In This Section: |
At any point during the configuration or management of a SmartLSM Security Gateway, you can perform immediate actions on the gateway.
SmartLSM Security Profiles implement a Security Policy, with rules for source/destination IP addresses, and localize these rules for each SmartLSM Security Gateway assigned to the profile. SmartProvisioning manages Dynamic Objects only for SmartLSM Security Gateways.
For example:
The Security Policy assigned to the SmartLSM Security Profile has a rule to drop traffic from IP addresses on a StormCenter. The Security Profile is assigned to ten SmartLSM Security Gateways. Some of the SmartLSM Security Gateways assigned to this profile must use one StormCenter site, and others use a different one. You do not have to create a new rule for each gateway. You can create one rule in the main policy, and use the CPDShield dynamic object to define the source (StormCenter list of IP addresses to block).
In SmartProvisioning, on each SmartLSM Security Gateway assigned to this profile, you resolve the CPDShield dynamic object to the real IP address of a StormCenter (double-click a SmartLSM Security Gateway and open Dynamic Objects > Add).
After you resolve the dynamic object to a real IP address value, it is not applied immediately to the selected SmartLSM Security Gateway. You can wait for the gateway to fetch its profile, but if you want the value to be applied immediately, you can push the resolved values of dynamic objects to the SmartLSM Security Gateway.
To apply new values to dynamic objects of a SmartLSM Security Gateway:
Right-click the gateway and select Actions > Push Dynamic Objects.
If you change the Security Policy assigned to a SmartLSM Security Profile in SmartConsole, and install it on gateways, it is not applied to SmartLSM Security Gateways. Each SmartLSM Security Gateway fetches its SmartLSM Security Profile on a different time interval, and then gets the updated Security Policy.
You can apply the changes immediately by pushing the policy on the SmartLSM Security Gateway. To do this, right-click the Security Gateway and Actions > Push Policy.
This chapter explains management concepts and procedures that are common to all SmartLSM Security Gateways.
You must have Write permissions for SmartLSM Gateway Database.
The edit window is different for each type of SmartLSM Security Gateway, but is opened in the same ways.
To open the SmartLSM Security Gateway window:
You can change the SmartLSM Security Profile that you assign to a SmartLSM Security Gateway.
Note - If the assigned SmartLSM Security Profile was changed in SmartConsole, do this procedure to make sure that the changes are applied immediately.
To apply a change in SmartLSM Security Profile:
You can force a UTM-1 Edge SmartLSM Security Gateway to get a new SIC key, by generating a new Registration Key for the gateway.
To generate a new key:
You can view and edit the status of the Secure Internal Communication Trust between the Security Management Server or Domain Management Server and the SmartLSM Security Gateway. SIC Trust is established after a certificate is issued by the management server and delivered to the SmartLSM Security Gateway.
To check the SIC Trust of a SmartLSM Security Gateway:
This is the SmartLSM Security Gateway's Distinguished Name (SIC name)
syntax: CN=gw-name, O=Management-domain-name
If it is empty, change the SIC certificate state.
If the Certificate state is Uninitialized, and the IP address of the SmartLSM Gateways & Servers is entered, you can initialize the SIC trust now. Perform this procedure if the Generate button is available.
To initialize a SIC trust:
If no IP address is entered, you must pull the SIC certificate from the Security Management Server or Domain Management Server with the Check Point Configuration tool (cpconfig).
To initialize a SIC trust if the Security Management Server or Domain Management Server cannot find the gateway:
You may want to reset an established SIC Trust if you replaced the gateway host machine, or if you lost the Activation Key.
From the time that you reset SIC until trust is re-established, the internal communications between the Check Point applications, the management server, and the managed devices is down. This procedure revokes the current certificate and provides a new one. Therefore, it is recommended that you continue only if you are sure that SIC must be reset. After you complete this procedure, quickly re-initialize SIC trust.
To reset a SIC trust:
A message asks for confirmation: Are you sure you want to reset SIC?
If you reset the SIC certificate now (revoke current license and get a new one), internal communications between Check Point applications, Security Management Server/Domain Management Server, and managed devices can be adversely affected. Continue only if you are sure this must be done.
The Details tab of the Gateway window for SmartLSM Security Gateways and UTM-1 Edge SmartLSM Security Gateways provides identification information for log tracking and cluster usage.
You can edit the ID of the gateway device and add detailed notes for easier network management.
