Workflow for Upgrading and Installing CloudGuard

Upgrading and Installing CloudGuard

To upgrade or install the CloudGuard Gateway for NSX, open the systems listed here:

  • vSphere Web Client

  • SmartConsole

  • Console or SSH connection

For first time installation

If you are installing CloudGuard for the first time, make sure to install the latest build of the CPUSE Deployment Agent from sk92449. After you install CloudGuard, continue with Step 4.

Use the steps below as a guide for your system.

Step

Procedure

Step 1: Installing the CloudGuard Service Registration Hotfix on the Management Server
Step 2: Upgrading the CloudGuard Service Registration Hotfix
Step 3: Upgrading the CloudGuard Gateway for NSX
Step 4: Configuring the VMware Components
Step 5: Providing the URL OVF Path
Step 6: Configuring the Management Server
Step 7: Registering a New CloudGuard Gateway Service
Step 8: Deploying and Configuring CloudGuard Security Gateway for NSX

Step 1: Installing the CloudGuard Service Registration Hotfix on the Management Server

  • Install the CloudGuard Service Registration Hotfix. See the corresponding section in sk114518.

Step 2: Upgrading the CloudGuard Service Registration Hotfix

You can upgrade from CloudGuard Service Registration v5 only.

Upgrading from v5 or v6

Using CPUSE to Install the Management Server Hotfix

Uninstalling the Hotfix

Before you uninstall the Hotfix:

Step 3: Upgrading the CloudGuard Gateway for NSX

You can upgrade the CloudGuard Gateway for NSX manually or with the CLI.

Before you start the upgrade, you have to enable the OVF files. See Step 5: Providing the URL OVF Path.

Important - Before the upgrade, make sure the service status in the vSphere web client is UP, or the upgrade fails.

Upgrading the CloudGuard Gateway with the CLI

Upgrading the CloudGuard Gateway Manually

Step 4: Configuring the VMware Components

Before you start these procedures, install and configure the required VMware component. You can install more than one ESXi.

Adding the vCenter IP Address to the Runtime Settings

To use VMware, you must add the vCenter IP address to the Runtime Settings tab on the vCenter Server Setting page.

Preparing the ESXi Cluster for CloudGuard Service Deployment

The sections below describe how to configure an ESXi cluster.

Adding an ESXi to an ESXi Cluster

Configuring Agent VM Host Settings

Removing an ESXi Server from an ESXi Cluster

NSX Grouping Objects

With the Grouping feature, you can create custom containers and assign resources, such as Virtual Machines and network adapters, for CloudGuard Service protection. After a group is defined, you can add the group as source or destination to a firewall rule.

Creating a Security Group

Creating a CloudGuard Gateway IP Address Pool

Creating an IP Set

vMotion

vMotion lets you migrate active Virtual Machines between ESXi servers.

Configure network interfaces on source and target ESXi servers. Configure each ESXi server with at least one network interface for vMotion traffic. To secure data transfer, make sure only trusted parties access the vMotion network. Additional bandwidth significantly improves vMotion performance. When you migrate a Virtual Machine with vMotion without using shared storage, the virtual disk contents are also transferred over the network.

Step 5: Providing the URL OVF Path

Install the OVF files to configure the Security Gateway. The CloudGuard Gateway package includes these files:

  • <file_name>.ovf

  • <file_name>.vmdk

  • <file_name>.mf

After you download the OVF file, create the default file location. Step 3 below shows the default file location that Check Point recommends on the Security Management Server or Multi-Domain Server.

You can also save it to another file location that is more appropriate for your system.

Use Case - Manually Selecting the OVF File Location

An administrator has a High Availability environment. He wants to store the SVM image on a distributed data store so his clients can have access to the files at any time.

After the administrator has downloaded the files, he can select the location of the folder.

Step 6: Configuring the Management Server

Create Data Center objects in SmartConsole to connect to the NSX Manager and the vCenter server.

Configuring the Security Management Server or Multi-Domain Server Properties

Log in to Expert Mode to run the command cloudguard_config

Step 7: Registering a New CloudGuard Gateway Service

If this is the first registered service, select a management administrator and enter the correct password to continue. These credentials are given to the NSX Manager that uses the credentials as identification for all the operations done by the Security Management Server or Multi-Domain Server.

Make sure the administrator has Management API login permission.

In a Multi-Domain Server environment, make sure the administrator has permissions on the relevant domain for the Domain Management Server.

Configuring Tap/Monitor Mode

When you register a service with the Tap/Monitor Mode, CloudGuard Gateway for NSX can listen to traffic that is redirected to it, without interfering with the traffic.

The original packets continue on their path through the network, and a duplicate packet is sent to the CloudGuard Gateway enabled with the Tap/Monitor Mode.

You can use Tap Mode combined with Threat Prevention Tagging to share security events with NSX Manager and achieve prevention, without deploying the solution inline.

Configuring IPv6 Support

If you want the service to support IPv6 traffic, select On.

