In This Section: |
This section includes procedures for upgrading Multi-Domain Security Management to R77.
This section describes the different upgrade and migrate utilities, and explains when and how each of them is used.
Before performing the upgrade the Multi-Domain Security Management upgrade script,
, runs a list of pre-upgrade utilities. The utilities search for well-known upgrade problems that might be present in your existing installation. The output of the utilities is also saved to a log file. Three types of messages are generated by the pre-upgrade utilities:UnixInstallScript
In versions prior to Multi-Domain Security Management R75, you had the option of dividing functionality between two physical Multi-Domain Server platforms:
The current version no longer uses this architecture. All Multi-Domain Servers host all management databases.
Versions R75 and later use a different licensing model. All converted Multi-Domain Servers must have the appropriate new licenses.
Check Point developed the Container2MultiDomain utility to help administrators convert their old Multi-Domain Server Containers to the new single platform architecture.
After upgrading an old Multi-Domain Server Container, this message shows to remind you that you can use Container2MultiDomain to do the conversion.
The installation has indicated that this server is a Container MDS. When
Run the Container2MultiDomain utility and follow the instructions. |
Converting a Multi-Domain Server is optional.
To use the utility:
|
This message opens when the process completes.
|
The Export current Multi-Domain Server option in
extracts the database and configuration settings from a Multi-Domain Server and its associated Domain Management Servers. It then stores this data in a single TGZ file. You can import this TGZ file to a newly installed Multi-Domain Server. mds_setup
Run
from the DVD, from the mds_setup
directorylinux/p1_install/
In a High Availability deployment, you must export the primary Multi-Domain Server. If the target Multi-Domain Server uses a different leading IP address than the source server, you must change the Multi-Domain Server IP address and the external interface.
You can include the log files in the exported TGZ file. These log files are likely to be very large.
The
command exports the content of one Domain Management Server or Security Management Server database into a TGZ archive file. This archive file serves as the source for the migration tools described below. The migrate export
utility is included on the Multi-Domain Security Management distribution DVD. migrate
Note - Before you migrate using
|
To install the migrate utility:
p1_upgrade_tools.tgz
archive file in the upgrade_tools
subdirectory under the relevant operating system parent directory. Installation example:
Install from CD: # gtar xvfz /mnt/cdrom/linux/upgrade_tools/linux/p1_upgrade_tools.tgz -C /var/opt/export_tools
Install from DVD: # gtar xvfz /mnt/cdrom/Linux/linux/upgrade_tools/linux/p1_upgrade_tools.tgz -C /var/opt/export_tools
The database to import is the database belonging to the primary Domain Management Server/Security Management Server. Before you import, make sure that the database is synchronized.
If you want to migrate your current High Availability environment to a Domain Management Server High Availability on a different Multi-Domain Server, export the database. Then continue with a High Availability deployment (see the High Availability chapter in the R77 Multi-Domain Security Management Administration Guide).
To export the management database:
|
The optional
flag includes closed log files and SmartLog data from the source Domain Management Server in the output archive. –l
migrate
command works on the current Domain Management Server. You must use the mdsenv <Domain Management Server name>
command to set environment to the current Domain Management Server (or to the Multi-Domain Server environment for the global policy) before you run the migrate
command.Example:
# cd /opt/CPsuite-R77/fw1/bin/upgrade_tools/
# mdsenv dms1
# migrate export -l /var/opt/dms1_exported.tgz
This example assumes that you are upgrading using the distribution CD or DVD.
The
command imports an existing Domain Management Server management database into a Multi-Domain Server. If the imported Domain Management Server is from a version earlier than that of the Multi-Domain Server, the upgrade process occurs automatically during the import. cma_migrate
You must run
to import Domain Management Servers exported using the cma_migrate
command. Copy the exported management database archive file to target Multi-Domain Server prior to using the migrate export
command. Bear in mind that the source and target platforms may be different. cma_migrate
Before running
, create a new Domain and a new Domain Management Server. Do not start the Domain Management Server.cma_migrate
If you are migrating a Domain Management Server to a new Domain Management Server with a different IP address, it is a different procedure.
Syntax:
cma_migrate <source management tgz> <target Domain Management Server FWDIR directory> |
Example:
# cma_migrate /tmp/exported_smc.tgz /opt/CPmds-r71/domains/dms2/CPsuite-R71/fw1 |
The first argument (<source management tgz>) specifies the path, on the Multi-Domain Server, to the source management data as obtained by the migrate utility. The second argument (<target Domain Management Server FWDIR directory>) is the FWDIR of the newly created Domain Management Server.
