Connecting Gateways and Clusters
Connecting on-premises Security Gateway or CloudGuard Network Security Gateway

-
From the left navigation panel, click Gateways & Servers.
-
Click the New icon
or a
button and select Gateway....
The Check Point Gateway properties window opens.
-
Fill in the required fields for the Check Point Security Gateway:
-
Enter name - The name for the Security Gateway.
-
IP Address
-
Automatic IPv4 address: The Security Gateway's IP address is set to an internal IP address used for cloud communication over an outbound tunnel.
-
Custom IPv4 address: Configure a static IP address if it is not an SD-WAN Gateway.
You can configure the Security Gateway object in Smart-1 Cloud with a static IP address as the primary IP address (in the same way you configure a Security Gateway from an on-premises Security Management Server).
When you configure the Security Gateway object with a Tunnel IP address, management traffic, control connections, and Smart-1 Cloud tenant communications use this main static IP address through the maas_tunnel interface.
Note - We recommend using a static IP address when available, unless configuring an SD-WAN Gateway.
This simplifies configuration for features such as UserCheck, NAT rules, and VPN configuration.
-
-
-
In the Device section, click Connect.
The Connect Device window opens.
-
In the Security Gateway section, select Appliance/Open Server.
-
Connect to the CLI on the Security Gateway. In Clish, run the provided command to set the authentication token. The initial connection status is Pending connection. After the Security Gateway connects to Smart-1 Cloud, the status changes to Connected.
-
To establish Secure Internal Communication (SIC) between the Security Gateway and Smart-1 Cloud, enter the one-time password you set on the Security Gateway.
-
Click Next and wait until the Security Gateway connection process finishes. Then close the Connect Device window.
-
Click OK.
If you have an existing Security Gateway object configured with a Tunnel IP address, follow these steps to change it to a static IP address:
-
Edit the Security Gateway object in SmartConsole:
-
Click Register.
This creates a new Security Gateway object in Smart-1 Cloud with the name you entered.
-
Click Connect Gateway.
-
For an on-premises Security Gateway, follow the on-screen instructions to complete the connection.
Note - Connecting a new Security Gateway involves two steps:
-
Connect the Security Gateway to the service by performing the required steps on the Security Gateway as instructed. When completed, the status in the portal shows Pending SIC.
-
Connect the Security Management Server to the Security Gateway by logging into SmartConsole and establishing SIC between the Security Management Server and Security Gateway. When complete, the portal shows Registration complete.
-
-
For a CloudGuard Network Security Gateway:
-
Copy the Token from the Connect Gateway screen.
-
In the Security Gateway deployment template:
-
Paste the Token into the appropriate field.
-
Complete all other required fields and start the deployment.
-
When Security Gateway deployment completes:
-
A tunnel is established between the Security Gateway and Smart-1 Cloud.
-
The Security Gateway status changes to Pending trust (SIC) establishment.
-
-
-
Connect to SmartConsole, open the new Security Gateway object, initialize SIC, and publish the session.
Note - Connecting CloudGuard Security Gateway is supported across all major public cloud providers (AWS, Azure, GCP).
-
-
Connecting a Cluster


-
From the left navigation panel, click Gateways & Servers.
-
Click the New icon
or a
button and select Cluster....
The Check Point Cluster window opens.
Note - Web SmartConsole supports configuration of a Security Gateway/Cluster object for Gaia OS versions R80.10 and higher.
-
Fill in the required fields:
-
Enter Name: The Cluster name.
-
IP address: The Cluster VIP IP address.
-
-
Click Add... next to Member ID 1.
The Check Point Cluster Member window opens.
-
Enter the name and IP address of Member ID 1.
Notes:
- Automatic IPv4 address: The Security Gateway's IP address is set to an internal IP address used for cloud communication over an outbound tunnel.
-
Custom IPv4 address: Configure a static IP address if it is not an SD-WAN Gateway.
-
Click Connectin the Secure Internal Communication section.
The Connect Device window opens.
-
In the Security Gateway section, select the Cluster Gateway type.
-
Follow the on-screen instructions to connect the Cluster member to the Smart-1 Cloud management.
-
When the Connection Status changes to Connected, click Next.
-
To establish Secure Internal Communication (SIC) between the Cluster member and Smart-1 Cloud, enter the one-time password you set on the Cluster member.
-
Click Next and wait until the Cluster member connection process finishes. Then close the Connect Device window.
-
-
Click Add... next to Member ID 2.
Follow steps 4.a-4.g again for this member.
-
Navigate to the Network Management tab.
-
Click Get Interfaces > Get Interfaces With Topology.
-
Click the MaaS Tunnel interface, and in General > Network Type section, select Private.
-
On the same MaaS Tunnel settings page, in Advanced > Monitoring section, make sure the Monitored Interface checkbox is cleared.
-
Finalize the topology definitions for the cluster.
-
Install the policy.