Note - You can change this setting at any time. See the R80.10 Gaia Administration Guide - Chapter System Management - Section System Configuration.

If you want to optimize service, select y. If you selected to optimize:

  • The service can use all cores that are used to inspect IPv4, to inspect IPv6 also. If you do not choose to optimize, only a maximum of two cores are used to inspect IPv6 traffic.

    On each CloudGuard Gateway, you can configure the number of IPv6 CoreXL FW instances to inspect IPv6 traffic.

    Run cpconfig, select Check Point CoreXL, and follow the on-screen instructions.

  • Most of the traffic passing through the CloudGuard Gateway is IPv6 traffic.

Changing the Failure Policy

Automatic Provisioning of CloudGuard Objects

Automatic Provisioning handles these actions on CloudGuard objects:

  • Creates CloudGuard objects (Clusters or Gateways) on the Security Management Server or Multi-Domain Server when it receives a notification from the NSX Server.

  • Automatically initializes SIC between the CloudGuard Gateway and the Security Management Server or Multi-Domain Server.

  • Installs the policy on new Security Gateways if the CloudGuard Cluster Object already has a policy.

Uninstalling the CloudGuard Gateway Service

Important - Do not use this procedure for an upgrade.

Uninstall the CloudGuard Gateway service before you uninstall CloudGuard from the Security Management Server or Multi-Domain Server.

Automatic Provisioning in SmartConsole

  • If you did not enable Automatic Provisioning, delete the cluster object.

  • If you did enable Automatic Provisioning, wait for the objects to be deleted from SmartConsole.

This stops the process on the Security Management Server or Multi-Domain Server, from which you did not remove the service.

Management High Availability Failover

Failover from an Active Management Server (Security Management Server or Multi-Domain Server) to the Standby Management Server is done manually. You must manually synchronize the Management Servers before and after failover. To learn more, see the section Synchronization Procedures in the relevant Security Management Administration Guide.

To learn more about failover, see the section Changing a Server to Active or Standby in the relevant Security Management Administration Guide

Step 8: Deploying and Configuring CloudGuard Security Gateway for NSX

Check Point CloudGuard Gateway enforces adaptive security across virtual environments. It applies advanced Threat Prevention to block threats inside the Data Center, and micro-segmentation for access control inside the virtual environment.

Deploying CloudGuard Gateway

After you complete service registration (see Step 7: Registering a New CloudGuard Gateway Service), you can deploy the CloudGuard Gateway with the vSphere Web Client.

Deploying the Service

This procedure uses an Agent VM (see Configuring Agent VM Host Settings), for an environment with a local datastore.

The system copies the OVF to the vCenter, and deploys it to all ESXi hosts on the selected clusters.

See the Installation Status in the Service Deployments tab to monitor the progress of the deployment from the vSphere client.

When installation completes, the CloudGuard Gateway automatically reboots.

Configuring NSX to Redirect Traffic to the CloudGuard Gateway

This procedure describes basic steps to configure a Security Group. See the VMware documentation for conceptual information, detailed procedures, and explanations of the different objects and options.

Configure the NSX security policy to redirect traffic to Check Point entities. Create rules in this policy, in pairs:

  • Rule for traffic from the Security Group (Source = Security Group)

  • Rule for traffic to the Security Group (Destination = Security Group)

Creating Security Policy

Excluding Virtual Machines from Distributed Firewall Protection

You can exclude a set of Virtual Machines from distributed firewall protection. For a Virtual Machine with multiple vNICs, all are excluded from firewall protection. NSX Manager and service Virtual Machines are automatically excluded from firewall protection.

Preventing Traffic Redirection to the CloudGuard Service

NSX IP Mappings for Virtual Machines

NSX redirection policies based on Virtual Machine names or other dynamic attributes, require IP mapping of the Virtual Machines.

Manually Creating CloudGuard Cluster Objects

This procedure is not necessary if you enabled Automatic Provisioning of CloudGuard objects.

Create a cluster object with CloudGuard Gateway members. Each CloudGuard Gateway gets the license attached to the cluster.

Multi-Tenancy Support

CloudGuard supports multi-tenant protection on ESXi. That means it can protect multiple customers or organizations as well as departments or business units that share the same ESXi cluster.

Depending on the requirements, these solutions may provide multi-tenant protection:

  1. Dedicated cluster for each tenant.

    Each tenant's traffic is handled by a single service deployed on the cluster, enforcing the Security Policy that applies to the security groups for the specific tenant.

  2. Tenants share the same cluster.

    This solution requires a service registration for each tenant. Manage each tenant through a different service. To control the tenant traffic redirection, separate security groups have to be created for each tenant (see, Creating a Security Group).

Manual Activation of the CloudGuard Gateway

This procedure is not necessary if you configured the system for Automatic Provisioning of CloudGuard Objects or Automatic Assignment of IP addresses to CloudGuard Gateways.

 

 

CloudGuard for NSX Administration Guide