Advanced Configuration
Configuring the Security Management Server
Important - If you deploy a new Management Server Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. with the Transit Gateway template, all configuration is applied automatically. In such case, skip this entire section.
Use these instructions to configure the Transit service, which controls CloudGuard's integration to AWS Amazon® Web Services. Public cloud platform that offers global compute, storage, database, application and other cloud services. Endpoints that seamlessly operate the AWS Transit Hub solution.
For examples of other configuration, see Examples of 'autoprov_cfg' Configuration.
Configuring the Auto_Provisioning
Automation
There are two options to configure auto_provisioning
for the first time on the Security Management Server Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server.:
Options | Description |
---|---|
Recommended |
Configuration with the CloudGuard Auto Scaling Transit Gateway First Time Configuration Wizard |
Advanced |
Configuring the Security Management Server with the 'autoprov_cfg' Utility |
Configuring the Security Management Server with the 'autoprov_cfg
' Utility
Important - If you have an existing configuration for different CloudGuard solutions, make sure not to initialize your configuration. Add the Controller or Template for the Transit Gateway solution with the applicable configuration.
This utility configures the Check Point Security Management Server with all the settings needed for Transit:
-
Connect to the command line on the Check Point Security Management Server.
-
Log in to the Expert mode.
-
Run all the commands below.
Commands and their description:
autoprov_cfg init AWS -mn "<MANAGEMENT-NAME>" -tn "<TEMPLATE-NAME>" -otp "<SIC-KEY>" -ver <recommended_version> -po "<POLICY-NAME>" -cn "<CONTROLLER-NAME>" -r "<REGIONS>" -iam
Initializes configuration with IAM credentials.
Options:
-
-mn
- Specifies the name of the Security Management Server -
-tn
- Specifies the template name -
-otp
- Specifies the one-time SICSecure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server. password
-
-ver
- Specifies the Gateway version -
-po
- Specifies the name of the policy package -
-cn
- Specifies the name of the Controller -
-r
- Specifies the list of regions, separated by commas -
-iam
- Specifies to use IAM to connect to AWS
-
-
autoprov_cfg set controller AWS -cn "<CONTROLLER-NAME>" -sg -sv -com "<VPN-COMMUNITY-NAMES>" -sn "<SUBACCOUNT-NAME> -ssr <STS-ROLE-ARN>
Sets Controller with the required attributes for transit.
Options:
-
-sg
- Specifies to scan gateways (enables CME) -
-sv
- Specifies to scan VPN (enables Transit) -
-com
- Specifies the list of VPN communities allowed to be used by this Controller -
-sn
- Specifies the custom name for your sub-account -
-ssr
- Specifies the STS role name of trustee (spoke account)
-
-
autoprov_cfg set template -tn "<TEMPLATE-NAME>" -vpn -vd "" -con "<VPN-COMMUNITY-NAME>" -dt TGW
Sets template with the required attributes for transit.
Options:
-
-vpn - Enables the IPsec VPN
Check Point Software Blade on a Security Gateway that provides a Site to Site VPN and Remote Access VPN access. blade on gateways
-
-vd - Specifies the name of the VPN Domain object
-
-con - Specifies the name of the VPN Community
-
-dt - Specifies the deployment type
-
-
autoprov_cfg show all
Shows all the used configurations.
Run this command to confirm all the configurations are correct.
-
Run this command to test the configuration:
service cme test
Make sure there are no errors.
If the test ends with any error, see the Troubleshooting section.
Examples of 'autoprov_cfg
' Configuration
Learn how to use the autprov_cfg
utility to configure different deployment scenarios.
Notes:
-
The examples below apply only if you did not run the
tgw-menu
command. see Note - Steps 1-4 apply only if you did not run the tgw-menu command. -
The CloudGuard Auto Scale is always the primary account.
-
In the examples below, replace the bolded variables, with values in your environment.

Scanning the Transit Gateways and AWS Transit Gateway account is authenticated with the management IAM role only.
