In This Section: |
Database Migration lets you move the database from an earlier Security Management Server or Multi-Domain Server, to an R80 server.
Important Notes:
R80 is a management-only release and does not support migration from a Standalone deployment (server and gateway on the same machine). Standalone to Standalone migration will be supported in R80.10.
Upgrade from IPSO is not supported.
This procedure has steps to close GUI clients (SmartConsole applications) and to stop Check Point services (
). If you do not do one of these before you upgrade, the exported management database can be corrupted.cpstop
Before you begin:
Gaia operating system settings are not backed up. If you restore the database later, you must configure these settings manually. Before you upgrade, open the Gaia WebUI and take note of these settings: interfaces, servers (such as DHCP, DNS, and proxy), routes, NetFlow, system settings (such as time and date, SNMP, jobs), advanced routing protocols and functionality, user management, and High Availability.
This procedure is an overview that explains how to migrate the database to a R80 Security Management Server with a new IP address.
It is important that you use the correct migration tools package. Download the latest version of the migration tools from the Support Center.
Important - Extract all the files to the same directory and run the tools from that directory.
chmod 777 *
Source: new server
Destination: target Security Gateways
Service:
FW1 (TCP 256)
CPD (TCP 18191)
FW1_CPRID (TCP 18208)
CPM (TCP 19009)
cpstop
Required Disk Space:
/var/log
folder on the target must be at least 25% of the size of the /var/ log
directory on the source machine.Required Network Access:
IPv4:
The target must use the same IP address configuration as the source. If the source uses IPv6, you must change it to IPv4 before you can migrate.
Target Version and Products:
You can only upgrade or migrate the version of the server or set of products. The target must have the same or higher version and the same set of installed products.
Before you upgrade appliances or servers, get the upgrade tools. There is a different package of tools for each source platform.
Important! To make sure you have the latest version of the upgrade tools, download the appropriate package from the Tools section in the Check Point R80 Support site.
When you open the upgrade_tools package, you see these files:
Package |
Description |
---|---|
migrate.conf |
Holds configuration settings for Advanced Upgrade / Database Migration. |
migrate |
Runs Advanced Upgrade or migration. |
pre_upgrade_verifier |
Analyzes compatibility of the currently installed configuration with the upgrade version. It gives a report on the actions to take before and after the upgrade.
|
migrate export |
Backs up all Check Point configurations, without operating system information. |
migrate import |
Restores backed up configuration. |
The migrate command exports a source Security Management Server database to a file, or imports the database file to a target Security Management Server. Use absolute paths in the command, or relative paths from the current directory.
Before you run this command for export, close all SmartConsole clients or run
on the Security Management Server.cpstop
Before you run this command for import, run
on the Security Management Server.cpstop
Syntax:
migrate {export | import} [-l] [-n] <filename> [] [
--exclude-uepm-postgres-db
]
--include-uepm-msi-files
Parameters |
Description |
|
One of these actions must be used. Make sure services are stopped. |
|
Optional. Export or import SmartView Tracker logs and SmartLog data. Only closed logs are exported. Use the |
|
Optional. Run silently (non-interactive) using the default options for each setting. |
|
Skip over backup/restore of PostgreSQL database of the Endpoint product. |
|
Export/import the uepm msi files. |
|
Required. Enter the name of the archive file with the server database. The path to the archive must exist. |
Note - Before you upgrade the Security Management Server, make sure that the correct ports are open for SmartConsole to communicate with the Security Management Server.
To create a management database export file on the source server:
pre_upgrade_verifier
If there are errors, correct them before you continue.
/migrate export
<filename>.tgz
The
command exports the content of one Security Management Server database to a TGZ file. migrate export
The management database is exported to the file that you named in the command. Make sure you define it as a TGZ.
Import the Security Management Server configuration that you exported. Make sure that you use the migration tools for the target version.
Before you begin: Install the R80 Security Management Server.
Important: When you transfer the exported database from the source to the target, use binary mode during the transfer.
To import the management server configuration:
<directory># md5sum /
<name>/
DDMMYYY.
