You can upgrade R77.xx to R80.20 with a migration procedure. Versions higher than R77.30 cannot be migrated.
A basic migration is when you upgrade the database from a source Security Management Server to a target Security Management Server of the same version.
In an advanced upgrade, the database from an R77.xx Security Management Server is migrated to an R80.10 server. When you migrate, you are exporting the upgrade from the source server and importing it to the target server.
We recommend that you use database export/import
to upgrade.
Note - There has to be a valid license on the Multi-Domain Servers before you import the database.
To make sure a valid license is installed, run:
mdsenv && cplic print
If it is not already installed, then install a valid license now.
Important! In R80.10, the order that you import servers is crucial:
If there is no Primary Multi-Domain Server, you must first promote a Secondary Multi-Domain Server to be the Primary. See R80.10 Multi-Domain Security Management Administration Guide.
Export current Multi-Domain Server extracts the database and configuration settings from a Multi-Domain Server and its associated Domain Management Servers. It then stores this data in a single TGZ file. You can import this TGZ file to a newly installed Multi-Domain Server.
Note - In a High Availability deployment, you must export the primary Multi-Domain Server. If the target Multi-Domain Server uses a different leading IP address than the source server, you must change the Multi-Domain Server IP address and the external interface.
You can include the log files in the exported TGZ file. These log files are likely to be very large.
To create the export file on a source Multi-Domain Server:
# mdsstop
# mdsenv
# mcd
# mount -o loop /path_to/Check_Point_R80.10_Gaia.iso /mnt/cdrom
# cd /mnt/cdrom/linux/p1_install
# ./mds_setup
(1) Run Pre-upgrade verification only [recommended before upgrade]
(2) Upgrade to R80.10
(3) Backup current Multi-Domain Server
(4) Export current Multi-Domain Server
Or 'Q' to quit.
The pre-upgrade verifier analyzes compatibility of the management database and its current configuration. A detailed report shows the steps to do before and after the upgrade.
Note - The pre-upgrade verification is required when you upgrade to a new version. You do not need to run the verification when you migrate to the same version (without upgrading).
# mdsstop
# ./mds_setup
(1) Run Pre-upgrade verification only [recommended before upgrade]
(2) Upgrade to R80.10
(3) Backup current Multi-Domain Server
(4) Export current Multi-Domain Server
Or 'Q' to quit.
Would you like to proceed with the export now [yes/no] ?
yesPlease enter target directory for your Multi-Domain Server export (or 'Q' to quit):
/var/logDo you plan to import to a version newer than R80.10 [yes/no] ?
noUsing migrate_tools from disk.
Do you wish to export the log database [yes/no] ?
yes or no
If you enter no to export the logs, the configuration is still exported.
# ls -l /var/log/exported_mds.
DDMMYYY-
HHMMSS.tgz
# md5sum /var/log/exported_mds.
DDMMYYY-
HHMMSS.tgz
Import the Multi-Domain Server configuration that you exported.
Important - When you transfer the exported database from the source to the target, use binary mode during the transfer.
To import the Multi-Domain Server configuration:
When you complete the upgrade process for the Primary Multi-Domain Server, the Multi-Site upgrade is not finished. You can only access objects that are stored on other Multi-Domain Servers when the upgrade process for the other Multi-Domain Servers is complete.
exported_mds.
DDMMYYY-
HHMMSS.tgz
# md5sum /<directory>/exported_mds.
DDMMYYY-
HHMMSS.tgz
# mdsenv
# cplic print
If it is not already installed, then install a valid license now.
$MDSDIR/scripts/mds_import.sh
<path_exported_database>/exported_mds.
DDMMYYY-
HHMMSS.tgz
mdsstart
Import the Multi-Domain Server configuration that you exported to a Secondary Multi-Domain Server or Multi-Domain Log Server. If you have multiple servers, import the database to one server at a time.
Important - When you transfer the exported database from the source to the target, use binary mode during the transfer.
Before you begin:
# mds_backup -b –d /var/log
# mdsenv
# cplic print
If it is not already installed, then install a valid license now.
To import the Multi-Domain Server configuration:
exported_mds.DDMMYYY-HHMMSS.tgz
# md5sum /<
directory>/exported_mds.DDMMYYY-HHMMSS.tgz
# $MDSDIR/scripts/mds_import.sh -primaryip <
IP_primary_server> <
path_to_exported_database>/exported_mds.DDMMYYYY-HHMMSS.tgz
mdsstart
command on it.After you complete the upgrade of all secondary Multi-Domain Servers and the Multi-Domain Log Servers, you must update the version of the Domain Management Server and the Domain Log Server objects.
To update the version of the Domain Management Server and Domain Log Server objects on the Multi-Domain Servers:
# mdsstat
# mdsenv
# $MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL -n <
Name of Domain Management Server or Domain Log Server>
Note - Because the command prompts you for a 'yes/no
' for each Domain and each object in the Domain, you can explicitly provide the 'yes
' answer to all questions with this command:
# yes | $MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL -n <
Name of Domain Management Server or Domain Log Server>
Attention:
This upgrade method is supported only when you upgrade from R7x versions. We recommend to upgrade the entire Multi-Domain Server at once with one of these methods:
Because upgrade of the entire Multi-Domain Server at once is the default recommended method, use the Gradual Migration of Domain Management Servers only in these cases:
|
If you use the Gradual Migration method:
If you need to make changes on the source Multi-Domain Servers, follow these guidelines:
Notes:
In a gradual upgrade, you export each Domain Management Server one at a time from the source Multi-Domain Server to a target Multi-Domain Server of the latest version.
The gradual upgrade does not keep all data.
