In This Section: |
This section includes procedures for upgrading Multi-Domain Security Management to R77.
This section describes the different upgrade and migrate utilities, and explains when and how each of them is used.
Before performing the upgrade the Multi-Domain Security Management upgrade script,
, runs a list of pre-upgrade utilities. The utilities search for well-known upgrade problems that might be present in your existing installation. The output of the utilities is also saved to a log file. Three types of messages are generated by the pre-upgrade utilities:UnixInstallScript
In versions prior to Multi-Domain Security Management R75, you had the option of dividing functionality between two physical Multi-Domain Server platforms:
The current version no longer uses this architecture. All Multi-Domain Servers host all management databases.
Versions R75 and later use a different licensing model. All converted Multi-Domain Servers must have the appropriate new licenses.
Check Point developed the Container2MultiDomain utility to help administrators convert their old Multi-Domain Server Containers to the new single platform architecture.
After upgrading an old Multi-Domain Server Container, this message shows to remind you that you can use Container2MultiDomain to do the conversion.
The installation has indicated that this server is a Container MDS. When
Run the Container2MultiDomain utility and follow the instructions. |
Converting a Multi-Domain Server is optional.
To use the utility:
|
This message opens when the process completes.
|
The Export current Multi-Domain Server option in
extracts the database and configuration settings from a Multi-Domain Server and its associated Domain Servers. It then stores this data in a single TGZ file. You can import this TGZ file to a newly installed Multi-Domain Server. mds_setup
Run
from the DVD, from the mds_setup
directorylinux/p1_install/
In a High Availability deployment, you must export the primary Multi-Domain Server. If the target Multi-Domain Server uses a different leading IP address than the source server, you must change the Multi-Domain Server IP address and the external interface.
You can include the log files in the exported TGZ file. These log files are likely to be very large.
The
command exports the content of one Domain Server or Security Management Server database into a TGZ archive file. This archive file serves as the source for the migration tools described below. The migrate export
utility is included on the Multi-Domain Security Management distribution DVD. migrate
Note - Before you migrate using
|
To install the migrate utility:
p1_upgrade_tools.tgz
archive file in the upgrade_tools
subdirectory under the relevant operating system parent directory. Installation example:
Install from CD: # gtar xvfz /mnt/cdrom/linux/upgrade_tools/linux/p1_upgrade_tools.tgz -C /var/opt/export_tools
Install from DVD: # gtar xvfz /mnt/cdrom/Linux/linux/upgrade_tools/linux/p1_upgrade_tools.tgz -C /var/opt/export_tools
The database to import is the database belonging to the primary Domain Server/Security Management Server. Before you import, make sure that the database is synchronized.
If you want to migrate your current High Availability environment to a Domain Server High Availability on a different Multi-Domain Server, export the database. Then continue with a High Availability deployment (see the High Availability chapter in the R77 Multi-Domain Security Management Administration Guide).
To export the management database:
|
The optional
flag includes closed log files and SmartLog data from the source Domain Server in the output archive. –l
migrate
command works on the current Domain Server. You must use the mdsenv <Domain Server name>
command to set environment to the current Domain Server (or to the Multi-Domain Server environment for the global policy) before you run the migrate
command.Example:
# cd /opt/CPsuite-R77/fw1/bin/upgrade_tools/
# mdsenv dms1
# migrate export -l /var/opt/dms1_exported.tgz
This example assumes that you are upgrading using the distribution CD or DVD.
The
command imports an existing Domain Server management database into a Multi-Domain Server. If the imported Domain Server is from a version earlier than that of the Multi-Domain Server, the upgrade process occurs automatically during the import. cma_migrate
You must run
to import Domain Servers exported using the cma_migrate
command. Copy the exported management database archive file to target Multi-Domain Server prior to using the migrate export
command. Bear in mind that the source and target platforms may be different. cma_migrate
Before running
, create a new Domain and a new Domain Server. Do not start the Domain Server.cma_migrate
If you are migrating a Domain Server to a new Domain Server with a different IP address, it is a different procedure.
Syntax:
cma_migrate <source management tgz> <target Domain Server FWDIR directory> |
Example:
# cma_migrate /tmp/exported_smc.tgz /opt/CPmds-r71/domains/dms2/CPsuite-R71/fw1 |
The first argument (<source management tgz>) specifies the path, on the Multi-Domain Server, to the source management data as obtained by the migrate utility. The second argument (<target Domain Server FWDIR directory>) is the FWDIR of the newly created Domain Server.