HHMMSS-
.tgz
/migrate import
<path_exported_database>/<filename>.tgz
If the primary Security Management Server is not available, convert the secondary Security Management Server to a primary Security Management Server. To get assistance with this step, contact Check Point Technical Support or your vendor.
When you migrate the Security Management Server to R80, the SmartEvent databases are not included.
For more about how to migrate the events database to R80, see sk110173.
We recommend that you use database export/import to upgrade. This procedure migrates all system databases, Domain Servers, Rule Bases, logs and Global Domains to a target Multi-Domain Server.
Important - Unlike in previous versions, in R80, the order that you import servers is very important. First you must import the Primary Multi-Domain Server, then Secondary Multi-Domain Servers and Multi-Domain Log Servers. If there is no Primary Multi-Domain Server, you must first promote a secondary Multi-Domain Server to be the primary.
Before you begin:
To create the export file on a source Multi-Domain Server:
# mdsstop
# mdsenv
# mcd
# mount -o loop /path_to/Check_Point_R80_Gaia.iso /mnt/cdrom
# cd /mnt/cdrom/linux/p1_install
# ./mds_setup
(1) Run Pre-upgrade verification only [recommended before upgrade]
(2) Upgrade to R80
(3) Backup current Multi-Domain Server
(4) Export current Multi-Domain Server
Or 'Q' to quit.
The pre-upgrade verifier analyzes compatibility of the management database and its current configuration. A detailed report shows the steps to do before and after the upgrade.
Note: The pre-upgrade verifier can only verify a database that is intended for import into a different major version (for example, R77.xx to R80). It cannot be used on a database that is intended for import to the same major version.
# mdsstop
# ./mds_setup
(1) Run Pre-upgrade verification only [recommended before upgrade]
(2) Upgrade to R80
(3) Backup current Multi-Domain Server
(4) Export current Multi-Domain Server
Or 'Q' to quit.
yesWould you like to proceed with the export now [yes/no] ?
/var/logPlease enter target directory for your Multi-Domain Server export (or 'Q' to quit):
noDo you plan to import to a version newer than R80 [yes/no] ?
Using migrate_tools from disk.
yes or noDo you wish to export the log database [yes/no] ?
If you enter no to export the logs, the configuration is still exported.
DDMMYYY# ls -l /var/log/exported_mds.
HHMMSS-
.tgz
DDMMYYY# md5sum /var/log/exported_mds.
HHMMSS-
.tgz
Import the Multi-Domain Server configuration that you exported.
Important - When you transfer the exported database from the source to the target, use binary mode during the transfer.
Before you begin, install R80 Multi-Domain Security Management on the target Multi-Domain Server.
Note - When you complete the upgrade process for the Primary Multi-Domain Server, the Multi-Site upgrade is not finished. You can only access objects that are stored on other Multi-Domain Security Management servers when the upgrade process for the other Multi-Domain Servers is complete.
To import the Multi-Domain Server configuration:
exported_mds.
DDMMYYY-
HHMMSS.tgz
DDMMYYY# md5sum /<directory>/exported_mds.
HHMMSS-
.tgz
$MDSDIR/scripts/mds_import.sh
<path_exported_database>/exported_mds.
DDMMYYY-
HHMMSS.tgz
mdsstart
To update the version of the Domain Server and Domain Log Server objects on this Multi-Domain Server:
On each Domain Server and Domain Log Server that you import, run:
Multi-Domain Server name$MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL -n <
>
Import the Multi-Domain Server configuration that you exported to a Secondary Multi-Domain Server or Multi-Domain Log Server. If you have multiple servers, import the database to one server at a time.
Important: When you transfer the exported database from the source to the target, use binary mode during the transfer.
Before you begin:
To import the Multi-Domain Server configuration:
exported_mds.
DDMMYYY-
HHMMSS.tgz
DDMMYYY# md5sum /<directory>/exported_mds.
