the original SmartCenter Server.
2 Choose Export in Upgrade Options.
If you chose to perform the Export procedure manually make sure you are using
the NGX R60 Export tool.
3 Select the destination path of the configuration (.tgz) file.
Wait while exporting database files.
4 Copy the exported.tgz file to the new SmartCenter Server.
5 Insert the NGX R60 CD into the new SmartCenter Server.
68
Migrate your Current SmartCenter Configuration and Upgrade
Warning - The configuration file (.tgz) file contains your security configuration. It is highly
recommended to delete it after completing the import process.
1 On the original SmartCenter Server add rules that will allow the new SmartCenter
to access the modules it is managing. To do this create a SmartCenter object that
represents the new SmartCenter Server’s IP address:
Manage > Network Objects > New… > Check Point > Host/Gateway and in the
General Properties tab select Secondary SmartCenter Server in the Check Point
Products section.
2 On the original SmartCenter Server, create a security rule that allows FW1 (TCP
256) and CPD (TCP 18191) services to originate from the new SmartCenter
Server whose destination is all available Enforcement Modules.
3 Install the new security policy on all Enforcement Modules.
4 Follow the Advanced Upgrade page 68 process to migrate your original SmartCenter
Server.
1 Update the SmartCenter licenses with the new IP address. If central licenses are
used for the modules, they should also be updated with the new IP Address. Refer
to the Upgrading VPN-1 Pro/Express Licenses page 19 for additional information.
2 Using the cpstart command start the new SmartCenter Server.
3 Access the new SmartCenter Server using SmartDashboard.
4 On the new SmartCenter Server update the primary SmartCenter object so that its
IP Address and topology match its new configuration.
5 On the new SmartCenter Server remove the object you created to represent the
new SmartCenter Server’s IP address (refer to step 1 in the previous section).
6 On the DNS Server map the Primary SmartCenter Server’s DNS to the new IP
address.
70
Upgrading a Clustered Deployment
In This Section
Note - When upgrading the Enforcement Module, all SmartUpdate packages (excluding
SofaWare firmware packages) are deleted from the SmartUpdate Repository.
The following is a list of the products that can be upgraded to NGX R60:
• VPN-1 Pro Enforcement Modules
• SecurePlatform
• Performance Pack
• SmartView Monitor (when it is a part of the NGX R60 software package)
• Eventia Reporter
• UserAuthority
• UserAuthority Server
• PolicyServer (when it is a part of the NGX R60 software package)
• QoS
• Nokia OS
72
Upgrading the Enforcement Module Using SmartUpdate
• by adding them from the Check Point CD (Packages > Add > From CD...),
• by importing a file (Packages > Add > From File...).
When adding the package to the Package Repository, the package file is transferred to
the SmartCenter Server. When the Operation Status window opens, you can verify the
success of the operation. The Package Repository is then updated to show the new
package object.
Note - the Allow reboot... option (checked by default) is required in order to activate the
newly installed packages.
The Operation Status pane opens and shows the progress of the installation. Each
operation is represented by a single entry. Double click the entry to open the
Operation Details window, which shows the operation history.
74
Upgrading the Enforcement Module Using SmartUpdate
• The gateway is rebooted if the Allow Reboot... option was selected and the
package requires it.
• The gateway version is updated in SmartDashboard.
• The installed packages are updated in SmartUpdate.
3 Select the relevant package from the list provided and click Distribute.
Repeat steps 2 to 3 for every package that should be installed on the Enforcement
Module.
Note - it is also possible to use SmartUpdate to install HFAs on Enforcement Modules from
previous versions (for example, R54 and later).
76
Enforcement Module Upgrade on SecurePlatform R54, R55 and Later Versions
Using a CD ROM
The following steps depict how to upgrade SecurePlatform R54 and later versions using
a CD ROM drive.
1 Log into SecurePlatform (Expert mode is not necessary).
2 Apply the SecurePlatform NGX R60 upgrade package: # patch add cd.
3 At this point you will be asked to verify the MD5 checksum.
4 Answer the following question:
Do you want to create a backup image for automatic revert? Yes/No
If you select Yes, a Safe Upgrade will be performed.
Safe Upgrade automatically takes a snapshot of the entire system so that the entire
system (operating system and installed products) can be restored if something goes
wrong during the Upgrade process (for example, hardware incompatibility). If the
Upgrade process detects a malfunction, it will automatically revert to the Safe
Upgrade image.
When the Upgrade process is complete, upon reboot you will be given the option
to manually choose to start the SecurePlatform operating system using the upgraded
version image or using the image prior to the Upgrade process.
5 After you complete the upgrade process perform the following:
a Using SmartDashboard login to the NGX R60 SmartCenter Server that
controls the upgraded Enforcement Module.
b Open the gateway object properties window that represents the upgraded
Enforcement Module and change the version to NGX R60.
4 Apply the SecurePlatform NGX R60 upgrade package by using a CD ROM drive
with the following command:
# patch add cd.
78
Enforcement Module Upgrade on SecurePlatform NG FP2, FP3, or FP3 Edition 2
80
Enforcement Module Upgrade on an IPSO Platform
4 Click Apply.
At this point you are informed that the file download and image installation can
take a long time.
5 Click Apply.
6 At this point you will receive a message that the new image installation process has
started. When you receive a Success message click UP > UP > Manage IPSO Images.
The IPSO Image Management window appears.
7 Under the title Select an image for next boot, select the last downloaded image.
8 Click Test Boot.
9 In the window that appears select Commit testboot and click Apply.
10 Access the CLI console to see when the Reboot is complete. Once the Reboot is
complete go back to Network Voyager (that is, step 10) to verify that the image was
set properly.
11 In the Network Voyager, click Refresh and Login.
12 If you are not returned to the last window you were in click
System Configuration > Manage IPSO Images.
At this point, you should be able to see that the relevant IPSO Image is selected.
13 Access the CLI console and login.
14 Perform an FTP using bin mode to transfer the package.
15 Type newpkg -S -m LOCAL -n <CPsuite package path> -o $FWDIR and press Enter.
At this point the package is loaded and the following products are upgraded:
• CPshared
• VPN-1/FW-1
Once the process is complete you should receive a message that states that the
process was a success.
16 Type Reboot and press Enter.
19 Click Apply.
21 Click Apply.
22 Click Save.
At this point you should receive a message that states that the process was a success.
23 Return to the CLI console and type Reboot.
25 Select y to reboot.
26 After you complete the upgrade process perform the following:
a Using SmartDashboard login to the NGX R60 SmartCenter Server that
controls the upgraded Enforcement Module.
b Open the gateway object properties window that represents the upgraded
Enforcement Module and change the version to NGX R60.
82
Enforcement Module Upgrade on an IPSO Platform
84
CHAPTER 5
Upgrading a Standalone
VPN-1 Pro/Express
Deployment
In This Chapter
Introduction page 85
Pre-Upgrade Considerations page 86
Standalone VPN-1 Gateway Upgrade on a Windows Platform page 89
Standalone VPN-1 Gateway Upgrade on SecurePlatform R54, R55 and Later
Versions page 90
Standalone VPN-1 Gateway Upgrade on SecurePlatform NG FP2, FP3, FP3
Edition 2 page 91
Standalone VPN-1 Gateway Upgrade on a Solaris Platform page 92
Standalone VPN-1 Gateway Upgrade on an IPSO Platform page 93
Migrate your Current VPN-1 Gateway Configuration and Upgrade page 96
Introduction
This chapter describes the process of upgrading a VPN-1 standalone deployment to
NGX R60.
A standalone deployment consists of the SmartCenter Server and enforcement module
installed on the same system.
85
Pre-Upgrade Considerations
Pre-Upgrade Considerations
In This Section
86
License Upgrade to NGX
Usage:
88
Using the Pre-Upgrade Verification Tool
90
Using the Pre-Upgrade Verification Tool
4 Apply the SecurePlatform NGX R60 upgrade package by using a CD ROM drive
with the following command:
# patch add cd.
92
Using the Pre-Upgrade Verification Tool
4 Click Apply.
At this point you are informed that the file download and image installation can
take a long time.
