Managing SmartLSM Security Gateways
Immediate SmartLSM Security Gateway Actions
At any point while configuring or managing a SmartLSM Security Gateway you can perform immediate actions on the gateway.
Applying Dynamic Object Values
SmartLSM Security Profiles can bring a Security Policy, with rules for source/destination IP addresses, and localize these rules for each SmartLSM Security Gateway that references the profile. See Dynamic Objects to learn more about dynamic objects. Dynamic objects are managed in SmartProvisioning only for SmartLSM Security Gateways.
The Security Policy that is fetched by a SmartLSM Security Profile has a rule to drop traffic from IP addresses on a StormCenter. This one profile is referenced by ten SmartLSM Security Gateways: some of the SmartLSM Security Gateways that reference this profile should use one StormCenter site; others should use a different one. You do not have to create a new rule for each gateway. You create one rule in the main policy, and use the CPDShield dynamic object to define the source (StormCenter list of IP addresses to block).
In SmartProvisioning, on each SmartLSM Security Gateway that references this profile, you resolve the CPDShield dynamic object to the real IP address of a StormCenter (double-click a SmartLSM Security Gateway and open Dynamic Objects > Add).
After you have resolved the dynamic object to a real IP address value, it is not applied immediately to the selected SmartLSM Security Gateway. You can wait for the gateway to fetch its profile, but if you want the value to be applied immediately, you can push the resolved values of dynamic objects to the SmartLSM Security Gateway.
To apply new values to dynamic objects of a SmartLSM Security Gateway:
Select Actions > Push Dynamic Objects.
Getting Updated Security Policy
If you change the Security Policy in SmartDashboard that is used by a SmartLSM Security Profile, including installing it on gateways, it is not applied to SmartLSM Security Gateways. Each SmartLSM Security Gateway fetches its SmartLSM Security Profile on interval, and thus gets its updated Security Policy.
You can apply the changes immediately by pushing the policy onto the SmartLSM Security Gateway by selecting Actions > Push Policy.
For any gateway with Provisioning enabled, you can initiate an immediate fetch of the Provisioning Profile with the same command by selecting Actions > Push Policy.
Common SmartLSM Security Gateway Configurations
SmartLSM Security Gateways may be on UTM-1 Edge devices; or non-Edge devices, with Check Point Security Gateway or Check Point UTM-1 Edge software.
Configurations for these different types of SmartLSM Security Gateways sometimes differ, but this chapter explains management concepts and procedures that are common to all SmartLSM Security Gateways.
The administrator must have Read/Write permissions for managing device settings.
The edit window for gateways is different for each type of SmartLSM Security Gateway, but is opened in the same ways.
To open the SmartLSM Security Gateway window:
- In the tree, click .
- Do one of the following:
- Click the toolbar button.
- In the work space, double-click the gateway you want to edit.
- In the work space, right-click the gateway and select .
- From the menu, when the gateway is selected in the work space, click .
Changing Assigned SmartLSM Security Profile
You can change the SmartLSM Security Profile that you assign to a SmartLSM Security Gateway. (This section is applicable only to SmartLSM Security Gateways, of both UTM-1 Edge and Security Gateway types.)
This procedure should also be performed if the assigned SmartLSM Security Profile was changed in SmartDashboard, to ensure immediate application of the changes.
To apply a change in SmartLSM Security Profile:
- In SmartDashboard, edit the Security Policy as needed and install it on the SmartLSM Security Profile.
- In SmartProvisioning, open the Gateway window, and select the General tab.
- From the Security Profile drop-down list, select the SmartLSM Security Profile.
- Select Actions > Push Policy.
Managing SIC Trust
Getting New Registration Key for UTM-1 Edge Device
You can force a UTM-1 Edge SmartLSM Security Gateway to get a new SIC key, by generating a new Registration Key for the gateway.
To generate a new key:
- Double-click a UTM-1 Edge device.
- In the UTM-1 Edge SmartLSM Security Gateway window > General tab, find the Secure Internal Communication > Registration Key field.
- Click New Key.
- Click Generate Key, and then click Set to set the new key.
Verifying SIC Trust on SmartLSM Security Gateways
You can view and edit the status of the Secure Internal Communication Trust between the management server (Security Management Server or Domain Management Server) and the SmartLSM Security Gateway. SIC Trust is established after a certificate has been issued by the management server and delivered to the SmartLSM Security Gateway.
To check a SmartLSM Security Gateway's SIC Trust:
- In the SmartLSM Security Gateway window > General tab, find the Secure Internal Communication > DN field.
This is the SmartLSM Security Gateway's Distinguished Name (SIC name)
syntax: CN=gw-name, O=Management-domain-name
If it is empty, you should change the SIC Trust State.
- Click Communication.
- Check the value of the Trust State field, which indicates the status of this SmartLSM Security Gateway's SIC Trust with the Security Management Server or Domain Management Server.
- Initialized: Indicates that the SmartLSM Security Gateway has a valid SIC certificate.
- Uninitialized: Indicates that the SmartLSM Security Gateway does not have a valid SIC certificate (because it was never initialized, or its certificate was revoked).
Initializing SIC Trust on SmartLSM Security Gateways
If Trust State is Uninitialized, and the IP address field has the IP address of the SmartLSM Security Gateway, you can initialize the SIC trust now. Perform this procedure if the Generate button is available.
To initialize a SIC trust:
- Click Generate to generate an Activation Key, or select Activation Key to provide one that you have from the Security Management Server or Domain Management Server.
- Click Initialize. A new SIC certificate is created for this SmartLSM Security Gateway, and its trust state becomes Initialized.
Pulling SIC from Security Management Server
If the IP address field is empty, you must pull the SIC certificate from the Security Management Server or Domain Management Server using the Check Point Configuration tool (cpconfig).
To initialize a SIC trust if the Security Management Server or Domain Management Server cannot find the gateway:
- Open cpconfig > Secure Internal Communication (SIC) on the Security Management Server or Domain Management Server and on the SmartLSM Security Gateway.
- Copy the SIC password.
- On the gateway, provide the Activation Key of the Security Management Server or Domain Management Server.
- Restart Check Point services on the gateway.
Resetting Trust on SmartLSM Security Gateways
You may want to reset an established SIC Trust if you have replaced the gateway host machine, or if you have lost the Activation Key.
From the time that you reset SIC, up to the second that trust is re-established, internal communications between Check Point applications, the management server, and managed devices is down. This procedure actually revokes the current certificate and provides a new one. Thus, it is recommended that you continue only if you are sure that SIC should be reset, and after this procedure, you should quickly re-initialize SIC trust.
To reset a SIC trust:
- In the Communication window, click Reset
A message asks for confirmation: Are you sure you want to reset SIC?
If you reset the SIC certificate now (revoke current license and get a new one), internal communications between Check Point applications, Security Management Server/Domain Management Server, and managed devices might be adversely affected. Continue only if you are sure this must be done.
- If you are ready to reset SIC now, click Yes.
- On the SmartLSM Security Gateway, open the Check Point Configuration tool > Secure Internal Communication tab, and click Reset.
- Reboot the SmartLSM Security Gateway.
The Details tab of the Gateway window for SmartLSM Security Gateways and UTM-1 Edge SmartLSM Security Gateways provides identification information for log tracking and cluster usage.
You can edit the ID by which the actual device of the gateway is known and add detailed notes for easier network management.
- SmartLSM ID: Unique ID, in the form of an IP address, per-SmartLSM Security Gateway. When the SmartLSM Security Gateway send logs to a Log Server, the logs are stored by Origin IP, which is this SmartLSM ID. This allows consistent tracking of the SmartLSM Security Gateway's logs, even if its external IP address changes. This ID cannot be edited.
- Device ID (Security Gateway) or MAC Address (UTM-1 Edge): Often used to hold a SmartLSM Security Gateway's MAC address, this field accepts free text. Use this field to note the machine ID, in whatever format is best for the environment and the SmartLSM Security Gateway.
- Customer Details: Often used to hold environment details of the SmartLSM site, which can be especially useful if the SmartProvisioning administrators are not personally familiar with the remote office.
- Participates in UTM-1 Edge cluster (available for UTM-1 Edge only).
