CP R80.10 Installation and Upgrade Guide
CP R80.10 Installation and Upgrade Guide
CP R80.10 Installation and Upgrade Guide
INSTALLATION AND
UPGRADE GUIDE
R80.10
Protected
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date
with the latest functional improvements, stability fixes, security enhancements and
protection against new and evolving attacks.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
mailto:cp_techpub_feedback@checkpoint.com?subject=Feedback on Installation and
Upgrade Guide R80.10 .
24 July 2018 Removed: All references to IP Series appliances, because they are not
supported by R80 and above.
Added: Feedback link in the WEB guide, at the bottom of each page.
Terms
The Check Point Security Gateway and
Security Management Server products are
deployed on different computers.
Administrator
Domain
A SmartConsole user with permissions to
A network or a collection of networks related
manage Check Point security products and
to an entity, such as a company, business
the network environment.
unit or geographical location.
ClusterXL
Domain Log Server
Cluster of Check Point Security Gateways
A log server for a specified Domain. It stores
that work together in a redundant
and processes logs from Security Gateways
configuration. The ClusterXL both handles
that are managed by the corresponding
the traffic and performs State
Domain Management Server.
Synchronization.
These Check Point Security Gateways are Domain Management Server
installed on Gaia OS:
A virtual Security Management Server that
• Up to 5 cluster members are supported in manages Security Gateways for one Domain,
ClusterXL. as part of a Multi-Domain Security
Management environment.
• Up to 2 cluster members are supported in
VRRP cluster.
Global Policy
• Up to 13 cluster members are supported
All Policies defined in the Global Domain that
in VSX VSLS cluster.
can be assigned to Domains, or to specified
Note - In ClusterXL Load Sharing mode, groups of Domains.
configuring more than 4 members
significantly decreases the cluster ICA
performance due to amount of Delta Sync. Internal Certificate Authority - A component
on Check Point Management Server that
Database Migration
issues certificates for authentication.
Process of:
Multi-Domain Log Server
1. Installing the latest Security Management
Server or Multi-Domain Server version A Check Point computer that runs Check
from the distribution media on a separate Point software to store and process logs in
computer from the existing Security Multi-Domain Security Management
Management Server or Multi-Domain environment. The Multi-Domain Log Server
Server consists of Domain Log Servers that store
2. Exporting the management database and process logs from Security Gateways
from the existing Security Management that are managed by the corresponding
Server or Multi-Domain Server Domain Management Servers.
Package Repository
A SmartUpdate repository on the Security
Management Server that stores uploaded
packages. These packages are then used by
SmartUpdate to perform upgrades of Check
Point Gateways.
Security Gateway
A Check Point computer that runs Check
Point software to inspect traffic and enforces
Security Policies for connected network
resources.
Security Policy
A collection of rules that control network
traffic and enforce organization guidelines
for data protection and access to resources
with packet inspection.
SmartConsole
A Check Point GUI application used to
manage security policies, monitor products
and events, install updates, provision new
devices and appliances, and manage a
multi-domain environment and each domain.
Getting Started
CHAPTE R 1
Getting Started
In This Section:
Welcome ........................................................................................................................12
R80.10 Documentation .................................................................................................12
For New Check Point Customers ................................................................................13
Disk Space .....................................................................................................................13
Product Deployment Scenarios ...................................................................................14
Installing and Upgrading with CPUSE .........................................................................15
Welcome
Thank you for choosing Check Point Software Blades for your security solution. We hope that you
will be satisfied with this solution and our support services. Check Point products provide your
business with the most up to date and secure solutions available today.
Check Point also delivers worldwide technical services including educational, professional, and
support services through a network of Authorized Training Centers, Certified Support Partners,
and Check Point technical support personnel to ensure that you get the most out of your security
investment.
For additional information on the Internet Security Product Suite and other security solutions, go
to: http://www.checkpoint.com or call Check Point at 1(800) 429-4391. For additional technical
information, visit the Check Point Support center http://supportcenter.checkpoint.com.
Welcome to the Check Point family. We look forward to meeting all of your current and future
network, application, and management security needs.
R80.10 Documentation
This guide is for administrators responsible for installing R80.10 on appliances and open servers
that run the Gaia Operating System.
To learn what is new in R80.10, see the R80.10 Release Notes.
See the R80.10 Home Page SK http://supportcontent.checkpoint.com/solutions?id=sk111841 for
information about the R80.10 release.
Disk Space
When you install or upgrade R80.10, the installation or upgrade wizard makes sure that there is
sufficient space on the hard disk to install the Check Point products.
If there is not sufficient space on the hard disk, an error message is shown. The message states:
• The amount of disk space necessary to install the product.
• The directory where the product is installed.
• The amount of free disk space that is available in the directory.
To learn how to remove old Check Point packages and files, see sk91060
http://supportcontent.checkpoint.com/solutions?id=sk91060.
After there is sufficient disk space, install or upgrade the Check Point product.
Distributed Deployment - The Security Management Server (1) and the Security Gateway (3) are
installed on different computers or appliances, with a network connection (2).
Management HA - A Primary Security Management Server (1) has a direct or indirect connection
(2) to one or more Secondary Security Management Servers (3). The databases of the Security
Management Servers are synchronized, manually or on a schedule, to back up one another. The
administrator makes one Security Management Server Active and the others Standby. If the Active
Security Management Server is down, the administrator can make the Standby server Active.
Upgrade Limitations
• Personal files saved outside of the /home directories are erased during the upgrade process.
If you created a snapshot immediately before you upgraded, you can revert to the snapshot to
recover personal files saved outside of the /home directory.
• Open Servers that were upgraded from SecurePlatform to Gaia, cannot be upgraded. You can
update the version when you do a clean installation.
• Upgrading using Full Images:
• IP Series appliances are not supported.
• UTM-1 appliances are not supported.
• To upgrade the secondary Security Management Server of a Full High Availability
deployment, use the procedure in this guide for upgrading with a clean installation.
• The SSH key is not migrated to the new version.
• Mobile Access Software Blade custom configuration is not upgraded.
• Endpoint Policy Servers cannot be upgraded.
After you install the Gaia operating system, you must run the First Time Configuration Wizard.
The steps below walk you through how to install and configure a Check Point appliance, or an
Open Server.
Step 1: Install the operating system on the appliance.
• If you have a Check Point appliance, configure Gaia for the server.
• If you have an Open Server ("Installing the Gaia Operating System on an Open Server" on
page 23):
Configure the partition sizes on your computer ("Changing Gaia Partition Sizes Before
the Operating System Installs" on page 22).
Use the Installation Media to start the server.
Install Gaia on the server.
Configure the interfaces for the server.
Step 2: Connect to the Gaia Portal to configure the system with the First Time Configuration
Wizard ("Running the Gaia First Time Configuration Wizard" on page 18).
Step 3: Install SmartConsole ("Installing SmartConsole" on page 46).
Step 4: Configure your system and Security Policies.
• Configure a Standalone server ("Installing a Standalone" on page 27).
• Configure a Security Management Server.
• Configure a Security Gateway ("Installing Security Gateways" on page 31).
To install R80.10 on 2012 and 3000 series appliances that run an earlier version of
Gaia:
1. Download the Gaia Operating System ISO file from the R80.10 Home sk111841
http://supportcontent.checkpoint.com/solutions?id=sk111841.
2. See sk65205 http://supportcontent.checkpoint.com/solutions?id=sk65205 to create a USB
removable device.
3. Connect a computer to the console port on the front of the appliance through the supplied DB9
serial cable.
4. Connect to the appliance through a Serial connection, using these connection settings:
a) Connection type - Select or enter a serial port.
b) Define the serial port settings - 9600 BPS, 8 bits, no parity, 1 stop bit.
c) From the Flow control list, select None.
5. Connect the installation media to the USB port on the appliance.
6. Reboot the appliance. The appliance begins the boot process and status messages show in the
terminal emulation window.
For installation from a removable USB device - In the boot screen, enter serial at the boot
prompt and press Enter.
The R80.10 ISO file is installed on the appliance, and the version and build number show in the
terminal emulation window and on the LCD screen.
7. Reboot the appliance - Press CTRL+C.
The appliance reboots and shows the model number on the LCD screen.
To change the Management address before you run the First Time Configuration
Wizard:
1. Open a console connection.
2. Log in with the default username and password: admin and admin.
3. In Clish, get the name of the management interface: # show interfaces
4. Set the management IP address:
# set interface mgmt ipv4-address <IPv4 address> subnet-mask <mask>
5. Disable the static route to the default gateways that are not used:
# set static-route default nexthop gateway address <IPv4 address> off
6. Open a browser to the Gaia Portal and run the First Time Configuration Wizard.
To change the management IP address after you run the First Time Configuration
Wizard:
1. Open a browser to the Gaia Portal.
2. Open the Network Management > Network Interfaces window.
3. In the Management Interface view, click Set Management Interface.
The Management Interface window shows the interface that is configured as the management
interface.
4. In the Interfaces table, select the management interface and click Edit.
5. Change the IP address of the interface.
Note - This changes the settings of an interface to which the browser connected.
6. Click OK.
Installing a Standalone
Important - These instructions apply to Open Servers and Check Point appliances except Smart-1
appliances.
See the R80.10 Release Notes for the supported Check Point appliances and Open Server
requirements for a Standalone deployment.
You can configure a Check Point Standalone deployment using the Check Point First Time
Configuration Wizard ("Running the Gaia First Time Configuration Wizard" on page 18).
• Standard ("Configuring a Standalone Appliance in Standard Mode" on page 28) - Supported on
Check Point appliances, Open Servers, and VMs that meet the requirements listed in the
Release Notes.
• Quick Setup ("Configuring a Standalone Appliance in Quick Setup Mode" on page 30) - Installs
a Security Gateway and a Security Management Server on a single appliance in Bridge Mode.
Supported on Check Point appliances that support Standalone configuration.
For more on Gaia Quick Standalone Setup on appliances, see sk102231
http://supportcontent.checkpoint.com/solutions?id=sk102231.