5 Click Apply.
6 At this point you will receive a message that the new image installation process has
started. When you receive a Success message click UP > UP > Manage IPSO Images.
The IPSO Image Management window appears.
7 Under the title Select an image for next boot, select the last downloaded image.
8 Click Test Boot.
9 In the window that appears select Commit testboot and click Apply.
10 Access the CLI console to see when the Reboot is complete. Once the Reboot is
complete go back to Network Voyager (that is, step 10) to verify that the image was
set properly.
11 In the Network Voyager, click Refresh and Login.
12 If you are not returned to the last window you were in click
System Configuration > Manage IPSO Images.
At this point, you should be able to see that the relevant IPSO Image is selected.
19 Click Apply.
21 Click Apply.
22 Click Save. At this point you should receive a message that states that the process
was a success.
23 Return to the CLI console and type Reboot.
25 Select y to reboot.
94
Using the Pre-Upgrade Verification Tool
Warning - The configuration file (.tgz) file contains your security configuration. It is highly
recommended to delete it after completing the import process.
96
CHAPTER 6
Upgrading ClusterXL
In This Chapter
97
Tools for Gateway Upgrades
98
Permanent Kernal Global Variables
Note - Full Connectivity Upgrade is supported between minor versions only. For further
information please refer to “Performing a Full Connectivity Upgrade on a ClusterXL Cluster”
on page 104 and the NGX R60 Release Notes.
When upgrading from R55W to NGX R60 refer to NGX R60 Release Notes for details
about support of Web Intelligence and VoIP Application Intelligence features on Load
Sharing Clusters.
But, if you wish to avoid such a situation (for example, during downgrade), you should
physically (or using ifconfig) disconnect the cluster interfaces and the synchronization
network of that cluster member prior to the downgrade process.
100
Upgrading OPSEC Certified Third Party Clusters Products
2 Suppose cluster member A is the active member, and members B and C are standby
members. In Load Sharing mode, randomly choose one of the cluster members to
upgrade last. Ensure that the previously upgraded NGX licenses are attached to
members B and C
3 Attach the previously upgraded licenses to all cluster members (A, B and C) as
follows: At the SmartConsole GUI machine, open SmartUpdate, and connect to
the SmartCenter Server. The updated licenses are displayed as Assigned. Use the
Attach assigned licenses option to Attach the Assigned licenses to the cluster
members.
4 Upgrade cluster members B and C either:
• Using SmartUpdate
• In Place
When the upgrade of B and C is complete, reboot both of them.
5 Continue with the process according to one of the following scenarios:
• Skip to step 6 if you are upgrading from NG with Application Intelligence (R54
and above). When machines B and C are up again, change the cluster version in
SmartDashboard to NGX R60.
• Skip to step 7 if you are running SmartUpdate. SmartUpdate compiles and
installs an updated policy on the new member, once it is rebooted.
6 Installing the policy:
If you are upgrading from NG with Application Intelligence (R54 and above)
install the policy. Be aware that policy installation on the old Check Point gateway
may cut connections for services that do not survive policy installation
This can be avoided by configuring the Check Point Gateway > Advanced >
Connection Persistence tab to either Keep all connections or Keep data connections.
For complete instructions, when you are in the Connection Persistence tab click on
the help button.
Note - Do not change any cluster parameters from the current policy in this stage. For
example, if the cluster is running in New High Availability mode, do not change it to LS.
Changes can be made after the upgrade process is complete.
If you are upgrading from previous versions, perform the following steps:
i From the Policy Installation window, deselect the For Gateway Clusters,
install on all the members, if it fails do not install at allcheckbox located
under the Install on each selected Module independently radio button.
102
Supported Modes
Note - It is recommended that you keep the time in which cluster members are running
different versions to a minimum.
Supported Modes
FCU is supported on all modes of ClusterXL including IPSO’s IP clustering and
VRRP. Legacy High Availability is not supported in FCU. For other third party’s
support please refer to the third party’s documentation.
Terminology
FCU - An abbreviation for “Full Connectivity Upgrade”.
NM - An abbreviation for the already upgraded member during the upgrade. This
Check Point Gateway contains a newer version. It is in the “non-active” state.
OM - An abbreviation for the old member that has not yet been upgraded. It carries all
the traffic. It is in the “active” state.
104
Implementing a Full Connectivity Upgrade
2 The exact same products must be installed on the OM and on the NM.
For example, it is not possible to perform FCU from a Check Point Gateway that
has Floodgate-1 installed to a newer Check Point Gateway that does not have
Floodgate-1 installed. Verify by running the command fw ctl conn on both
cluster members.
An example output on the NM:
Registered connections modules:
No. Name Newconn Packet End Reload Dup Type Dup Handler
0: Accounting 00000000 00000000 d08ff920 00000000 Special d08fed58
1: Authentication d0976098 00000000 00000000 00000000 Special d0975e7c
3: NAT 00000000 00000000 d0955370 00000000 Special d0955520
4: SeqVerifier d091e670 00000000 00000000 d091e114 Special d091e708
6: Tcpstreaming d0913da8 00000000 d09732d8 00000000 None
7: VPN 00000000 00000000 d155a8d0 00000000 Special d1553e48
Verify that the list of Check Point Gateway names is the same for both cluster
members.
3 Verify that all the Firewall-1 Check Point Gateway configuration parameters have
the same values on the NM and the OM. The same rule applies to any other local
configurations you may have set.
For example having the attribute block_new_conns with different values on the
NM and on the OM might fail your FCU because FireWall-1 behavior cannot be
changed during the upgrade.
4 A cluster that performs static NAT using Firewall-1’s automatic proxy ARP feature
requires special considerations: cpstop the old Check Point Gateway right after
running cphastop. Running cphastop is part of the upgrade procedure listing in
“Performing a Zero Down Time Upgrade on a ClusterXL Cluster” on page 101.
Not doing so may fail some of the connections that rely on proxy ARP and may
cause other connections that rely on proxy ARP not to open, until the upgrade
process completes. However note that doing cpstop on the old Check Point
Gateway rules out the option to rollback to the OM while maintaining all live
connections that were originally created on the OM.
Note - cphastop can also be performed from the Cluster object in the SmartView Monitor
SmartConsole. Once cphastop is performed do not run cpstart or cphastart again or
try rebooting the machine.
106
Implementing a Full Connectivity Upgrade
cphaprob fcustat displays statistical information regarding the upgrade process. Run
this command on the new member. Here is a typical output after running the
command:
During FCU....................... yes
Number of connection modules..... 23
Connection module map (remote -->local)
0 --> 0 (Accounting)
1 --> 1 (Authentication)
2 --> 3 (NAT)
3 --> 4 (SeqVerifier)
4 --> 5 (SynDefender)
5 --> 6 (Tcpstreaming)
6 --> 7 (VPN)
Table id map (remote->local)..... (none or a specific list,
depending on configuration)
Table handlers ..................
78 --> 0xF98EFFD0 (sip_state)
8158 --> 0xF9872070 (connections)
Global handlers ................. none
Explanation of Output
During FCU – This should be “yes” only after running the fw fcu command and
before running cphastop on the final OM. In all other cases it should be “no”.
Number of connection modules – Safe to ignore.
Connection module map – The output reveals a translation map from the OM to
the NM. See “Full Connectivity Upgrade Limitations” on page 104 for further
information.
Table id map – This shows the mapping between FireWall-1 kernel table indices on
the OM and on the NM. Having a translation is not mandatory.
Table handlers – This should include a sip_state and connection table handlers. In
a VPN-1 Pro/Express configuration a VPN handler should also be included.
Global handlers – Reserved for future use.
Options
-t - table
-u - unlimited entries
-s - (optional) summary of the number of connections
For further information on the fw tab -t connections command see the “Command
Line Interface” Book.
It is safe to run the fw fcu command more than once. Make sure to run both cpstop
and cpstart on the NM before re-running the fw fcu command. The reason for
running cpstop and cpstart is that the table handlers that deal with the upgrade are
only created during policy installation (cpstart installs policy).
108
CHAPTER 7
Upgrading Provider-1
In This Chapter
109
Introduction
Introduction
In This Section
Scope
This chapter describes methods and utilities for upgrading Provider-1/SiteManager-1 to
NGX.