Data that is not exported |
To get this data in the new environment |
---|---|
Multi-Domain Server administrators and management consoles |
Redefine and reassign to Domains after the upgrade. |
Status of global communities |
Run these commands:
|
You can migrate the global policy only one time. We recommend that you do not change the global policy on R77.xx until you move all the Domain Management Servers to the R80.10 Multi-Domain Server.
If you have to change the global policy after you have migrated it, follow these guidelines:
cma_migrate
on the target Multi-Domain Server fails.migrate_global_policies
upgrades a global policy database from a Multi-Domain Server and imports it to an R80.10 Multi-Domain Server.
Note - When you execute the migrate_global_policies
utility, the Multi-Domain Server is stopped.
Before you run the migrate_global_policies
utility, make sure that you remove all the data from the global database of the R80.10 Multi-Domain Server.
Upgrading the global policy is supported for R77.xx only. You cannot upgrade the global policy when the source is R80.xx.
To upgrade Global Policies from R77.xx to R80.10:
# mdsenv
# cd <
full path to migrate command>
# ./migrate export <
output file>
# mdsenv
mdsenv
cplic print
If it is not already installed, then install a valid license now.
# migrate_global_policies
<full_path_exported_tgz>
#
mdsstart
This procedure exports, updates, and imports the database of an R77.xx Domain Management Server to an R80.10 Domain Management Server.
Important - This procedure is not supported for migration of versions R80 and above.
Before you begin:
To import from R77.xx Domain Management Server to R80.10:
Extraction makes the upgrade_tools
subdirectory.
In this path, extract the Multi-Domain Security Management tools - p1_upgrade_tools.tgz
For example:
Install from CD:
|
Install from DVD:
|
# mdsenv <
IP address or Name of Domain Management Server>
# cd <
full path to migrate command>
# ./migrate export [-l]
<output file>
migrate
export
command exports one Domain Management Server database to a TGZ file.–l
flag includes closed log files and SmartLog data from the source Domain Management Server in the output archive.# mgmt_cli --root true add domain name <my_domain_name> servers.ip-address <my_IP_address> servers.name <my_domain_server_name> servers.multi-domain-server <R80.10_multi-domain-server_Name> servers.skip-start-domain-server true |
Important! - After you create the new Domain with this command, do not change the Domain IP address until you run the cma_migrate
command.
# unset TMOUT # cma_migrate <source management tgz file> <target Domain Management Server $FWDIR directory> |
For example:
|
This command updates the database schema before it imports. First, the command runs pre-upgrade verification. If no errors are found, migration continues. If there are errors, you must change the source Domain Management Server according to instructions in the error messages. Then do this procedure again.
# mdsenv # $MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL -n <Name of Domain Management Server> |
Note - Because the command prompts you for a 'yes/no
' for each Domain and each object in the Domain, you can explicitly provide the 'yes
' answer to all questions with this command:
# yes | $MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL -n <Name of Domain Management Server> |
Important - To do a Domain Management Server migration on a Secondary Multi-Domain Server, you must set the state of its Global Domain to Active.
Procedure:
# mdsenv && $CPDIR/bin/cpprod_util CPPROD_SetValue FW1 LastIpsUpdate 1 `date +%s` 1
A window shows for the global domain.
The cma_migrate
process does not change the Certificate Authority or key data. The R80.10 Domain Management Server has SIC with Security Gateways. If the IP address of the R80.10 server is not the same as the IP address of the R77.xx server, you must establish trust between the new server and the gateways.
Before you begin, see sk17197 to make sure the environment is prepared.
To initialize a Domain Management Server Internal Certificate Authority:
# mdsstop_customer <
IP address or Name of Domain Management Server>
# mdsenv <
IP address or Name of Domain Management Server>
# fwm sic_reset
# mdsconfig -ca <
Name of Domain Management Server> <
IP address f Domain Management Server>
# mdsstart_customer <
IP address or Name of Domain Management Server>
With a VPN tunnel that has an externally managed, third-party gateway and a Check Point Security Gateway, there can be an issue with the IKE certificates after you migrate the management database.
The Security Gateway presents its IKE certificate to its peer. The third-party gateway uses the FQDN of the certificate to retrieve the host name and IP address of the Certificate Authority. If the IKE certificate was issued by a Check Point Internal CA, the FQDN contains the host name of the original management server. The peer gateway will fail to contact the original server and will not accept the certificate.
To fix:
Migration from Standalone to R80.10 Domain Management Server is supported only from R77.30 and lower versions. You need to separate the Security Management Server and Security Gateway on the Standalone. Then you manage the former-Standalone computer as a Security Gateway from the R80.10 Domain Management Server.
Note - To undo the separation of the Security Management Server and Security Gateway on the Standalone, back up the Standalone computer before you migrate.
Before migrating:
To migrate the management database to the Domain Management Server:
migrate export
command.# ./migrate export [-l] <
output file>
# mgmt_cli --root true add domain name
<my_domain_name> servers.ip-address
<my_IP_address> servers.name
<my_domain_server_name> servers.multi-domain-server
<R80.10_multi-domain-server_Name> servers.skip-start-domain-server true
Important! After you create the new domain with this command, do not change the domain IP address until you run the cma_migrate
command.
# unset TMOUT
# cma_migrate
<source management tgz file> <target Domain Management Server $FWDIR directory>
For example:
# cma_migrate tmp/orig_mgmt.tgz /opt/CPmds-R80/customers/cma1/CPsuite-R80/fw1
This command updates the database schema before it imports. First, the command runs pre-upgrade verification. If no errors are found, migration continues. If there are errors, you must change the source Domain Management Server according to instructions in the error messages. Then do this procedure again.
Previous references to the Standalone management object now refer to this object.
Note - If you see warning messages about this Security Gateway because it is not yet configured, ignore them.