Print Download PDF Send Feedback

Previous

Next

Advanced Upgrade with Database Migration

In This Section:

Preparing to Migrate the Database

Overview of Database Migration to R80

Requirements for Database Migration

Upgrading Security Management Server with Migration

Upgrading Multi-Domain Security Management with Migration

Migrating an R80 Database to Another R80 Server

Migrating a License to a New IP Address (Security Management Server)

Restoring on Failure

Preparing to Migrate the Database

Database Migration lets you move the database from an earlier Security Management Server or Multi-Domain Server, to an R80 server.

Important Notes

R80 is a management-only release and does not support migration from a Standalone deployment (server and gateway on the same machine). Standalone to Standalone migration will be supported in R80.10.

Upgrade from IPSO is not supported.

This procedure has steps to close GUI clients (SmartConsole applications) and to stop Check Point services (cpstop). If you do not do one of these before you upgrade, the exported management database can be corrupted.

Before you begin:

  1. Make sure the environment meets the requirements
  2. Make sure that you have SmartConsole and SmartConsole for the correct source and target versions to connect to the management server.
  3. Save a backup from the Gaia WebUI.

    Gaia operating system settings are not backed up. If you restore the database later, you must configure these settings manually. Before you upgrade, open the Gaia WebUI and take note of these settings: interfaces, servers (such as DHCP, DNS, and proxy), routes, NetFlow, system settings (such as time and date, SNMP, jobs), advanced routing protocols and functionality, user management, and High Availability.

Overview of Database Migration to R80

This procedure is an overview that explains how to migrate the database to a R80 Security Management Server with a new IP address.

  1. Get the R80 migration tools package.

    It is important that you use the correct migration tools package. Download the latest version of the migration tools from the Support Center.

    1. Extract the downloaded package, to the source and the target servers.

      Important - Extract all the files to the same directory and run the tools from that directory.

    2. Make sure the files have executable permissions: chmod 777 *
  2. Create a new temporary host object in SmartConsole or SmartDashboard with the IP address of the target.
  3. Define a Firewall rule that lets the new R80 server connect to Security Gateways:

    Source: new server

    Destination: target Security Gateways

    Service:

    FW1 (TCP 256)

    CPD (TCP 18191)

    FW1_CPRID (TCP 18208)

    CPM (TCP 19009)

  4. Install the new security policy on all gateways.
  5. If the source has IPv6 addresses, on the source operating system, disable IPv6.
  6. In SmartConsole or SmartDashboard, delete the temporary host objects from the primary Security Management Server.
  7. Close all Check Point GUI clients that are connected to the Security Management Server.
  8. If this server is not in production, run: cpstop
  9. Export the database with the R80 export tools.
  10. Clean install the new R80 Security Management Server or Multi-Domain Server.
  11. Configure Gaia OS settings in the Gaia WebUI or CLI.
  12. Import the database.

Requirements for Database Migration

Required Disk Space:

Required Network Access:

IPv4:

The target must use the same IP address configuration as the source. If the source uses IPv6, you must change it to IPv4 before you can migrate.

Target Version and Products:

You can only upgrade or migrate the version of the server or set of products. The target must have the same or higher version and the same set of installed products.

Upgrade Tools

Before you upgrade appliances or servers, get the upgrade tools. There is a different package of tools for each source platform.

Important! To make sure you have the latest version of the upgrade tools, download the appropriate package from the Tools section in the Check Point R80 Support site.

When you open the upgrade_tools package, you see these files:

Package

Description

migrate.conf

Holds configuration settings for Advanced Upgrade / Database Migration.

migrate

Runs Advanced Upgrade or migration.
On Windows, this is migrate.exe.

pre_upgrade_verifier

Analyzes compatibility of the currently installed configuration with the upgrade version. It gives a report on the actions to take before and after the upgrade.
On Windows this is pre_upgrade_verifier.exe

pre_upgrade_verifier -p $FWDIR -c <Current Version>
-t <Target Version>

migrate export

Backs up all Check Point configurations, without operating system information.
On Windows, this is migrate.exe export

migrate import

Restores backed up configuration.

Migrate Command Reference

The migrate command exports a source Security Management Server database to a file, or imports the database file to a target Security Management Server. Use absolute paths in the command, or relative paths from the current directory.

Before you run this command for export, close all SmartConsole clients or run cpstop on the Security Management Server.

Before you run this command for import, run cpstop on the Security Management Server.

Syntax:

migrate {export | import} [-l] [-n] <filename> [--exclude-uepm-postgres-db] [--include-uepm-msi-files] 

Parameters

Description

export
import

One of these actions must be used. Make sure services are stopped.