Note - You can run |
To run the
utility from the SmartDomain Manager:cma_migrate
When running
, pre-upgrade verification takes place. If no errors are found, then the migration continues. If errors are found, certain modifications must be implemented on the original Security Management Server, after which you must re-export the source.cma_migrate
The
process does not change the Certificate Authority or key data. The R77 Domain Management Server has SIC with Security Gateways. If the IP address of the R77 server is not the same as the IP address of the R77.xx server, you must establish trust between the new server and the gateways.cma_migrate
Before you begin, see sk17197 to make sure the environment is prepared.
To initialize a Domain Management Server Internal Certificate Authority:
DomainServer Name or IP# mdsstop_customer <
>
DomainServer Name or IP# mdsenv <
>
# fwm sic_reset
DomainServer Name># mdsconfig -ca <
DomainServer IP <
>
DomainServer Name or IP# mdsstart_customer <
>
With a VPN tunnel that has an externally managed, third-party gateway and a Check Point Security Gateway, sometimes there is an issue with the IKE certificates after you migrate the management database.
The Security Gateway presents its IKE certificate to its peer. The third-party gateway uses the FQDN of the certificate to retrieve the host name and IP address of the Certificate Authority. If the IKE certificate was issued by a Check Point Internal CA, the FQDN contains the host name of the original management server. The peer gateway will fail to contact the original server and will not accept the certificate.
To fix:
The
command imports (and upgrades, if necessary) a global policies database from one Multi-Domain Server to another.migrate_global_policies
Note - |
If the global policy database on the target Multi-Domain Server contains polices that are assigned to Domains, the
command stops. This is to make sure that the Global Policy used by those Domains is not deleted.migrate_global_policies
Note - When executing the |
Syntax:
migrate_global_policies <path to exported tgz> |
<path to exported tgz>: specifies the fully qualified path to the archive file created by the
command.migrate export
The purpose of the backup/restore utility is to back up a whole Multi-Domain Server, including all the Domain Management Servers that it maintains, and to restore it when necessary. The restoration procedure brings the Multi-Domain Server to the state it was when the backup procedure was executed. The backup saves both user data and binaries.
Note - Backup and restore cannot be used to move the Multi-Domain Server installation between platforms. |
Restoration can be performed on the original machine or, if your intention is to upgrade by replicating your Multi-Domain Server for testing purposes, to another machine. When performing a restoration to another machine, if the machine's IP address or interface has changed, refer to Changing the Multi-Domain Server IP Address and External Interface for instructions on how to adjust the restored Multi-Domain Server to the new machine.
During backup, you can view data but cannot make changes. If the Multi-Domain Security Management system consists of several Multi-Domain Servers, the backup procedure takes place manually on all the Multi-Domain Servers concurrently. Likewise, when the restoration procedure takes place, it should be performed on all Multi-Domain Servers concurrently.
The
command backs up the complete Multi-Domain Server, including all the Domain Management Servers, binaries, and user data. If the Multi-Domain Security Management environment has multiple Multi-Domain Servers, backup runs on all of them at the same time. mds_backup
This command requires Superuser privileges.
executes the mds_backup
command on product root directories containing data and binaries, and backs up all files, except those specified in the gtar
file. The collected data is stored in a single .tgz file, in the current working directory, named with the date-time. For example: $MDSDIR/conf/mds_exclude.dat
13Sep2002-141437.mdsbk.tgz
To back up a Multi-Domain Server:
It is important that you not run
from a directory that will be backed up, to avoid a circular reference. For example, do not run mds_backup
from mds_backup
. /opt/CPmds-R77
mds_backup
.tgz
file, with the mds_restore
, gtar
and gzip
command files, to an external backup location.Syntax mds_backup [-g -b {-d <target dir name>} -v -h]
Parameter |
Description |
---|---|
|
Executes without prompting to disconnect GUI clients. |
|
Batch mode - executes without asking anything (-g is implied). |
|
Specifies a directory store for the backup file. When not specified, the backup file is stored in the current directory. You cannot store the backup file in any location inside the product root directory tree. |
|
Verbose mode - lists all files to be backed up, but do not perform the backup operation. |
|
Exclude logs from the backup. |
|
Help - displays help text. |
Comments When using the
or -g
options, make sure that no GUI clients or log servers are connected. If there are client connections, the backup can be corrupted if changes are made during the backup process.-b
Active log files are not backed up, to avoid read-during-write inconsistencies. It is best practice to run a log switch before backup.
