Working with Gemalto HSM (Previous Procedure)

Important - There are two different procedures to configure a Check Point Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. (ClusterClosed Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing.) to work with the Gemalto HSM Server:

Environment

Procedure to Follow

R80.40 with the Jumbo Hotfix AccumulatorClosed Collection of hotfixes combined into a single package. Acronyms: JHA, JHF, JHFA. Take 53 or higher

Working with Gemalto HSM (New Procedure)

R80.40, or

R80.40 with the Jumbo HotfixClosed Software package installed on top of the current software version to fix a wrong or undesired behavior, and to add a new behavior. Accumulator Take lower than 53

Procedure below

Prerequisites

  1. R80.40 Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. (see sk160736).

  2. R80.40 Security Gateway or Cluster Members (see sk160736).

  3. Optional: R80.40 Jumbo Hotfix Accumulator Take lower than 53 (see Jumbo Hotfix Accumulator for R80.40).

Configuration Steps

Additional Actions for a Gemalto HSM Server