-l

Optional. Export or import SmartView Tracker logs and SmartLog data. Only closed logs are exported. Use the fw logswitch command to close the logs before you do the export.

-n

Optional. Run silently (non-interactive) using the default options for each setting.
Important: If you export a management database in this mode, to a directory with a file with the same name, it is overwritten without prompting.
If you import using this option, the command runs cpstop automatically.

--exclude-uepm-postgres-db

Skip over backup/restore of PostgreSQL database of the Endpoint product.

--include-uepm-msi-files

Export/import the uepm msi files.

filename

Required. Enter the name of the archive file with the server database. The path to the archive must exist.

Upgrading Security Management Server with Migration

Note - Before you upgrade the Security Management Server, make sure that the correct ports are open for SmartConsole to communicate with the Security Management Server.

Exporting the Current Security Management Server Database

To create a management database export file on the source server:

  1. Log in to expert mode.
  2. Run the Pre-Upgrade Verifier tool: pre_upgrade_verifier

    If there are errors, correct them before you continue.

  3. Run: <upgrade_tools_path>/migrate export <filename>.tgz

    The migrate export command exports the content of one Security Management Server database to a TGZ file.

  4. Follow the instructions.

    The management database is exported to the file that you named in the command. Make sure you define it as a TGZ.

  5. If SmartEvent is installed on the source server, export the Events database.

Importing the Security Management Server Database

Import the Security Management Server configuration that you exported. Make sure that you use the migration tools for the target version.

Before you begin: Install the R80 Security Management Server.

Important: When you transfer the exported database from the source to the target, use binary mode during the transfer.

To import the management server configuration:

  1. Log in to Expert mode.
  2. Transfer (with FTP, SCP, or similar) the exported configuration file collected from the source () to the new server.
  3. Calculate the MD5 for the transferred file and compare to the MD5 that was calculated on original server:

    # md5sum /<directory>/<name>.DDMMYYY-HHMMSS.tgz 

  4. Import the configuration: <migration_tools_path>/migrate import <path_exported_database>/<filename>.tgz
  5. Test the target installation.
  6. Disconnect the source server from the network.
  7. Connect the target server to the network.

Migrating the Database of a Secondary Security Management Server

  1. Export the database file from the primary Security Management Server.

    If the primary Security Management Server is not available, convert the secondary Security Management Server to a primary Security Management Server. To get assistance with this step, contact Check Point Technical Support or your vendor.

  2. Install a new primary Security Management Server.
  3. Import the management database file to the new primary Security Management Server.
  4. Install new secondary R80 Security Management Server.
  5. Establish SIC with the secondary Security Management Server.
  6. Synchronize the new secondary Security Management Server with the new primary Security Management Server.

Migrating Log and Event Databases

When you migrate the Security Management Server to R80, the SmartEvent databases are not included.

For more about how to migrate the events database to R80, see sk110173.

Upgrading Multi-Domain Security Management with Migration

We recommend that you use database export/import to upgrade. This procedure migrates all system databases, Domain Servers, Rule Bases, logs and Global Domains to a target Multi-Domain Server.

Important - Unlike in previous versions, in R80, the order that you import servers is very important. First you must import the Primary Multi-Domain Server, then Secondary Multi-Domain Servers and Multi-Domain Log Servers. If there is no Primary Multi-Domain Server, you must first promote a secondary Multi-Domain Server to be the primary.

Exporting the Multi-Domain Server Databases

Before you begin:

To create the export file on a source Multi-Domain Server:

  1. Stop all Check Point services: # mdsstop 
  2. Switch to the Multi-Domain Server context:

    # mdsenv

    # mcd 

  3. Mount the ISO file:

    # mount -o loop /path_to/Check_Point_R80_Gaia.iso /mnt/cdrom 

  4. Go to the installation folder:

    # cd /mnt/cdrom/linux/p1_install 

  5. Run the installation script:

    # ./mds_setup 

  6. Run the Pre-Upgrade Verifier: enter 1 when this menu shows:

    (1) Run Pre-upgrade verification only [recommended before upgrade]

    (2) Upgrade to R80

    (3) Backup current Multi-Domain Server

    (4) Export current Multi-Domain Server

    Or 'Q' to quit.

    The pre-upgrade verifier analyzes compatibility of the management database and its current configuration. A detailed report shows the steps to do before and after the upgrade.

    Note: The pre-upgrade verifier can only verify a database that is intended for import into a different major version (for example, R77.xx to R80). It cannot be used on a database that is intended for import to the same major version.

