Re-establishing SIC Trust with Virtual Devices
In the event you encounter connectivity problems due to the loss of SIC Secure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server. Trust for a specific Virtual Device
Logical object that emulates the functionality of a type of physical network object. Virtual Device can be on of these: Virtual Router, Virtual System, or Virtual Switch. (Virtual System
Virtual Device on a VSX Gateway or VSX Cluster Member that implements the functionality of a Security Gateway. Acronym: VS. or Virtual Router
Virtual Device on a VSX Gateway or VSX Cluster Member that functions as a physical router. Acronym: VR.), you can use the procedure below to manually re-establish the SIC trust.
To manually re-establish SIC Trust with a Virtual Device (except VS0):
Follow the instructions in the sk34098.
-
On the VSX Gateway
Physical server that hosts VSX virtual networks, including all Virtual Devices that provide the functionality of physical network devices. It holds at least one Virtual System, which is called VS0. or each VSX
Virtual System Extension. Check Point virtual networking solution, hosted on a computer or cluster with virtual abstractions of Check Point Security Gateways and other network devices. These Virtual Devices provide the same functionality as their physical counterparts. Cluster Member
Security Gateway that is part of a cluster.:
-
Connect to the command line the VSX Gateway or each VSX Cluster
Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. Member.
-
Log in to the Expert mode.
-
Examine the VSX configuration to determine the ID of the Virtual Device:
vsx stat -v
-
Go to the context of the Virtual Device:
vsenv <
ID>
-
Reset the SIC with the specified Virtual Device:
vsx sicreset <
ID>
-
-
-
Connect to the command line the Management Server.
-
Log in to the Expert mode.
-
On the Multi-Domain Server
Dedicated Check Point server that runs Check Point software to host virtual Security Management Servers called Domain Management Servers. Synonym: Multi-Domain Security Management Server. Acronym: MDS., change the context to the applicable Target Domain Management Server used to manage the Virtual Device:
mdsenv <
IP Address or Name of Domain Management Server>
-
Determine the SIC name of the Virtual Device:
cpca_client lscert -stat valid -kind SIC | grep -i -A 2 <
Name of Virtual Device Object>
-
Revoke the SIC certificate of the Virtual Device:
cpca_client revoke_cert -n <
CN=...,O=...,>
-
-
Connect with SmartConsole
Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. to the Security Management Server
Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. or Main Domain Management Server used to manage the VSX Cluster.
-
From the Gateways & Servers view or Object Explorer, double-click the Virtual Device object.
-
Click OK (without changing anything).
This action creates a new SIC certificate for the Virtual Device and saves it on the VSX Gateway or each VSX Cluster Member.
Resetting SIC in Security Groups
Resetting SIC on a VSX Gateway (VS0)
Workflow to reset SIC on a VSX Gateway (VS0):
-
Initialize SIC in SmartConsole in the Security Group object.
-
Make sure that Trust is established on the Security Group.
To initialize SIC on the Security Group:
-
Use a serial console to connect to the Security Group.
-
Log in to the Expert mode.
-
Run:
asg stat -i tasks
This tells you which Security Group Member is the SMO.
-
Run:
g_all cp_conf sic init <
activation_key>
Note - SIC Reset takes 3 to 5 minutes.
Important- Do the next steps immediately.
To initialize SIC in SmartConsole:
-
In the Security Group object, click the General Properties> Communication.
-
Click Reset.
-
Enter the same activation key you used when you initialized SIC on the Security Group.
-
Click Initialize.
Make sure that Trust is established.
-
Click OK.
-
Install the policy on the Security Group object.
To make sure that Trust is established on the Gateway:
Run:
|
Example of the expected output:
|
Resetting SIC for Non-VS0 Virtual Systems
To reset SIC on Virtual Systems that are not VS0:
-
Log into the SMO over an SSH.
-
Log in to the Expert mode.
-
Go to the applicable context ID:
vsenv <VS ID>
-
Initialize SIC:
g_all cp_conf sic init <activation_key>
-
Revoke the Virtual Systems certificate defined in the Management Server.
For the detailed procedure, see Part II of sk34098.
-
In SmartConsole, open the Virtual System object and just click OK without changing anything.
This pushes the VSX configuration and re-establishes SIC trust with the SMO.
-
Install a policy on the Virtual System object.
Troubleshooting SIC Reset in Security Groups
Resetting SIC takes 3-5 minutes.
If resetting of the SIC was interrupted (for example, by loss of network connectivity), run the g_all cp_conf sic state
command to get the SIC state and follow these steps:
SIC state |
Do this |
|
Repeat the SIC reset procedure. |
|
|
SIC Cleanup
To resolve other SIC issues, do a SIC cleanup in the Expert mode:
|