When you create a SmartLSM Security Profile for Security Gateway gateways in SmartConsole, you can also configure the log servers. In SmartProvisioning you can edit the log server configuration. You can select different log servers for a selected gateway, but the servers must already be defined in SmartConsole.
To change log servers of SmartLSM Security Gateways:
The window opens and shows the General tab.
Note - You configure the log servers for the UTM-1 Edge gateways through the UTM-1 Edge Portal > Setup > Logging. For more information about log servers, see the R75.40 UTM-1 Edge Administration Guide.
You have a License Repository with the licenses that you acquired for your environment. You can manage the licenses of the SmartLSM Security Gateways through SmartProvisioning.
SmartLSM Security Gateway licenses are available for SmartProvisioning management if they are in the License Repository on the Security Management Server or Domain Management Server.
To upload licenses to the repository:
The license is added to the License Repository.
To attach a license to a SmartLSM Security Gateway:
A list shows with the licenses in your License Repository which are not attached to any gateway. If an original license is used on another SmartLSM Security Gateway, you will not see the corresponding upgraded license in the License Repository.
The license operations, attachment or detachment, are performed immediately. The License Operation message appears:
Attaching/Detaching Licenses. Please wait...
UTM-1 Edge devices have embedded licenses. To release features, you need the Product Key.
To attach a license to a UTM-1 Edge SmartLSM Security Gateway:
The state of the license depends on whether the license is associated with the Security Gateway in the License Repository, and whether the license is installed on the remote Security Gateway.
The type of license depends on the IP address enabled in the license. If the IP address is of this gateway, the license type is Local. If the IP address is of the Security Management Server or Domain Management Server, the license type is Central.
You can manage the topology of SmartLSM Security Gateways through SmartProvisioning. View and change the internal and external interfaces of each gateway to fit its local environment.
To configure the topology of a SmartLSM Security Gateway:
The window opens and shows the General tab.
Note - This option is only available for UTM-1 Edge devices, and requires:
Manually Configuring a VPN Domain
Complex networks behind SmartLSM Security Gateways cannot be properly configured as VPN domains by the automatic calculation option (All IP Addresses behind the Gateway based on Topology information). If the SmartLSM Security Gateway topology consists of one type (Meshed or Star) and does not include subsequent firewalls, you may select the automatic option. Otherwise, it is recommended that you select Manually defined.
To manually configure a VPN domain:
The IP Address Range Configuration window opens.
You are prompted to save the data and then SmartProvisioning validates the topology you defined.
If successfully validated, the topology is immediately pushed to the gateway.
The IP addresses in this range are now part of the VPN domain that is secured by the SmartLSM Security Gateway and that tunnels to the CO gateway. To complete the VPN configurations, see Configuring VPNs on SmartLSM Security Gateways.
You can convert a SmartLSM Security Gateway managed with SmartProvisioning to a Security Gateway managed with SmartConsole. For example, if a remote gateway has so many customized requirements that Profiles are ineffective, you can manage it as a separate gateway through SmartConsole.
There is no need to delete existing objects, or to create new ones, because the Check Point Suite manages objects automatically during the conversion. It also preserves SIC certificates.
To convert to a SmartConsole gateway:
LSMcli <
server> <
user> <
pswd> Convert ROBO VPN1 <
Name>
LSMcli <
server> <
user> <
pswd> Convert ROBO VPN1Edge <
Name>
You can manage the software installed on SmartLSM Security Gateways and standard Security Gateways. The Package commands are available from the Actions menu and the Package toolbar buttons.
These commands are not available for Small Office Appliances and UTM-1 Edge gateways.
Upload Security Gateway software packages to the SmartProvisioning Package Repository on the Security Management Server or Domain Management Server.
To upload packages to the repository:
You can view the Check Point software packages installed on a gateway. Such packages include Security Gateway upgrades, Check Point Hotfixes that are relevant for the installed version, and Check Point HFAs.
To view the packages list on a gateway:
The window opens and shows the General tab.
The operating system of the gateway, and all installed Check Point packages are listed.
Before you install a Check Point software package on a gateway, you can test if the package is compatible with the selected gateway.
To verify package pre-installation:
A message appears: Getting targets for install. Please wait...
If there are packages in the Package Repository, the Verify Installation window opens.
In the Status View > Action Status, see the verification phases in the Details column:
If the package is verified for the selected gateway, the Status column shows Completed, and the Details column shows:
'<package>' is compatible with installed packages
Use the Upgrade to Management Version features to upgrade devices for a new version of the Security Gateway software.