  7. Read the Pre-Upgrade Verifier output and fix all errors according to the instructions.
  8. After fixing errors, open the SmartConsole and reassign the Global Policy on all Domains.
  9. Stop the services again: # mdsstop
  10. Run the installation script  # ./mds_setup 
  11. Export the current Multi-Domain Server configuration: enter 4 when this menu shows:

    (1) Run Pre-upgrade verification only [recommended before upgrade]

    (2) Upgrade to R80

    (3) Backup current Multi-Domain Server

    (4) Export current Multi-Domain Server

    Or 'Q' to quit.

  12. Answer the interactive questions: 

    Would you like to proceed with the export now [yes/no] ? yes
    Please enter target directory for your Multi-Domain Server export (or 'Q' to quit): /var/log
    Do you plan to import to a version newer than R80 [yes/no] ? no
    Using migrate_tools from disk.
    Do you wish to export the log database [yes/no] ? yes or no

    If you enter no to export the logs, the configuration is still exported.

  13. Make sure this export file is created:

    # ls -l /var/log/exported_mds.DDMMYYY-HHMMSS.tgz

  14. Calculate the MD5 for this file:

    # md5sum /var/log/exported_mds.DDMMYYY-HHMMSS.tgz

Importing the Database to the Primary Multi-Domain Server

Import the Multi-Domain Server configuration that you exported.

Important - When you transfer the exported database from the source to the target, use binary mode during the transfer.

Before you begin, install R80 Multi-Domain Security Management on the target Multi-Domain Server.

Note - When you complete the upgrade process for the Primary Multi-Domain Server, the Multi-Site upgrade is not finished. You can only access objects that are stored on other Multi-Domain Security Management servers when the upgrade process for the other Multi-Domain Servers is complete.

To import the Multi-Domain Server configuration:

  1. Log in to expert mode.
  2. Transfer (with FTP, SCP, or similar) the exported configuration file collected from the source to the new server: exported_mds.DDMMYYY-HHMMSS.tgz
  3. Calculate the MD5 for the transferred file and compare to the MD5 that was calculated on original server:

    # md5sum /<directory>/exported_mds.DDMMYYY-HHMMSS.tgz 

  4. Import the configuration: $MDSDIR/scripts/mds_import.sh <path_exported_database>/exported_mds.DDMMYYY-HHMMSS.tgz
  5. Test the target installation.
  6. Disconnect the source server from the network.
  7. Connect the target server to the network and run mdsstart

To update the version of the Domain Server and Domain Log Server objects on this Multi-Domain Server:

On each Domain Server and Domain Log Server that you import, run:
$MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL -n <Multi-Domain Server name>

Importing the Database to Secondary Multi-Domain Servers

Import the Multi-Domain Server configuration that you exported to a Secondary Multi-Domain Server or Multi-Domain Log Server. If you have multiple servers, import the database to one server at a time.

Important: When you transfer the exported database from the source to the target, use binary mode during the transfer.

Before you begin:

To import the Multi-Domain Server configuration:

  1. Log in to expert mode.
  2. Transfer (with FTP, SCP, or similar) the exported configuration file collected from the source to the new server: exported_mds.DDMMYYY-HHMMSS.tgz
  3. Calculate the MD5 for the transferred file and compare to the MD5 that was calculated on source Multi-Domain Server:

    # md5sum /<directory>/exported_mds.DDMMYYY-HHMMSS.tgz 

  4. Make sure that there is connectivity to the newly upgraded primary Multi-Domain Server.
  5. Import the configuration: $MDSDIR/scripts/mds_import.sh -secondary -primaryip <IP_primary_server> <path_exported_database>/exported_mds.DDMMYYYY-HHMMSS.tgz
  6. On the Primary Multi-Domain Server, make sure that the Full Sync task completes successfully.
  7. Test the target installation.
  8. Disconnect the source server from the network.
  9. Connect the target server to the network and run mdsstart.

To update the version of the Domain Server and Domain Log Server objects on this Multi-Domain Server:

  1. On each Domain Server and Domain Log Server that you import, run:
    $MDSDIR/scripts/mds_fix_cmas_clms_version -c ALL -n <Multi-Domain Server name>
  2. Open SmartConsole and make sure that the version for each of the upgraded objects is R80.

Migrating Global Policies

The migrate_global_policies command upgrades a Global Policy database from a Multi-Domain Server and imports it to a R80 Multi-Domain Server.

Note - When executing the migrate_global_policies utility, the Multi-Domain Server and the Domain Servers are stopped.

Before you run the migrate_global_policies utility, make sure that you remove all the data from the Global database of the R80 Multi-Domain Server.