See the R80.10 Release Notes.
3 Click Login.
The First Time Configuration Wizard starts and the Welcome screen shows.
Click Next.
4 In the Setup section of Deployment Options view, select Install a version available locally
on your device.
Click Next.
5 If the Available Releases view shows, select Continue with configuration of Gaia R80.10.
Click Next.
6 In the Authentication Details view, select Change the default administrator password.
Enter a strong password.
Click Next.
7a Enter the IPv4 address and Subnet mask of the management interface.
Note - You can leave the IP address and the subnet mask unchanged. It is the factory
default address or the latest address that the administrator configured.
7c In Configure IPv6, select On from the drop-down menu (by default, it is off), if you have
IPv6 in your environment.
7d Enter the IPv6 address and Subnet mask of the management interface.
Step Action
8 Optional: In the Internet Connection view, configure the interface to connect to the
Internet.
Click Next.
8b In Configure IPv4, select On from the drop-down menu (by default, it is off). Enter the IPv4
address and Subnet mask of the interface.
8c If you already assigned an IPv6 address, in Configure IPv6, select On from the drop-down
menu (by default, it is Off). Enter the IPv6 address and Subnet mask of the interface.
11 In the Products window, select both these products: Security Gateway and Security
Management Server.
11a If you configure Security Management in High Availability, define this server as Primary,
or Secondary.
If you configure a Dedicated Server, select SmartEvent or Log Server.
Click Next.
11b Optional: If you configure a Full High Availability cluster, select Unit is a part of a cluster
and select the cluster type ClusterXL.
If you have several clusters on the same network, enter the unique Cluster Global ID.
Click Next.
12 In the Security Management Administrator view, either Use Gaia administrator: admin or
define new log in credentials for the Security Management Server administrator account.
Click Next.
13 In the Security Management GUI Clients view, define which GUI clients can connect to the
Security Management Server.
Click Next.
Step Action
13a Note - For Check Point appliances only:
• Get a license automatically from the User Center https://usercenter.checkpoint.com and activate it, or use
the trial license.
• If there is a proxy server between the appliance and the Internet, enter its IP address and port.
• Click Yes to start the configuration process.
• A progress bar tracks the configuration of each task.
15 After the First Time Configuration Wizard completes and reboots the system, you can
download the SmartConsole from the Gaia Portal.
To change the minimum available disk space for Logs and indexes:
1. In SmartConsole, edit the Security Management Server or Log Server or SmartEvent network
object.
2. From the Gateways & Servers double-click an object. The Check Point Host window opens.
3. Click Logs > Storage.
4. Select When disk space is below <number> Mbytes, start deleting old files.
5. Change the disk space value.
6. Click OK.
Note - In a Multi-Domain Security Management environment, the disk space for logs and
indexes is controlled by the Multi-Domain Server, and applies to all Domain Management
Servers. Configure the disk space on the Multi-Domain Server object.
4. In the Management Connection page, set an IPv4 and an IPv6 address for the management
interface, or set one IP address (IPv4).
You can change the Management IP address. Gaia automatically creates a secondary interface
to keep connectivity when the management interface is not available. After you complete the
First Time Configuration Wizard, you can remove this interface in the Interface Management >
Network Interfaces page.
5. Optional: In the Connection to User Center page, configure an external interface to connect to
the Check Point User Center. Use this connection to download a license and activate it.
Alternatively, use the trial license. To connect to the User Center, you must also configure
DNS and (if applicable) a Proxy Server, in the Device Information page of the First Time
Configuration Wizard.
6. In the Device Information page, set the Host Name for the appliance.
Optional:
• Set the domain name, and IPv4 or IPv6 addresses for the DNS servers.
• To connect to the User Center, set the IP Address and Port for a Proxy Server. Do this if you
want to activate the appliance by downloading a license from the User Center.
Click Next.
7. In the Date and Time Settings page, set the date and time manually, or enter the hostname,
IPv4 address or IPv6 address of the NTP server.
Click Next.
8. In the Products page, select Multi-Domain Server and Primary.
For R77.10 and higher: Automatically download Blade Contracts and other important data.
Check Point highly recommends that you select Automatic Downloads (on page 152).
9. In the Security Management Administrator page, define the name and password of a
Superuser administrator that can connect to the Multi-Domain Server using SmartConsole
clients.
Click Next.
10. In the Multi-Domain Server GUI Clients page, define IP addresses from which SmartConsole
clients can log in to the Multi-Domain Server.
• If you select This machine or Network, define an IPv4 or an IPv6 address.
• You can also select a range of IPv4 addresses.
Click Next.
11. In the Appliance Activation page, get a license automatically from the User Center and
activate it, or use the 15 day trial license.
Click Next.
12. In the Summary page, review your choices. Click Finish.
Optional: Improve product experience by Sending Data to Check Point (on page 153).
13. To start the configuration, click Yes > OK.
A progress bar tracks the configuration of each task.
14. Download SmartConsole from the Gaia Portal.
a) In your web browser, connect to the Gaia Portal: https://<management_ip_address>
b) In the Overview page, click Download Now!
Post-Installation Configuration
You can use the Check Point configuration tool (cpconfig for Security Management Server or
mdsconfig for Multi-Domain Security Management) to configure settings after installation:
• Licenses and Contracts: Add or delete licenses for the Security Management Server and
Security Gateways.
• Administrators: Define administrators with Security Management Server access permissions.
These administrators must have Read/Write permissions to create the first Security Policy.
• GUI Clients: Define client computers that can connect to the Security Management Server
using SmartConsole clients.
Make sure that no firewall blocks port 19009 between the management server and
SmartConsole clients.
• Certificate Authority: Starts the Internal Certificate Authority (ICA), which makes connections
between the Security Management Server and Gateways. For Windows, you must define the
name of the ICA host. You can use the default name or define your own. The ICA name must be
in the host name.domain format, for example, ica.checkpoint.com.
• Fingerprint: Save the certificate fingerprint when you log in to SmartConsole clients for the
first time.
Installing SmartConsole
In This Section:
Logging in to SmartConsole.........................................................................................46
Troubleshooting SmartConsole ...................................................................................47
SmartConsole is a GUI client you use to manage the Check Point environment. For SmartConsole
requirements, see the R80.10 Release Notes.
You can download the SmartConsole installation package from:
• R80.10 Home Page SK http://supportcontent.checkpoint.com/solutions?id=sk111841
• Check Point Support Center http://supportcenter.checkpoint.com
• Gaia Portal of your Security Management Server or Multi-Domain Server.
Logging in to SmartConsole
To log in to SmartConsole:
1. Open the SmartConsole application.
2. Enter the IP address of resolvable hostname of the Security Management Server or
Multi-Domain Server.
The Management Server authenticates the connection when you log in for the first time.
Multiple administrators can be logged in at one time.
3. Enter your administrator credentials or select the certificate file.
4. Click Login.
5. If necessary, confirm the connection using the fingerprint generated during the installation.
You see this only the first time that you log in from a SmartConsole client computer.
Troubleshooting SmartConsole
Make sure the SmartConsole computer can access these ports on the Management Server:
• 18190
• 18264
• 19009
For more information, see:
• sk52421: Ports used by Check Point software
http://supportcontent.checkpoint.com/solutions?id=sk52421
• sk43401: How to completely disable FireWall Implied Rules
http://supportcontent.checkpoint.com/solutions?id=sk43401
High Availability
In This Section:
Understanding Full High Availability on Appliances ...................................................48
Installing Standalone Full High Availability on Gaia Appliances ................................49
Configuring Standalone Full High Availability on Appliances ....................................52
Configuring Management High Availability .................................................................55
For information on Cluster functionality, see the R80.10 ClusterXL Administration Guide
http://downloads.checkpoint.com/dc/download.htm?ID=54804.
For information Security Management Servers, see the R80.10 Security Management
Administration Guide http://downloads.checkpoint.com/dc/download.htm?ID=54842.
After you install the Gaia operating system on each appliance, configure Full High Availability.
First, use the First Time Configuration Wizard, then configure the ClusterXL High Availability
options in SmartConsole.
Note - SmartEvent Server and SmartReporter are not supported in Management High Availability
and ClusterXL Full High Availability environments. For these environments, install SmartEvent
Server and SmartReporter on dedicated machines. To learn more, see sk25164
http://supportcontent.checkpoint.com/solutions?id=sk25164.
Configure Monitor Mode on Security Gateway interfaces, to monitor traffic from a mirror port or
span port on a switch. Use Monitor Mode to analyze network traffic without changing the
production environment. The mirror port on a switch duplicates the network traffic and sends it to
the monitor interface on the gateway to record the activity logs.
You can use mirror ports:
• To monitor the use of applications as a permanent part of your deployment
• To evaluate the capabilities of the Application Control and IPS blades before you buy them
The mirror port does not enforce a policy or run active operations (prevent, drop, reject) on
network traffic. It can be used only to evaluate the monitoring and detecting capabilities of the
Software Blades. All duplicated packets that arrive at the monitor interface of the gateway are
terminated and will not be forwarded. The Security Gateway does not send traffic through the
monitor interface.
Item Description
1 Switch with mirror port
2 Computers
3 Servers
Note - Make sure that one mirror port on the switch is connected to one interface on the Security
Gateway.
To enable Monitor Mode on the Security Gateway from the Gaia Portal:
1. From the navigation tree, click Network Management > Network Interfaces.
2. Select the interface and click Edit.
3. Click the Ethernet tab and check Monitor Mode.
4. Click OK.
To enable monitor mode on the Security Gateway from the Gaia Clish:
# set interface <interface name> monitor-mode on
DLP Yes No
Best Practices:
1. Save a backup of your source system as the first step of an upgrade.
2. Save a second backup immediately after the Pre-Upgrade Verifier successfully completes with
no further suggestions.
3. Transfer the backup files and exported database files to external storage devices.
Snapshot options:
• Revert
• To a user created image.
• To a factory default image.
This is automatically created on Check Point appliances by the installation or upgrade
procedure.
• Delete an image from the local system.