Note - You can run |
To run the
utility from the SmartDomain Manager:cma_migrate
When running
, pre-upgrade verification takes place. If no errors are found, then the migration continues. If errors are found, certain modifications must be implemented on the original Security Management Server, after which you must re-export the source.cma_migrate
The
process does not change the Certificate Authority or key data. The R77 Domain Server has SIC with Security Gateways. If the IP address of the R77 server is not the same as the IP address of the R77.xx server, you must establish trust between the new server and the gateways.cma_migrate
Before you begin, see sk17197 to make sure the environment is prepared.
To initialize a Domain Server Internal Certificate Authority:
DomainServer Name or IP# mdsstop_customer <
>
DomainServer Name or IP# mdsenv <
>
# fwm sic_reset
DomainServer Name># mdsconfig -ca <
DomainServer IP <
>
DomainServer Name or IP# mdsstart_customer <
>
With a VPN tunnel that has an externally managed, third-party gateway and a Check Point Security Gateway, sometimes there is an issue with the IKE certificates after you migrate the management database.
The Security Gateway presents its IKE certificate to its peer. The third-party gateway uses the FQDN of the certificate to retrieve the host name and IP address of the Certificate Authority. If the IKE certificate was issued by a Check Point Internal CA, the FQDN contains the host name of the original management server. The peer gateway will fail to contact the original server and will not accept the certificate.
To fix:
The
command imports (and upgrades, if necessary) a global policies database from one Multi-Domain Server to another.migrate_global_policies
Note - |
If the global policy database on the target Multi-Domain Server contains polices that are assigned to Domains, the
command stops. This is to make sure that the Global Policy used by those Domains is not deleted.migrate_global_policies
Note - When executing the |
Syntax:
migrate_global_policies <path to exported tgz> |
<path to exported tgz>: specifies the fully qualified path to the archive file created by the
command.migrate export
The purpose of the backup/restore utility is to back up a whole Multi-Domain Server, including all the Domain Servers that it maintains, and to restore it when necessary. The restoration procedure brings the Multi-Domain Server to the state it was when the backup procedure was executed. The backup saves both user data and binaries.
Note - Backup and restore cannot be used to move the Multi-Domain Server installation between platforms. |
Restoration can be performed on the original machine or, if your intention is to upgrade by replicating your Multi-Domain Server for testing purposes, to another machine. When performing a restoration to another machine, if the machine's IP address or interface has changed, refer to Changing the Multi-Domain Server IP Address and External Interface for instructions on how to adjust the restored Multi-Domain Server to the new machine.
During backup, you can view data but cannot make changes. If the Multi-Domain Security Management system consists of several Multi-Domain Servers, the backup procedure takes place manually on all the Multi-Domain Servers concurrently. Likewise, when the restoration procedure takes place, it should be performed on all Multi-Domain Servers concurrently.
The
command backs up the complete Multi-Domain Server, including all the Domain Servers, binaries, and user data. If the Multi-Domain Security Management environment has multiple Multi-Domain Servers, backup runs on all of them at the same time. mds_backup
This command requires Superuser privileges.
executes the mds_backup
command on product root directories containing data and binaries, and backs up all files, except those specified in the gtar
file. The collected data is stored in a single .tgz file, in the current working directory, named with the date-time. For example: $MDSDIR/conf/mds_exclude.dat
13Sep2002-141437.mdsbk.tgz
To back up a Multi-Domain Server:
It is important that you not run
from a directory that will be backed up, to avoid a circular reference. For example, do not run mds_backup
from mds_backup
. /opt/CPmds-R77
mds_backup
.tgz
file, with the mds_restore
, gtar
and gzip
command files, to an external backup location.Syntax mds_backup [-g -b {-d <target dir name>} -v -h]
Parameter |
Description |
---|---|
|
Executes without prompting to disconnect GUI clients. |
|
Batch mode - executes without asking anything (-g is implied). |
|
Specifies a directory store for the backup file. When not specified, the backup file is stored in the current directory. You cannot store the backup file in any location inside the product root directory tree. |
|
Verbose mode - lists all files to be backed up, but do not perform the backup operation. |
|
Exclude logs from the backup. |
|
Help - displays help text. |
Comments When using the
or -g
options, make sure that no GUI clients or log servers are connected. If there are client connections, the backup can be corrupted if changes are made during the backup process.-b
Active log files are not backed up, to avoid read-during-write inconsistencies. It is best practice to run a log switch before backup.