-
From the left navigation panel, click Gateways & Servers.
-
Click the New icon
or a
button and select Cluster....
The Check Point Cluster window opens.
Note - Web SmartConsole supports configuration of a Security Gateway/Cluster object for Gaia OS versions R80.10 and higher.
-
Fill in the required fields:
-
Enter Name: The Cluster name.
-
IP address: The Cluster VIP IP address.
-
-
Click Add... next to Member ID 1.
The Check Point Cluster Member window opens.
-
Enter the name and IP address of Member ID 1.
Note:
- Automatic IPv4 address: The Security Gateway's IP address is set to an internal IP address used for cloud communication over an outbound tunnel.
-
Custom IPv4 address: Configure a static IP address if it is not an SD-WAN Gateway.
-
Click Connect below the Secure Internal Communication.
The Connect Device window opens.
-
Select Appliance/Open Server in the Cluster Gateway type.
-
Copy the Token from the Connect Device screen.
-
-
Click Add... next to Member ID 2.
Follow steps 4.a-4.d again for this member.
-
In the Security Cluster deployment template:
-
Paste the Tokens you copied from the Smart-1 Cloud portal for each member into the appropriate fields.
-
Fill in all remaining fields in the template and start the deployment.
-
When the CloudGuard Network Security Gateway deployment completes:
-
A tunnel is established between the Security Gateway and the Smart-1 Cloud.
-
The status of the Security Gateway changes to Pending trust (SIC) establishment.
-
-
-
In SmartConsole or Streamed SmartConsole:
Follow the administration guide specific to your deployed solution to configure the Cluster object and Cluster members in SmartConsole.
Notes:
-
When you enter the Cluster Virtual IP address, do not use IP addresses from these subnets:
-
100.64.x.x
-
100.70.x.x
-
100.71.x.x
-
100.100.x.x
-
100.101.x.x
-
-
When you add cluster members to the cluster object, use the existing members created in step 1.
-
Onboarding a new Quantum appliance using Zero Touch deployment

Follow these steps to deploy a new appliance in Zero Touch mode and configure it as a Security Gateway or Cluster Member.
-
Remove your new appliance from the shipping carton, connect the power cable, and turn on the appliance.
-
Wait for the light on one of the network interface ports to start blinking, then:
-
If you have a DHCP server:
Connect the network cable to the blinking interface port.
Make sure this connection leads to the environment with a working DHCP server.
-
If you do not have a DHCP server:
Configure an interface with the appropriate networking settings:
-
Connect to the command line on the appliance.
-
In Expert mode, disable Zero Touch DHCP:
/opt/CPzetc/bin/zetc_setlaunch 0
-
In Gaia Clish, configure the IP address:
set interface <Name of Interface> on
set interface <Name of Interface> ipv4-address <IPv4 Address> mask-length <Subnet Mask Length>
-
In Gaia Clish, configure the default route:
set static-route default nexthop gateway address 192.168.1.254 off
set static-route default nexthop gateway address <IPv4 Address> on
-
In Gaia Clish, configure DNS servers:
set dns primary <IPv4 Address>
set dns secondary <IPv4 Address>
set dns tertiary <IPv4 Address>
-
In Gaia Clish, save the configuration:
save config
-
Plug the network cable into the configured interface port.
-
-
-
Go to the Connect Gateways page in the Smart-1 Cloud portal.
-
Wait for your appliance to appear (this typically takes 2-3 minutes).
Note - If your appliance does not appear, check the Service and Contract page.
-
Click on your appliance's card, enter the required information, and click OK.
To replace an existing Security Gateway, click the arrow next to the Configure Device button.
-
Follow the on-screen instructions in the portal.
-
After the card status changes to Registration completed, you can configure your new Security Gateway in SmartConsole.
Connecting a Quantum Spark Appliance