• Export an existing image. This creates a compressed version of the image. You can download
the exported image to a different computer and delete the exported image from the Gaia
computer. This saves disk space.
Important! You must not rename the exported image. If you rename a snapshot image, it is not
possible to revert to it.
• Import an exported image.
• View a list of images that are stored locally.
Note - During the snapshot creation, all the system processes and services continue to run, and
the Security Policy enforcement does not get interrupted.
Snapshot Prerequisites
Before you create a snapshot image, make sure the appliance or storage destination meets these
prerequisites:
• To create the snapshot image requires free space on the disk. The required free disk space is
the size of the system root partition multiplied by 1.15.
Note - A snapshot image is created in unallocated space on the disk. Not all of the unallocated
space on a disk can be used for snapshots. To find out if you have enough free space for
snapshots:
a) Connect to the command line on the Security Management Server.
b) Log in to the Gaia Clish.
c) Run:
show snapshots
The output shows the amount of space on the disk available for snapshots. The value does not
represent all of the unallocated space on the disk.
• The free disk space required in the export file location is the size of the snapshot image
multiplied by two.
The minimal size of a snapshot image is 2.5GB. Therefore, the minimal necessary free disk
space in the export file location is 5GB.
To create a snapshot:
1. In the navigation tree, click Maintenance > Snapshot Management.
2. Click New.
The New Image window opens.
3. In the Name field, enter a name for the image.
Optional: In the Description field, enter a description for the image.
4. Click OK.
To restore a snapshot:
1. In the navigation tree, click Maintenance > Image Management.
2. Select a snapshot.
3. Click Revert.
The Revert window opens.
Note - Pay close attention to the warnings about overwriting settings, the credentials, and the
reboot and the image details.
4. Click OK.
To delete a snapshot:
1. In the navigation tree, click Maintenance > Snapshot Management.
2. Select a snapshot.
3. Click Delete.
The Delete Image window opens.
4. Click OK.
To export a snapshot:
1. In the navigation tree, click Maintenance > Snapshot Management.
2. Select a snapshot.
3. Check the snapshot size.
4. Make sure that there is enough free disk space in the /var/log/ partition:
a) Connect to the command line on Gaia.
b) Log in to Expert mode.
c) Run:
[Expert@HostName]# df -kh | egrep "Mounted|/var/log"
To import a snapshot:
To use the snapshot on another appliance, it has to be the same type of appliance you used to
export the image.
1. In the navigation tree, click Maintenance > Snapshot Management.
2. Click Import.
The Import Image window opens.
3. Click Browse to select the snapshot file for upload.
4. Click Upload.
5. Click OK.
Description
Manage system images (snapshots).
Syntax
• To create a new snapshot image:
add snapshot <Name of Snapshot> desc "<Description of Snapshot>"
Important - Reverting to the selected snapshot will overwrite the existing running
configuration and settings. Make sure you know credentials of the snapshot, to which you
revert.
• To show snapshot image information:
show snapshot <Name of Snapshot>
all
date
desc
size
show snapshots
Important - After you add, configure, or delete features, run the save config command to save
the settings permanently.
Parameters
Parameter Description
export <Name of Snapshot> Selects the snapshot image you export by the specified
name.
You must enter a string that does not contain spaces.
import <Name of Snapshot> Selects the snapshot image you import by the specified
name.
You must enter a string that does not contain spaces.
path <Path> Configures the path to the specified snapshot image file
(for example: /var/log/).
name <Name of Exported Snapshot> Configures the name, under which the exported
snapshot image file is stored on the hard disk.
You must enter a string that does not contain spaces.
name <Name of Imported Snapshot> Configures the name, under which the imported
snapshot image is stored on Gaia.
You must enter a string that does not contain spaces.
Example
gaia> add snapshot snap1 desc first_image_after_installation
Notes:
• You must not rename the exported image. If you rename a snapshot image, it is not possible to
revert to it.
• You can import a snapshot only on the same Gaia computer, from which it was exported.
Syntax add backup {local | tftp ip <ip> | {ftp | scp} ip <ip> username <name>
password plain}
Parameter Description
local Save the backup locally, to /var/CPbackup/backups/
username User name required to log in to the remote FTP or SCP server.
password plain At the prompt, enter the password for the remote FTP or SCP server.
Output:
gw> add backup local
Creating backup package. Use the command 'show backups' to monitor creation
progress.
mds_backup
You can back up the complete Multi-Domain Server, including all the Domain Management
Servers, binaries, and user data, with the mds_backup command. If the Multi-Domain Security
Management environment has multiple Multi-Domain Servers, back up all of them at the same
time.
This command requires Superuser privileges.
mds_backup executes the gtar command on product root directories containing data and
binaries, and backs up all files, except those specified in the $MDSDIR/conf/mds_exclude.dat
file.
The collected data is stored in a single .tgz file, in the current working directory, named with the
date-time. For example: 13Sep2002-141437.mdsbk.tgz
Parameter Description
-g Executes without prompting to disconnect GUI clients.
-d Specifies a directory store for the backup file. When not specified, the backup file is
stored in the current directory. You cannot store the backup file in any location
inside the product root directory tree.
-v Verbose mode - Lists all files to be backed up, but do not perform the backup
operation.
Comments When using the -g or -b options, make sure that no GUI clients or log servers are
connected. If there are client connections, the backup can be corrupted if changes are made
during the backup process.
Active log files are not backed up, to avoid read-during-write inconsistencies. It is best practice to
run a log switch before backup.
You can back up the Multi-Domain Server without log files. The .tgz will be much smaller.
mds_restore
You can restore a Multi-Domain Server that was backed up with mds_backup. Make sure you
have the operating system settings that you noted when you backed up.
If the Multi-Domain Security Management environment has multiple Multi-Domain Servers,
restore all Multi-Domain Servers at the same time.
Upgrading Prerequisites
In This Section:
Before Upgrading .........................................................................................................70
Contract Verification .....................................................................................................72
Upgrade Utilities ...........................................................................................................73
Using the Pre-Upgrade Verifier ...................................................................................74
Upgrading Successfully ................................................................................................75
Upgrading the vSEC Controller on the Security Management Server.......................76
Supported Security Gateways ......................................................................................77
Service Contract Files ..................................................................................................78
Before Upgrading
Before you upgrade:
• Make sure that you have the latest version of this document.
• See the R80.10 Release Notes for supported upgrade paths.
• Make sure that the target server meets the minimum hardware and operating system
requirements and is configured identically to the source server.
If the target server uses a different leading IP address than the source, change the target IP
address and the external interface.
• Upgrade all Management servers in your deployment, including those in High Availability
configuration:
• Upgrade R80 and higher Secondary Security Management Servers.
• For Secondary Security Management Servers of R77.xx and lower, do a clean installation
and re-establish the SIC trust. Management High Availability synchronization will start
automatically.
• Upgrade Secondary Multi-Domain Security Management servers from R80, and R77.xx and
lower.
• For upgrade of Management servers in High Availability configuration: If the Primary
management server was upgraded from R80 (with or without the Jumbo Hotfix Accumulator)
to R80.10, you must upgrade the Secondary management server in the same way.
Warning - If you upgrade from R7x versions and have files in the $FWDIR/lib/ directory
and/or the $FWDIR/conf/ directory that you changed manually, the changes will be lost. Make
sure you save the customized INSPECT files on an external storage and understand how to
replicate the required changes.
Important - If you use the Mobile Access Software Blade and you edited the configurations, review
the edits before you upgrade to R80.10.
1. Open these files on the computer to upgrade and make note of custom changes:
$CVPNDIR/conf/cvpnd.C (Gateway configuration)
$CVPNDIR/conf/httpd.conf (Apache configuration)
$CVPNDIR/conf/includes/* (Apache configuration)
$CVPNDIR/var/ssl/ca-bundle/ (Local certificate authorities)
$CVPNDIR/conf/SmsPhones.lst (DynamicID - SMS OTP - Local Phone List)
/var/ace/sdconf.rec (RSA configuration)
All PHP files
All replaced image files (*.gif, *.jpg)
2. Upgrade to R80.10.
3. Update Mobile Access Endpoint Compliance:
a) In SmartConsole, from the left Navigation Toolbar, click Security Policies.
b) In the Shared Policies section, click Mobile Access > Open Mobile Access Policy in
SmartConsole.
c) In SmartConsole, click Mobile Access tab > expand Endpoint Security On Demand > click
Endpoint Compliance Updates > click Update Databases Now.
d) Close SmartConsole.
4. Manually edit the new versions of the files, to include your changes.
Do not overwrite the R80.10 files with your customized files!
Contract Verification
Before upgrading a gateway or Security Management Server, you need to have a valid support
contract that includes software upgrade and major releases registered to your Check Point User
Centeraccount. The contract file is stored on Security Management Server and downloaded to
Check Point Security Gateways during the upgrade process. By verifying your status with the User
Center, the contract file enables you to easily remain compliant with current Check Point licensing
standards.
For more on service contracts, see sk33089
http://supportcontent.checkpoint.com/solutions?id=sk33089.
Upgrade Utilities
Before an upgrade, a set of utilities search your installation for known upgrade issues. The output
of the utilities is saved to a log file and an HTML file, with these message types:
• Action items before the upgrade: Errors that you must repair before the upgrade (for
example, an invalid policy name), and warnings of issues for you to decide whether to fix before
upgrade. Some messages recommend that you run utilities to fix an issue. In most cases, you
must fix the issues manually.
• Action items after the upgrade: Errors and warnings, to be handled after the upgrade.
• Information messages: Items to be aware of. For example, an object type is not supported in
the upgraded version but is in your database and is converted during the upgrade.
Important! Make sure you have the latest version of the upgrade tools! Download the
appropriate package from the Tools section in the Check Point R80.10 Support site
http://supportcontent.checkpoint.com/solutions?id=sk111841. There is a different package for
each operating system.
When you open the upgrade_tools package, you see these files:
Package Description
migrate.conf Holds configuration settings for Advanced Upgrade / Database
Migration.
migrate export Backs up all Check Point configurations, without operating system
information.