You can back up the Multi-Domain Server without log files. The .tgz will be must smaller. To make sure all logs are excluded:
$MDSDIR/conf/mds_exclude.dat
log/*
Use this command to restore a Multi-Domain Server that was backed up with
. It is best practice to restore to a clean install of the previous version. Use the Installation and Upgrade Guide for major versions, or the Release Notes for minor versions or hotfixes.mds_backup
If the Multi-Domain Security Management environment has multiple Multi-Domain Servers, restore all Multi-Domain Servers at the same time.
To restore a Multi-Domain Server:
./mds_restore <
backup_file>
You can upgrade Smart-1 appliances and open servers.
The in-place upgrade process takes place on an existing Multi-Domain Server machine. The Multi-Domain Server, together with all Domain Servers, are upgraded in one procedure.
Note - When upgrading Multi-Domain Security Management, all SmartUpdate packages on the Multi-Domain Server (excluding Edge firmware packages) are deleted from the SmartUpdate Repository. |
Before doing an in-place upgrade to R77:
UnixInstallScript
. In a multi-Multi-Domain Server environment, do this on all Multi-Domain Servers.mds_backup
to back up your system.Use this procedure to upgrade a Multi-Domain Server from SecurePlatform to R77 Gaia
Use the CLI to do the upgrade.
Note - When upgrading from SecurePlatform to Gaia, the size of the disk partitions does not change. To have larger disk partitions, you need to do a clean installation of Gaia. |
To upgrade a Multi-Domain Server from SecurePlatform to R77 Gaia:
Make sure that the DVD with the R77 ISO file is in the DVD drive.
mount /dev/cdrom
patch add cd
The upgrade package is installed.
Enter
.yes
to verify the MD5 checksum.The Multi-Domain Server is upgraded to R77.
/opt/CPmds-R77/scripts/mds_fix_cmas_clms_version -c ALL –n <Multi-Domain Server name>
Use a DVD to upgrade Multi-Domain Server on SecurePlatform.
Safe Upgrade automatically takes a snapshot of the entire system so that the entire system (operating system and installed products) can be restored if something goes wrong during the Upgrade process (for example, hardware incompatibility). If the Upgrade process detects a malfunction, it automatically reverts to the Safe Upgrade image.
When the Upgrade process is complete, upon reboot you are given the option to start the SecurePlatform operating system using the upgraded version image or using the image prior to the Upgrade process.
To upgrade Multi-Domain Server on SecurePlatform:
Make sure that the DVD with the R77 ISO file is in the DVD drive.
mount /dev/cdrom
.patch add cd
The SecurePlatform upgrade package is installed.
Multi-Domain Server is upgraded to R77.
/opt/CPmds-R77/scripts/mds_fix_cmas_clms_version -c ALL -n <Multi-Domain Server name>
To upgrade a Linux Open Server Multi-Domain Server using a DVD:
mount -ro loop /dev/cdrom /mnt/cdrom
cd /mnt/cdrom/
ls -l
./UnixInstallScript
If the verification fails, we recommend that you review the file, fix the problems, and restart the upgrade. Messages generated by the verification tools are saved to /opt/CPInstLog/verification_tools_report
The upgrade packages are installed.
After the upgrade completes successfully, configure the Multi-Domain Server.
You can only have one interface for this purpose.
We recommend that you get and attach your licenses when configuring Multi-Domain Security Management with the SmartDomain Manager.
to assign the root user group by default. You can define groups later.Note - Starting the Multi-Domain Server after an upgrade for the first time may take several hours, depending on the number of Multi-Domain Servers and on the complexity of the databases. Consider starting the Multi-Domain Server later. |
You can upgrade to the current version by replicating a deployment from existing (source) Multi-Domain Servers to target Multi-Domain Servers. This process combines a simplified methodology for upgrading a Multi-Domain Security Management deployment with the ability to thoroughly test the deployment prior to implementation.
Use
with the Export option, to extract database and configuration settings from a Multi-Domain Server, together with its Domain Servers, and then stores this data in a single TGZ file. If you are working with a High Availability deployment, you must export the primary Multi-Domain Server.mds_setup
Run
from the DVD, from the mds_setup
directorylinux/p1_install/
Use the
command to import the contents of a saved TGZ file to a separate, newly installed Multi-Domain Server. mds_import.sh
These commands export and import the following information:
Before you start the upgrade, consider these points:
After you begin to export from the source Multi-Domain Server, avoid making configuration changes on that Multi-Domain Server. Changes made after export starts are not included in the tgz file. You will need to make such changes manually on the target after you complete the upgrade.
