Configure Cloud Management Extension (CME)

Downloading and Installing the Latest CME Version

To download and install the CME (Cloud Management Extension) on the Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. or Multi-Domain ServerClosed Dedicated Check Point server that runs Check Point software to host virtual Security Management Servers called Domain Management Servers. Synonym: Multi-Domain Security Management Server. Acronym: MDS., see sk157492.

Configuring the CME on the Security Management Server

The instructions below contain information about how to configure a VMSS environment in CME. For more information about CME configurations, see the "Overview" section in the Cloud Management Extension Administration Guide.

Configure the CME on the Security Management Server with CME API (recommended)

With CME Management API you can configure the CME tool.

API Documentation:

Prerequisites:


  1. To configure Security Management Server during the CloudGuard Network Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. for Azure VMSS deployment:

    Send a PUT request:

    PUT https://<Management_IP_address>/web_api/v1.8/cme-api/v1.2.3/management

    Request body parameters:

    Parameter Name

    Description

    name

    Your Azure account name (for example, "my-management").

    This operation returns "status-code": 200.

  2. To configure CME on the Security Management Server:

    • With Azure IAM:

      Prerequisite: Security Management Server virtual machine is using a system-assigned managed identity.

      Send a POST request:

      POST https://<Management_IP_address>/web_api/v1.8/cme-api/v1.2.3/azure

      Request body parameters:

      Parameter Name

      Description

      name

      Your Azure account name.

      subscription

      The resource group containing your Security Management Server.

      iam

      Enable/disable IAM. Must be set to true.

      This operation returns "status-code": 200.

    • With Microsoft Entra ID and Service Principal:

      Send a POST request:

      POST https://<Management_IP_address>/web_api/v1.8/cme-api/v1.2.3/azur

      Request body parameters:

      Parameter Name

      Description

      name

      Your Azure account name.

      subscription

      The resource group containing your Security Management Server.

      directory_id

      The Azure Active Directory tenant ID.

      application_id

      The service principal's client ID value.

      client_secret

      The service principal's client secret value.

      This operation returns "status-code": 200.

  3. To configure gw_conf:

    Send a POST request:

    POST https://<Management_IP_address>/web_api/v1.8/cme-api/v1.2.3/gwConfigurations/azure

    Request body parameters:

    Parameter Name

    Description

    name

    The name of the relevant set of VMSS configurations to apply (for example, "my-configuration-template-for-x").

    base64_sic_key

    A random value that has at least 8 alphanumeric characters (for example, "MySICkey123").

    version

    The Security Gateway version.

    policy

    The name of the policy to install (for example, "Standard").