Syntax:
Parameters:
Parameter Description
-p Path of the installed Security Management Server (FWDIR)
-t Target version
-i If -i is used, only the INSPECT files are analyzed, to see if they were customized.
Upgrading Successfully
• When upgrading a Security Management Server, IPS profiles remain in effect on earlier
Gateways and can be managed from the IPS tab. When the gateway is upgraded, install the
policy to get the new IPS profile.
• When upgrading a Security Gateway, remember to change the gateway object in SmartConsole
to the new version.
If you encounter unforeseen obstacles during the upgrade process, consult the Support Center
http://supportcontent.checkpoint.com/solutions?id=sk111841 or contact your Reseller.
Important Information
1. When you upgrade the vSEC Controller to R80.10 the following files are overwritten with
default values:
• vSEC Controller v1
vsec.conf (found in $VSECDIR/conf)
• vSEC Controller v2
vsec.conf (found in $VSECDIR/conf)
tagger_db.C (found in $MDS_FWDIR/conf)
Before you begin the upgrade, back up any files that you have changed.
2. A Multi-Domain Server that contains imported Data Center objects in the Global Domain is not
supported in the upgrade to R80.10. You must remove objects from the Global Domain before
you install the upgrade.
3. Before you perform the upgrade on the Management server, if you have a Cisco APIC server,
keep only one URL. After the upgrade, add the other URLs.
4. For upgrades from the vSEC Controller v1, manually connect again to each Data Center
Server. For those servers that communicate with HTTPS, in SmartConsole double-click the
Data Center object and trust the certificate again.
Note - During the upgrade, the vSEC Controller does not communicate with the Data Center.
Therefore, Data Center objects are not updated on the Security Management Server or the
Security Gateways.
6. Make sure that the Primary Multi-Domain Server has the correct license to work in Multi-Site
environment.
7. Make sure that there is good connectivity between all the Multi-Domain Servers. System
databases, logs, and Global Domains are upgraded only on the Primary Multi-Domain Server.
The connection is necessary to synchronize the other Multi-Domain Servers and Multi-Domain
Log Servers.
8. The IP address of the source and target Secondary Multi-Domain Servers and Multi-Domain
Log Servers must be the same.
To update the version of the Domain Management Server and Domain Log Server
objects on the Multi-Domain Servers:
1. Connect to the command line on the Primary Multi-Domain Server, and make sure that all the
Domain Management Servers are up. Run:
# mdsstat
2. Make sure to disconnect all SmartConsoles.
3. Switch to the main MDS context:
# mdsenv
4. On each Domain Management Server and Domain Log Server that you import, run:
# $MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL
5. Open SmartConsole and make sure that the version for each of the upgraded objects is
R80.10.
This command updates the database schema before it imports. First, the command runs
pre-upgrade verification. If no errors are found, migration continues. If there are errors, you
must change the source Domain Management Server according to instructions in the error
messages. Then do this procedure again.
7. If the R80.10 server has a different IP address than the R77.xx server, establish trust with the
Security Gateways ("Certificate Authority Data" on page 95).
8. If the R77.xx server had VPN gateways, configure the keys ("Resolving Issues with IKE
Certificates" on page 96).
Important - To do a Domain Management Server migration on a Secondary Multi-Domain Server,
you must set its global domain to Active.
Procedure:
1. Connect to the command line on the Secondary Multi-Domain Server.
2. Log in to Expert Mode.
3. Run this command before you do the first migration on the Secondary Multi-Domain Server:
# mdsenv && $CPDIR/bin/cpprod_util CPPROD_SetValue FW1 LastIpsUpdate 1
`date +%s` 1
4. Connect with SmartConsole to the Secondary Multi-Domain Server.
5. From the left Navigation Toolbar, click Multi Domain > Domains.
6. Right-click the global domain of the Secondary Multi-Domain Server and click Connect to
Domain.
A window shows for the global domain.
7. Click Menu > Management High Availability.
8. In the Management High Availability status window, select Actions > Set Active for the
Connected Domain.
Before migrating:
1. Make sure that the target Domain Management Server IP address can communicate with all
Gateways.
2. Add an object to represent the Domain Management Server (name and IP address) and define
it as a Secondary Security Management Server.
3. Install policy on all managed Gateways.
4. Delete all objects or access rules created in Steps 1 and 2.
5. If the standalone computer already has Security Gateway installed:
• Clear the Firewall option in the Check Point Products section of the gateway object. You
may have to first remove it from the Install On column of your Rule Base (and then add it
again).
• If the gateway participates in a VPN community, remove it from the community and erase
its certificate. Note these changes, to undo them after the migration.
6. Save and close SmartConsole. Do not install policy.
11. Run Domain Management Server on the Primary management object. In each location,
consider changing to the new Security Gateway object.
12. Install the policy on all other Security Gateways, not the new one. If you see warning messages
about this Security Gateway because it is not yet configured, ignore them.
13. Uninstall the standalone deployment.
14. Install a Security Gateway on the previous standalone machine.
15. From the Domain Management Server SmartConsole, edit the Security Gateway object, define
its topology, and establish trust between the Domain Management Server and the Security
Gateway.
16. Install the policy on the Security Gateway.
4. After running the command and before synchronizing the Standby domains, run:
mdsstop;mdsstart. See sk121718
http://supportcontent.checkpoint.com/solutions?id=sk121718.
5. Synchronize all Standby Domain Management Servers.
6. Install the database in SmartConsole for the applicable Domain Management Server.
Preliminary steps:
1. Enable IPv6 for the leading interface (typically eth0) with Gaia Portal.
2. Assign an IPv6 address and default gateway to the management interfaces.
3. Write down the Multi-Domain Server IPv6 address and the host names and IPv6 addresses for
all Domain Management Servers. This is necessary because the system restarts after you
enable IPv6 support.
5. Prepare the old cluster member for synchronization of old connections with the upgraded
cluster member:
a) On the old cluster member, turn off fwaccel - run: fwaccel off -a
b) On the old cluster member, start the Optimal Serve Upgrade - run: cphaosu start
6. Reconnect the SYNC interface of one new cluster member to the network.
7. Move traffic to the new cluster member that is connected to the network. Do these steps:
a) Make sure the new cluster member is in ready state.
b) Connect the other new cluster member interfaces to the network.
c) On the new cluster member, run cphaosu start
d) On the old cluster member, run cphaosu stat
The network traffic statistics are shown.
e) When the old cluster member does not have many connections, run cphaosu finish
8. On the new cluster member, run cphaosu finish
9. Disconnect the old cluster member from the network.
10. Reconnect the other new cluster members to the network one at a time. Do these steps on
each cluster member:
a) Run cphastop
b) Connect the new cluster member to the network.
c) Run cphastart
d) In SmartConsole, change the version of the cluster object to R80.10 and install the Policy.
11. Upgrade the old cluster member and reconnect it to the network.
12. If the cluster has two members: In SmartConsole, change the version to R80.10.
13. Install the Policy.
To use the Optimal Service Upgrade to upgrade the R67.10 VSX cluster members:
1. Install the Optimal Service Upgrade Hotfix on a cluster member. This is the old cluster
member with Hotfix. For instructions and download links, refer to sk74300
http://supportcontent.checkpoint.com/solutions?id=sk74300.
2. Disconnect all old cluster members from the network, except for one cluster member.
Make sure that the management interfaces are not connected to the network.
3. On the old cluster member, configure kernel parameters:
• Upgrade to R77.30:
Run: cphaconf cluster_id get
If the cluster ID value is not as expected, run: cphaconf cluster_id set <value>
Make sure all cluster members have the same cluster ID. If a member has a different ID,
run this set command to configure the correct value.
• Upgrade to R77.20 and lower:
Make sure all cluster members use the same value for the fwha_mac_magic parameter.
Run: fw ctl get int fwha_mac_magic
The default value for the fwha_mac_magic parameter is 254. If your configuration uses a
different value, on each member, run: fw ctl set int fwha_mac_magic <value>
For more about the cluster_id and fwha_mac_magic parameters, see the
R80.10 ClusterXL Administration Guide
http://downloads.checkpoint.com/dc/download.htm?ID=54804
and sk25977 http://supportcontent.checkpoint.com/solutions?id=sk25977.
4. Install R80.10 on all the cluster members that are not connected to the network.
5. Prepare the old cluster member for synchronization of old connections with the upgraded
cluster member:
a) On the old cluster member, turn off fwaccel - run: fwaccel off -a
b) On the old cluster member, start the Optimal Serve Upgrade - run: cphaosu start
6. Reconnect the SYNC interface of one new cluster member to the network.
7. Move traffic to the new cluster member that is connected to the network. Do these steps:
a) Make sure the new cluster member is in ready state.
b) Connect the other new cluster member interfaces to the network.
c) On the new cluster member, run cphaosu start
d) On the old cluster member, run cphaosu stat
The network traffic statistics are shown.
e) When the old cluster member does not have many connections, run cphaosu finish
8. On the new cluster member, run cphaosu finish
9. Disconnect the old cluster member from the network.
10. Reconnect the other new cluster members to the network one at a time. Do these steps on
each cluster member:
a) Run cphastop
b) Connect the new cluster member to the network.
c) Run cphastart
11. Upgrade the old cluster member and reconnect it to the network.
Limitations
1. Upgrade procedure should be implemented when there is minimal network traffic.
2. If there is a member failure during the upgrade, the Optimal Service Upgrade procedure does
not provide redundancy.
3. Do not apply configuration changes during the upgrade process.
4. These connections do not survive the upgrade process:
a) Complex connections, for example:
b) Dynamic routing
c) Bridge mode (L2) configurations
Connectivity Upgrade
Before you run Connectivity Upgrade:
• Make sure that the cluster has two members, one Active and one Standby
• Read sk107042 ClusterXL upgrade methods and paths
http://supportcontent.checkpoint.com/solutions?id=sk107042
• Read sk101209 R77.20 Known Limitations
http://supportcontent.checkpoint.com/solutions?id=sk101209
• Read sk104860 R77.30 Known Limitations
http://supportcontent.checkpoint.com/solutions?id=sk104860
Check Point Connectivity Upgrade (CU) synchronizes existing connections to maintain connectivity
during cluster upgrades.