2 If difficulties in the upgrade process require that you restore your original
environment, follow the step in “Restoring your Original Environment” on page
166. Read the restoration instructions before you begin, as several actions need to
be taken before the upgrade in order to allow the restoration.
3 If you are upgrading a multi-MDS environment refer to “Upgrading in a Multi
MDS Environment” on page 163”.
110
Supported Platforms
Supported Platforms
The latest information about supported platforms is always available in the Check Point
Release Notes. Download them from:
http://www.checkpoint.com/techsupport/downloads.jsp
112
Pre-Upgrade Verifiers and Fixing Utilities
In This Section
This section includes items to be noted. For example, when a specific object type
that is no longer supported is found in your database and is converted during the
upgrade process, you will get a message stating that this change is going to occur.
The Provider-1/SiteManager-1 Pre-Upgrade Verifier uses Provider-1/SiteManager-1
specific verifications as well as verifications checked by SmartCenter’s Pre-Upgrade
Verifier. See “Using the Pre Upgrade Verification Tool” on page 59.
Installation Script
Starting from NG with Application Intelligence, the installation script to use for MDS
is mds_setup. To run mds_setup:
1 Unzip the MDS package: gunzip <package_name>.tgz
2 Untar tar xvf <package_name>.tar
3 A new directory with the same name of the tar file has been created.
Change to it: cd <package_name>.
4 Run the installation script: ./mds_setup.
When mds_setup is executed, it first checks for an existing installation of MDS:
• If no such installation exists, mds_setup asks you to confirm a fresh
installation of MDS.
• If a previous version of MDS is detected, you are prompted to select one of
the following options (Pre-Upgrade Verification Only, Upgrade or Backup)
listed below.
5 Exit all shell sessions. Open a new shell in order for the new environment to be set.
114
pv1_license_upgrade
Upgrade
Using this option mds_setup runs the Pre-Upgrade Verifier and if no errors are found,
the upgrade process proceeds. In case of errors mds_setup stops the installation until all
the errors are fixed. In some cases mds_setup suggests to automatically fix the problem
using a fixing utility. Fixing utilities that affect your existing installation can also be
executed from the command line. You can choose to stop the installation at this point
and execute the fixing utility from command line. There are two important things to
remember after changing your existing installation:
• Verify your changes in the existing installation before you upgrade.
• Synchronization:
If you make changes in global policies, reassign these global policies to customers. If
you have a multi-MDS environment:
• Synchronize databases between MDSs in High Availability.
• Synchronize databases between CMAs in High Availability.
• Install the database on CLMs.
Backup
Prior to upgrading backup your MDS. This option from mds_setup, will run
mds_backup (see mds_backup). Backup is also used for replication of your MDS to
another machine. Manual operations are necessary if you are switching IP addresses, or
network interface names. For more details see “Changing MDS IP address and External
Interface” on page 171.
pv1_license_upgrade
The pv1_license_upgrade command line tool is used to perform license upgrade for
Provider-1.
Provider-1/SiteManager-1 NGX with licenses from previous versions will not function.
It is therefore highly recommended to upgrade all Provider-1/SiteManager-1 NG
licenses to NGX before upgrading software to NGX.
When the tool is run on the MDS, upgraded licenses are obtained from the Check
Point User Center Web site for the MDS and for all the CMAs on the MDS. The tool
makes it simple to automatically upgrade licenses without having to do so manually
though the User Center.
The pv1_license_upgrade tool is located on the
• Provider-1 NGX CD at: /Tools/License Upgrade/<platform>/
• NGX installation at: /opt/CPmds-R60/system/license_upgrade/
license_upgrade
The license_upgrade command line tool is used to perform license upgrade for a
single CMA. It is the same tool as is used to perform license upgrade in SmartCenter
environments.
The license_upgrade tool is located on the
• Provider-1 NGX CD at: /Tools/License Upgrade/<platform>/
• NGX installation at: /opt/CPmds-R60/system/license_upgrade/
• Check Point Download site at
http://www.checkpoint.com/techsupport/ngx/license_upgrade.html
The licence_upgrade tool can be run either as a command line with parameters, or in
Wizard mode, which allows you to choose options from a menu. To run the tool in
Wizard mode, run:
license_upgrade
116
cma_migrate
cma_migrate
This utility is used to import an existing SmartCenter Server or CMA into a
Provider-1/SiteManager-1 MDS so that it will become one of its CMAs. If the
imported SmartCenter or CMA is of a version earlier than the MDS to which it is
being imported, then the Upgrade process is performed as part of the import. The list
of available versions is located in “Supported Versions for Upgrade” on page 111.
Keep in mind, the source and target platforms may be different. The platform of the
source management that will be imported can be Solaris, Linux, Windows,
SecurePlatform or IPSO.
Before running cma_migrate create a new customer and a new CMA. Do not Start the
CMA, this will cause cma_migrate to fail.
Usage
cma_migrate <source management directory path> <target CMA FWDIR
directory>
Example
cma_migrate /tmp/orig_mgmt_dir
/opt/CPmds-R60/customers/cma2/CPfw1-R60
directory contents
conf This directory contains the information that resides
under $FWDIR/conf of the source management.
database This directory contains the information that resides
under $FWDIR/database of the source
management.
log This directory contains the information that resides
under $FWDIR/log of the source management or
empty if you do not wish to maintain the logs.
conf.cpdir This directory is required when the source
management is NG FP1 or higher. It contains the
information that resides under $CPDIR/conf of the
source management.
The second argument (<target CMA FWDIR directory>) is the FWDIR of the newly
created CMA.
The cma_migrate utility can also be performed from the MDG:
1 Right click a CMA
2 Select Import Customer Management Add-on from the menu.
When running cma_migrate, pre-upgrade verification takes place. If no errors are
found, then the migration continues. If errors are found, changes must be performed
on the original SmartCenter Server.
The original Certificate Authority and putkey information is maintained when using
cma_migrate. This means that the SmartCenter Server that was migrated using
cma_migrate should not re-generate certificates to gateways and SIC should continue
to work with gateways from version NG and later. However, if the IP of the CMA is
different from that of the original management, then putkey should be redone between
the CMA and entities that connect to it using putkey information. Use putkey -n to
reestablish trust. For further information on putkey see the Check Point Command Line
interface documentation.
If you have VPN with externally managed gateways (or Global VPN-1 Communities)
maintain the original FQDN of the management, so that the CRL server location is
not changed. This is not a requirement for a VPN between Check Point internal
gateways.
The default FQDN of a CMA is its IP address, so if you migrated from CMA and
changing its IP address, you should change its FQDN to the new IP address by
executing:
mdsenv <CMA>, cpconfig, option 4 - Certificate Authority
If your purpose is to split a management or CMA into two or more CMAs, reinitialize
their Internal Certificate Authority so only one of the new CMAs will employ the
original ICA:
1 mdsstop_customer <CMA NAME>
118
migrate_assist
migrate_assist
This utility is a helper utility for cma_migrate. It can be used to pull the original
management directories to the current disk storage using FTP.
Once you finish running migrate_assist, it is possible to run cma_migrate (see
“cma_migrate” on page 117), whose input directory will be the output directory of
migrate_assist.
Usage
migrate_assist <source machine name/ip> <source FWDIR folder> <user name>
<password> <target folder>[<source CPDIR folder>]
Example
If you want to import a SmartCenter server with the IP address 192.168.0.5 of version
NG FP3 you will use the following command:
migrate_assist 192.168.0.5 /opt/CPfw1-53 FTP-user
FTPpass/EMC1/opt/CPshared/5.0
Where /EMC1 is the name of the directory you have created on the MDS server
machine migrate_assist will access the source machine and import the source FWDIR
and CPDIR folders to the specified target folder according to the structure described
above. User name and password are needed to gain access to the remote machine via
FTP. The source CPDIR parameter is required in case that the original management is
NG FP3 and higher.
Note - migrate_assist does not affect the source database, however it is highly
recommended to stop it before running migrate_assist so that no SmartConsole
Clients accidentally edit the database during migration.
migrate_global_policies
The migrate_global_policies utility is available starting with NG FP3. This utility
transfers (and upgrades, if necessary) a global policies database from one MDS to
another.
