Configuring the Gemalto HSM Environment
This section describes how to configure the Check Point environment to work with the Gemalto Luna SP SafeNet HSM.
The SafeNet Cryptographic Engine enables the SafeNet Network HSM functionality by providing:
-
Secure cryptographic storage.
-
Cryptographic acceleration.
-
Administrative access control.
-
Policy management.
-
Detection of modifications done to the data.
Workflow
Use this workflow to configure your Check Point Security Group A logical group of Security Gateway Modules that provides Active/Active cluster functionality. A Security Group can contain one or more Security Gateway Modules. Security Groups work separately and independently from each other. To the production networks, a Security Group appears a single Security Gateway. to work with the Gemalto HSM Server:
Step 1: Extract the Gemalto Help Package
Step 2: Configure the Gemalto HSM Server to Work with Check Point Security Group
Step 3: Configure the Gemalto HSM Client Workstation
Step 4: Create the CA Certificate on the Gemalto HSM Server
Step 5: Configure the Check Point Security Group to Work with the Gemalto HSM Server
Step 1: Extract the Gemalto Help Package
You must use the Gemalto configuration documents to configure the Gemalto HSM environment.

Step |
Instructions |
||
---|---|---|---|
1 |
Use a Window-based computer. |
||
2 |
Download this package: Gemalto SafeNet HSM Help package
|
||
3 |
Extract the Gemalto HSM Help package to some folder. |
||
4 |
Open the extracted Gemalto HSM Help folder. |
||
5 |
Double-click the START_HERE.html file. The Gemalto SafeNet Network HSM 6.2.2 Product Documentation opens. |
Step 2: Configure the Gemalto HSM Server to Work with Check Point Security Group
Use the Gemalto Help documents to install and configure the HSM Server.

Step |
Instructions |
||||||
---|---|---|---|---|---|---|---|
1 |
Install the Gemalto HSM Appliance. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to Installation Guide > SafeNet Network HSM Hardware Installation. |
||||||
2 |
Perform the initial configuration of the Gemalto HSM Appliance and the Gemalto HSM Server. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to Configuration Guide > and follow from [Step 1] to [Step 6]. |
||||||
3 |
Run the " From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to Configuration Guide > [Step 7] Create a trusted link and register Client and Appliance with each other. |
||||||
4 |
Complete the configuration of the Gemalto HSM Server to work with Check Point Security Group. Run these commands in LunaSH:
|
Step 3: Configure the Gemalto HSM Client Workstation
You use the Gemalto HSM Client Workstation to create a CA Certificate on the Gemalto HSM Server.
Check Point Security Group uses this CA Certificate for Outbound HTTPS Inspection Feature on a Security Gateway that inspects traffic encrypted by the Secure Sockets Layer (SSL) protocol for malware or suspicious patterns. Synonym: SSL Inspection. Acronyms: HTTPSI, HTTPSi. when it stores and accesses SSL keys on the Gemalto HSM Server.

Step |
Instructions |
|||
---|---|---|---|---|
1 |
Install a Windows-based or Linux-based computer to use as an HSM Client workstation. |
|||
2 |
Download and install this software package on the HSM Client workstation computer: SafeNet HSM Client for Workstation
From Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Installation Guide > SafeNet HSM Client Software Installation. |
|||
3 |
Establish a Trust Link between the HSM Client workstation and the HSM Server. On the HSM Client workstation, run in LunaCM:
From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to Configuration Guide > [Step 7] Create a trusted link and register Client and Appliance with each other.
|
Step 4: Create the CA Certificate on the Gemalto HSM Server