To upgrade Check Point software on a gateway:
If there are packages in the Package Repository, installed packages are upgraded to the latest available version.
If required packages are missing, they are listed in the Missing Packages window.
Use SmartUpdate to add the missing packages, and rerun Upgrade to Management Version.
Use the Distribute Packages feature to distribute Check Point Hotfixes and HFAs to the Security Gateways that can be enhanced by installing the package.
To install a Check Point package on a gateway:
A warning opens, which explains that using Distribute Packages, rather than Upgrade All, may lead to a mismatch between versions and malfunctions.
To prevent this issue, make sure to use Distribute for Hotfix and HFA installations, not for upgrading to a new version.
If there are packages in the Package Repository, the Distribute Package window opens.
The image creation can take some time.
This field is enabled, and required, only if the change is necessary.
You can execute immediate actions on SmartLSM Security Gateways and Security Gateway Provisioned gateways. You can run these actions on individual gateways, or on a Provisioning Profile, which effectively runs the action on all gateways assigned to this profile.
Before you begin, make sure that your administrator has permissions to Run Scripts.
You can get an instant view of the status of a Security Gateway: traffic, interfaces, performance, CPU, memory, and so on.
To view status details of a selected gateway:
You can execute complex gateway commands with your own scripts on any provisioned gateway. The Run Script feature is not available for UTM-1 Edge devices or UTM-1 Edge Provisioning Profiles.
Before you begin, make sure that your administrator has permissions to run scripts.
To run a script on a single gateway:
The script is pushed to the gateway and runs immediately. See the Action Status tab of the Status pane to view the details of the push and execution.
The Result pane displays the results of the script, 0 for success and other value for failure.
The Run Script feature lets you use a Security Gateway Provisioning Profile to run scripts on multiple gateways.
To run a script on all gateways of a Provisioning Profile:
See the Action Status tab of the Status pane to view details of the push and execution.
The Result pane displays the results of the script, 0 for success and other value for failure.
You can create a backup image of Security Gateways and SmartLSM Security Gateways. You can do this with the Action command on the gateway, or use a Provisioning Profile to create a backup image on all gateways assigned to the profile.
You can select to store backups on the gateway, or on another backup server. If you select another server, make sure you have the IP address or host name of that server, and if needed, a user name and password with Read/Write permissions.
Note - SmartProvisioning does not provide backup management for UTM-1 Edge devices or UTM-1 Edge Provisioning Profiles. UTM-1 Edge backups are managed through the UTM-1 Edge Portal (right-click > Launch UTM-1 Edge Portal), using the Export Tool. For more information, see the R75.40 UTM-1 Edge Administration Guide.
To execute an immediate backup of a Security Gateway:
The backup is created and pushed to the gateway or defined server. See the documentation of the target's operating system for Restore Backup instructions.
If you make a change to a Security Gateway Provisioning Profile, or use the Actions > Backup command, no change or action is immediately applied to the gateways.
Profile changes are applied to the gateways assigned to them when the gateways fetch their profiles on interval. At this time, the gateways get the commands to pull the scripts from SmartProvisioning and execute them, or to create backup images.
However, you sometimes need to apply profile changes and actions immediately. For example, if you run a script that configures a new server behind a SmartLSM Security Gateway, you want to apply this configuration as quickly as possible, to include the server in the gateway's VPN with the CO gateway.
To apply profile changes and actions immediately:
Right-click the Provisioning Profile and select Actions > Push Settings and Actions.
Enable Maintenance Mode on a Security Gateway when you test changes to its object configuration or Provisioning Profile. In this mode, changes are pushed from the SmartProvisioning console to the Security Management Server or Domain Management Server, but they are not pushed to the gateway.
For example:
A SmartLSM Security Gateway on your SmartProvisioning management has operational issues. The SmartLSM Security Gateway is in a remote office which is too far away for you to manage yourself, so you ask the local system administrator to handle the issue.
However, you do not want the gateway to lose the configurations that you already made to it from your central SmartProvisioning console. Therefore, enable Maintenance Mode on this gateway.
The local administrator fixes the issue. You disable Maintenance Mode, which switches the SmartLSM Security Gateway back to centralized configuration through the SmartProvisioning console.
Note - When you disable Maintenance Mode, the central SmartProvisioning configurations override any local changes. If the local administrator discovers that changes need to be made on this gateway, make sure you have the data before you switch back.
To enable Maintenance Mode:
Right-click a Security Gateway, and select Actions > Turn on maintenance mode.
Notes: