In This Section: |
A SmartLSM Security Gateway must have a SmartLSM Security Profile, which fetches a Check Point Security Policy from the Security Management Server or Domain Management Server. This Security Policy determines the settings of the firewall.
Before you can add a SmartLSM Security Gateway to SmartProvisioning, you must create the Security Policies and Security Profiles for them in SmartConsole.
This procedure describes how to create a SmartLSM Security Profile for Security Gateways. After you create a Security Profile, you can assign the gateway objects to it.
To create a SmartLSM Security Profile:
The SmartLSM Security Profile window opens.
To open the online help for each view of this window, click Help.
Note - In a High Availability environment, click Add > the Add Masters window opens. From the Available Management Stations column, select all servers and click Add. Then click OK.
The Install Policy window opens.
Do these steps again for each SmartLSM Security Profile. Make a new profile for each type of appliance or server.
This procedure describes how to add a Check Point Appliance/Open Server Security Gateway to SmartProvisioning.
Before you begin, you must have at least one SmartLSM Security Profile.
To add a SmartLSM Security Gateway to SmartProvisioning:
The wizard opens in a new window. Follow the steps to define the gateway.
This name is for SmartProvisioning management purposes and can be different from the name of the gateway device.
Clear this option if you are sure that Provisioning Profiles can have a negative impact on the gateway.
An activation key sets up a Secure Internal Communication (SIC) Trust between the Security Gateway and the Security Management Server or Domain Management Server. This is the same activation key that you provide in the SIC tab of the Check Point Configuration Tool (cpconfig) on the Security Gateway.
Use one of these options to provide an activation key:
If you want a CA certificate from a third-party (for example, if your organization already has certificates from an external CA for other devices), clear this check box and request the certificate from the appropriate CA server after you complete the wizard.
This section explains how to handle messages that may appear after you finish the wizard to add a Check Point Appliance/Open Server or UTM Security Gateway, during the SmartProvisioning processing of the gateway object.
If you did not generate or select an Activation Key for SIC setup during the wizard, a message appears:
'Activation Key' for the Gateway SIC setup is missing.
Do you want to continue?
Click Yes to define the gateway now and handle the SIC setup later; or click No and then Back to return to the Communication Properties page.
To handle the SIC setup after the gateway is added:
The Communication window opens, with the same fields as the Communication Properties page of the wizard.
When you add a new SmartLSM Security Gateway, SmartProvisioning connects between the Security Management Server or Domain Management Server and the SmartLSM Security Gateway, to match and initialize SIC and VPN certificates.
If the Operation Timed Out message shows, the most common cause is that SmartProvisioning cannot reach the Security Management Server or Domain Management Server or the SmartLSM Security Gateway. The gateway is still added to SmartProvisioning, but you must check the certificates status.
To view trust status:
The SmartLSM Security Gateway window opens
If you generated an Activation Key or provided an Activation Key file, but were not able to provide the IP address of the SmartLSM Security Gateway, this message shows:
To complete the initialization process, use the Check Point Configuration tool on the SmartLSM Security Gateway, to pull the certificate from the Security Management Server.
Note - For Multi-Domain Security Management, this message says Domain Management Server, in place of Security Management Server.
To complete the initialization process:
From the CLI on a Gaia, SecurePlatform, or Linux based Security Gateway, run cpconfig