Step |
Instructions |
|||
---|---|---|---|---|
1 |
On the HSM Client workstation computer, open a command prompt or a terminal window. |
|||
2 |
Use the " Example:
|
|||
3 |
When prompted, enter a password: Example:
|
|||
4 |
Select the RSA mechanism by entering the corresponding number:
|
|||
5 |
Run the Example:
|
|||
6 |
Use the handle numbers from the previous Step 5 to create the CA certificate. Example:
|
|||
7 |
Run the " Example:
|
Step 5: Configure the Check Point Security Group to Work with the Gemalto HSM Server
Workflow:
-
Install the Gemalto HSM Simplified Client software packages on the Check Point Security Group.
Procedure
Step
Instructions
1
Download this software package:
Gemalto SafeNet HSM Simplified Client for Check Point Security Gateway
Note - Software Subscription or Active Support plan is required to download this package.
2
Copy the software package to the Check Point Security Group to some directory.
3
Connect to the command line on the Check Point Security Group.
4
Log in to the Expert mode.
5
Go to the directory with the packages:
g_all cd /<Path>/<To>/<Directory>
6
Extract the packages:
g_all tar -xvf <Name of Package>.tar
7
Install these packages:
g_all rpm -Uvh configurator-6.2.2-4.i386.rpm
g_all rpm -Uvh libcryptoki-6.2.2-4.i386.rpm
g_all rpm -Uvh vtl-6.2.2-4.i386.rpm
-
Establish a Trust Link between the Check Point Security Group and the Gemalto HSM Server.
-
On the Check Point Security Group, follow these steps.
Instructions
-
Connect to the command line.
-
Log in to the Expert mode.
-
Go to the SafeNet HSM Simplified Client installation directory:
g_all cd /usr/safenet/lunaclient/bin/
-
Import the HSM Server certificate, server.pem, from the HSM Server to the Security Group:
Important - The period at the end is part of the syntax.
g_all scp admin@<IP Address of HSM Server>:server.pem .
-
Register the HSM Server certificate, server.pem, with the Check Point Security Group:
g_all ./vtl addServer -n <IP Address of HSM Server> -c server.pem
-
Create a certificate and private key for the Check Point Security Group:
g_all ./vtl createCert -n <IP Address of CP Security Group>
Notes:
-
Use the IP address of the interface that connects to the HSM Server.
In a Check Point Cluster, use the IP address of the Cluster Member
Security Gateway that is part of a cluster., and not the Cluster Virtual IP address.
-
The command creates this private key file:
/usr/safenet/lunaclient/cert/client/<IP Address of Check Point Security Group>Key.pem
-
The command creates this certificate file:
/usr/safenet/lunaclient/cert/client/<IP Address of Check Point Security Group>.pem
-
-
Copy the Check Point Security Group certificate file that you created to the HSM Server
Important - The colon at the end is part of the syntax.
g_all scp <IP Address of Check Point Security Group>.pem admin@<IP Address of HSM Server>:
-
-
On the HSM Server, in LunaSH, perform these steps.
Instructions
-
Register the Check Point Security Group certificate with the HSM Server:
lunash:> client register -client <Desired Name of HSM Client> -ip <IP Address of Check Point Security Group>
-
Restart the Network Trust Link service:
lunash:> service restart ntls
-
Confirm the Check Point Security Group registration:
lunash:> client list
-
Assign the Check Point Security Group to the applicable partition:
lunash:> client assignPartition -client <Configured Name of HSM Client> -partition <Partition Name>
-
Examine the partition access:
lunash:> client show -client <Configured Name of HSM Client>
-
-
On the Check Point Security Group, perform this step.
Instructions
Examine the partition access:
g_all ./vtl verify
Notes:
-
For more information, see Gemalto SafeNet Network HSM 6.2.2 Product Documentation.
For information about establishing a Trust Link, go to Appliance Administration Guide > Configuration without One-step NTLS > [Step 7] Create a Network Trust Link Between the Client and the Appliance.
-
If it is necessary to establish a new Trust Link, you have to delete the current Trust Link (see Deleting a Trust Link with the HSM Server).
-
-
Configure HTTPS Inspection on the Check Point Security Group to work with the Gemalto HSM Server.
Important Notes
-
Before you configure the HTTPS Inspection on the Security Group to work with the Gemalto HSM Server, you must enable and configure HTTPS Inspection on the Check Point Security Group, install the applicable Access Control Policy, and confirm that HTTPS Inspection works correctly without the Gemalto HSM Server.
-
After any change in the
$FWDIR/conf/hsm_configuration.C
file on the Check Point Security Group, you must fetch or install the Access Control Policy on the Security Group. -
If the Gemalto HSM Server is not available when you fetch or install policy on the Check Point Security Group, the HTTPS Inspection is not able to inspect the outbound HTTPS traffic.
As a result, internal computers are not able to access HTTPS web sites.
To resolve this, make sure that the Gemalto HSM Server is up and running, there is physical connectivity between the Check Point Security Group and the Gemalto HSM Server, the Trust Link is established with the Gemalto HSM Server, and then fetch or install the policy on the Security Group.
In addition, see Disabling Communication from the Check Point Security Group to the Gemalto HSM Server.
Procedure
-
Connect to the command line on the Security Group.
-
Log in to the Expert mode.
-
Edit the configuration file
$FWDIR/conf/hsm_configuration.C
:g_all vi $FWDIR/conf/hsm_configuration.C
-
Based on the output of the "
cmu list
" command from Step 4 above, add details of the CA certificate from the HSM Server to this configuration file.Example:
-
On the Security Group, fetch the local policy:
g_fw fetch local
-
Confirm that HTTPS Inspection is activated successfully on outbound traffic.
-
From an internal computer, connect to any HTTPS web site.
-
On the internal computer, in the web browser, you should receive the signed CA certificate from the HSM Server.
-
Additional Actions for a Gemalto HSM Server

You can disable communication from the Check Point Security Group to an HSM Server.
For example, when the HSM Server is under maintenance.
Step |
Instructions |
|
---|---|---|
1 |
Connect to the command line on the Check Point Security Group. |
|
2 |
Log in to the Expert mode. |
|
3 |
Back up the current configuration file
|
|
4 |
Edit the current configuration file
|
|
5 |
Set the value of the "
|
|
6 |
Save the changes in the file and exit the editor. |
|
7 |
Fetch the local policy:
|

If it is necessary to establish new Trust Link between a Check Point Security Group and an HSM Server, you must delete the current Trust Link.
For example, when you replace or reconfigure a Check Point Security Group, or an HSM Server.
Step |
Instructions |
||
---|---|---|---|
1 |
Delete the current Trust Link on the Check Point Security Group:
|
||
2 |
Delete the current Trust Link on the HSM Server:
|
|
Note - For more information, see Gemalto SafeNet Network HSM 6.2.2 Product Documentation. |

Step |
Instructions |
|
---|---|---|
1 |
Connect to the HSM Server over SSH. |
|
2 |
Examine all the configured interfaces:
|
|
3 |
Add a new interface:
|
|
4 |
Enable Network Trust Link Service (NTLS) on all the interfaces. |
|
Note - For more information, see Gemalto SafeNet Network HSM 6.2.2 Product Documentation > LunaSH Command Reference Guide > LunaSH Commands. |