Usage
migrate_global_policies <path to original global policies files>
<original files version>
The original files version should be one of the following taken from the $MDSDIR/conf
folder of the originating MDS:
• FP1
• FP2
• FP3
• R54 - for NG with Application Intelligence
• R55 - for NG with Application Intelligence
• NGX
The original file names depend on the version used:
120
Backup and Restore
Restoration can be done on the original machine or, if your intention is to upgrade by
replicating your MDS for testing purposes; to another machine. When performing a
restoration to another machine, if the machine’s IP address or interface has changed,
refer to “Changing MDS IP address and External Interface” on page 171” for
instructions on how to adjust the restored MDS to the new machine.
During backup, it is okay to view but do not write using MDGs, GUIs or other clients.
If the Provider-1/SiteManager-1 system consists of several MDSes, the backup
procedure takes place manually on all the MDSes concurrently. Likewise, when the
restoration procedure takes place, it should be performed on all MDSes concurrently.
mds_backup
This utility stores binaries and data from your MDS installation. Running mds_backup
requires super-user privileges. This is done by running the gtar command on the root
directories of data and binaries. Any extra information located under these directories is
backed up except from files that are specified in mds_exclude.dat ($MDSDIR/conf) file.
The collected information is wrapped in a single zipped tar file. The name of the
created backup file is constructed by the date and time of the backup, followed by the
extension .mdsbk.tgz. For example: 13Sep2002-141437.mdsbk.tgz. The file is put in
the current working directory, thus it is important not to run mds_backup from one of
the directories that will be backed up. For example, when backing up a NG FP3 MDS,
do not run mds_backup from /opt/CPmds-53 since you cannot zip the directory you’ll
need to write into.
Usage
mds_backup
mds_restore
Restores a MDS that was previously stored with mds_backup. For correct operation,
mds_restore requires a fresh installation of an MDS from the same version of the MDS
to be restored.
Usage
mds_restore <backup file>
$MDSDIR/bin/set_mds_info -b -y
122
Overview of NGX License Upgrade
124
Understanding Provider-1/SiteManager-1 Licenses
Provider-1/SiteManager-1 Licensing
The MDS Manager has
• Licenses for the MDS itself (MDS licenses), in the cp.license file. An example of
an MDS license is one that specifies how many CMAs may be configured.
• MDS License Repository (MDS Repository). This is a mirror (that is, a read-only
copy) of the CMA license repositories. All CMA license actions are reflected in the
MDS License Repository.
The MDS Container has:
• Licenses for the MDS Container itself, in the cp.license file. This license
specifies, among other things, how many CMAs may be configured in the
Container.
• For each CMA, licenses for the CMA itself (CMA licenses), in the cp.license file.
An example of a CMA license is one that specifies how many Gateways the CMA
can manage.
• For each CMA, the CMA license repository (CMA Repository) in the licenses.C
file. This is a repository of Gateway licenses.
To manage the licenses in the CMA Repository, use the SmartUpdate component of
the Multi-Domain GUI (MDG). SmartUpdate is used to connect to the MDS Manager
and manage the MDS Repository.
126
Before License Upgrade
Note - This section only applies if the Provider-1Pro Add-Ons for MDS are installed.
License Upgrade for the Pro Add-Ons for MDS must be performed either manually via
the User Center, or via the Check Point Account Services department.
To understand this issue, some background information is needed.
Pro Add-Ons for MDS is a bundled product that extends the SMART management
capabilities of multiple CMAs by adding SmartUpdate, SmartDirectory, and SmartView
Monitor. TABLE 7-3 shows the part numbers of Pro Add-ons for MDS.
TABLE 7-3 Part numbers of Pro Add-ons for MDS
Pro Add-ons for MDS
Customer Version Part Number
10 NG CPPR-PRO-10-NG
25 NG CPPR-PRO-25-NG
50 NG CPPR-PRO-50-NG
100 NG CPPR-PRO-100-NG
200 NG CPPR-PRO-200-NG
250 NG CPPR-PRO-250-NG
Licenses for the CMA Pro Add-on for MDS are generated in the User Center as
follows:
1 Perform the Activate License operation on the Pro bundled product, using the IP
address of the first CMA, to generate the license for this CMA. For each additional
CMA, perform the Change IP operation on the bundled product, and change to the
IP address of this CMA.
2 Install each generated license on its respective CMA.
3 At the end of the license generation process, the User Center shows a license with
the IP address of the last CMA for which the Change IP operation was performed.
The proxy port number is optional. Username and password (if any) are for the
proxy machine.
2 Save the following information:
• Log Files generated by the tool. The location of the files is printed to the screen
when running the tool.
• The cache file generated when running the tool, $CPDIR/conf/lic_cache.C.
3 Contact Account Services at US +1 817 606 6600, option 7 or e-mail
[email protected], and provide them with the above
information.
Note - This section only applies if the Virtual Systems Extension - CMA Bundle is installed.
To allow Provider-1 to manage VPN-1 VSX, the “Virtual Systems Extension - CMA
Bundle” product is required. If the Virtual Systems Extension - CMA Bundle is older
than VSX NG AI Release 2, automatic license upgrade is not available. License upgrade
must be performed manually via the User Center, or via the Check Point Account
Services department.
To understand this issue, some background information is needed.
Customers purchase multiple CMAs in order to manage either one VSX Virtual System
(VS) with each CMA, or manage a VS cluster with each CMA.
The purchased part numbers are shown in TABLE 7-4.
TABLE 7-4 Virtual Systems Extension - CMA Bundles
Virtual Systems Extension - CMA Bundles (Primary VSX-CMA)
Gateways Version Part Number
C10 NG CPPR-VSX-CMA-C10-NG
C25 NG CPPR-VSX-CMA-C25-NG
C50 NG CPPR-VSX-CMA-C50-NG
C100 NG CPPR-VSX-CMA-C100-NG
C250 NG CPPR-VSX-CMA-C250-NG
128
Before License Upgrade
One license for the Provider-1 CMA product in TABLE 7-10 (to be installed on the
CMA), that specifies the size of the VS cluster that the CMAs are allowed to manage.
A license for a VS cluster of 1 Gateway allows the CMA to manage one VS, A license
for a VS cluster of 2 Gateways allows the CMA to manage a cluster of two VSs, and so
on.
TABLE 7-6 Provider-1 CMA
Provider-1 CMA (Primary CMA)
Gateways Version Part Number
1 NG CPPR-CMA-1-NG
2 NG CPPR-CMA-2-NG
4 NG CPPR-CMA-4-NG
Licenses for the Provider-1 CMA product are generated in the User Center as follows:
1 Perform the Activate License operation on the Provider-1 CMA product, using the
IP address of the first CMA, to generate the license for this CMA. For each
additional CMA, perform the Change IP operation on the bundled product, and
change to the IP address of this CMA.
2 Install each generated license on its respective CMA.
3 At the end of the license generation process, the User Center shows a license with
the IP address of the last CMA for which the Change IP operation was performed.
130
Choosing The Right License Upgrade Procedure
What Next?
Once you have made the above three decisions, you can then decide which of the
following procedures is the right one for you.
• “License upgrade of Entire System Before Software Upgrade” on page 133
• “When MDS is Online” on page 133
• “When MDS is Offline” on page 134
• “License Upgrade of Entire System Using Wrapper” on page 136
(applies to an online MDS version NG)
• “License upgrade of Entire System After Software Upgrade” on page 137
• “When MDS is Online” on page 137
• “When MDS is Offline” on page 138
• “License Upgrade for a Single CMA” on page 140
• “When MDS is Online, Before Software Upgrade” on page 140
• “When MDS is Offline, Before Software Upgrade” on page 141
• “When MDS is Online, After Software Upgrade” on page 143
• “When MDS is Offline, After Software Upgrade” on page 144
132
License upgrade of Entire System Before Software Upgrade
In This Section
Note - If the license upgrade is performed before the software upgrade, Check Point
products will generate warning messages until all the software on the machine has been
upgraded. See “Error: “License version might be not compatible”” on page 37 for details.
Note - If the license upgrade is performed before the software upgrade, Check Point
products will generate warning messages until all the software on the machine has been
upgraded. See “Error: “License version might be not compatible”” on page 37 for details.
134
License upgrade of Entire System Before Software Upgrade
136
License upgrade of Entire System After Software Upgrade
In This Section
138
License upgrade of Entire System After Software Upgrade
In This Section
Note - If the license upgrade is performed before the software upgrade, Check Point
products will generate warning messages until all the software on the machine has been
upgraded. See “Error: “License version might be not compatible”” on page 37 for details.
140
License Upgrade for a Single CMA
6 Import new licenses of all CMAs into the NGX CMA Repositories.
pv1_license_upgrade import -C <cache file>
The default cache file is $CPDIR/conf/lic_cache.C. This imports the NGX
licenses from the cache file to the CMA Repositories of every CMA.
7 Perform the software upgrade to NGX on the enforcement module machine(s).
8 Connect to the MDS using the SmartUpdate component of the MDG, and for
each CMA, delete all obsolete licenses from NGX gateways.
3 Copy the licenses from this machine to a file using one of the following methods.
On SecurePlatform, run the command in expert mode:
EITHER run the following command line tool at the offline target machine:
license_upgrade export -z <package_file>
The export command packs all licenses on the machine into a single package file.
OR
Use the [U] wizard mode option.
4 Copy the output file package (containing the licenses) from the offline target
machine to any online machine. The online machine does not need to be a Check
Point-installed machine.
5 Copy the license_upgrade tool to the online machine.
6 EITHER run the command line tool at the online machine:
• If the online machine is directly connected to the User Center, run:
license_upgrade upgrade -i <input_file> -c <cache_file>
• If the online machine is connected to the User Center via a proxy:
license_upgrade upgrade -y <proxy:port> -i <input_file> -c
<cache_file>
Where <input_file> is the package file that is the result of step 3. This fetches
new CMA licenses from the User Center and puts them in a cache file.
OR
Use the [O] wizard mode option.
Specify the package file package that is the result of step 3 and the requested
cache file. This fetches new licenses from the User Center and puts them in a cache
file.
7 Copy the cache file (with the new CMA licenses) to the offline target machine.
8 EITHER run following command line on the offline target machine:
license_upgrade import -c <cache_file>
OR
Use the [U] wizard mode option.
9 Upgrade the software on the MDS.
10 Start the MDS services by running
mdsstart
142
License Upgrade for a Single CMA
11 Import new licenses of all CMAs into the NGX CMA Repositories. Run the
command
pv1_license_upgrade import -c <cache file name>
12 Connect to the MDS using the SmartUpdate component of the MDG, and for
each CMA, delete all obsolete licenses from NGX gateways.
2 Copy the licenses from this machine to a file using one of the following command.
On SecurePlatform, run the following command in expert mode.
EITHER run the following command line tool at the offline MDS:
license_upgrade export -z <package_file>
OR use the [U] wizard mode option.
The export command packs all licenses on the machine into a single package file.
3 Copy the output file package (containing the licenses) from the offline MDS to any
online machine. The online machine does not need to be a Check Point-installed
machine.
4 Copy the license_upgrade tool to the online machine. The tool is located at
<Specific_platform> on the NGX CD, and in the Check Point Download site at
http://www.checkpoint.com/techsupport/ngx/license_upgrade.html.
5 EITHER run the command line tool at the online machine:
• If the online machine is directly connected to the User Center, run:
license_upgrade upgrade -i <input_file> -c <cache_file>
• If the online machine is connected to the User Center via a proxy:
license_upgrade upgrade -y <proxy:port> -i <input_file> -c
<cache_file>
Where <input_file> is the package file that is the result of step 2. This fetches
new CMA licenses from the User Center and puts them in a cache file.
OR use the [O] wizard mode option.
Specify the output file package that is the result of step 2. This fetches new CMA
licenses from the User Center and puts them in a cache file.
6 Copy the cache file (with the new CMA licenses) to the MDS machine.
144
License Upgrade for a Single CMA
10 Import new licenses of this CMA into the NGX CMA Repositories. Run
mdsenv <cma name>)
Then, EITHER run following command line on the offline target machine
license_upgrade import -c <cache_file>
OR use the [U] wizard mode option.
11 Perform the software upgrade to NGX on the enforcement module machine(s).
12 Connect to the MDS using the SmartUpdate component of the MDG, and for
each CMA, delete all obsolete licenses from NGX gateways.
146
Troubleshooting License Upgrade
In This Section
Cause
The way to generate the CMA Pro Add-on licenses in the User Center is as follows:
1 Perform the Activate License operation on the Pro bundled product, using the IP
address of the first CMA, to generate the license for this CMA. For each additional
CMA, perform the Change IP operation on the bundled product, and change to the
IP address of this CMA.
2 Install each generated license on its respective CMA.
3 At the end of the license generation process, the User Center shows a license with
the IP address of the last CMA for which the Change IP operation was performed.
Only this last license is upgraded by the license upgrade process.
Resolution
148
Troubleshooting License Upgrade
Cause
One license for the Provider-1 CMA product in TABLE 7-10 (to be installed on the
CMA), that specifies the size of the VS cluster that the CMAs are allowed to manage.
A license for a VS cluster of 1 Gateway allows the CMA to manage one VS, A license
for a VS cluster of 2 Gateways allows the CMA to manage a cluster of two VSs, and so
on.
TABLE 7-10 Provider-1 CMA
Provider-1 CMA (Primary CMA)
Gateways Version Part Number
1 NG CPPR-CMA-1-NG
2 NG CPPR-CMA-2-NG
4 NG CPPR-CMA-4-NG
The way to generate the Provider-1 CMA product licenses in the User Center is as
follows:
1 Perform the Activate License operation on the Provider-1 CMA product, using the
IP address of the first CMA, to generate the license for this CMA. For each
additional CMA, perform the Change IP operation on the bundled product, and
change to the IP address of this CMA.
2 Install each generated license on its respective CMA.
3 At the end of the license generation process, the User Center shows a license with
the IP address of the last CMA for which the Change IP operation was performed.
Only this last license is upgraded by the license upgrade process.
Resolution
150
Troubleshooting License Upgrade
In-place Upgrade
The in-place upgrade process takes place on the existing MDS machine. The MDS
with all CMAs are upgraded during a single upgrade process.
License upgrade is also required. Provider-1/SiteManager-1 NGX with licenses from
previous versions will not function. It is therefore highly recommended to upgrade all
Provider-1/SiteManager-1 NG licenses to NGX before upgrading software to NGX.
Note - When upgrading Provider-1 to NGX R60, all SmartUpdate packages on the MDS
(excluding SofaWare firmware packages) are deleted from the SmartUpdate Repository.
152
In-place Upgrade
5 Follow the steps of the license upgrade procedure prior to the MDS software
upgrade that are detailed in “License upgrade of Entire System Before Software
Upgrade” on page 133. Follow the procedure for an online MDS or an offline
MDS, as applicable.
6 Perform the in-place upgrade using mds_setup (see “Installation Script” on
page 114).
7 Follow the steps of the license upgrade procedure after the MDS software upgrade
that are detailed in “License upgrade of Entire System Before Software Upgrade”
on page 133. Follow the procedure for an online MDS or an offline MDS, as
applicable.
8 After the upgrade completes, retest using the sub-steps in step 3 above.
154
Gradual Upgrade to Another Machine
Note - The target machine should be on an isolated network segment so that modules
connected to the original MDS are not affected until you switch to the target machine.
3 Restore the MDS on the target machine. Copy the file created by the backup
process to the target machine and run mds_restore, or run mds_setup and select
the Restore option.
4 If your target machine and the source machine have different IP addresses, follow
the steps listed in “IP Address Change” on page 171” to adjust the restored MDS
to the new IP address. If your target machine and the source machine have different
interface name (e.g. hme0 and hme1), follow the steps listed in “Interface Change”
on page 172 to adjust the restored MDS to the new interface name.