Connectivity Upgrade is supported during these upgrades:
R75.46 CU CU CU
R75.47 CU CU CU
R76 CU CU CU
R77 - CU CU
R77.10 - CU CU
R77.20 - CU CU
R77.30 - - CU
Notes -
• Software Blade information does not get synchronized. If a connection needs to be inspected
by a Software Blade, and this Software Blade is configured in SmartConsole to Prefer
Connectivity Over Security, then the connection is accepted without the inspection. Otherwise,
the connection is dropped.
• All member gateways must have the same number of CoreXL Firewall instances.
• All member gateways must run the same 32-bit or 64-bit kernel edition.
To make sure all cluster members are up and in VSX High Availability mode:
On each cluster member, run: cphaprob state
If the state of a cluster member is HA not started, run: cphastart
• The peer member is handling the traffic - Shows which cluster member currently handles the
traffic and the version of the Cluster Control Protocol for each member
• Connection table - Shows the summary of the connections table for each Virtual System
Example 1 - VSX High Availability
[Expert@gw2:0]# cphacu start
==============================================================================
Full Sync ended (Delta Sync is enabled)
For delayed connections (Templates) to be synchronized it is recommended to turn
off SecureXL
on the old member before doing a failover. Run: 'fwaccel off' on the old member
Please note: turning SecureXL off might slow down existing connections.
==============================================================================
Connections table
=================
VS HOST NAME ID #VALS #PEAK #SLINKS
0 localhost connections 8158 30 103 34
2 localhost connections 8158 0 1 0
3 localhost connections 8158 1 2 2
==============================================================================
==
Full Sync ended (Delta Sync is enabled)
For delayed connections (Templates) to be synchronized it is recommended to turn
off SecureXL
on the old member before doing a failover. Run: 'fwaccel off' on the old member
Please note: turning SecureXL off might slow down existing connections.
==============================================================================
==
Connections table
=================
HOST NAME ID #VALS #PEAK #SLINKS
localhost connections 8158 34 38
37
==============================================================================
==
Full Sync ended (Delta Sync is enabled)
For delayed connections (Templates) to be synchronized it is recommended to turn
off SecureXL
on the old member before doing a failover. Run: 'fwaccel off' on the old member
Please note: turning SecureXL off might slow down existing connections.
==============================================================================
==
Connections table
=================
VS HOST NAME ID #VALS #PEAK #SLINKS
0 localhost connections 8158 28 103 30
2 localhost connections 8158 0 1 0
3 localhost connections 8158 1 2 2
cphacu stat
Description Shows the status of Connectivity Upgrade.
Syntax
cphacu stat
Example 1 - VSX High Availability
[Expert@HostName]# cphacu stat
Connection table
================
VS HOST NAME ID #VALS #PEAK #SLINKS
0 localhost connections 8158 16 56 16
1 localhost connections 8158 0 3 0
2 localhost connections 8158 0 0 0
3 localhost connections 8158 0 0 0
4 localhost connections 8158 0 0 0
5 localhost connections 8158 0 0 0
6 localhost connections 8158 0 1
Connection table
================
HOST NAME ID #VALS #PEAK #SLINKS
localhost connections 8158 16 56
Column Description
License Status The general state of the Software Blade licenses:
• OK - All the blade licenses are valid.
• Not Activated - Blade licenses are not installed. This is only possible
in the first 15 days after the establishment of the SIC with the
Security Management Server. After the initial 15 days, the absence of
licenses will result in the blade error message.
• Error with <number> blade(s) - The specified number of blade
licenses are not installed or not valid.
• Warning with <number> blade(s) - The specified number of blade
licenses have warnings.
• N/A - No available information.
CK Unique Certificate Key of the license instance.
Column Description
Account ID User's account ID.
Support Expiration Date when the Check Point support contract expires.
Status Description
Active The Software Blade is active and the license is valid.
Available The Software Blade is not active, but the license is valid.
No License The Software Blade is active but the license is not valid.
About to Expire The Software Blade is active, but the license will expire in thirty days
(default) or less (7 days or less for an evaluation license).
Quota Exceeded The Software Blade is active, and the license is valid, but the quota of
related objects (gateways, files, virtual systems, and so on, depending
on the blade) is exceeded.
Quota Warning The Software Blade is active, and the license is valid, but the number of
objects of this blade is 90% (default) or more of the licensed quota.
Monitoring Licenses
To keep track of license issues, you can use these options:
• License Status view - To see and export license information for Software Blades on each
specific Security Management Server, gateway, or Log Server object.
• License Status report - To see, filter and export license status information for all configured
Security Management Server, gateway, or Log Server objects.
• License Inventory report - To see, filter and export license information for Software Blades on
all configured Security Management Server, gateway, or Log Server objects.
The SmartEvent Software Blade lets you customize the License Status and License Inventory
information from the Logs & Monitor view of SmartConsole.
It is also possible to view license information from the Gateways & Servers view of SmartConsole
without enabling the SmartEvent blade on Security Management Server.
The Gateways & Servers view in SmartConsole lets you see and export the License
Inventory report.
1. To see the License Inventory report from the Gateways & Servers view:
a) In SmartConsole, from the left Navigation Toolbar, click Gateways & Servers.
b) From the top toolbar, click Actions > License Report.
c) Wait for the SmartView to load and show this report.
By default, this report contains:
Inventory page: Blade Names, Devices Names, License Statuses
License by Device page: Devices Names, License statuses, CK, SKU, Account ID,
Support Level, Next Expiration Date
2. To export the License Inventory report from the Gateways & Servers view:
a) In the top right corner, click the Options button.
b) Select the applicable export option - Export to Excel, or Export to PDF.
The Logs & Monitor view in SmartConsole lets you see, filter and export the License
Status report.
1. To see the License Status report from the Logs & Monitor view:
a) In SmartConsole, from the left Navigation Toolbar, click Logs & Monitor
b) At the top, open a new tab by clicking New Tab, or [+].
c) In the left section, click Views.
d) In the list of reports, double-click License Status.
e) Wait for the SmartView to load and show this report.
By default, this report contains:
Names of the configured objects, License status for each object, CK, SKU, Account ID,
Support Level, Next Expiration Date
2. To filter the License Status report in the Logs & Monitor view:
a) In the top right corner, click the Options button > View Filter.
The Edit View Filter window opens.
b) Select a Field to filter results. For example, Device Name, License Status, Account ID.
c) Select the logical operator - Equals, Not Equals, or Contains.
d) Select or enter a filter value.
Note - Click the X icon to delete a filter.
e) Optional: Click the + icon to configure additional filters.
f) Click OK to apply the configured filters.
The report is filtered based on the configured filters.
3. To export the License Status report in the Logs & Monitor view:
a) In the top right corner, click the Options button.
b) Select the applicable export option - Export to Excel, or Export to PDF.
The Logs & Monitor view in SmartConsole lets you see, filter and export the License
Inventory report.
1. To see the License Inventory report from the Logs & Monitor view:
a) In SmartConsole, from the left Navigation Toolbar, click Logs & Monitor
b) At the top, open a new tab by clicking New Tab, or [+].
c) In the left section, click Reports.
d) In the list of reports, double-click License Inventory.
e) Wait for the SmartView to load and show this report.
By default, this report contains:
Inventory page: Blade Names, Devices Names, License Statuses
License by Device page: Devices Names, License statuses, CK, SKU, Account ID,
Support Level, Next Expiration Date
2. To filter the License Inventory report in the Logs & Monitor view:
a) In the top right corner, click the Options button > Report Filter.
The Edit Report Filter window opens.
b) Select a Field to filter results. For example, Blade Name, Device Name, License Overall
Status, Account ID.
c) Select the logical operator - Equals, Not Equals, or Contains.
d) Select or enter a filter value.
Note - Click the X icon to delete a filter.
e) Optional: Click the + icon to configure additional filters.
f) Click OK to apply the configured filters.
The report is filtered based on the configured filters.
3. To export the License Inventory report in the Logs & Monitor view:
a) In the top right corner, click the Options button.
b) Select the applicable export option - Export to Excel, or Export to PDF.
Adding a license:
1. In the navigation tree, click Maintenance > Licenses.
2. Click New.
The Add License window opens.
3. Enter the license data manually, or click Paste License to enter the data automatically.
The Paste License button only shows in Internet Explorer. For other web browsers, paste the
license strings into the empty text field.
4. Click OK.
Deleting a license:
1. In the navigation tree, click Maintenance > Licenses.
2. Select a license in the table.
3. Click Delete.
Using SmartUpdate
In This Section:
Accessing SmartUpdate .............................................................................................138
Licenses Stored in the Licenses & Contracts Repository ........................................139
Licensing Terms for SmartUpdate ............................................................................139
Managing Licenses Using SmartUpdate ...................................................................141
Attaching a License to a Security Gateway ...............................................................145
Detaching Licenses from a Security Gateway ...........................................................145
Installing Software Packages on R80.10 ...................................................................146
Upgrading with SmartUpdate for R77.30 and Below ................................................147
SmartUpdate automatically distributes applications and updates for Check Point and OPSEC
Certified products and manages product licenses. It provides a centralized way to guarantee that
Internet security throughout the enterprise network is always up to date.
These features and tools are available in SmartUpdate:
• Maintaining licenses
• Upgrading packages for R77.30 and below (see "Upgrading with SmartUpdate for R77.30 and
Below" on page 147)
• Adding packages to Package Repository for R77.30 and below ("Using the Package
Repository" on page 148)
Important - The SmartUpdate GUI shows two tabs - Package Management and Licenses &
Contracts. For versions R80.10 and above, the tools in the Package Management tab are no
longer supported. To install packages on Gaia OS, use CPUSE (see sk92449
http://supportcontent.checkpoint.com/solutions?id=sk92449), or Central Deployment Tool (see
sk111158 http://supportcontent.checkpoint.com/solutions?id=sk111158). For further information,
see Installing Packages on R80.10 and above ("Installing Software Packages on R80.10" on page
146).
Accessing SmartUpdate
1. Open the SmartUpdate in one of these ways:
• In SmartConsole, click Menu > Manage licenses & packages.
• On the SmartConsole computer, run this executable file directly:
On Windows OS 32-bit:
C:\Program
Files\CheckPoint\SmartConsole\<RXX>\PROGRAM\SmartDistributor.exe
On Windows OS 64-bit:
C:\Program Files
(x86)\CheckPoint\SmartConsole\<RXX>\PROGRAM\SmartDistributor.exe
2. Click Menu > View > Menu Bar.
The menu names appear at the top of the GUI.
• Get
You can add information from your managed Security Gatewaysabout the licenses you installed
locally. This updates the License & Contract Repository with all local licenses across the
installation. The Get operation is a two-way process that places all locally installed licenses in
the License & Contract Repository and removes all locally deleted licenses from the License
& Contract Repository.
• Delete ("Deleting a License from the Licenses & Contracts Repository" on page 144)
You can delete a license from the License & Contract Repository.
• Export
You can export a license from the License & Contract Repository to a file.
• License Expiration
Licenses expire on a particular date, or never. If a license expires, the applicable products and
features stop working on the Check Point computer, to which the license is attached.
• State
The license state depends on whether the license is associated with a managed Security
Gateway in the License & Contract Repository, and whether the license is installed on that
Security Gateway. The license state definitions are as follows:
• Attached indicates that the license is associated with a managed Security Gateway in the
License & Contract Repository, and is installed on that Security Gateway.
• Unattached indicates that the license is not associated with managed Security Gateways in
the License & Contract Repository, and is not installed on managed Security Gateways.
• Assigned is a license that is associated with a managed Security Gateway in the License &
Contract Repository, but has not yet been installed on a Security Gateway.
• Upgrade Status
This is a field in the License & Contract Repository that contains an error message from the
User Center when the License Upgrade process fails.
• Central License
Attach a Central License to the IP address of your Management Server.
• Local License
A Local License is tied to the IP address of the specific Security Gateway. You can only use a
local license with a Security Gateway or a Security Management Server with the same address.
• Multi-License File
This is a license files that contains more than one license.
The cplic put, and cplic add commands support these files.
• Certificate Key
This is a string of 12 alphanumeric characters. The number is unique to each package.
• Features
This is a character string that identifies the features of a package.
• cplic
A CLI utility to manage local licenses on Check Point computers.
To delete a license:
1. Right-click anywhere in the Licenses & Contracts Repository and select View Unattached
Licenses.
2. Select the unattached licenses that you want to delete, and click Delete.
Upgrading a License
SmartUpdate can upgrade licenses that are in the Licenses & Contracts Repository. SmartUpdate
attempts to upgrade them with the use of the Upgrade tool.
To detach a license:
• From SmartConsole, select Licenses & Contract. Right-click and select Detach, and select the
licenses to detach.
To uninstall a package:
From the SmartUpdate Menu, select Packages > Uninstall.
Note - Uninstallation restores the gateway to the last management version distributed.
Download Center
Select Packages > New Package > Add from Download Center.
1. Accept the Software Subscription Download Agreement.
2. Enter your user credentials.
3. Select the packages to be downloaded. Use the Ctrl and Shift keys to select multiple files.
You can also use the Filter to show just the packages you need.
4. Click Download to add the packages to the Package Repository.
User Center
Use this procedure for adding OPSEC packages and Hotfixes to the Package Repository.
1. Open a browser to the Check Point Support Center http://supportcenter.checkpoint.com.
2. Select the package you want to upgrade.
3. Enter your user credentials.
4. Accept the Software Subscription Download Agreement.
5. Choose the appropriate platform and package, and save the download to the local disk.
6. Select Packages > New Package > Import File.
7. In the Add Package window, navigate to the desired .tgz file and click Open to add the
packages to the Package Repository.
Generating CPInfo
CPInfo is a support tool that gathers into one text file a wide range of data concerning the Check
Point packages in your system. When speaking with a Check Point Technical Support Engineer,
you may be asked to run CPInfo and transmit the data to the Support Center. Download the tool
from the Support Center http://supportcontent.checkpoint.com/solutions?id=sk30567.
To launch CPInfo, select Tools > Generate CPInfo.
1. Choose the directory to which you want to save the output file.
2. Choose between two methods to name the file:
• based on the SR number the technician assigns you, or
• a custom name that you define.
3. Optionally, you may choose to add:
• log files to the CPInfo output.
• the registry to the CPInfo output.
For more information about the CPInfo Utility, see sk92739
http://supportcontent.checkpoint.com/solutions?id=sk92739.
Automatic Downloads
Check Point products connect to Check Point cloud services to download and upload information.
You can enable or disable Automatic Downloads in the Gaia First Time Configuration Wizard, on
the Products page. We recommend that you enable Automatic Downloads, so that you can use
these features:
• Blade Contracts are annual licenses for Software Blades and product features. If there is no
valid Blade contract, the applicable blades and related features will work, but with some
limitations.
• CPUSE lets you manage upgrades and installations on Gaia OS. See sk92449
http://supportcontent.checkpoint.com/solutions?id=sk92449.
• Data updates and Cloud Services are necessary for the full functionality of these Software
Blades and features:
• Application & URL Filtering • Threat Prevention (Anti-Bot, • HTTPS Inspection
• Application Database Anti-Virus, Anti-Spam, IPS, Threat • Compliance
Emulation)
• URL Filtering database • SmartEndpoint
• AppWiki • Threat Wiki
DLP Yes No
QoS Yes No
Item Description
1 Security Gateway bridges Layer-2 traffic over one IP address, with a subnet on each
side, using the same address
4 Internal network
Item Description
1 Internal network
5 Internet
Item Description
1 Security Gateway bridging Layer-2 traffic
2 eth1
3 eth2
5 Switches
Item Description
1 Security Management Server sends management packet to management interface
\\
\\ User defined INSPECT code
\\
allowed_ethernet_protocols={ <0x44,0x44> );
dropped_ethernet_protocols={ <0x4,0x4> );
fendif /*__user_def__*/
VLANs
When switches are configured with VLANs, VLAN traffic can pass through our bridge in Access
mode or in Trunk mode:
• Access mode (VLAN translation) – Bridge is constructed from two VLAN interfaces.
• Trunk mode – Bridge is constructed from two non-VLAN interfaces. The VLAN tag is not
removed, and the firewall processes the tagged packet. The traffic passes with the original tag
to its destination.
Item Description
1 Security Gateway
2 Switch
Special Protocols
PVST - Per-VLAN Spanning Tree. PVST is a proprietary Cisco version of STP and maintains a
spanning tree instance for each VLAN. It uses ISL Trunking and lets a VLAN trunk be forwarded
for some VLANs and blocked for others. Because PVST treats each VLAN as a separate network, it
can load balance traffic at layer-2. It forwards some VLANs on one trunk and other VLANs on
another trunk without causing a Spanning Tree loop.
BPDU - Bridge Protocol Data Unit. BPDUs are data messages that are exchanged across
the switches within an extended LAN that uses STP topology.
When VLAN translation is configured, BPDU frames can arrive with the wrong VLAN number to
the ports through the bridge. This mismatch can cause the switch port to enter blocking mode.
In Active-Standby mode only, there are options to avoid blocking mode.
To configure the gateway to allow only IPv4, IPv6, and ARP traffic:
1. Add to $FWDIR/modules/fwkern.conf the line: fwaccept_unknown_protocol=0
2. Reboot the Security Gateway.
Trunk Mode
If you configure the switch ports as VLAN trunk, the Check Point bridge should not interfere with
the VLANs. To configure bridge with VLAN trunk, create the bridge from two interfaces (no VLAN).
Note - VLAN translation is not supported in Trunk mode.
Boot Security
During the boot process, there are a few seconds after the computer can receive communication
(and can be attacked) and before the security policy is loaded and enforced. firewall Boot Security
protects the computer, and its networks, during this time. Boot Security works through control of
IP Forwarding on boot and the Default Filter.
The Default Filter also provides protection if firewall processes are stopped for maintenance.
Parameter Description
-fwflag -proc Maintains the active Security Policy running in the kernel when Check
Point daemons and services are stopped. Rules with generic allow, reject,
or drop rules based on services continue to work.
-fwflag -default The active Security Policy running in the kernel is replaced with the
Default Filter, which allows open connections to the gateway to remain
open.
Monitoring Security
You can see that the Default Filter or the Initial Policy are loaded on a non-production Security
Gateway. Restart the computer before Install Policy and run:
$FWDIR/bin/fw stat
If the output shows defaultfilter for the Default Filter status and InitialPolicy for the installed
policy, the computer is running on the default, pre-firewall security.
CLI Commands
In This Section:
cpconfig .......................................................................................................................170
cplic .............................................................................................................................172
cppkg ...........................................................................................................................187
cprid .............................................................................................................................190
cprinstall .....................................................................................................................191
control_bootsec ..........................................................................................................199
fwboot bootconf ..........................................................................................................200
comp_init_policy .........................................................................................................201
cpstop -fwflag default and cpstop -fwflag proc ........................................................202
All management operations can be executed via the command line. There are three main
commands:
• cppkg to work with the Packages Repository.
• cprinstall to perform remote installations of packages.
• cplic for license management.
cpconfig
Description
This command starts the Check Point Configuration Tool. This tool is used to configure installed
Check Point products.
The options shown depend on the configuration and installed products:
Automatic start of Check Point Products Shows and controls which of the installed
Check Point products start automatically during
boot.
Syntax
cpconfig
Configuration Options:
----------------------
(1) Licenses and contracts
(2) Administrator
(3) GUI Clients
(4) SNMP Extension
(5) Random Pool
(6) Certificate Authority
(7) Certificate's Fingerprint
(8) Automatic start of Check Point Products
(9) Exit
cplic
The cplic command lets you manage Check Point licenses. The cplic command can be run in
Gaia Clish or in Expert Mode.
