Upgrade
Side-by-Side Upgrade
Side-by-Side upgrade results in a new NVA Network Virtual Appliance - A resource deployed in Azure's Virtual Hub that includes Security Gateways and other networking infrastructure. with new Gateways deployed.
The IP addresses of the new Gateways are different from the old Gateways IP's.
Follow this procedure:
-
Deploy a new NVA in the Virtual Hub (with a public IP address if you need ingress traffic.).
-
Custom configurations adjustments (if required)
-
Configure the Security Gateways of the NVA with SmartConsole
Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on.: Adjust the Security Policy
Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. to include the new Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. IP.
-
If there is configuration on related machines, update them to use the updated IP (for example BGP settings).
-
-
If Ingress traffic is configured:
-
Delete the configured ingress rules using CME API.
-
Detach the public IP address from the old NVA SLB
Software Load Balancer, used to distribute tenant and tenant customer network traffic to virtual network resources. SLB enables multiple servers to host the same workload, providing high availability and scalability.
-
Attach the public IP address to the new NVA.
-
Establish the load balancing and NSG rules.
-
Confirm that the NAT rules are correctly aligned.
-
-
Install the policy on the new Security Gateways.
-
Navigate to the Virtual Hub and select Routing Intent and Routing Policies.
-
In Next Hop Resource select the new NVA instead of the previous NVA.