5 Test to confirm that the replication has been successful:
a) Start the MDS.
b) Verify that all CMAs are running and that you can connect to the MDS with
MDG and Global SmartDashboard.
c) Connect to CMAs using SmartDashboard.
6 Upgrade your MDS. Stop the MDS on the target machine and employ an In-Place
Upgrade (see “In-place Upgrade” on page 152 for further information).
Upgrade steps
1 Install MDS of the target version onto the target machine.
2 Follow the steps of the license upgrade procedure prior to the software upgrade of
the MDS that are detailed in “License upgrade of Entire System Before Software
Upgrade” on page 133. Follow the procedure for an online MDS or an offline
MDS, as applicable.
3 Copy the following file to the target MDS:
$CPDIR/conf/lic_cache.C
At this point all NGX version CMA and MDS licenses reside in cp.license, and all
licenses appear in the cache.
4 On the target MDS, create a customer and CMA but do not start the CMA.
5 Use the migrate_assist utility to copy the CMA directories and files for each
CMA from the source machine to the destination machine. For further information
see “migrate_assist” on page 119. This process transfers the NGX licenses for both
the CMA and the CMA Repository.
6 Start the CMA. Run the commands
mdsenv
mdsstart
7 Import licenses that were upgraded to the CMA database from the cache file copied
from the NG version MDS. Run:
pv1_license_upgrade import -c <cache file name>
If not all licenses were successfully upgraded on the version NG MDS, perform the
license upgrade for a single CMA, either “When MDS is Online, After Software
Upgrade” on page 143, or “When MDS is Offline, After Software Upgrade” on
page 144.
8 Use migrate_global_policies to import the global policies.
156
Gradual Upgrade to Another Machine
1 Global VPN community setup involves the Global database and the CMAs that are
managing gateways participating in the global communities. When gradually
upgrading a GVC environment split the upgrade into two parts:
• one for all the CMAs that do not participates in the GVC and
• one for CMAs that do.
2 If some of your CMAs have already been migrated and some have not and you
would like to use the Global Policy, make sure that it does not contain gateways of
non-existing customers. To test whether you have non-existing customers, assign
this Global Policy to a customer. If the assignment operation fails and the error
message lists problematic gateways, you have at least one non-existing customer. If
this occurs:
A Run the where used query from the Global SmartDashboard > Manage >
Network Objects > Actions to figure out where the problematic gateway(s) are
used in the Global Policy. Review the result set and edit or delete list items as
necessary. Make sure that no problematic gateways are in use.
B The gateways must be disabled from global use:
i From the MDG’s General View, Right Click on a gateway and select
Disable Global Use.
ii If the globally used gateway refers to a gateway of a customer that was not
migrated, you can remove the gateway from the global database by issuing
a command line command. First make sure that the Global
SmartDashboard is not running, then execute the command:
mdsenv; remove_globally_used_gw <Global name of the gateway>
Terminology
Stand Alone Gateway (SGW) - management and module installed on the same host.
ModuleA - the module on Machine A during and after the separation procedure.
Machine A - the machine on which the SGW is installed.
Machine B - the machine on which the MDS is installed (with the target CMA).
Note - If you want the option to later undo the separation process, backup your SGW before
migrating.
Note - This procedure also covers cases where the SGW manages additional modules other
than itself.
158
Migrating from a Standalone Installation to CMA
machine steps
Prepare SGW for Export
Machine A 1 Make sure that:
AFTP access is allowed from Machine B
(machine on which the MDS is installed with
the target CMA) to Machine A (machine on
which SGW is installed). This is only necessary
if you plan to use migrate_assist.
B CMA (On Machine B) will be able to
communicate with and install policy on all
managed modules.
2 Add an object representing the CMA (name and IP
address) and define it as a Secondary SmartCenter
Server.
3 Install policy on all managed gateways.
4 Delete all objects or access rules created in steps 1
and 2.
5 If the SGW has VPN-1 installed:
A Uncheck VPN-1 from the Check Point
Products section of the SGW object. You may
have to first remove it from the Install On
column of your rulebase (and then add it
again).
B If the SGW participates in a VPN-1
community: in the VPN tab, remove it from
the community and erase its certificate. Note
these changes in order to undo them after the
migration.
6 Save and close SmartDashboard. Do not install
policy.
TABLE 7-11 Migrating from Stand Alone to CMA from NG forward (Continued)
machine steps
Export the management database from Machine A and import it to CMA
on the MDS on Machine B
Machine B 1 Run the migrate_assist <SGW_NAME>
(cont...) <SGW_FWDIR> <username> <password>
<target_dir> <SGW_CPDIR> command. Do not
forget to supply the last parameter <SGW_CPDIR>,
this parameter is mandatory when running
migrate_assist on NG.
160
Migrating from a Standalone Installation to CMA
TABLE 7-11 Migrating from Stand Alone to CMA from NG forward (Continued)
machine steps
3 Create an Object representing moduleA (From New
> Check Point > Gateway):
A Assign a Name and IP address for moduleA.
B Select the appropriate Check Point version.
C Check the appropriate Check Point Products
you have installed.
D If the Object previously belonged to a VPN-1
Community, add it back.
E Do not initialize communication.
4 Run Where Used on the primary Management
Object and in each location, consider changing to
the gateway object (moduleA).
5 Install Policy on all modules, except for moduleA.
You may get warning messages about moduleA
because it is not yet configured. Ignore these.
Reinstall module on Machine A and prepare for SIC with the CMA
Machine A 1 Uninstall the SGW.
2 Install the module.
Start managing moduleA from CMA
Machine B 1 Re-establish trust with moduleA.
2 Define moduleA’s topology in the CMA
SmartDashboard.
3 Install the Policy on moduleA.
4 Use the vi text editor to manually edit the objects_5_0.C file in the $MDSDIR/
conf/mdsdb/ directory.
6 Edit the value and change it from true to false. For example:
:use_sites (false)
162
Pre-Upgrade Verification and Tools
In This Section
2 Upgrade all container MDSes. Each container MDS that you upgrade is managed
from the already upgraded manager MDS.
3 Upgrade your second manager MDS.
Following these steps promises continuous manageability of your container MDS.
While containers do not accept SmartCenter connections, the CMAs on the container
MDSes do. This means that even if you cannot perform global operations on the
container MDS you can still connect to the CMAs that reside on it.
3 If the pre-upgrade verifier requires a modification to the global database, then after
modifying the global database, all other MDSes should be synchronized.
4 If this modification affects a global policy that is assigned to customers, then the
global policy should be reassigned to the relevant customers, in order to repair the
error in the CMA databases.
5 If a modification is required at the CMA level, then if it exists after modifying the
CMA database, synchronize the mirror CMA. If the customer also has a CLM (on
MLM) then install the database on the CLM to verify that the modification is
applied to the CLM as well.
Note - When synchronizing, make sure to have only one active MDS and one active CMA for
each customer. Modify the active MDS/CMA and synchronize to Standby.
164
Upgrading an NG with Application Intelligence Multi-MDS System
If the CMA identifies the CLM version as earlier then the current CLM version, the
following scenario will take place:
• A complete database installation from the CMA on the CLM will not take place
and as result, resolving IP addresses and services by the CLM will not be executed
completely.
In order to update the CLM/CMA objects to the most recent version, please verify that
all active CMAs are up and running with valid licenses and that SmartDashboard is not
connected. At this time, the following should be run on each MDS after upgrading all
MLMs/MDSs: mdsenv
To update all CLM/CMA objects, run:
$MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL
To update CLM/CMA objects that are located on a specific MLM/MDS, (in case other
MDSs were not upgraded yet), run:
$MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL -n <MLM/MDS name>
Likewise, perform these steps if you want to migrate your current High Availability
environment to a CMA High Availability on a different MDS. At this point, continue
with a High Availability deployment (refer to the High Availability chapter in the Check
Point Provider-1/SiteManager-1 User Guide).
166
Restoring your Original Environment
Renaming Customers
In This Section
Previous Provider-1 versions allowed customer names or CMA names in Check Point
2000 to contain illegal characters, such as spaces and certain keyword prefixes. In NG
with Application Intelligence, all customer names must adhere to the same restrictions
as CMA names or any other network objects.