Run
from the DVD, from the mds_setup
directorylinux/p1_install/
To export a Multi-Domain Server to a TGZ file:
linux/p1_install/
directory.mds_setup
Note - Exporting log files can significantly increase the tgz file size and the time required to complete the upgrade. |
To import a Multi-Domain Server deployment onto a target machine:
exported_mds_<time & date stamp>.tgz
mds_import.sh
command on the target Multi-Domain Server. Follow the instructions on the screen.mdsstart
on the target Multi-Domain Server.Choose this type of upgrade if you intend to change hardware as part of the upgrade process, or if you want to test the upgrade process first. The existing Multi-Domain Server installation is copied to another machine (referred to as the target machine) by using the
and mds_backup
commands.mds_restore
To perform the Replicate and Upgrade process:
mds_backup
UnixInstallScript
and select the Backup optionNote - Make sure the target machine is on an isolated network segment, so that Gateways connected to the original Multi-Domain Server are not affected until you switch to the target machine. |
mds_restore
.Important - In Gaia, run this command from expert mode and exit after running the command. You must run this command from the folder that contains the backup file. |
Container2MultiDomain
.In a gradual upgrade, you export Domain Servers one at a time from the source Multi-Domain Server to a target Multi-Domain Server of the latest version.
The gradual upgrade does not keep all data.
Data Not Exported |
To get this data in the new environment: |
---|---|
Multi-Domain Security Management Administrators and management consoles |
Redefine and reassign to Domains after the upgrade. |
Status of global communities |
Run: |
To run a gradual upgrade:
migrate export
The migrate export command exports the Domain Server database to a .tgz file on the Multi-Domain Server. It also transfers the licenses for the Domain Server.
cma_migrate
<src tgz> <FWDIR on target>mdsenv; mdsstart
migrate_global_policies
to import the global policies.The gradual upgrade process for a Multi-Domain Server using Global VPN Communities is not fundamentally different from the gradual upgrade process described above, with the following exceptions:
where used
query from the Global SmartDashboard > Manage > Network Objects > Actions to identify where the problematic Gateways are used in the Global Policy. Review the result set, and edit or delete list items as necessary. Make sure that no problematic Gateways are in use.mdsenv; remove_globally_used_gw <Global name of the gateway>
migrate_global_policies
where the existing Global Policy contains Global Communities, the resulting Global Policy contains:As a result of the migration, the Global Communities are overridden by the migrated database.
|
This section describes how to migrate the Security Management Server product of a standalone deployment to a Domain Server. Then you manage the former-standalone computer as a Security Gateway only from the Domain Server.
Note - To later undo the separation of the Security Management Server and Security Gateway on the standalone, back up the standalone computer before you migrate. |
Before migrating:
To migrate the management database to the Domain Server:
migrate export [-l] <output file>
cma_migrate
command or the import operation from the SmartDomain Manager, specifying as an argument the database location you specified in step 2.Note - To run the You can also run |
Multi-Domain Security Management High Availability gives you management redundancy for all Domains. Multi-Domain Security Management High Availability operates at these levels:
You can only do Global policy and global object management tasks using the active Multi-Domain Server. In the event that the active Multi-Domain Server is unavailable, you must change one of the standby Multi-Domain Servers to active.
You can also use ClusterXL to give High Availability redundancy to your Domain Security Gateways. You use SmartDashboard to configure and manage Security Gateway High Availability for Domain Servers.
Run the pre-upgrade verification on all Multi-Domain Servers before upgrading any Multi-Domain Servers. Select the Pre-Upgrade Verification Only option from
. Upgrade the primary Multi-Domain Server only after you have fixed all errors and reviewed all warnings for all Multi-Domain Servers.UnixInstallScript
Multi-Domain Servers can only communicate and synchronize with other Multi-Domain Servers running the same version. If your deployment has more than one Multi-Domain Server, make sure they are upgraded to the same version.
To upgrade multiple Multi-Domain Servers:
During the upgrade process, we recommend that you do not use any of the Multi-Domain Servers to make changes to the databases. This can cause inconsistent synchronization between Multi-Domain Servers.
Note - You must upgrade your Multi-Domain Log Servers to the same version as the Multi-Domain Servers.
To upgrade a Multi-Domain Server and a Domain Server:
Note - When synchronizing, make sure that you have only one active Multi-Domain Server and one active Domain Server for each Domain.
Change the active Multi-Domain Server and Domain Server, and then synchronize the Standby computers.
After upgrading the Multi-Domain Servers and Domain Servers, you must update the objects in all Domain Server databases. This is necessary because upgrade does not automatically update the object versions attribute in the databases. If you do not manually update the objects, the standby Domain Servers and Log Servers will show the outdated versions.
Update the objects with these steps on each Multi-Domain Server.