You can back up the Multi-Domain Server without log files. The .tgz will be must smaller. To make sure all logs are excluded:
$MDSDIR/conf/mds_exclude.dat
log/*
Use this command to restore a Multi-Domain Server that was backed up with
. It is best practice to restore to a clean install of the previous version. Use the Installation and Upgrade Guide for major versions, or the Release Notes for minor versions or hotfixes.mds_backup
If the Multi-Domain Security Management environment has multiple Multi-Domain Servers, restore all Multi-Domain Servers at the same time.
To restore a Multi-Domain Server:
./mds_restore <
backup_file>
You can upgrade Smart-1 appliances and open servers.
The in-place upgrade process takes place on an existing Multi-Domain Server machine. The Multi-Domain Server, together with all Domain Management Servers, are upgraded in one procedure.
Note - When upgrading Multi-Domain Security Management, all SmartUpdate packages on the Multi-Domain Server (excluding Edge firmware packages) are deleted from the SmartUpdate Repository. |
Before doing an in-place upgrade to R77:
UnixInstallScript
. In a multi-Multi-Domain Server environment, do this on all Multi-Domain Servers.mds_backup
to back up your system.Upgrade Requirements:
Ensure you have at least 6 GB of disk space available to do the upgrade.
df -h
command and check the available space in /var/log
. To Upgrade Using Upgrades (CPUSE)
See Upgrading Using Gaia Upgrades (CPUSE).
To upgrade using an ISO image on a DVD:
Check_Point_Install_and_Upgrade_R77.Gaia.iso
upgrade cd
Yes
. Yes
.The upgrade takes place.
OK
to reboot.To upgrade using the upgrade package, with CLI:
You can upload the TGZ to the Portal, and upgrade Gaia with CLI commands.
Check_Point_upg_Portal_and_SmartUpdate_R77.Gaia.tgz
expert
mode./var/log/upload
. expert
mode.Clish
, register the file as an upgrade package. Run the command:add upgrade <version> package file <full path>
upgrade local <version>
For example:upgrade local R77
You are asked if you want to save a snapshot of the system before upgrade. We recommend that you answer
. Yes
/tmp/pre_upgrade_out.txt
. Pre-upgrade verification failed
" we recommend that you review the file, fix the problems, and restart the upgrade. Do not take another system snapshot. Yes
.You can upgrade to the current version by replicating a deployment from existing (source) Multi-Domain Servers to target Multi-Domain Servers. This process combines a simplified methodology for upgrading a Multi-Domain Security Management deployment with the ability to thoroughly test the deployment prior to implementation.
Use
with the Export option, to extract database and configuration settings from a Multi-Domain Server, together with its Domain Management Servers, and then stores this data in a single TGZ file. If you are working with a High Availability deployment, you must export the primary Multi-Domain Server.mds_setup
Run
from the DVD, from the mds_setup
directorylinux/p1_install/
Use the
command to import the contents of a saved TGZ file to a separate, newly installed Multi-Domain Server. mds_import.sh
These commands export and import the following information:
Before you start the upgrade, consider these points:
After you begin to export from the source Multi-Domain Server, avoid making configuration changes on that Multi-Domain Server. Changes made after export starts are not included in the tgz file. You will need to make such changes manually on the target after you complete the upgrade.
Run
from the DVD, from the mds_setup
directorylinux/p1_install/
To export a Multi-Domain Server to a TGZ file:
linux/p1_install/
directory.mds_setup
Note - Exporting log files can significantly increase the tgz file size and the time required to complete the upgrade. |
To import a Multi-Domain Server deployment onto a target machine:
exported_mds_<time & date stamp>.tgz
mds_import.sh
command on the target Multi-Domain Server. Follow the instructions on the screen.mdsstart
on the target Multi-Domain Server.Choose this type of upgrade if you intend to change hardware as part of the upgrade process, or if you want to test the upgrade process first. The existing Multi-Domain Server installation is copied to another machine (referred to as the target machine) by using the
and mds_backup
commands.mds_restore
To perform the Replicate and Upgrade process:
mds_backup
UnixInstallScript
and select the Backup optionNote - Make sure the target machine is on an isolated network segment, so that Gateways connected to the original Multi-Domain Server are not affected until you switch to the target machine. |
mds_restore
.Important - In Gaia, run this command from expert mode and exit after running the command. You must run this command from the folder that contains the backup file. |
Container2MultiDomain
.In a gradual upgrade, you export Domain Management Servers one at a time from the source Multi-Domain Server to a target Multi-Domain Server of the latest version.