High-Availability Environment
In an MDS High Availability environment, non-compliance is detected on the first
MDS you upgrade. The mds_setup utility identifies non-compliant names as more than
a single MDS. Since this is non-compliant, an error message is issued.
Note - Nothing will be changed in the existing installation when translating customer names.
Any changes are applied only to the upgraded installation.
Translation prompt - Enter a name to replace the non-compliant name, or enter the
'-' sign to get a menu of additional options. The new name is checked for naming
restrictions compliance and is not accepted until you enter a compliant name.
168
Advanced Usage
Return to translation prompt - Choose this option if you want to return to the
customer name you were prompted with when you entered '-'.
Note - The pre-upgrade tool allows only non-compliant customer names to be translated.
If the session is exited before all the translations are done, the mds_setup utility exits
with an error message stating that the MDS verification failed. To return to the tool,
simply run mds_setup again and choose Option 2 - Upgrade to NGX.
High-Availability
After completing the translations on the first MDS, copy the following files to the other
MDSes. If the MDSes are properly synchronized, no additional work will be required
on them.
Files to be copied:
/var/opt/CPcustomers_translated.txt
/var/opt/CPcustomers_translated.md5
When running the tool a second time, the customer names that were already translated
will be shown before the first non-compliant name is displayed. This will also be the
case when running on an additional MDS.
Advanced Usage
An advanced user may choose to directly edit the translation file,
/var/opt/CPcustomers_translated.txt. In this case, all the translations will be
verified when mds_setup is run again.
Translations file format - The file is structured line-wise. Each line's meaning is
indicated by its first character. An empty line is ignored. Any line that does not obey
the syntax causes the file to be rejected with an appropriate message.
TABLE 7-12 Line Prefixes
170
IP Address Change
IP Address Change
If your target machine and the source machine have different IP addresses, please follow
the steps listed below in order to adjust the restored MDS to the new IP address:
1 The MDS must be stopped. Stop the MDS by running mdsstop.
2 Change the IP address in $MDSDIR/conf/LeadingIP file to the new IP address.
3 Edit the $MDSDIR/conf/mdsdb/mdss.C file. Find the MDS object that has the
source MDS IP address and change its IP address to the new IP address. Do not
change the name of the MDS.
4 Due to the change of IP address install a new license on the target MDS with the
new MDS IP address.
5 For multiple MDS/MLM environments repeat steps 1 to 4 for the MDS/MLM for
which you changed the IP, on each MDS/MLM.
Interface Change
If your target machine and the source machine have different interface name (e.g. hme0
and hme1), follow the steps listed below in order to adjust the restored MDS to the new
interface name:
1 Change the interface name in file $MDSDIR/conf/external.if to the new interface
name.
2 For each CMA replace the interface name in $FWDIR/conf/vip_index.conf . For
example if this is an NG FP3 installation and you have a CMA named cma1, edit
/opt/CPmds-53/customers/cma1/CPfw1-53/conf/vip_index.conf .
172
CHAPTER 8
Upgrading SmartLSM
ROBO Gateways
In This Chapter
173
Adding a ROBO Gateway Upgrade Package to SmartUpdate Repository
174
License Upgrade on Multiple ROBO Gateways
6 Add those licenses that are Assigned to this ROBO from the SmartLSM License
Repository to the Licenses window. You can do this by performing one of the
following two options. The first way is easier:
• Click Add these licenses to the list.
• Click Add, and then select those licenses that are Assigned to this ROBO.
The added Assigned licenses are shown grayed-out because they are not yet Attached.
7 Click OK to Attach the Assigned Licenses to this ROBO.
At this point the ROBO Gateway will have both NG and NGX licenses. The
Licenses window shows that the NGX license is Attached, and the NG license is
Obsolete, which means that it is no longer needed. The NG license is useful
because if you need to downgrade the Gateway version, the Gateway will keep on
working.
8 Repeat from step 5 for each ROBO Gateway.
• The Specific Install method can be used when you want to install a specific
product on a ROBO Gateway.
Full Upgrade
1 From SmartLSM, select the line representing the VPN-1 Express/Pro ROBO
Gateway that you want to upgrade.
2 Select Actions > Packages > Upgrade All Packages. This selection can also be done
through the right-click menu, or the Upgrade All Packages icon in the toolbar.
3 The Upgrade process begins with a verification stage, checking which version is
currently installed on the gateway, and whether the required packages exist in your
Package Repository. When it completes, a Verification Details dialog box opens,
showing you the verification results.
4 Select the Change to a new Profile after upgrade checkbox, and select the
appropriate new SmartLSM Profile from the list.
5 Check the Allow reboot if required checkbox.
6 Click the Continue button.
7 The Upgrade process begins. Its stages and completion status can be seen in the
Action Status pane, at the bottom of SmartLSM. The entire progress report can be
seen at any time by viewing the Action History (right-click on the respective line in
the Action Status pane, and select Action History).
Specific Installation
1 In SmartLSM, select the line representing the VPN-1 Express/Pro ROBO Gateway
you want to upgrade.
2 Select Actions > Packages > Get Gateway Data to fetch information about Packages
currently installed on the VPN-1 Express/Pro ROBO Gateway.
3 Select Actions > Packages > Distribute Package… This selection can also be done
through the right-click menu, or the Distribute Package… icon in the toolbar.
The Distribute Package window appears. This window displays the relevant
packages from the Package Repository that can be installed on your VPN-1
Express/Pro ROBO Gateway.
4 In the Distribute Package window select the package you want to install.
You can then select one of the following actions:
• Distribute and install packages
176
Upgrading a VPN-1 Edge ROBO Gateway
Note - If you are doing a step-by-step upgrade, do not check the Allow Reboot if
required checkbox.
6 If the operating system is SecurePlatform, you can select Backup image for
automatic revert, if the installation does not succeed.
7 The option Change to a new profile after install lets you select the SmartLSM
Profile that will be assigned to the Package upon installation. When upgrading the
VPN-1 Express/Pro ROBO Gateway, you must provide a suitable SmartLSM
Profile from the target version. If you are installing a package that does not require
changing the SmartLSM Profile of the VPN-1 Express/Pro ROBO Gateway, this
field will remain disabled.
8 Click the Start button.
9 The Install process begins. Its stages and completion status can be seen in the Action
Status pane, at the bottom of SmartLSM. The whole progress report can be seen at
any time by viewing the Action History (right click on the respective line in the
Action Status pane, and select Action History).
Note - You can always verify if the installation will succeed before actually upgrading the
ROBO Gateway by choosing Actions > Packages > Verify Installation.
3 Select the Use the following firmware option, select the desired firmware from the
list, and Click OK. The VPN-1 Edge ROBO Gateway will fetch and install the new
firmware the next time it automatically checks for updates. In order for the
firmware upgrade to take effect immediately, please restart the ROBO Gateway by
selecting Actions > Restart gateway
2 From the Version menu select the new version of the upgraded gateway.
3 From the Profile menu select a new SmartLSM Profile for the upgraded gateway.
4 Click OK to close the dialog.
5 The policy and properties of the new SmartLSM Profile will be applied on the
ROBO Gateway the next time it automatically checks for updates. In order for the
SmartLSM Profile change to take effect immediately, please restart the ROBO
Gateway by selecting Actions > Restart Gateway.
178
SmartLSM Upgrade Tools
LSMcli
The LSM Command Line Interface (LSMcli) is an alternative to SmartLSM. LSMcli
provides the ability to perform SmartLSM operations from a command line or through a
script. It also allows you to upgrade a ROBO Gateway. When used in scripts it allows
you to perform batch upgrades.
The LSMcli tool is contained in the SmartCenter installation package on the
SmartCenter Server machine. It can be run either on your SmartCenter Server, or it
can be copied to and run on another host with the same operating system. The host
does not need to be a Check Point-installed machine, but it must be:
• Defined on the SmartCenter Server as a GUI Client.
• Of the same Operating System as the SmartCenter Server.
• Reachable through the network from the SmartCenter Server.
For general usage and help, type the command LSMcli --help.
The LSMcli command line arguments are fully described in the Command Line Reference
chapter of the SmartLSM Guide. A partial list of arguments is shown in TABLE 8-1,
which lists only the arguments that are important for performing upgrades.
