The procedure below describes an example VSX Cluster with three members M1, M2 and M3. However, it can be used for clusters that consist of two or more members.
Cluster States |
General Upgrade Workflow |
---|---|
The VSX Cluster Member M1 has the lowest Cluster Member ID and is the Active member. The VSX Cluster Members M2 and M3 are Standby. |
|
Step 1 of 21: On the Management Server - Upgrade the configuration of the VSX Cluster object to R80.20
Step |
Description |
---|---|
1 |
Connect to the command line on the Security Management Server or Multi-Domain Server that manages this VSX Cluster. |
2 |
Log in to the Expert mode. |
3 |
On a Multi-Domain Server, switch to the context of the Main Domain Management Server that manages this VSX Cluster object:
|
4 |
Upgrade the configuration of the VSX Cluster object to R80.20: |
4A |
Run:
This command is interactive. |
4B |
Enter these details to log in to the management database:
|
4C |
Select your VSX Cluster. |
4D |
Select the R80.20. |
4E |
For auditing purposes, save the
|
5 |
Connect with SmartConsole to the R80.20 Security Management Server or Main Domain Management Server that manages this VSX Cluster. |
6 |
From the left navigation panel, click Gateways & Servers. |
7 |
Open the VSX Cluster object. |
8 |
From the left navigation tree, click the General Properties page. |
9 |
Make sure in the Platform section, the Version field shows R80.20. |
10 |
Click Cancel (do not click OK). |
Step 2 of 21: Get the R80.20 image
Step |
Description |
---|---|
1 |
Download the applicable R80.20 image from the R80.20 Home Page SK - CPUSE upgrade image, or Clean Install image. |
2 |
Transfer the upgrade image to the current VSX Cluster Members to some directory (for example, Note - Make sure to transfer the file in the binary mode. |
Step 3 of 21: On each VSX Cluster Member - Examine the cluster state and get the Cluster Member IDs
Step |
Description |
---|---|
1 |
Connect to the command line on each VSX Cluster Member. |
2 |
Log in to the Expert mode. |
3 |
Examine the cluster state:
Identify the VSX Cluster Member with the lowest Cluster Member ID. |
Step 4 of 21: On all VSX Cluster Members with higher Cluster Member IDs - Upgrade to R80.20 with CPUSE, or perform a Clean Install of R80.20
Upgrade or perform Clean Install on all of the VSX Cluster Members (in our example, M2 and M3),
except for the VSX Cluster Member with the lowest Cluster Member ID (in our example, M1).
Note that you already upgraded the configuration of the VSX Cluster object to R80.20.
Notes:
Step 5 of 21: In SmartConsole - Install the Access Control Policy
Step |
Description |
---|---|
1 |
Connect with SmartConsole to the R80.20 Security Management Server or Main Domain Management Server that manages this VSX Cluster. |
2 |
From the left navigation panel, click Gateways & Servers. |
3 |
Click Install Policy. |
4 |
In the Install Policy window:
|
5 |
The Access Control Policy successfully installs on the upgraded VSX Cluster Members M2 and M3. The Access Control Policy installation fails on the old VSX Cluster Member M1 with a warning. Ignore this warning. |
Step 6 of 21: On each VSX Cluster Member - Examine the cluster state
Step |
Description |
---|---|
1 |
Connect to the command line on each VSX Cluster Member. |
2 |
Examine the cluster state:
Notes:
|
Step 7 of 21: Stop all, except one, of the upgraded VSX Cluster Members
Step |
Description |
---|---|
1 |
Connect to the command line on all the upgraded VSX Cluster Members M2 and M3. |
2 |
Stop all Check Point services on all upgraded members (for example, M3), except one (for example, M2):
|
Step 8 of 21: On each VSX Cluster Member - Examine the cluster state
Step |
Description |
---|---|
1 |
Connect to the command line on each VSX Cluster Member. |
2 |
Examine the cluster state:
Notes:
|
Step 9 of 21: On the working upgraded VSX Cluster Member - Start the Connectivity Upgrade
Step |
Description |
---|---|
1 |
Connect to the command line on the working upgraded VSX Cluster Member M2. |
2 |
Log in to the Expert mode. |