The gradual upgrade does not keep all data.
Data Not Exported |
To get this data in the new environment: |
---|---|
Multi-Domain Security Management Administrators and management consoles |
Redefine and reassign to Domains after the upgrade. |
Status of global communities |
Run: |
To run a gradual upgrade:
migrate export
The migrate export command exports the Domain Management Server database to a .tgz file on the Multi-Domain Server. It also transfers the licenses for the Domain Management Server.
cma_migrate
<src tgz> <FWDIR on target>mdsenv; mdsstart
migrate_global_policies
to import the global policies.The gradual upgrade process for a Multi-Domain Server using Global VPN Communities is not fundamentally different from the gradual upgrade process described above, with the following exceptions:
where used
query from the Global SmartDashboard > Manage > Network Objects > Actions to identify where the problematic Gateways are used in the Global Policy. Review the result set, and edit or delete list items as necessary. Make sure that no problematic Gateways are in use.mdsenv; remove_globally_used_gw <Global name of the gateway>
migrate_global_policies
where the existing Global Policy contains Global Communities, the resulting Global Policy contains:As a result of the migration, the Global Communities are overridden by the migrated database.
|
This section describes how to migrate the Security Management Server product of a standalone deployment to a Domain Management Server. Then you manage the former-standalone computer as a Security Gateway only from the Domain Management Server.
Note - To later undo the separation of the Security Management Server and Security Gateway on the standalone, back up the standalone computer before you migrate. |
Before migrating:
To migrate the management database to the Domain Management Server:
migrate export [-l] <output file>
cma_migrate
command or the import operation from the SmartDomain Manager, specifying as an argument the database location you specified in step 2.Note - To run the You can also run |
Multi-Domain Security Management High Availability gives you management redundancy for all Domains. Multi-Domain Security Management High Availability operates at these levels:
You can only do Global policy and global object management tasks using the active Multi-Domain Server. In the event that the active Multi-Domain Server is unavailable, you must change one of the standby Multi-Domain Servers to active.
You can also use ClusterXL to give High Availability redundancy to your Domain Security Gateways. You use SmartDashboard to configure and manage Security Gateway High Availability for Domain Management Servers.
Run the pre-upgrade verification on all Multi-Domain Servers before upgrading any Multi-Domain Servers. Select the Pre-Upgrade Verification Only option from
. Upgrade the primary Multi-Domain Server only after you have fixed all errors and reviewed all warnings for all Multi-Domain Servers.UnixInstallScript
Multi-Domain Servers can only communicate and synchronize with other Multi-Domain Servers running the same version. If your deployment has more than one Multi-Domain Server, make sure they are upgraded to the same version.
To upgrade multiple Multi-Domain Servers:
During the upgrade process, we recommend that you do not use any of the Multi-Domain Servers to make changes to the databases. This can cause inconsistent synchronization between Multi-Domain Servers.
Note - You must upgrade your Multi-Domain Log Servers to the same version as the Multi-Domain Servers.
To upgrade a Multi-Domain Server and a Domain Management Server:
Note - When synchronizing, make sure that you have only one active Multi-Domain Server and one active Domain Management Server for each Domain.
Change the active Multi-Domain Server and Domain Management Server, and then synchronize the Standby computers.
After upgrading the Multi-Domain Servers and Domain Management Servers, you must update the objects in all Domain Management Server databases. This is necessary because upgrade does not automatically update the object versions attribute in the databases. If you do not manually update the objects, the standby Domain Management Servers and Log Servers will show the outdated versions.
Update the objects with these steps on each Multi-Domain Server.
To update Domain Management Server and Domain Log Server objects:
mdsstat
If a Domain Management Server is down, resolve the issue, and start the Domain Management Server: mds_startcustomer
mdsenv
$MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL
Optional: Update one Domain Management Server or Domain Log Server at a time with this command: $MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL -n <server_name>
The best practice is to avoid making any changes to Domain Management Server databases during the upgrade process. If your business model cannot support management down-time during the upgrade, you can continue to manage Domain Management Servers during the upgrade process.