-
autoprov_cfg init AWS -mn "my-mgmt" -tn "my-template" -otp "my-one-time-password" -ver <recommended_version> -po "my-policy" -cn "my-controller" -r "us-east-1" -iam
-
autoprov_cfg set controller AWS -cn "my-controller" -sg -sv -com "my-vpn-community"
-
autoprov_cfg set template -tn "my-template" -vpn -vd "" -con "my-vpn-community" -dt TGW

Add a sub-account to the Controller with an STS role on the spoke account for scanning the AWS Transit Gateway.
The Management IAM role scans the Auto Scale account.
-
autoprov_cfg init AWS -mn "my-mgmt" -tn "my-template" -otp "my-one-time-password" -ver <recomended_version> -po "my-policy" -cn "my-controller" -r "us-east-1" -iam
-
autopmrov_cfg set controller AWS -cn "my-controller" -sg -sv -com "my-vpn-community"
-
autoprov_cfg set template -tn "my-template" -vpn -vd "" -con "my-vpn-community" -dt TGW

Trust between the Management and CloudGuard Auto Scale accounts is done with STS roles.
Add a sub-account to the Controller with an STS role on the spoke account to allow scanning of the AWS Transit Gateway.
Add an STS role for the transit account on the Controller to scan gateways.
-
autoprov_cfg init AWS -mn "my-mgmt" -tn "my-template" -otp "my-one-time-password" -ver <recommended_version> -po "my-policy" -cn "my-controller" -r "us-east-1" -ak "my-aws-main-access-secret-key" -sk "my-aws-main-cred-secret-key"
-
autoprov_cfg set controller AWS -cn "my-controller" -sg -sv -com "my-vpn-community" -sn "my-account" -ssr "arn:aws:iam::123456789012:role/SpokeAccountRole"
-
autoprov_cfg set template -tn"my-template" -vpn -vd "" -con "my-vpn-community" -dt TGW

Add a sub-account to the Controller with an STS role on the spoke account for spoke scanning.
Add an access key and a secret key of a user with programmatic access on the transit account on the Controller, to scan gateways.
-
autoprov_cfg init AWS -mn "my-mgmt" -tn "my-template" -otp "my-one-time-password" -ver <recommended_version> -po "my-policy" -cn "my-controller" -r "us-east-1" -ak "my-aws-main-access-secret-key" -sk "my-aws-main-cred-secret-key"
-
autoprov_cfg set controller AWS -cn "my-controller" -sg -sv -com "my-vpn-community" -sn "my-account" -ssr "arn:aws:iam::123456789012:role/SpokeAccountRole
" -
autoprov_cfg set template -tn "my-template" -vpn -vd "" -con "my-vpn-community" -dt TGW
Configuring the VPN Community with the 'config-community.sh
' Script
This script creates a VPN Community with all the settings needed for Transit:
-
Connect to the command line on the Check Point Security Management Server.
-
Log in to the Expert mode.
-
Run:
/opt/CPcme/menu/additions/config-community.sh "<VPN-COMMUNITY-NAME>"
Example:
/opt/CPcme/menu/additions/config-community.sh "Transit-VPN-Community"
Configuring the Multi-Domain Server
To configure the Multi-Domain Server:
Note - Steps 1-4 apply only if you did not run the tgw-menu command.
-
Connect to the command line on the Check Point Multi-Domain Server
Dedicated Check Point server that runs Check Point software to host virtual Security Management Servers called Domain Management Servers. Synonym: Multi-Domain Security Management Server. Acronym: MDS..
-
Log in to the Expert mode.
-
Execute the
autoprov-cfg
utility on the Multi-Domain Server. See sk120992. -
Execute the
config-community.sh
script on the Multi-Domain Server:/etc/fw/scripts/autoprovision/config-community.sh"<VPN-COMMUNITY-NAME>" "<DOMAIN_NAME>"
Replace the "
<DOMAIN_NAME>
" with the name of your Domain. -
Tag the Transit Gateway and its route tables on a Multi-Domain Server.
On a Multi-Domain Server, you have to indicate the specific Domain, on which Transit has to manage the VPN connection to the spoke VPC.