3 |
Start the Connectivity Upgrade:
|
Step 10 of 21: On the old VSX Cluster Member - Make sure it handles the traffic
Step |
Description |
---|---|
1 |
Connect to the command line on the Active old VSX Cluster Member M1. |
2 |
Log in to the Expert mode. |
3 |
Make sure it handles the traffic:
|
Step 11 of 21: On the working upgraded VSX Cluster Member - Make sure the Connectivity Upgrade is complete
Step |
Description |
---|---|
1 |
When the Connectivity Upgrade finishes on the working upgraded VSX Cluster Member M2, this message shows:
|
2 |
If you synchronized the Dynamic Routing information:
Make sure that the dynamic routes on the working upgraded VSX Cluster Member M2 match the dynamic routes on the Active old VSX Cluster Member M1. |
Step 12 of 21: On the stopped upgraded VSX Cluster Members - Start all Check Point services
Step |
Description |
---|---|
1 |
Connect to the command line on the stopped upgraded VSX Cluster Members (in our example, M3). |
2 |
Start all Check Point services:
|
Step 13 of 21: On each VSX Cluster Member - Examine the cluster state
Step |
Description |
---|---|
1 |
Connect to the command line on each VSX Cluster Member. |
2 |
Examine the cluster state:
Notes:
|
Step 14 of 21: On the Active old VSX Cluster Member - Stop all Check Point services
Step |
Description |
---|---|
1 |
Connect to the command line on the Active old VSX Cluster Member M1. |
2 |
Stop all Check Point services:
Important - At this moment, the connections fail over from the old VSX Cluster Member M1 to the Active upgraded VSX Cluster Member (M2 or M3). |
Step 15 of 21: On the upgraded VSX Cluster Members - Examine the cluster state and make sure the Active handles the traffic
Step |
Description |
---|---|
1 |
Connect to the command line on the upgraded VSX Cluster Members M2 and M3. |
2 |
Examine the cluster state:
Notes:
|
3 |
Make sure the Active upgraded member handles the traffic:
|
4 |
Make sure to stop the Connectivity Upgrade on the Active upgraded member. Log in to the Expert mode and run:
|
Step 16 of 21: On the former Active old VSX Cluster Member - Upgrade to R80.20 with CPUSE, or perform a Clean Install of R80.20
Note that you already upgraded the configuration of the VSX Cluster object to R80.20.
Notes:
Step 17 of 21: In SmartConsole - Install the Access Control Policy
Step |
Description |
---|---|
1 |
Connect with SmartConsole to the R80.20 Security Management Server or Main Domain Management Server that manages this VSX Cluster. |
2 |
From the left navigation panel, click Gateways & Servers. |
3 |
Click Install Policy. |
4 |
In the Install Policy window:
|
5 |
The Access Control Policy successfully installs on all the VSX Cluster Members. |
Step 18 of 21: On each VSX Cluster Member - Examine the cluster state
Step |
Description |
---|---|
1 |
Connect to the command line on each cluster member. |
2 |
Examine the cluster state:
Note - Cluster states of the members are: one is Active, others are Standby. |
Step 19 of 21: On each VSX Cluster Member - Change the CCP mode to Auto
Step |
Description |
---|---|
1 |
Connect to the command line on each VSX Cluster Member. |
2 |
Change the CCP mode:
Notes:
|
3 |
Make sure the CCP mode is set to Auto:
|
Step 20 of 21: In SmartConsole - Install the Threat Prevention Policy
Step |
Description |
---|---|
1 |
Connect with SmartConsole to the R80.20 Security Management Server or Domain Management Server that manages this VSX Cluster. |
2 |
From the left navigation panel, click Gateways & Servers. |
3 |
Click Install Policy. |
4 |
In the Policy field, select the applicable Threat Prevention Policy. |
5 |
Click Install. |
Step 21 of 21: Test the functionality
Step |
Description |
---|---|
1 |
Connect with SmartConsole to the R80.20 Security Management Server or Main Domain Management Server that manages this VSX Cluster. |
2 |
From the left navigation panel, click Logs & Monitor > Logs. |
3 |
Examine the logs from Virtual Systems on this VSX Cluster to make sure they inspect the traffic as expected. |
For more information, see the: