SmartProvisioning
You can create a Security Gateway or cluster object out of SmartLSM profiles in SmartProvisioning.
You can also manage device settings such as Hotspot, RADIUS, and Internet options.
Creating a Gateway
Make sure you define a SmartLSM gateway profile in SmartDashboard before you create a gateway in SmartProvisioning.
To create a new gateway:
- Open SmartProvisioning.
- In the page, right-click an empty row in the table and select > .
The SmartLSM Security Gateway General Properties page opens.
General Properties
- Enter a for the SmartLSM Security Gateway. It cannot contain spaces or non-alphanumeric characters.
- Enter an optional that identifies the SmartLSM Security Gateway.
- Click .
More Information
- In ,select the firmware version of the installed Check Point Appliance.
- In ,select the relevant SmartLSM gateway profile that the SmartLSM Security Gateway is mapped to.
- In ,select the operating system of the gateway. Make sure the selection fits the hardware type.
- In ,select this checkbox to enable this gateway to be managed with provisioning configurations. For more information, see Managing Device Settings.
- In ,select this option if you want to enable provisioning but are not yet ready to assign a specific profile.
- In ,select the provisioning profile to assign to this gateway, from the list of profiles created in SmartProvisioning.
- Click .
Communication Properties
In the Communication Properties page, you define an Activation Key that is used to set up Secure Internal Communication (SIC) Trust between the SmartLSM Security Gateway and the Security Management Server. This is the same key that you should enter in the one-time password field of the Security Management Server Authentication page of the Check Point Appliance First Time Configuration Wizard.
To generate a key automatically:
- Select .
- Click .
The Generated Activation Key window opens.
- Click .
The two Activation Key fields show the new key in hidden text. You cannot view it in clear text again. If you click , the generated key is discarded.
To manually define an activation key:
- Select .
- Enter your own key, a string of any length.
- In , enter the key again. You cannot copy the text from the first field.
To clear the key, click .
To initialize certification:
The SIC certificate must be shared between the Security Management Server and the SmartLSM Security Gateway. With this SmartLSM wizard, you create the key on the Security Management Server (the SIC certificate and the IKE certificate for the selected gateway are created when you finish this wizard). The certificate is pulled by the gateway when it first connects to the Security Management Server after it is configured with the Check Point Appliance First Time Configuration Wizard.
- If you know the IP address of the SmartLSM Security Gateway, select , and enter the IP address.
- If you do not know the IP address of the SmartLSM Security Gateway, select .
- Click .
VPN Properties
- Select how to create a VPN certificate:
- For a CA certificate from the Internal Check Point CA, select .
- For a CA certificate from a third party (for example, if your organization already has certificates from an external CA for other devices), clear this checkbox and request the certificate from the appropriate CA server.
- Click .
Finish
- Select to work with the newly created object.
- Clickto complete the SmartLSM Security Gateway creation.
After the SmartLSM Security Gateway object is created:
- Update the Corporate Office Gateway.
- If the VPN option was selected in the VPN Properties page, the Certificate Authority issues a certificate to the appliance. This certificate is installed on the appliance the first time that the SmartLSM Security Gateway connects to the Security Management Server.
To update the Corporate Office Gateway:
- Select from the toolbar.
- Select the from the list.
It is important to update the Corporate Office Gateway whenever SmartLSM Security Gateways are added, deleted, or modified (such as the generation of a new IKE key, a Push Policy action, or a Push Dynamic Objects action).
Creating a SmartLSM Appliance Cluster
Make sure you have a SmartLSM cluster profile defined in SmartDashboard before you create a Small Office Appliance cluster in SmartProvisioning.
To create a new SmartLSM Security Cluster:
- Open SmartProvisioning.
- In the page, right-click an empty row in the table, select > .
The SmartLSM Security Gateway General Properties page opens.
General Properties
- Enter a unique (Suffix is optional).
The SmartLSM Security Cluster name is:
<prefix>cluster<suffix>.
- In , enter the real external virtual IP address for your actual gateway cluster.
- Click .
Cluster Properties
- In ,select the firmware version for the Check Point Appliance.
- In , select the SmartLSM Cluster Profile that was created in SmartDashboard (in the example ClusterProfile1).
- In ,select this checkbox to enable this gateway to be managed with provisioning configurations. For more information, see Managing Device Settings.
- In ,select this option if you want to enable provisioning but are not yet ready to assign a specific profile.
- In ,select the provisioning profile to assign to this gateway, from the list of profiles created in SmartProvisioning.
- Click .
Cluster Names
The cluster members' names are shown with the configured prefix.
Click .
More Information
- Click to override the settings of the template topology on each of the interfaces. For example, select WAN and click Edit.
The interface window opens.
- In , enter the actual network IP address to override the template Network address.
- Click and do the above steps again for all the interfaces.
- Click .
Communication Properties
- Select a member and click . Enter the trusted communication (SIC) details and click .
- Do this step again for the second member.
- Click .