TABLE 8-1 LSMcli Command line arguments for upgrades
argument meaning...
-d (Optional) Run the command with debug output.
Server The IP or hostname of the SmartCenter Server.
User The username and password of a SmartCenter Administrator.
Password
ROBO The name of the ROBO Gateway to be upgraded.
-F Firmware The firmware version of the VPN-1 Edge ROBO Gateway.
argument meaning...
-P=Profile (Optional) The SmartLSM Profile name the ROBO Gateway
will be mapped to after a successful upgrade.
You must specify the new SmartLSM Profile when upgrading
the VPN-1 version. This is not necessary when installing
Hotfixes or other packages.
-boot (Optional) Use this option only when upgrading VPN-1 Pro. If
you do not use this option, manually reboot the gateway from
its console.
-DoNotDistribute (Optional) Install previously distributed packages.
Product To see the list of all packages available in the repository, use the
Vendor ShowRepository LSMcli command.
Version
SP (The usage of this command is described in the SmartLSM
User’s Guide).
Export
The export tool is located in your SmartLSM application, File > Export to File. Use
this tool to export a ROBO Gateway’s properties into a text file that you can turn into
a script in order to perform batch upgrades.
To see which product packages are available in your package repository, execute:
LSMcli [-d] <Server> <User> <Password> ShowRepository
180
Upgrading a VPN-1 Edge ROBO Gateway Using LSMcli
To view a list of packages that can be installed on a specific ROBO gateway, execute:
LSMcli [-d] <Server> <User> <Password> GetCandidates <ROBO>
Note - It is recommended to use the Full Upgrade method to upgrade VPN-1 Express/Pro
ROBO Gateways.
Where:
MyServer = the name of my SmartCenter Server.
John = the administrator’s name.
mypassword = the administrator’s password.
VerifyUpgrade = the Full Upgrade verification command.
Upgrade = the Full Upgrade command.
ROBO17 = the VPN-1 Express/Pro ROBO Gateway to be upgraded.
MyNewProfile = the new SmartLSM Profile that ROBO17 will be mapped to after
the upgrade.
Where:
MyServer = the name of my SmartCenter Server.
John = the administrator's name.
mypassword = the administrator's password.
ModifyROBO VPN1Edge = the command to modify a property on a VPN-1 Edge
ROBO gateway.
ROBO101 = the Edge ROBO Gateway to be upgraded.
EdgeNewProfile = the new SmartLSM Profile that ROBO101 will be mapped to
after the upgrade (optional).
4.0.23 = the name of the new Firmware package.
Restart = the command to restart the gateway.
182
Using the LSMcli in Scripts
For example:
LSMcli MyServer John mypassword AttachAssignedLicenses VPN1 ROBO17
LSMcli MyServer John mypassword AttachAssignedLicenses VPN1 ROBO18
LSMcli MyServer John mypassword AttachAssignedLicenses VPN1 ROBO19
184
CHAPTER 9
Upgrading VSX
SmartCenter
Management
In This Chapter
185
Before You begin
License Upgrade
To upgrade the SmartCenter to NGX R60, you must first upgrade licenses for all NG
products. a SmartCenter of version NGX R60 with licenses from previous versions will
not function.
It is highly recommended to upgrade licenses before upgrading the software. If
necessary, license upgrade can be done after the software upgrade. See “Upgrading
VPN-1 Pro/Express Licenses” on page 19 for details.
Pre-Upgrade Verification
During basic or either of the two phases of advanced upgrades, a pre-upgrade
verification is automatically performed. If you prefer, you can run the pre-upgrade
verification from the CD separately from the upgrade in order to prepare yourself for
your upgrade. Pre-upgrade verification provides you with a report. Three types of
results can be displayed in the report and are listed below.
Usage:
186
Tools for Upgrading a SmartCenter
Duplicated Objects
--------------------------------------------------------------------------------
Warnings: It is recommended to resolve the following problems.
Description: From FP3 we have centralized the cluster data. Many attributes that were
taken from the members are now taken from the cluster object.
Impacts: In the upgrade process the cluster data will be taken from one of the cluster
members, if the data is not similar on all members it can lead to problems.
To do: Make sure that all members of a cluster are identical. Make sure the following
attributes appear: SYNDefender properties, Authentication properties (next http proxy
configuration), SAM properties, NAT IP Pools properties, SMTP properties.
Information Messages
Items that should be noted.
188
Upgrading VSX NG AI R2 to NGX R60 SmartCenter
6 Access the upgrade tools folder in the following location using the following
command:
cd $FWDIR/bin/upgrade_tools
7 Copy gtar and gzip from /bin to current the folder using the following commands:
cp /bin/gtar .
cp /bin/gzip .
10 Transfer the file (<file name>) to a remote location for future use.
190
Export and Import Commands
4 Access the upgrade tools folder in the following location using the following
command:
cd $FWDIR/bin/upgrade_tools
5 Run the upgrade export utility (see “Export Usage” on page 191) using the
following command:
./upgrade_export <filename>
6 Transfer the file (<file name>) to a remote location for future import usage.
Export Usage
upgrade_export [-d] [-h] [-v] <exported file path>
Where:
<exported file path> - the path to export the configuration file (default-local path)
-d - prints debug information
-h - prints this usage
-v - prints the version
Import Usage
upgrade_import [-d] [-h] <path>
Where:
<path> - The location of the exported file
-v - Prints the version
-d - Prints debug information
-h - Prints this usage
192
Index
A G mds_setup 167
migrate_assist 119
migrate_global_policies 119
Administrators 155 Global Communities 157 Migrating 158
Authentication properties 187 Global Policy 157 migration process 58
Global VPN Communities 156 Minimal Effort Upgrade 71, 99
MLM 164
Multi-MDS environments 163
B MVS 16
H
backup 47
Backup and Restore 120
backups of system settings 47
High Availability 60, 152, 163
High-Availability 169 N
backward compatibility 14
Nokia clustering 101
Nokia OS 72
I
C
Check Point Gateway 15
Import and Export tools 191
In Place Upgrade 16 O
CLM 115, 164 Internal Certificate Authority 118
Clustered deployment 71 IPSO Platform 65, 81, 93 Operation Status 74
ClusterXL 16, 99 OPSEC 72, 73, 98
CMA 115, 118, 120, 154, 155, 160,
164, 172
cma_migrate 117 L
cprid 74
CRL 118
P
License Repository 21
License Upgrade 21 Package Repository 15, 176
License_upgrade 22 patch command 63, 78, 91
E Licensing
Web Intelligence 56
Performance Pack 72
Plug & Play 174
Local Upgrade 71 PolicyServer 72
Enforcement Module 15, 55, 58 LSM 16 Pre-upgrade utilities 166
Enforcement Modules 75 LSMcli commands 179 Pre-Upgrade verification 58, 86
errors 88, 187 Pre-upgrade verification 59
Evaluation licenses 38 pre-upgrade verification 61, 76, 87,
Eventia Reporter 72 89, 114, 163, 164, 186
Expert mode 63, 77
expert mode 190
M Pre-Upgrade Verifier 114
Products 57
Provider-1/SiteManager-1
MD5 checksum 63, 78 upgrade 110
MDS 114, 115, 120, 121, 155, 160,
F 171
MDS environment 162
FQDN 118
MDS High Availability 168
MDS services 162 Q
FTP access 159 mds_backup 121
mds_remove 167 QoS 72
193
R
R V
release notes link 12 Virtual Routers 16
remote upgrade 174 Virtual System 16
restore 47 VPN distributed deployment 55
ROBO Gateway 173, 175, 177 VPN-1 distributed deployment 85
ROBO Gateways 16 VPN-1 Edge Firmware package 174
ROBO Profile 16 VPN-1 Pro Enforcement
Modules 72
VPN-1 Pro Server 89
VSX Clustering 16
S VSX Gateway 16, 185
T
TFTP 47, 49
The Full Upgrade method 175
The Specific Install method 176
Translation prompt 168
U
Uninstalling 158
upgrade_export 190
UserAuthority 72
UserAuthority Server 72
194