HHMMSS-
.tgz
$MDSDIR/scripts/mds_import.sh -secondary -primaryip
<IP_primary_server>
<path_exported_database>/exported_mds.DDMMYYYY-HHMMSS.tgz
mdsstart
.To update the version of the Domain Server and Domain Log Server objects on this Multi-Domain Server:
$MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL -n <
Multi-Domain Server name>
The
command upgrades a Global Policy database from a Multi-Domain Server and imports it to a R80 Multi-Domain Server.migrate_global_policies
Note - When executing the
utility, the Multi-Domain Server and the Domain Servers are stopped. migrate_global_policies
Before you run the
utility, make sure that you remove all the data from the Global database of the R80 Multi-Domain Server. migrate_global_policies
To upgrade Global Policies from R77.xx to R80:
# mdsenv
# <
full path to migrate command> migrate export <
output file>
# migrate_global_policies
<full_path_exported_tgz>#
mdsstart
This procedure exports, updates, and imports the database of an R77.xx Domain Server to an R80 Domain Server.
Before you begin:
To import from R77.xx Domain Server to R80:
Extraction makes the
subdirectory. In this path, extract the Multi-Domain Security Management tools: upgrade_tools
p1_upgrade_tools.tgz
For example:
Install from CD: # gtar xvfz /mnt/cdrom/linux/upgrade_tools/linux/p1_upgrade_tools.tgz -C /var/opt/export_tools
Install from DVD: # gtar xvfz /mnt/cdrom/Linux/linux/upgrade_tools/linux/p1_upgrade_tools.tgz -C /var/opt/export_tools
# mdsenv
<domainServer_name> # <
full path to migrate command> migrate export [-l] <
output file>
migrate export
command exports one Domain Server database to a TGZ file. –l
flag includes closed log files and SmartLog data from the source Domain Server in the output archive.
<user_name> <password># mgmt_cli login
<my_domain_name> # mgmt_cli add domain name
<my_IP_address> servers.ip-address
<my_domain_server_name> servers.name
<R80_multi-domain-server_Name> servers.multi-domain-server
servers.skip-start-domain-server true
<source_server> <new_server>/<FWDIR_path># cma_migrate
For example: # cma_migrate /tmp/myR77-30.tgz /opt/CPmds-r80/domains/my_dms/CPsuite-R80/fw1
You must run
to import the database. This command updates the database schema before it imports. cma_migrate
First, the command runs pre-upgrade verification. If no errors are found, migration continues. If there are errors, you must change the source Domain Server according to instructions in the error messages. Then do this procedure again.
#
mdsstop
and then mdsstart
The
process does not change the Certificate Authority or key data. The R80 Domain Server has SIC with Security Gateways. If the IP address of the R80 server is not the same as the IP address of the R77.xx server, you must establish trust between the new server and the gateways.cma_migrate
Before you begin, see sk17197 to make sure the environment is prepared.
To initialize a Domain Server Internal Certificate Authority:
DomainServer NAME# mdsstop_customer <
>
DomainServer NAME# mdsenv <
>
# fwm sic_reset
DomainServer NAME># mdsconfig -ca <
DomainServer IP <
>
DomainServer NAME# mdsstart_customer <
>
With a VPN tunnel that has an externally managed, third-party gateway and a Check Point Security Gateway, sometimes there is an issue with the IKE certificates after you migrate the management database.
The Security Gateway presents its IKE certificate to its peer. The third-party gateway uses the FQDN of the certificate to retrieve the host name and IP address of the Certificate Authority. If the IKE certificate was issued by a Check Point Internal CA, the FQDN contains the host name of the original management server. The peer gateway will fail to contact the original server and will not accept the certificate.
To fix:
You can migrate the R80 Security Management Server database to a different R80 server. The procedure is similar to upgrading from an earlier version to R80.
For Multi-Domain Server run mds_backup
Licenses are related to the management IP addresses. You must update the license and configure the environment to recognize the new server.
cpstop
and cpstart
on Security Management Server.evstop
and evstart
on SmartEvent servers.Configuring the new IP address for Log Servers and SmartEvent:
This updates the server to the correct version.
If there are issues with the upgrade, you can restore the original database. Make sure you have the OS settings that you noted when you backed up.
Use the Installation and Upgrade Guide for major versions, or the Release Notes for minor versions or hotfixes.