Therefore, the tag value structure for the spoke VPC also must have the Domain name.
Tag Key:
x-chkp-vpn
Tag Value:
<MANAGEMENT_NAME>/<DOMAIN_NAME>/<VPN_COMMUNITY_NAME>
Where:
-
<MANAGEMENT_NAME>
- Specifies the name of your Multi-Domain Server. Use the same name you used when you executed theautoprov_cfg
command. -
<DOMAIN_NAME>
- Specifies the name of the Domain as defined in the SmartConsoleCheck Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on..
-
<VPN_COMMUNITY_NAME>
- Specifies the name of your VPN Community. Use the same name you used when you created the VPN Community
-
Provisioning CloudGuard Gateways with Private IP addresses from an On-Premises Management Server
AWS Transit Gateway enables your on-premises Management Server to manage the CloudGuard Gateways that are assigned Private IP addresses. See the Architecture section.

-
In Amazon VPC console, go to the Create Customer Gateway tab.
-
Create a new Customer Gateway with the IP address of your Corporate Gateway.
-
Create a VPN Attachment to the Transit Gateway Transit Gateway, which you created in the Deploying the AWS Transit Gateway section.
-
In Amazon VPC console, go to the Site-to-Site VPN connection tab.
Make sure a VPN connection is created and established.
-
Configure the Transit Gateway Attachment to the Transit Auto Scaling Group VPC:
-
Add a route in the Transit ASG VPC route table:
Destination:
<MANAGEMENT_IP>
Target: Transit Gateway ID
-
In Amazon VPC console, go to the Transit Gateway Route Tables tab.
-
Configure a Corporate route table:
-
Create a Corporate route table.
-
Associate the Corporate Gateway VPN attachment to this route table.
-
Propagate the route table to the Transit Gateway Auto Scale VPC attachment. This creates a route from the Corporate Gateway to the Transit Gateway Auto Scale VPC.
-
-
Configure a Transit Auto scaling route table.
-
Create a Transit Auto scaling route table.
-
Associate the Transit Gateway Auto Scale VPC attachment to this route table.
-
Propagate the route table to the Transit Gateway Corporate Gateway VPN attachment.
-
Create a static route from the Transit Gateway Auto Scale VPC to the Management Server CIDR using the Corporate Gateway attachment.
-
Configuring Inbound Auto Scaling through a Transit Gateway
AWS Transit Gateway supports inbound traffic through CloudGuard Auto Scaling Group.
Follow these steps to configure the AWS Transit Gateway:
-
Configure Inbound Auto Scaling on Amazon side.
-
Configure Inbound Auto Scaling on Check Point side.
Configuring Inbound Auto Scaling on Amazon Side
To configure Inbound Auto Scaling on Amazon side:
-
Deploy the CloudGuard Auto Scaling Group in a dedicated VPC. See sk112575 - "Section (4) Configuration".
Notes:
-
Place the Internal Load Balancer in the spokes VPC with the services you want to get.
-
Deploy the CloudGuard External Load Balancer using the public subnets. Configure the Attachment to the Transit Auto Scaling Group VPC: Create the Attachment to the ASG VPC.
-
- Configure the Transit Gateway Attachment to the Transit Auto Scaling Group VPC:
Associate the ASG subnets to a route table.
The route table must contain a default route to the Internet Gateway and specific routes for the spokes to the Transit Gateway.
Route 1:
Destination:
<SPOKES_CIDR_INITIAL>
Target: Transit Gateway ID
Route 2:
Destination:
0.0.0.0/0
Target: Internet Gateway ID
-
In Amazon VPC console, go to the Transit Gateway Route Tables tab.
-
Configure an inbound checkpoint route table to associate the CloudGuard ASG VPC attachment:
-
Create an inbound checkpoint route table.
-
Associate the CloudGuard ASG VPC attachment to this route table.
-
Propagate the route table to the applicable Spoke VPCs for inbound traffic.
This creates a route from the CloudGuard ASG to the applicable Spoke VPCs.
-
-
Configure an inbound spokes route table to propagate the applicable Spoke VPCs to the ASG VPC attachment:
-
Create an inbound spokes route table.
