Re-establishing SIC Trust with Virtual Devices
In the event you encounter connectivity problems due to the loss of SIC Secure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server. Trust for a specific Virtual Device
Logical object that emulates the functionality of a type of physical network object. Virtual Device can be on of these: Virtual Router, Virtual System, or Virtual Switch. (Virtual System
Virtual Device on a VSX Gateway or VSX Cluster Member that implements the functionality of a Security Gateway. Acronym: VS. or Virtual Router
Virtual Device on a VSX Gateway or VSX Cluster Member that functions as a physical router. Acronym: VR.), you can use the procedure below to manually re-establish the SIC trust.
To manually re-establish SIC Trust with a Virtual Device:
Follow the instructions in the sk34098.
-
On the VSX Gateway
Physical server that hosts VSX virtual networks, including all Virtual Devices that provide the functionality of physical network devices. It holds at least one Virtual System, which is called VS0. or each VSX
Virtual System Extension. Check Point virtual networking solution, hosted on a computer or cluster with virtual abstractions of Check Point Security Gateways and other network devices. These Virtual Devices provide the same functionality as their physical counterparts. Cluster Member
Security Gateway that is part of a cluster.:
-
Connect to the command line the VSX Gateway or each VSX Cluster
Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. Member.
-
Log in to the Expert mode.
-
Examine the VSX configuration to determine the ID of the Virtual Device:
vsx stat -v
-
Reset the SIC with the specified Virtual Device:
vsx sic reset <
ID>
-
-
-
Connect to the command line the Management Server.
-
Log in to the Expert mode.
-
On the Multi-Domain Server
Dedicated Check Point server that runs Check Point software to host virtual Security Management Servers called Domain Management Servers. Synonym: Multi-Domain Security Management Server. Acronym: MDS., change the context to the applicable Target Domain Management Server used to manage the Virtual Device:
mdsenv <
IP Address or Name of Domain Management Server>
-
Determine the SIC name of the Virtual Device:
cpca_client lscert -stat valid -kind SIC | grep -i -A 2 <
Name of Virtual Device Object>
-
Revoke the SIC certificate of the Virtual Device:
cpca_client revoke_cert -n <
CN=...,O=...,>
-
-
Connect with SmartConsole
Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. to the Security Management Server
Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. or Main Domain Management Server used to manage the VSX Cluster.
-
From the Gateways & Servers view or Object Explorer, double-click the Virtual Device object.
-
Click OK.
This action creates a new SIC certificate for the Virtual Device and saves it on the VSX Gateway or each VSX Cluster Member.
Resetting SIC in Scalable Platforms
Background
Resetting SIC on a VSX Gateway (VS0)
Workflow to reset SIC on a VSX Gateway (VS0):
-
Initialize SIC on the Scalable Platform.
-
Initialize SIC in SmartConsole in the Scalable Platform object.
-
Make sure that Trust is established on the Scalable Platform.
To initialize SIC on the Scalable Platform:
-
Use a serial console to connect to the Scalable Platform.
-
Log in to the Expert mode.
-
Run:
asg stat -i tasks
This tells you which SGM is the SMO
See "SMO"..
-
Run:
g_cpconfig sic init <
activation_key>
Note - SIC Reset takes 3 to 5 minutes.
Important- Do the next steps immediately.
To initialize SIC in SmartConsole:
-
In the Scalable Platform object, click the General Properties> Communication.
-
Click Reset.
-
Enter the same activation key you used when you initialized SIC on the Scalable Platform.
-
Click Initialize.
Make sure that Trust is established.
-
Click OK.
-
Install the policy on the Scalable Platform object.
-
At the serial console connection to the Scalable Platform, press
c
to complete the procedure.
Note - At this stage, all SGMs except for the SMO, reboot.
To make sure that Trust is established on the Gateway:
Run:
|
Example of the expected output:
|
Resetting SIC for Non-VS0 Virtual Systems
To reset SIC on Virtual Systems that are not VS0:
-
Log into the SMO over an SSH.
-
Log in to the Expert mode.
-
Go to the applicable context ID:
vsenv <VS ID>
-
Initialize SIC:
g_cpconfig sic init <activation_key>
-
Revoke the Virtual Systems certificate defined in the Management Server.
For the detailed procedure, see Part II of sk34098.
-
In SmartConsole, open the Virtual System object and just click OK without changing anything.
This pushes the VSX configuration and re-establishes SIC trust with the SMO.
-
Install a policy on the Virtual System object.
Troubleshooting SIC Reset in Scalable Platforms
Resetting SIC takes 3-5 minutes. If resetting of the SIC was interrupted (for example, by loss of network connectivity), run the g_cpconfig sic state
command to get the SIC state and follow these steps.
SIC state |
Do this |
|
Repeat the SIC reset procedure. |
|
|
SIC Cleanup
To resolve other SIC issues, do a SIC cleanup. There are two ways to do a SIC cleanup:
Run:
|
OR
-
Log in to the Expert mode.
-
Use the
ccutil
command to shut down all SGMs (but not the SMO). -
Connect to the SMO using a serial console.
-
In SmartConsole, open the Scalable Platform object.
-
Go to General Properties page >Communication.
-
Initialize SIC.
-
Install the Access Control Policy on the SMO.
-
Use the
ccutil
command to turn on all SGMs.