To connect Quantum Spark appliance to Smart-1 Cloud, follow these steps:
-
From the left navigation panel, click Gateways & Servers.
-
Click the New icon
or a
button and select Gateway... or Cluster....
The Check Point Gateway properties window opens.
-
Fill in the required fields for the Check Point Security Gateway:
-
Enter name - The name for the Security Gateway.
-
IP Address
- Automatic IPv4 address: The Security Gateway's IP address is set to an internal IP address used for cloud communication over an outbound tunnel.
-
Custom IPv4 address: Configure a static IP address if it is not an SD-WAN Gateway.
You can configure the Security Gateway object in Smart-1 Cloud with a static IP address as the primary IP address (in the same way you configure a Security Gateway from an on-premises Security Management Server).
When you configure the Security Gateway object with a Tunnel IP address, management traffic, control connections, and Smart-1 Cloud tenant communications use this main static IP address through the maas_tunnel interface.
Note - We recommend using a static IP address when available, unless configuring an SD-WAN Gateway.
This simplifies configuration for features such as UserCheck, NAT rules, and VPN configuration.
-
-
Click Connect in the Device field.
The Connect Device window opens.
-
In the Security Gateway section, select Quantum Spark.
-
In the Connection preference section, select "Prepare the object now, connect the Security Gateway later". Click Next.
-
To establish trust between the Security Gateway and Smart-1 Cloud, configure the one-time password and enter it later on the Security Gateway. Click Next
-
Copy the authentication token to paste it later in the Security Management Server setup. Then close the Connect Device window.
-
Click OK.
-
Connect to the Quantum Spark WebUI, navigate to the Security Management tab, and click Setup.
-
Select the Use Security Management service checkbox and click Next.
-
Click Use the Infinity Portal to generate a new authentication token and paste the token. Click Connect
-
Wait for the status to change to Connected successfully to the Security Management Server, then click Next.
-
Set the one-time password and click Next:
-
Connect to the Smart-1 Cloud WebUI.
-
In Gateways & Servers, double-click the Quantum Spark device that was configured earlier. The device properties window opens.
-
Under Network Management, select General.
-
In the Interfaces menu, select Get Interfaces with Topology.
-
Once it is done, publish the changes and install the policy.
Connecting a Maestro Security Group
|
Important - This procedure supports only Maestro Security Groups that run R81.10 and higher versions. |

-
Smart-1 Cloud does not support Maestro Security Groups in the VSX mode.
-
The SMO Image Cloning is not supported if the Security Group R81.10 and higher contains different appliance models.
-
DAIP is not supported.
-
Automatic IP not supported with Maestro Security Group.

-
On the Maestro Orchestrator, configure the required Security Group - in Gaia Portal or Gaia Clish.
See the Quantum Maestro Getting Started Guide and the Maestro Administration Guide for your version.
Important - Write down the IP address of the Security Group. You must configure it later in Smart-1 Cloud.
-
Install the required Hotfixes on the Security Group: For details, refer to sk181495.
-
Connect to the Smart-1 Cloud Portal.
-
Add the Security Group as a new Security Gateway object:
From the left navigation panel, click Gateways & Servers.
-
Click the New icon
and select Gateway.
The Check Point Gateway properties window opens.
-
Fill in the required fields for the Check Point Security Gateway:
-
Enter name - The name for the Security Gateway.
-
IP Address - In the IP address field, enter the IP address of the Security Group as you configured it on the Maestro Orchestrator (this is the IP address assigned to the Mgmt interface of the Security Group).
-
-
Click Connect in the Device field.
The Connect Device window opens.
-
In the Security Gateway type drop-down, select Appliance/Open Server.
-
Follow the on-screen instructions to connect your Security Group. The connection status is Pending connection, and when the Security Group connects to Smart-1 Cloud, the status change to Connected.
-
-
Click Next to close the Connect Device window.
-
Click OK.

-
Before you add a newSecurity Group Member to the Security Group that is connected to Smart-1 Cloud (while the "
maas_tunnel
" is active and working), you must install the required Hotfixes on that Security Group Member. -
To examine the status of the Smart-1 Cloud connection on all Security Group Members:
-
In Gaia gClish:
-
Connect to the command line on the Security Group.
-
If your default shell is the Expert mode, go to Gaia gClish:
gclish
-
Run:
show security-gateway cloud-mgmt-service
-
-
In the Expert mode:
-
Connect to the command line on the Security Group.
-
If your default shell is Gaia gClish, go to the Expert mode:
expert
-
Run:
maas status
-
-
-
To disable the Smart-1 Cloud connection on the Security Group:
-
In Gaia gClish:
-
Connect to the command line on the Security Group.
-
If your default shell is the Expert mode, go to Gaia gClish:
gclish
-
Run:
set security-gateway cloud-mgmt-service off
-
-
In the Expert mode:
-
Connect to the command line on the Security Group.
-
If your default shell is Gaia gClish, go to the Expert mode:
expert
-
Run:
maas off
-
-
-
To enable the Smart-1 Cloud connection on the Security Group again:
-
In Gaia gClish:
-
Connect to the command line on the Security Group.
-
If your default shell is the Expert mode, go to Gaia gClish:
gclish
-
Run:
set security-gateway cloud-mgmt-service on
-
-
In the Expert mode:
-
Connect to the command line on the Security Group.
-
If your default shell is Gaia gClish, go to the Expert mode:
expert
-
Run:
maas on
-
-