-
Associate the spoke VPCs attachment to this route table.
-
Propagate the route table to the ASG VPC attachment.
This creates a route from the applicable Spoke VPCs to the CloudGuard ASG.
Note - To support outbound traffic and East-West traffic for these Spoke VPCs, you must add the dedicated tag.
Tag Key:
x-chkp-vpn
Tag Value:
<MANAGEMENT-NAME>/<VPN-COMMUNITY-NAME>/propagate
Where:
-
<MANAGEMENT-NAME>
- Specifies the name of the Management Server. Use the same name you used when you executed the step - Configuring the Security Management Server with the 'autoprov_cfg' Utility. -
<VPN-COMMUNITY-NAME>
- Specifies the name of the VPN Community. Use the same name you used when you created the Configuring the VPN Community with the 'config-community.sh' Script. propagate
- Specifies that the auto provisioning service propagates dynamically the spokes to the CloudGuard Transit Gateway VPN tunnels in the route table.
-
-
Associate the applicable Spoke VPCs to this route table.
-
Configuring Inbound Auto Scaling on Check Point Side
To configure Inbound Auto Scaling on the Check Point Side:
-
Connect the command line to the Management Server.
-
Log in to the Expert mode.
-
Use the autoprov_cfg CLI utility to add the "
-slb
" attribute to the main Controller:autoprov_cfg set controller AWS -cn "<CONTROLLER-NAME>" -slb
-
Use the autoprov_cfg CLI utilityto create an additional template for the Auto Scale:
autoprov_cfg add template -tn "<NEW-TEMPLATE-NAME>" -otp "<SIC-KEY>" -ver <recommended_version> -po "<POLICY-NAME>"
Configuring Cross Account Spoke VPCs
To configure Cross Account spoke VPCs
-
When you create the AWS Transit Gateway, enable the Auto accept shared attachments.
-
Follow the instructions in the AWS Documentation > Amazon VPC > Transit Gateways > Working with Transit Gateways > Transit Gateways - section Sharing a Transit Gateway.
-
Follow the instructions in the AWS Documentation > Amazon VPC > Transit Gateways > Working with Transit Gateways > Transit Gateways - section Accepting a Resource Share.
-
Attach all Spoke VPCs in each account to the Transit Gateway you just created. At this point, the attachment has a "pending acceptance" status.
-
In the main account, go to the Transit Gateway and accept all pending transactions.
-
Add a default route to the Transit Gateway in each Spoke VPC route table:
Destination:
0.0.0.0/0
Target: Transit Gateway ID
Note - The route table must be the route table, in which the associated subnets are those attached to the Transit Gateway.
AWS Transit Gateway, Outbound Auto Scale, and Management in Cross-Accounts
If you want to update the Amazon Machine Image (AMI) or the Version of the Transit Gateway Auto Scaling Group, see sk112575.
Static Routes

-
Connect to the command line in the Management Server.
-
Log in to Expert mode.
-
Use the
autoprov_cfg
CLI utility to set the static routes that must be created on the Security Transit Gateway Auto Scaling Group's configuration template.Run:
autoprov_cfg set template -tn <TEMPLATE_NAME> -gtr <COMMA_SEPARATED_LIST_OF_CIDRS>
-
To test the configuration, log in to Clish, and then run this command on one of the provisioned Gateways to make sure that the static routes were created.:
show configuration static-route
Note - To add a CIDR, set the flat with the existing CIDRs as well.
Re-Advertising Spoke Routes
To activate the CloudGuard TGW gateway to Re-advertise the spoke route's CIDRs.
-
Connect to the command line on the Check Point Management Server.
-
Log in to the Expert mode.
-
Use the
autoprov_cfg
CLI utility to set the CIDR to be re-advertised by the Gateways.Run:
autoprov_cfg set template -tn <TEMPLATE_NAME> -gsr <COMMA_SEPARATED_LIST_OF_CIDRS>
-
Test the configuration:
-
In the AWS console, go the propagated tagged TGW route tables. The route tables show a route to each spoke CIDR added in the configuration.
-
On of the provisioned Gateway, log in to Clish, and then run:
show configuration routemaps
-
Important - Make sure that the maps were created (starting with spoke-
)
Note - To add a CIDR, set the flag with the existing CIDRs as well.
Updating the Auto Scaling Group
|
Notes:
|
Updating AMI
-
For Launch Template:
-
Find the target AMI ID:
-
Open AWS Marketplace and search for CloudGuard.
-
Select the listing matching the one used to deploy the autoscaling group.
-
Click Continue to subscribe.
-
Click Continue to configuration.
-
Select the target version and build (For example: R81.20-631.1427).
-
Select the region of your autoscaling group.
-
Copy the AMI ID.
-
-
Update the autoscaling group launch template:
-
Open the Amazon EC2 console.
-
From the main menu bar select Launch Templates and select the launch template of the Auto Scaling Group.
-
Click Actions > Modify template (Create new version).
-
In Auto Scaling Guidance Check Provide guidance to help me set up a template that I can use with EC2 Auto Scaling.
-
Go to Application and OS Images (Amazon machine image) and click Browse more AMIs.
-
In the search box enter the AMI-ID (“ami-xxxxxxxxxxxxxxxxx”) copied in step #1.
-
Click the Community AMIs tab.
-
Click the Select button next to the AMI matching the AMI-ID you pasted in the search bar.
-
If you get the alert: Some of your current settings will be changed or removed if you proceed, review the changes and Confirm if you agree.
-
-
In Network settings section mark Select existing security group.
-
Examine your configuration in all other sections and create the launch template version.
-
-
From the Navigation Toolbar, select Auto Scaling Groups.
-
Select the applicable Auto Scaling Group, click Edit.
-
In the Launch Template section, select the new version and select Update.
-
To apply this update, manually stop the Security Gateways one by one. The Auto Scaling Group deploys new Gateways with the updated AMI and not with the terminated gateways.
-
-
For Launch Configuration:
-
Open the Amazon EC2 console.
-
From the Primary menu bar, select Launch Configurations and select the launch configuration of the Auto Scaling Group.
-
Click Actions > Copy launch configuration.
-
Go to Amazon machine image (AMI) and select the new AMI.
Follow these steps to find the desired AMI id:
-
Open the AWS Marketplace.
-
Search for Check Point and click on the relevant product listing.
-
Click Continue to Subscribe.
-
Click Continue to Configuration.
-
Select the relevant Software Version and Region.
-
Copy the Ami Id.
-
-
Examine your configuration in all other sections and create the launch configuration.
-
From the Navigation Toolbar, select Auto Scaling Groups.
-
Select the applicable Auto Scaling Group, click Edit.
-
In the Launch Configuration section, select the newly created launch configuration, named the same as the previous configuration with Copy concatenated to it, and select Update.
-
To apply this update, manually stop the Security Gateways one by one. The Auto Scaling Group deploys new Gateways with the updated AMI and not with the terminated gateways.
-
|
Notes -
|
Replace launch configuration with launch template
-
Copy a launch configuration to a launch template:
-
Open the Amazon EC2 console.
-
In the navigation pane under Auto Scaling, select Launch Configurations.
-
Select the launch configuration to copy and select Copy to launch template > Copy selected. It creates a new launch template with the same name and options as the selected launch configuration.
-
For New launch template name, use the name of the launch configuration (the default) or enter a new name. The launch template names must be unique.
-
Select Copy.
-
-
Replace the launch configuration for an Auto Scaling group:
-
Open the Amazon EC2 console.
-
In the navigation pane, select Auto Scaling Groups.
-
Select the check box next to your Auto Scaling group.
A pane opens at the bottom of the page with information about the selected group.
-
On the Details tab, select Launch configuration, Edit.
-
Select Switch to launch template.
-
For Launch template, select your launch template.
-
For Version, select the launch template version as necessary. After you create versions of a launch template, you can specify if the Auto Scaling group uses the default or the latest version of the launch template when scaling out.
-
When complete, select Update.
-