Print Download PDF Send Feedback

Previous

Next

Upgrading a VSX Gateway with CPUSE

Notes:

Important - Before you upgrade a VSX Gateway:

Step

Description

1

Back up your current configuration.

Important - Back up both the Management Server and the VSX Gateway. Follow sk100395: How to backup and restore VSX gateway.

2

See the Upgrade Options and Prerequisites.

3

Upgrade the Management Server and Log Servers to R80.20 version.

4

Upgrade the licenses on the VSX Gateway, if needed. See Working with Licenses.

5

Schedule a full maintenance window to make sure you can make all the desired custom configurations again after the upgrade. The upgrade process replaces all existing files with default files. If you have custom configurations on the Security Gateway, they are lost during the upgrade. As a result, different issues can occur in the upgraded Security Gateway.

Workflow:

  1. On the Management Server, upgrade the configuration of the VSX Gateway object to R80.20
  2. Upgrade the VSX Gateway with CPUSE
  3. In SmartConsole, install the Policy
  4. Test the functionality

Step 1 of 4: On the Management Server, upgrade the configuration of the VSX Gateway object to R80.20

Step

Description

1

Connect to the command line on the Security Management Server or Multi-Domain Server that manages this VSX Gateway.

2

Log in to the Expert mode.

3

On a Multi-Domain Server, go to the context of the Main Domain Management Server that manages this VSX Gateway object:

mdsenv <IP Address or Name of Main Domain Management Server>

4

Upgrade the configuration of the VSX Gateway object to R80.20:

4A

Run:

vsx_util upgrade

This command is interactive.

4B

Enter these details to log in to the management database:

  • IP address of the Security Management Server or Main Domain Management Server that manages this VSX Gateway
  • Management Server administrator's username
  • Management Server administrator's password

4C

Select your VSX Gateway.

4D

Select R80.20.

4E

For auditing purposes, save the vsx_util log file:

  • On a Security Management Server:

    /opt/CPsuite-R80.20/fw1/log/vsx_util_YYYYMMDD_HH_MM.log

  • On a Multi-Domain Server:

    /opt/CPmds-R80.20/customers/<Name_of_Domain>/CPsuite-R80.20/fw1/log/vsx_util_YYYYMMDD_HH_MM.log

5

Connect with SmartConsole to the R80.20 Security Management Server or Main Domain Management Server that manages this VSX Gateway.

6

From the left navigation panel, click Gateways & Servers.

7

Open the VSX Gateway object.

8

From the left navigation tree, click the General Properties page.

9

Make sure in the Platform section, the Version field shows R80.20.

10

Click Cancel (do not click OK).

Note - If you click OK, the Management Server pushes the VSX configuration to the VSX Gateway. Because the VSX Gateway is not upgraded yet, this operation would fail.

Step 2 of 4: Upgrade the VSX Gateway with CPUSE

See Installing Software Packages on Gaia and follow the applicable action plan for the local or central installation.

Step 3 of 4: In SmartConsole, install the Policy

Step

Description

1

Connect with SmartConsole to the R80.20 Security Management Server or Main Domain Management Server that manages this VSX Gateway.

2

From the left navigation panel, click Gateways & Servers.

3

Install the default policy on the VSX Gateway object:

  1. Click Install Policy.
  2. In the Policy field, select the default policy for this VSX Gateway object.

    This policy is called:

    <Name_of_VSX_Gateway_object>_VSX

  3. Click Install.

4

Install the Threat Prevention Policy on the VSX Gateway object:

  1. Click Install Policy.
  2. In the Policy field, select the applicable Threat Prevention Policy for this VSX Gateway object.
  3. Click Install.

Step 4 of 4: Test the functionality

Step

Description

1

Connect with SmartConsole to the R80.20 Security Management Server or Main Domain Management Server that manages the Virtual Systems on this VSX Gateway.

2

From the left navigation panel, click Logs & Monitor > Logs.

3

Examine the logs from the Virtual Systems on this VSX Gateway to make sure they inspect the traffic as expected.

For more information:

See the R80.20 VSX Administration Guide.