VPN Properties
- Select how to create a VPN certificate:
- For a CA certificate from the Internal Check Point CA, select .
- For a CA certificate from a third party (for example, if your organization already has certificates from an external CA for other devices), clear this checkbox and request the certificate from the appropriate CA server.
- Click .
Finish
- Click . After the wizard finishes, wait until the SIC initialization completes. It can take a few minutes. When it completes, you see the cluster object and its two members.
When you double-click the cluster object you can see that the topology is configured with the actual addresses.
- On each Check Point Appliance, open the WebUI > page and click to manually pull the policy immediately. Alternatively, the appliance connects to the Security Management Server at predefined periodic intervals to pull the policy.
Defining SmartLSM Gateways Using LSM CLI
This is a sample SmartLSM CLI script that you can use to create a new gateway object and associate it with a SmartLSM profile. Optionally, you can also set a SIC password and initiate a SIC connection.
LSMcli <server> <user> <password> AddROBO CPSG80 <RoboName> <Profile> [-O=<ActivationKey> [-I=<IP>]]
|
Parameter
|
Description
|
<server>
|
The Security Management Server on which to create the gateway object
|
<user>
|
The username of the Security Management Server administrator
|
<password>
|
The password of the Security Management Server administrator
|
<RoboName>
|
The name for the new gateway object
|
<Profile>
|
Then name of the SmartLSM profile to associate with the gateway
|
<ActivationKey>
|
The SIC password
|
<IP>
|
The IP to use to initiate a SIC connection
|
Managing Device Settings
You can manage device settings directly on individual gateways or you can use a SmartProvisioning Profile to manage multiple gateways. For more information about provisioning profiles and creating them, see the SmartProvisioning Administration Guide.
These device settings are unique to the Check Point Appliance. They can be defined directly on the device or through the profile. Their tabs are:
- Firmware
- RADIUS
- Hotspot
- Configuration Script
Configuring Firmware
This section explains how to configure firmware installation settings for the provisioning profile for the Check Point Appliance. When you configure firmware settings on a Provisioning Profile, you give the configuration for all appliances that reference this profile.
Firmware configuration lets you replace the firmware on the Security Gateway. The Security Gateway version must match its SmartLSM profile's version as defined in SmartDashboard for correct policy behavior. As a result, after firmware upgrade, the SmartLSM profile is replaced with the default SmartLSM security profile.
In some instances, it may be necessary to define exceptions for the default SmartLSM security profile. For example, if you do not want all gateways to use the specified default SmartLSM profile after installation, you can customize different security profiles to replace known security profiles.
Let’s say you have a scenario with these details:
- The default SmartLSM profile after installation is configured to use a SmartLSM profile called "NewLSM".
- After firmware installation, you want the "NewLSM" profile installed on all Security Gateways exceptfor gateways that currently use the "GroupA_LSM" profile.
- You want to replace the "GroupA_LSM" profile with a profile called "GroupA_NewLSM".
In this scenario, you add an that replaces the "GroupA_LSM" profile with the "GroupA_NewLSM" profile.
You can install the firmware with one of these options:
- - Installs the firmware in two steps:
- Downloads the firmware immediately during the next synchronization with a Security Gateway that references this profile.
- Installs the firmware when the download completes.
- - You can define download and installation time ranges for the firmware image. The download and installation time can be limited to a specified list of time ranges in the week. They start at the nearest time range after firmware settings were applied. You can also define that the download takes place immediately as above and only installation is based on specified time ranges. For example, if the firmware installation settings were applied on Sunday and there are two time ranges:
- One range is set to Friday 00:00 to Saturday 00:00
- One range is set to Wednesday 23:00 to Thursday 06:00
The firmware is installed between Wednesday 23:00 and Thursday 06:00.
If the Security Gateway did not succeed to download and/or install the firmware during the nearest time range, it tries again in the next time range.
To configure firmware installation settings on a Provisioning Profile:
- Open the window, and select the tab.
- Select .
- Click .
The Profile Settings window is displayed.
- Select an override profile setting:
For more information about override profile settings, see Configuring Profile Settings.
- In , click to select a firmware image that was uploaded through SmartUpdate.
- In , select the new SmartLSM profile of the Security Gateway (the Security Gateway version must match its SmartLSM profile's version as defined in SmartDashboard for correct policy behavior). The Security Gateway replaces its SmartLSM profile after successful firmware installation and only if the new firmware version is different from the version you have now.
- If necessary, click to select a new SmartLSM profile for Security Gateways with a specified SmartLSM profile.
- - Click or to open the window to define/change an exception for a SmartLSM profile replacement. SmartLSM profiles is not shown unless they are from a version higher than R71.
- Select a SmartLSM profile from the list. A SmartLSM profile is shown only if the version is not R71 and not the selected firmware version. Make sure you installed a policy for the SmartLSM profile in SmartDashboard.
- Select a SmartLSM profile that replaces the SmartLSM profile after the firmware image installation. A SmartLSM profile is shown only if the version is the same as the selected firmware version. Make sure you installed a policy for the SmartLSM profile in SmartDashboard.
- -Click to remove a SmartLSM profile setting.
- Select an option to install the firmware:
- Downloads the firmware immediately but installs it in the next synchronization with a Security Gateway that references this profile.
- - Select to use the Security Gateway time or local time.
- - Click Add or Edit to open the Time Range window to define/change the weekdays and times for downloading and installing the firmware image. Select the days and times and click .
- - Select a range from the list and click to delete a time range.
- - Click this option to download the firmware image immediately but install the image during one of the set time ranges.
- Click - To see the settings of the Provisioning Profile that this gateway references.
- Click .
Configuring RADIUS
You can configure the RADIUS server (Remote Authentication Dial In User Service) that provides authentication, authorization, and accounting for the Check Point Appliance gateways. When you configure RADIUS in the Provisioning Profile, you can configure it for all gateways that reference this profile. The RADIUS server must already be defined as a SmartDashboard object.
You can configure your appliance to contact more than one RADIUS server. If the first server in the list is unreachable, the next RADIUS server in the list is contacted for authentication.
To configure RADIUS settings on a Provisioning Profile:
- Open the window, and select the tab.
- Select .
- Click .
The Profile Settings window opens.
- Select an override profile setting:
For more information about override profile settings, see Configuring Profile Settings.
- Select to enable RADIUS on the Check Point Appliance.
- Click to add RADIUS servers that were defined in SmartDashboard, select a RADIUS server from the list and click .
- To remove a server, select a server in the list and click .
- Useand to set the priority to contact RADIUS servers.
- Click to allow authentication from specified groups as defined on the RADIUS server. Only administrators that belong to those groups can get access.
- Click .
Configuring Hotspot
To configure hotspot settings on a Provisioning Profile:
- Open the window, and select the tab.
- Select .
- Click . The Profile Settings window is displayed.
- Select one of these override profile settings:
For more information about override profile settings, see Configuring Profile Settings.
- Select to activate the hotspot.
- Configure the fields:
- - Keep the default or enter a different title.
- - Keep the default or enter a different message.
- - Select this checkbox to add an "I agree with the following terms and conditions" checkbox on the Hotspot portal page. Enter the terms and conditions text in the text box. When users click the "terms and conditions" link, the entered text is shown.
- - To require user authentication, select the checkbox.
- - Select to allow access to a specific user group and not all users. Enter the group's name in the text box.
- Click .
Configuring a Configuration Script
To configure a configuration script on a Provisioning Profile:
- Open the window, and select the tab.
- Select .
- Click .
The window opens.
- Select one of these override profile settings:
- In , enter a script to run on the Small Office Appliance gateway.
- Click .
Configuring Profile Settings
For each set of configurations managed with a Provisioning Profile, you can decide which settings have preference: local (not provisioned) or central (from SmartProvisioning individual management or from Provisioning Profile).
To determine profile settings:
- In the , right-click a profile and select .
- In the Profile window, click any category tab (other than ).
- Select management settings for gateways that reference the profile:
- : Each gateway that references this profile has its own settings, configured locally (not on SmartProvisioning). These settings cannot be overwritten by changes to the Provisioning Profile or to the SmartProvisioning gateway object. If you select this option, the Gateway window shows: .
- : Each gateway that references this profile gets its configuration for this setting from the Provisioning Profile or from the SmartProvisioning gateway object.
- If you selected to manage settings centrally, click .
The window opens.
- Select an option for :
- You can override the profile settings with device-local settings, or with changes to these settings in the SmartProvisioning device window. You can also leave the profile settings as they are.
- Each gateway takes the settings from the profile, with no option to override the profile settings.
- Each gateway is managed without a Provisioning Profile.
- Click.
This table maps the profile settings selections to the Gateway window options:
Profile managed
|
Profile Override
|
Gateway Window Display and options
|
Locally
|
Not relevant
|
profile_name.
(controls are unavailable)
|
Centrally
|
Override denied
|
profile_name (controls are Read-Only, configured by profile)
|
Centrally
|
Override allowed
|
Select override method:
- : Local management. Override provisioning configurations with local settings.
- : Enforce profile settings on this gateway.
- : Manage these settings on this gateway individually with the values given here.
|
Centrally
|
Override mandatory
|
.
profile_name
(Each gateway is configured separately)
- Manage these settings on this gateway locally.
- : Manage these settings on this gateway individually with the values given here.
|
For example, if you set Hosts configuration to and : The tab on the gateway enables you to manage the Host List of a gateway if you:
- Define the Host List locally on the device (even if it has an assigned Provisioning Profile)
- Provision gateways with the Host List of the Provisioning Profile
- Define a New Host List (in the Gateway window) that overrides the Provisioning Profile on this gateway

|
Warning - If you select and do not enter values for a specified topic, the current settings on the device are deleted.
|