Best Practice - Manage licenses in the SmartUpdate GUI.
License Management is divided into three types of commands:
• Local licensing commands are executed on the Check Point computers.
• Remote licensing commands are executed on the Security Management Server, and affect the
managed Security Gateways.
• License Repository commands are executed on the Security Management Server, and affect
the licenses stored in the local license repository.
For more about managing licenses, see the R80.10 Security Management Administration Guide
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_SecurityManage
ment_AdminGuide/html_frameset.htm.
cplic check
Description
Confirms that the license includes the feature on the local Security Gateway or Security
Management Server.
Syntax
cplic check [-p <Product>] [-v <Version>] [-c | -count] [-t <Date>] [-r | -routers]
[-S | -SRusers] <Feature>
Parameters
Parameter Description
cplic db_add
Description
Adds one or more licenses to the license repository on the Security Management Server.
When local licenses are added to the license repository, they are automatically attached to the
intended Check Point Security Gateway. Central licenses have to undergo the attachment process.
This command is a license repository command and can only be executed on the Security
Management Server.
Syntax
cplic db_add -l <License File> [<Host>] [<Expiration Date>] [<Signature>]
[<SKU/Features>]
Parameters
Parameter Description
<SKU/Features> The SKU of the license summarizes the features included in the license.
For example, CPSUITE-EVAL-3DES-vNG
Example
If the file 192.0.2.11.lic contains one or more licenses, the command cplic db_add -l
192.0.2.11.lic produces output similar to:
gaia> cplic db_add -l 192.0.2.11.lic
Adding license to database ...
Operation Done
cplic db_print
Description
Displays the details of Check Point licenses stored in the license repository on the Security
Management Server.
Syntax
cplic db_print <Object Name | -all> [-n | -noheader] [-x] [-t | -type] [-a |
-attached]
Parameters
Parameter Description
Note - This command is a license repository command and can only run on the Security
Management Server.
cplic db_rm
Description
Removes a license from the license repository on the Security Management Server. It can be
executed ONLY after the license was detached using the cplic del command. Once the license
is removed from the repository, it can no longer be used.
Syntax
cplic db_rm <Signature>
Parameters
Parameter Description
Example
gaia> cplic db_rm 2f540abb-d3bcb001-7e54513e-kfyigpwn
Note - This command is a license repository command and can only run on the Security
Management Server.
cplic del
Description
Deletes a single Check Point license on a host, including unwanted evaluation, expired, and other
licenses. Used for both local and remote machines
Syntax
cplic del [-F <Output File>] <Signature> <Object Name>
Parameters
Parameter Description
-F <Output File> Sends the output to <output file> instead of the screen.
<Object Name> The name of the Check Point Security Gateway object as defined in
SmartConsole.
Syntax
cplic del <Object Name> [-F <Output File>] [-ip <Dynamic IP Address>] <Signature>
Parameters
Parameter Description
<Object Name> The name of the Check Point Security Gateway object as defined in
SmartConsole.
-F <Output File> Diverts the output to outputfile rather than to the screen.
-ip <Dynamic IP Deletes the license on the Check Point Security Gateway with the
Address> specified IP address. Use this parameter to delete a license on a DAIP
Check Point Security Gateway.
Note - If this parameter is used, then object name must be a DAIP
Security Gateway.
Note - This is a Remote Licensing command, which affects remote managed machines. It is
executed on the Security Management Server.
cplic get
Description
Retrieves all licenses from Security Gateways into the license repository on the Security
Management Server. This command helps to synchronize the repository with the Check Point
Security Gateways. When the command is run, all local changes are updated.
Syntax
cplic get {<IP Address> | <Host Name> | -all} [-v41]
Parameters
Parameter Description
<IP Address> The IP address of the Check Point Security Gateway, from which licenses are to
be retrieved.
<Host Name> The name of the Check Point Security Gateway object as defined in
SmartConsole, from which licenses are to be retrieved.
-all Retrieves licenses from all Check Point Security Gateways in the managed
network.
-v41 Retrieves version 4.1 licenses from the NF Check Point Security Gateway. Used
to upgrade version 4.1 licenses.
Example
If the Check Point Security Gateway with the object name caruso contains four Local licenses,
and the license repository contains two other Local licenses, the command cplic get caruso
produces output similar to this:
gaia> cplic get caruso
Get retrieved 4 licenses.
Get removed 2 licenses.
Note - This is a Remote Licensing Command, which affects remote machines. It is executed on the
Security Management Server.
cplic put
Description
Installs one or more local licenses on a local machine.
Syntax
cplic put [-o|-overwrite] [-c|-check-only] [-s|-select] [-F <Output File>]
[-P|-Pre-boot] [-k|-kernel-only] -l <License File> [<Host>] [<Expiration Date>]
[<Signature>] [<SKU/Features>]
Parameters
Parameter Description
-o | -overwrite On a Security Management Server, this erases all existing licenses and
replaces them with the new licenses.
On a Check Point Security Gateway, this erases only the local licenses,
but not central licenses that are installed remotely.
-c | -check-only Verifies the license. Checks if the IP of the license matches the machine
and if the signature is valid.
-s | -select Selects only the local license whose IP address matches the IP address
of the machine.
-F <Output File> Outputs the result of the command to the designated file rather than to
the screen.
-P | -Pre-boot Use this option after you have upgraded and before you reboot the
machine. Use of this option will prevent certain error messages.
<SKU/Features> The SKU of the license summarizes the features included in the license.
For example: CPSUITE-EVAL-3DES-vNG
Copy and paste the parameters from the license received from the User Center:
Parameter Description
host One of these:
• All platforms - The IP address of the external interface (in dot
notation). The last part cannot be 0 or 255.
• Solaris2 - The response to the hostid command (beginning with
0x).
expiration date The license expiration date. It can be never.
SKU/features A string listing the SKU and the Certificate Key of the license. The SKU
of the license summarizes the features included in the license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
Example
gaia> cplic put -l License.lic
Host Expiration SKU
192.168.2.3 14Jan2016 CPSB-SWB CPSB-ADNC-M CK0123456789ab
gaia>
Syntax
cplic put <Object Name> [-ip Dynamic IP] [-F <Output File>] -l <License File>
[<Host>] [<Expiration Date>] [<Signature>] [<SKU/Feature>]
Parameters
Parameter Description
<Object Name> The name of the Check Point Security Gateway object, as defined in
SmartConsole.
-ip <Dynamic IP> Installs the license on the Check Point Security Gateway with the specified
IP address. This parameter is used for installing a license on a DAIP
Check Point Security Gateway.
Note - If this parameter is used, then the object name must be a DAIP
Check Point Security Gateway.
-F <Output File> Diverts the output to <outputfile> rather than to the screen.
<SKU/Features> The SKU of the license summarizes the features included in the license.
For example: CPSUITE-EVAL-3DES-vNG
Note - This is a remote licensing command, which affects remote machines. It is executed on the
Security Management Server. More than one license can be attached.
Copy and paste the parameters from the license received from the User Center:
Parameter Description
host One of these:
• All platforms - The IP address of the external interface (in dot
notation). The last part cannot be 0 or 255.
• Solaris2 - The response to the hostid command (beginning with
0x).
expiration date The license expiration date. It can be never.
SKU/features A string listing the SKU and the Certificate Key of the license. The SKU
of the license summarizes the features included in the license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
cplic print
Description
The cplic print command prints details of Check Point licenses on the local machine.
Syntax
cplic print [-n|-noheader][-x][-t|-type][-F <Output File>] [-p|-preatures]
Parameters
Parameter Description
Note - On a Check Point Security Gateway, this command prints all licenses that are installed on
the local machine, both local and central licenses.
cplic upgrade
Description
Upgrades licenses in the license repository with licenses in a license file from the user center.
Syntax
cplic upgrade –l <Input File>
Parameters
Parameter Description
–l <Input File> Upgrades the licenses in the license repository and Check Point Security
Gateways to match the licenses in <Input File>.
Example
This example explains the procedure to upgrade the licenses in the license repository. There are
two Software Blade licenses in the file. One does not match any license on a remote Security
Gateway, the other matches a version NGX license on a Security Gateway that has to be upgraded.
• Upgrade the Security Management Server to the latest version.
Ensure that there is connectivity between the Security Management Server and the Security
Gateways with the previous product versions.
• Import all licenses into the license repository. This can also be done after upgrading the
products on the remote Security Gateways.
• Run this command:
cplic get -all
Example:
[Expert@MyMGMT]# cplic get -all
Getting licenses from all modules ...
MyGW:
Retrieved 1 licenses
Example:
[Expert@MyMGMT]# cplic db_print -all -a
Retrieving license information from database ...
• In the User Center http://usercenter.checkpoint.com, view the licenses for the products that
were upgraded from version NGX to a Software Blades license. You can also create new
upgraded licenses.
• Download a file containing the upgraded licenses. Only download licenses for the products that
were upgraded from version NGX to Software Blades.
• If you did not import the version NGX licenses into the repository, import the version NGX
licenses now. Use the command cplic get -all
• Run the license upgrade command: cplic upgrade –l <inputfile>
• The licenses in the downloaded license file and in the license repository are compared.
• If the certificate keys and features match, the old licenses in the repository and in the
remote Security Gateways are updated with the new licenses.
• A report of the results of the license upgrade is printed.
Note - This is a remote licensing command, which affects remote Security Gateways. It is
executed on the Security Management Server.
For more about managing licenses, see the R80.10 Security Management Administration Guide
http://downloads.checkpoint.com/dc/download.htm?ID=54842.
cppkg
Description Manages the product repository. It is always executed on the Security Management
Server.
Important - This command is not supported for gateways running on Gaia OS.
cppkg add
Description Adds a product package to the product repository. You can only add SmartUpdate
packages to the product repository.
Add products to the repository by importing a file downloaded from the Download Center. Add the
package file to the repository directly from a DVD or from a local or network drive.