Configuring Log Servers
When you create a SmartLSM Security Profile for Security Gateway gateways in SmartDashboard, you can also configure the log servers. In SmartProvisioning you can edit the log server configuration. You can select different log servers for a selected gateway; but the servers must already be defined in SmartDashboard.
To change log servers of SmartLSM Security Gateways:
- Open the Security Gateway window, and select the Advanced tab.
- Clear the As defined in SmartLSM Profile check box.
- Select the servers which should hold the logs for this SmartLSM Security Gateway:
- Send logs to: Select the primary log server for this gateway.
- When unreachable, send logs to: Select the alternative log server.
Note - UTM-1 Edge gateways are configured for log servers through the UTM-1 Edge Portal > Setup > Logging. For more information about log servers, see the UTM-1 Edge User Guide.
SmartLSM Security Gateway Licenses
You have a License Repository with the licenses that you acquired for your environment. You can manage the licenses of SmartLSM Security Gateways through SmartProvisioning.
Uploading Licenses to the Repository
SmartLSM Security Gateway licenses are available for SmartProvisioning management if they are in the License Repository on the Security Management Server or Domain Management Server.
To upload licenses to the repository:
- Open SmartUpdate: Window > SmartUpdate > Licenses and Contracts
- Click Licenses & Contracts > Add License and then select a source location.
- Browse to the file.
- Click Open.
The license is added to the License Repository.
Attaching License to SmartLSM Security Gateways
To attach a license to a SmartLSM Security Gateway:
- Open the SmartLSM Security Gateway window, and select the Licenses tab.
- Click Add.
The displayed licenses are those that are in your License Repository but currently are unattached to any gateway. If an original license is in use on another SmartLSM Security Gateway, you will not see the corresponding upgraded license displayed in the License Repository.
- Select the licenses that you want to appear in this gateway's Licenses window. You can select more than one license at a time.
- Click OK. The license attached to this gateway is added to the Licenses list.
- In the Gateway window, click OK.
The license operations, either attaching or detaching are performed immediately. The License Operation message appears:
Attaching/Detaching Licenses. Please wait...
Attaching License to UTM-1 Edge SmartLSM Security Gateways
UTM-1 Edge devices have embedded licenses. To release features, you need the Product Key.
To attach a license to a UTM-1 Edge SmartLSM Security Gateway:
- Open the UTM-1 Edge SmartLSM Security Gateway window, and select the Licenses tab.
- Provide the Product Key.
- Click Show Product Description to see the features that are enabled by this license.
License State and Type
The State of the license depends on whether the license is associated with the Security Gateway in the License Repository, and whether the license is installed on the remote Security Gateway.
- Unattached: Not associated with the Security Gateway in the License Repository, and not installed on the remote Security Gateway.
- Engaged: Associated with the Security Gateway in the License Repository, but not installed on the remote Security Gateway.
- Attached: Associated with the Security Gateway in the License Repository, and installed on the remote Security Gateway.
The type of license depends on the IP address enabled in the license. If the IP address is of this gateway, the license type is Local. If the IP address is of the Security Management Server or Domain Management Server, the license type is Central.
Handling License Attachment Issues
- If there are unattached licenses that belong to the SmartLSM Security Gateway, a message is displayed in the Licenses tab. In general, this situation occurs after you have finished running the License Upgrade Tool. Click Add these licenses to the list. The upgraded and unattached licenses are disabled.
- To remove an existing license from the Licenses list, select it and click Remove. The license will be detached from the SmartLSM Security Gateway after you click OK.
- You cannot have an upgrade license attached to a SmartLSM Security Gateway while the corresponding original license is detached and exists in the License Repository.
- If you try to remove the original license from the gateway, while the upgrade license is listed, you will receive a warning that if you proceed, both licenses will be removed. If you click OK, both licenses are removed from the gateway.
- If you try to remove the upgrade license from the gateway, while the original license is listed, you will receive a notification stating that you may either remove the upgrade license alone, or both licenses.
- If both the original and the upgrade license are in the License Repository, and you attempt to add the upgrade license to the gateway, you will receive a notification stating that if you proceed, both licenses will be added to the gateway.
Configuring SmartLSM Security Gateway Topology
You can manage the topology of SmartLSM Security Gateways through SmartProvisioning, viewing and changing the internal and external interfaces of each gateway to fit its local environment.
To configure the topology of a SmartLSM Security Gateway:
- Open the Gateway window, and select the Topology tab.
- Select the option that best describes the topology of this SmartLSM Security Gateway:
- Not defined: No VPN is defined for this gateway. To enable this Gateway to participate in a VPN, another option must be selected. Select this option if this device is not a gateway for a network.
- Only the external interface: The external IP addresses of the SmartLSM Security Gateway is the entire VPN domain. The CO gateway connects to the remote office nodes only through the SmartLSM Security Gateway. The nodes are usually connected and secured by NAT.
- All IP Addresses behind the Gateway based on Topology information: SmartProvisioning automatically calculates the encryption domain based on the IP address and net mask of the SmartLSM Security Gateway's internal interfaces.
- Automatically determined by the topology configured on the Edge device. The VPN domain of the gateway consists of all the IP addresses configured locally on the UTM-1 Edge device, regardless of the interface configuration of the Edge object in SmartDashboard. Selecting this option requires the OSPF feature of the CO gateway to dynamically learn the VPN domain of the UTM-1 Edge device.
Note - This option is only available for UTM-1 Edge devices, and requires:
Manual definition of VTIs on the device and CO gateway for the CO gateway to learn the VPN domain. The domain topology is stored on the Edge device, and not acquired through an install policy action or automatic update from the CO.
OSPF feature of the CO gateway to dynamically learn the VPN domain of the UTM-1 Edge device.
- Manually defined: The previous options do not describe the VPN domain you want to support, and you want to define it yourself. The range table is enabled.
- Complex networks behind SmartLSM Security Gateways cannot be properly configured as VPN domains by the automatic calculation option (All IP Addresses behind the Gateway based on Topology information). If the SmartLSM Security Gateway topology consists of one type (Meshed or Star) and does not include subsequent firewalls, you may select the automatic option. Otherwise, it is recommended that you select Manually defined.
- If you select Manually defined, click Add.
Provide the topology information in the IP Address Range Configuration window.
- Provide the IP addresses that define a network behind this gateway.
- Provide comments to help manage this network.
- Click OK.
- Repeat to add as many ranges as needed to define the VPN of this gateway to the CO gateway.
- Select Actions > Push Policy.
You are prompted to save the data and then SmartProvisioning validates the topology you have defined. If successfully validated, the topology is immediately pushed to the gateway.
- Update the CO gateway (see Updating Corporate Office Gateways).
The IP addresses in this range are now part of the VPN domain that is secured by the SmartLSM Security Gateway and that tunnels to the CO gateway. To complete the VPN configurations, see Configuring VPNs on SmartLSM Security Gateways.
Configuring the Automatic VPN Domain Option for UTM-1 Edge
The topology of the VPN domain can be determined automatically on the UTM-1 Edge device.
- When the automatic option is configured, the VPN domain of the gateway consists of all the IP addresses configured locally on the UTM-1 Edge device, regardless of the interface configuration of the Edge object in SmartDashboard.
- Selecting this option requires the OSPF feature of the CO gateway to dynamically learn the VPN domain of the UTM-1 Edge device.
Converting SmartLSM Security Gateways to Gateways
You can convert a SmartLSM Security Gateway managed with SmartProvisioning to a Security Gateway or UTM-1 Edge gateway managed with SmartDashboard. There is no need to delete existing objects, nor to create new ones, because the Check Point Suite handles object management automatically during the conversion. It also preserves relevant SIC certificates.
For example, if a remote gateway has so many customized requirements that Profiles are ineffective, you can manage it as a separate gateway through SmartDashboard.
To convert to a SmartDashboard gateway:
- In the SmartProvisioning CLI, execute one of the following commands (see Converting Gateways for details and more options).
- Security Gateway: LSMcli <server> <user> <pswd> Convert ROBO VPN1 <Name>
- UTM-1 Edge: LSMcli <server> <user> <pswd> Convert ROBO VPN1Edge <Name>
- Define the gateway interfaces.
- Update relevant VPN communities.
- Install Security Policies.
- Restart Check Point services.
- Update the CO gateway to which the SmartLSM Security Gateway was a satellite.