To update Domain Server and Domain Log Server objects:
mdsstat
If a Domain Server is down, resolve the issue, and start the Domain Server: mds_startcustomer
mdsenv
$MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL
Optional: Update one Domain Server or Domain Log Server at a time with this command: $MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL -n <server_name>
The best practice is to avoid making any changes to Domain Server databases during the upgrade process. If your business model cannot support management down-time during the upgrade, you can continue to manage Domain Servers during the upgrade process.
This creates a risk of inconsistent Domain Server database content between instances on different Multi-Domain Servers. The synchronization process cannot resolve these inconsistencies.
After successfully upgrading one Multi-Domain Server, you can set its Domain Servers to Active while you upgrade the others. Synchronization between the Domain Servers occurs after all Multi-Domain Servers are upgraded.
If, during the upgrade process, you make changes to the Domain Server database using different Multi-Domain Servers, the contents of the two (or more) databases will be different. Because you cannot synchronize these databases, some of these changes will be lost. The Domain Server High Availability status appears as Collision.
You must decide which database version to retain and synchronize it to the other Domain Servers. You then must re-enter the lost changes to the synchronized database.
After completing the upgrade process, start Domain Servers: mdsstart
Before the upgrade:
Pre-upgrade utilities are an integral part of the upgrade process. In some cases, you are required to change your database before the actual upgrade can take place or the Pre-Upgrade Verifier suggests you execute utilities that perform the required changes automatically. Even if you decide to restore your original environment, keep the changes you made as a result of the pre-upgrade verification.
Prepare a backup of your current configuration using the
utility from the currently installed version. Prepare a backup as the first step of the upgrade process and prepare a second backup right after the Pre-Upgrade Verifier successfully completes with no further suggestions.mds_backup
To restore your original environment:
mds_remove
utility../mds_restore
The original environment is restored.
After upgrading your Multi-Domain Server to the latest version, earlier version files are not automatically deleted from the disk. This lets you revert to the old version in the event there are problems with the upgrade. These files can take up a lot of disk space and cause performance degradation.
After you complete testing your upgrade, we recommend that remove these earlier version files. You can use the
tool to automatically remove old installations with no effect on the installed version.mds_remove_version
To remove old installations:
mds_remove_version.sh
script to the Multi-Domain Server mds_remove_version.sh
.Important - This tool removes major releases and all minor releases installed over a major release. For example, if R71.50 is installed on your Multi-Domain Server, and you upgraded to R77, the tool removes R71 and R71.50 files. |
If your target machine and the source machine have different IP addresses, follow the steps listed below it to change the restored Multi-Domain Server to the new IP address.
To change the IP address:
mdsstop
.$MDSDIR/conf/LeadingIP
file to the new IP address.$MDSDIR/conf/mdsdb/mdss.C
file. Find the Multi-Domain Server object that has the source Multi-Domain Server IP address and change its IP address to the new IP address. Do not change the Multi-Domain Server name.If your target machine and the source machine have different interface names (e.g.,
and hme0
), follow the steps listed below to adjust the restored Multi-Domain Server to the new interface name.hme1
To change the interface:
$MDSDIR/conf/external.if
to the new interface name.$FWDIR/conf/vip_index.conf
.We recommend that you save each Domain policy, so that you can restore the settings after the upgrade. To do so, go to the Domain Configuration window > Assign Global Policy tab, and enable Create database version.
See the Global Policy Chapter in the R77 Multi-Domain Security Management Administration Guide for detailed information.
IPv6 is automatically enabled if you configure IPv6 addresses in the First Time Configuration Wizard.
If you did not do this, enable IPv6 in one of the following ways:
To enable IPv6 using Clish:
# set ipv6-state on
# save config
# reboot
To enable IPv6 using the Portal:
If your environment uses IPv6 addresses, you first must enable IPv6 support for the Multi-Domain Server and for any existing Domain Servers. It is not necessary to enable IPv6 support for Domain Servers that are created after IPv6 is enabled on the Multi-Domain Server, because this occurs automatically.
Before enabling IPv6 support for the Multi-Domain Server:
To enable IPv6 support for the Multi-Domain Server:
> mdsconfig
.Press y again to confirm.
After a few moments, the
menu shows.mdsconfig
To enable IPv6 support for all existing Domain Servers:
mdsconfig
menu, select IPv6 Support for Existing Domain Servers.Or
Press r to automatically assign IPv6 address from a specified range.
To manually enable IPv6 support for specified Domain Servers.
mdsconfig
menu, select IPv6 Support for Existing Domain Servers.Press y to confirm.
The available Domain Servers show above prompt. You can copy and paste the name.