Syntax:
> cppkg add {<package-full-path>|<CD drive> [product]}
Parameter Description
package-full-pat If the package you want to add to the repository is on a local disk or
h network drive, type the full path to the package.
Note - cppkg add does not overwrite existing packages. To overwrite existing packages, you
must first delete existing packages.
Example:
[d:\winnt\fw1\ng\bin]cppkg add l:\CPsuite-R80.10\
Enter package name:
----------------------
(1) SVNfoundation
(2) firewall
(3) floodgate
(4) rtm
(e) Exit
Enter your choice : 1
Enter package OS :
----------------------
(1) win32
(2) linux
(3) ipso
(e) Exit
Enter your choice : 1
You choose to add 'SVNfoundation' for 'win32' OS. Is this correct? [y/n] : y
cppkg delete
Description Deletes a product package from the repository. To delete a product package you
must specify a number of options. To see the format of the options and to view the contents of the
product repository, use the cppkg print command.
Syntax:
> cppkg delete <vendor> <product> <version> <os> [sp]
Parameter Description
cppkg get
Description Synchronizes the Package Repository database with the content of the actual
package repository under $SUROOT
Syntax:
> cppkg get
cppkg getroot
Description Finds the location of the product repository. The default product repository location
on Windows machines is C:\SUroot. On UNIX machines it is /var/SUroot.
Syntax:
> cppkg getroot
Example:
> cppkg getroot
Current repository root is set to : /var/suroot/
cppkg print
Description Lists the contents of the product repository.
Use cppkg print to see the product and OS strings required to install a product package
using the cprinstall command, or to delete a package using the cppkg delete
command.
Syntax:
> cppkg print
cppkg setroot
Description Creates a new repository root directory location and moves existing product
packages into the new repository.
The default product repository location is created when the Security Management Server is
installed. On Windows machines the default location is C:\SUroot and on UNIX machines it is
/var/SUroot. Use this command to change the default location.
When changing repository root directory:
• The content of the old repository is copied into the new repository.
• The $SUROOT environment variable gets the value of the new root path.
• A product package in the new location is overwritten by a package in the old location, if the
packages are the same (they have the same ID strings).
The repository root directory should have at least 200 Mbyte of free disk space.
Syntax:
> cppkg setroot <repository>
Parameter Description
<repository> The full path for the desired location for the
product repository.
Note - It is important to reboot the Security Management Server after using this command. This
sets the new $SUROOT environment variable.
Example:
cppkg setroot /var/new_suroot
Repository root is set to : /var/new_suroot/
cprid
cpridrestart
Description Stops and starts the Check Point Remote Installation Daemon cprid. This is the
daemon that is used for remote upgrade and installation of products. In Windows it is a service.
cpridstart
Description Starts the Check Point Remote Installation Daemon (cprid). This is the service
that allows for the remote upgrade and installation of products. In Windows it is a service.
Syntax:
> cpridstart
cpridstop
Description Stops the Check Point Remote Installation Daemon cprid. This is the service
that allows for the remote upgrade and installation of products. In Windows it is a service.
Syntax:
> cpridstop
cprinstall
Description Use cprinstall commands to perform remote installation of product
packages and associated operations.
Important - This command is not supported for gateways running on Gaia OS.
On the Security Management Server, cprinstall commands require licenses for
SmartUpdate.
On the remote Check Point gateways the following are required:
• Trust must be established between the Security Management Server and the Check Point
gateway.
• cpd must run.
• cprid remote installation daemon must run.
cprinstall boot
Description Boot the remote computer.
Syntax:
> cprinstall boot <object name>
Parameter Description
<object name> Object name of the Check Point Security Gateway defined in SmartConsole.
Example:
> cprinstall boot harlin
cprinstall cpstart
Description Enables cpstart to be run remotely.
All products on the Check Point Security Gateway must be of the same version.
Syntax:
> cprinstall cpstart <object name>
Parameter Description
<Object name> Object name of the Check Point Security Gateway defined in SmartConsole.
cprinstall cpstop
Description Enables cpstop to be run remotely.
All products on the Check Point Security Gateway must be the same version.
Syntax:
> cprinstall cpstop {-proc|-nopolicy} <object name>
Parameter Description
-proc Kills Check Point daemons and security servers while it maintains the active
Security Policy running in the kernel. Rules with generic allow/reject/drop
rules, based on services continue to work.
-nopolicy
Object name Object name of the Check Point Security Gateway defined in SmartConsole.
cprinstall get
Description Gets details of the products and the operating system installed on the specified
Check Point Security Gateway. It also updates the database.
Syntax:
> cprinstall get <object name>
Parameter Description
<object name> The name of the Check Point Security Gateway object defined in
SmartConsole.
Example:
cprinstall get gw1
Checking cprid connection...
Verified
Operation completed successfully
Updating machine information...
Update successfully completed
'Get Gateway Data' completed successfully
Operating system Major Version Minor Version
------------------------------------------------------------------------
SecurePlatform R75.20 R75.20
cprinstall install
Description Installs Check Point products on remote Check Point Security Gateways.
To install a product package you must specify a number of options. Use the cppkg print
command and copy the required options.
Syntax:
> cprinstall install [-boot] <Object name> <vendor> <product> <version> [sp]
Parameter Description
Object name Object name of the Check Point Security Gateway defined in SmartConsole.
Note - Before transferring any files, this command runs the cprinstall verify command
to verify that the operating system is appropriate and that the product is compatible with
previously installed products.
Example:
# cprinstall install -boot fred checkpoint firewall R70
cprinstall uninstall
Description Uninstalls products on remote Check Point Security Gateways.
To uninstall a product package you must specify a number of options. Use the cppkg print
command and copy the required options.
Syntax:
> cprinstall uninstall [-boot] <Object name> <vendor> <product> <version> [sp]
Parameter Description
Object name Object name of the Check Point Security Gateway defined in SmartConsole.
Note - Before uninstalling any files, this command runs the cprinstall verify command.
It verifies that the operating system is appropriate and that the product is installed.
After uninstalling, retrieve the Check Point Security Gateway data by running cprinstall get
Example
# cprinstall uninstall fred checkpoint firewall R75.20
cprinstall verify
Description Confirms these operations were successful:
• If a specific product can be installed on the remote Check Point Security Gateway.
• That the operating system and currently installed products are appropriate for the package.
• That there is enough disk space to install the product.
• That there is a CPRID connection.
Syntax:
> cprinstall verify <Object name> <vendor> <product> <version> [sp]
Parameter Description
Object name Object name of the Check Point Security Gateway defined in SmartConsole.
Example:
Successful - Verify succeeds
cprinstall verify harlin checkpoint SVNfoundation R75.20
cprinstall snapshot
Description Creates a snapshot <filename> on the Check Point Security Gateway.
Syntax:
> cprinstall snapshot <object name> <filename>
Parameter Description
Object name Object name of the Check Point Security Gateway defined in SmartConsole.
cprinstall show
Description Displays all snapshot (backup) files on the Check Point Security Gateway.
Syntax:
> cprinstall show <object name>
Parameter Description
Object name Object name of the Check Point Security Gateway defined in SmartConsole.
Example:
# cprinstall show GW1
SU_backup.tzg
cprinstall revert
Description Restores the Check Point Security Gateway from a snapshot.
Syntax:
> cprinstall revert <object name> <filename>
Parameter Description
<object name> Object name of the Check Point Security Gateway defined in SmartConsole.
cprinstall transfer
Description Transfers a package from the repository to a Check Point Security Gateway without
installing the package.
Syntax:
> cprinstall transfer <object name> <vendor> <product> <version> [sp]
Parameter Description
Object name Object name of the Check Point Security Gateway defined in SmartConsole.
control_bootsec
Enables or disables Boot Security. The command affects both the Default Filter and the Initial
Policy.
$FWDIR/bin/control_bootsec [-r] [-g]
Options Description
-r Removes boot security
fwboot bootconf
Configure boot security options. This command is in $FWDIR/boot.
$FWDIR/bin/fwboot bootconf <command> [value]
get_def none Returns the full path to the Default Filter that will be used on boot.
set_def <filename> Loads the file as the Default Filter in the next boot. The only safe and
recommended directory is $FWDIR/boot. (The default.bin
filename is a default name.)
Note - Do NOT move these files.
comp_init_policy
Use the comp_init_policy command to generate and load, or to remove, the Initial Policy.
This command generates the Initial Policy. It ensures that it will be loaded when the computer is
booted, or any other time that a Policy is fetched, for example, at cpstart, or with the fw fetch
localhost command. After running this command, cpconfig adds an Initial Policy if there is no
previous Policy installed.
$FWDIR/bin/comp_init_policy [-u | -g]
Options Description
-u Removes the Initial Policy, and makes sure that it will not be generated in the future
when cpconfig is run.
-g Generates the Initial Policy and makes sure that it is loaded the next time a policy is
fetched (cpstart, reboot, fw fetchlocalhost). After running this command,
cpconfig adds an Initial Policy when needed.
The comp_init_policy -g command will only work if there is no previous policy. If there is a policy,
make sure that after removing the policy, you delete the folder $FWDIR/state/local/FW1/. The
$FWDIR/state/local/FW1/ folder contains the policy that will be fetched when fw fetch localhost is
run.
The fw fetch localhost command is the command that installs the local policy. cpstart.
comp_init_policy creates the initial policy, but has a safeguard so that the initial policy will not
overwrite a regular user policy (since initial policy is only used for fresh installations or upgrade).
For this reason, you must delete the $FWDIR/state/local/FW1/ directory if there is a previous
policy, otherwise comp_init_policy will detect that the existing user policy and will not overwrite it.
If you do not delete the previous policy, the original policy will be loaded.
Options Description
-default Kills firewall processes (such as fwd, fwm, vpnd, snmpd). Logs, kernel traps,
resources, and security server connections stop.
The security policy in the kernel is replaced with the Default Filter.
-proc Kills firewall processes. Logs, kernel traps, resources, and security server
connections stop.
The security policy remains loaded in the kernel. Allow, reject, and drop rules
that do not use resources, only services, continue to work.