Generic Workflow
This section contains generic workflows for an HSM environment.
Workflow for Configuring a Check Point Security Gateway to Work with HSM
Follow the steps below on the Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. and Cluster
Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. Members that must work with an HSM.
|
Note - Instructions for specific HSM vendors are located in the corresponding sections. |

|
Important:
|
Step | Instructions | ||
---|---|---|---|
1 |
In SmartConsole See the R80.40 Security Management Administration Guide > Chapter HTTPS Inspection. |
||
2 |
On the Security Gateway / each Cluster Member, disable the HSM in the
|
||
3 |
In SmartConsole, install the applicable Access Control Policy on the Security Gateway (Cluster). |
||
4 |
Make sure that HTTPS Inspection works correctly without the HSM Server:
|

|
Important:
|
Step | Instructions | ||
---|---|---|---|
1 |
Unpack and install the HSM Client package supplied by the HSM vendor. |
||
2 |
Transfer the required PKCS#11 library file to the /usr/lib/hsm_client/ directory.
|
||
3 |
Transfer other tools or files supplied by the HSM vendor that are required to configure the PKCS#11 library. |
||
4 |
Configure the required connection or trust between with the HSM Server. |
||
5 |
Optional: Make sure there is a trusted link with the HSM Server that is based on the PKCS#11 library.
|

|
Important:
|
|
Notes:
|
Configuration steps:
Step | Instructions | |||
---|---|---|---|---|
1 |
Connect to the command line on the Security Gateway / each Cluster Member. |
|||
2 |
Log in to the Expert mode. |
|||
3 |
Back up the |
|||
4 |
Edit the |
|||
5 |
Configure the required values for these attributes (see the corresponding sections for HSM vendors): Copy
|
|||
|
Example: Copy
|
|||
6 |
To apply the new configuration, restart all Check Point services with this command:
|
|||
7 |
Make sure that the Security Gateway / each Cluster Member can connect to the HSM Server and that HTTPS Inspection is activated successfully on the outbound traffic. Run this command:
The output must show:
For more information, see Monitoring HTTPS Inspection with HSM in CLI. |
|||
8 |
Make that HTTPS Inspection is activated successfully on the outbound traffic:
|
Workflow for Configuring an HSM Client Workstation
HSM Client workstation is an external computer, on which you install the HSM Client software of your HSM vendor.
HSM Client workstation can run on Windows, Linux, or other operating system, as required by the HSM vendor.
You use the HSM Client workstation to:
-
Create a CA Certificate on the HSM Server.
Check Point Security Gateways / Cluster Members use this CA Certificate for HTTPS Inspection when it needs to store and access SSL keys on the HSM Server.
-
Manage keys for a fake certificate created by the Check Point Security Gateway / Cluster Members.
|
Important - You must get the HSM Client package from the HSM vendor. |