This creates a risk of inconsistent Domain Management Server database content between instances on different Multi-Domain Servers. The synchronization process cannot resolve these inconsistencies.
After successfully upgrading one Multi-Domain Server, you can set its Domain Management Servers to Active while you upgrade the others. Synchronization between the Domain Management Servers occurs after all Multi-Domain Servers are upgraded.
If, during the upgrade process, you make changes to the Domain Management Server database using different Multi-Domain Servers, the contents of the two (or more) databases will be different. Because you cannot synchronize these databases, some of these changes will be lost. The Domain Management Server High Availability status appears as Collision.
You must decide which database version to retain and synchronize it to the other Domain Management Servers. You then must re-enter the lost changes to the synchronized database.
After completing the upgrade process, start Domain Management Servers: mdsstart
Before the upgrade:
Pre-upgrade utilities are an integral part of the upgrade process. In some cases, you are required to change your database before the actual upgrade can take place or the Pre-Upgrade Verifier suggests you execute utilities that perform the required changes automatically. Even if you decide to restore your original environment, keep the changes you made as a result of the pre-upgrade verification.
Prepare a backup of your current configuration using the
utility from the currently installed version. Prepare a backup as the first step of the upgrade process and prepare a second backup right after the Pre-Upgrade Verifier successfully completes with no further suggestions.mds_backup
To restore your original environment:
mds_remove
utility../mds_restore
The original environment is restored.
After upgrading your Multi-Domain Server to the latest version, earlier version files are not automatically deleted from the disk. This lets you revert to the old version in the event there are problems with the upgrade. These files can take up a lot of disk space and cause performance degradation.
After you complete testing your upgrade, we recommend that remove these earlier version files. You can use the
tool to automatically remove old installations with no effect on the installed version.mds_remove_version
To remove old installations:
mds_remove_version.sh
script to the Multi-Domain Server mds_remove_version.sh
.Important - This tool removes major releases and all minor releases installed over a major release. For example, if R71.50 is installed on your Multi-Domain Server, and you upgraded to R77, the tool removes R71 and R71.50 files. |
If your target machine and the source machine have different IP addresses, follow the steps listed below it to change the restored Multi-Domain Server to the new IP address.
To change the IP address:
mdsstop
.$MDSDIR/conf/LeadingIP
file to the new IP address.$MDSDIR/conf/mdsdb/mdss.C
file. Find the Multi-Domain Server object that has the source Multi-Domain Server IP address and change its IP address to the new IP address. Do not change the Multi-Domain Server name.If your target machine and the source machine have different interface names (e.g.,
and hme0
), follow the steps listed below to adjust the restored Multi-Domain Server to the new interface name.hme1
To change the interface:
$MDSDIR/conf/external.if
to the new interface name.$FWDIR/conf/vip_index.conf
.We recommend that you save each Domain policy, so that you can restore the settings after the upgrade. To do so, go to the Domain Configuration window > Assign Global Policy tab, and enable Create database version.
See the Global Policy Chapter in the R77 Multi-Domain Security Management Administration Guide for detailed information.
IPv6 is automatically enabled if you configure IPv6 addresses in the First Time Configuration Wizard.
If you did not do this, enable IPv6 in one of the following ways:
To enable IPv6 using Clish:
# set ipv6-state on
# save config
# reboot
To enable IPv6 using the Portal:
If your environment uses IPv6 addresses, you first must enable IPv6 support for the Multi-Domain Server and for any existing Domain Management Servers. It is not necessary to enable IPv6 support for Domain Management Servers that are created after IPv6 is enabled on the Multi-Domain Server, because this occurs automatically.
Before enabling IPv6 support for the Multi-Domain Server:
To enable IPv6 support for the Multi-Domain Server:
> mdsconfig
.Press y again to confirm.
After a few moments, the
menu shows.mdsconfig
To enable IPv6 support for all existing Domain Management Servers:
mdsconfig
menu, select IPv6 Support for Existing Domain Management Servers.Or
Press r to automatically assign IPv6 address from a specified range.
To manually enable IPv6 support for specified Domain Management Servers.
mdsconfig
menu, select IPv6 Support for Existing Domain Management Servers.Press y to confirm.
The available Domain Management Servers show above prompt. You can copy and paste the name.