To upgrade Global Policies from R77.xx to R80:

  1. On the R77.xx Multi-Domain Server, extract the Upgrade Tools from the R80 CD or ISO, if you did not do this already.
  2. Run: # mdsenv
  3. Run: # <full path to migrate command> migrate export <output file>
  4. Copy the TGZ file from the R77.xx server to the R80 Multi-Domain Server.
  5. Run: # migrate_global_policies <full_path_exported_tgz>
  6. Run: # mdsstart

Migrating Domain Server Database

This procedure exports, updates, and imports the database of an R77.xx Domain Server to an R80 Domain Server.

Before you begin:

To import from R77.xx Domain Server to R80:

  1. On the R77.xx Domain Server, get the Upgrade Tools from the R80 CD or ISO.
  2. Extract the tools.

    Extraction makes the upgrade_tools subdirectory. In this path, extract the Multi-Domain Security Management tools: p1_upgrade_tools.tgz

    For example:

    Install from CD:
    # gtar xvfz /mnt/cdrom/linux/upgrade_tools/linux/p1_upgrade_tools.tgz -C /var/opt/export_tools

    Install from DVD:
    # gtar xvfz /mnt/cdrom/Linux/linux/upgrade_tools/linux/p1_upgrade_tools.tgz -C /var/opt/export_tools

  3. Run: # mdsenv <domainServer_name>
  4. Before you export the database, make sure that you remove the Global Policy from the source Domain Server.
  5. Run: # <full path to migrate command> migrate export [-l] <output file>
    • The migrate export command exports one Domain Server database to a TGZ file.
    • The output file must be specified with the fully qualified path. Make sure there is sufficient disk space for the output file.
    • The optional –l flag includes closed log files and SmartLog data from the source Domain Server in the output archive.
  6. On the R80 Multi-Domain Server, run these API commands to create a new Domain and a new Domain Server (without starting it):

    # mgmt_cli login <user_name> <password>

    # mgmt_cli add domain name <my_domain_name> servers.ip-address <my_IP_address> servers.name <my_domain_server_name> servers.multi-domain-server <R80_multi-domain-server_Name> servers.skip-start-domain-server true

  7. Copy the TGZ file from the R77.xx Domain Server to the R80 Multi-Domain Server.
  8. When the new Domain is ready, import the exported database:

    # cma_migrate <source_server> <new_server>/<FWDIR_path>

    For example: # cma_migrate /tmp/myR77-30.tgz /opt/CPmds-r80/domains/my_dms/CPsuite-R80/fw1

    You must run cma_migrate to import the database. This command updates the database schema before it imports.

    First, the command runs pre-upgrade verification. If no errors are found, migration continues. If there are errors, you must change the source Domain Server according to instructions in the error messages. Then do this procedure again.

  9. If the R80 server has a different IP address than the R77.xx server, establish trust with the Security Gateways.
  10. If the R77.xx server had VPN gateways, configure the keys.
  11. Restart the R80 Domain Server: # mdsstop and then mdsstart

Certificate Authority Data

The cma_migrate process does not change the Certificate Authority or key data. The R80 Domain Server has SIC with Security Gateways. If the IP address of the R80 server is not the same as the IP address of the R77.xx server, you must establish trust between the new server and the gateways.

Before you begin, see sk17197 to make sure the environment is prepared.

To initialize a Domain Server Internal Certificate Authority:

  1. Remove the current Internal Certificate Authority for the specified environment, run:

    # mdsstop_customer <DomainServer NAME>
    # mdsenv <DomainServer NAME>
    # fwm sic_reset

  2. Create a new Internal Certificate Authority, run:

    # mdsconfig -ca <DomainServer NAME> <DomainServer IP>
    # mdsstart_customer <DomainServer NAME>

Resolving Issues with IKE Certificates

With a VPN tunnel that has an externally managed, third-party gateway and a Check Point Security Gateway, sometimes there is an issue with the IKE certificates after you migrate the management database.

The Security Gateway presents its IKE certificate to its peer. The third-party gateway uses the FQDN of the certificate to retrieve the host name and IP address of the Certificate Authority. If the IKE certificate was issued by a Check Point Internal CA, the FQDN contains the host name of the original management server. The peer gateway will fail to contact the original server and will not accept the certificate.

To fix:

Migrating an R80 Database to Another R80 Server

You can migrate the R80 Security Management Server database to a different R80 server. The procedure is similar to upgrading from an earlier version to R80.

  1. Create a backup file of the current system settings from the Gaia WebUI.

    For Multi-Domain Server run mds_backup

  2. Perform the steps to migrate to another R80 Security Management Server or Multi-Domain Server.

Migrating a License to a New IP Address (Security Management Server)

Licenses are related to the management IP addresses. You must update the license and configure the environment to recognize the new server.

  1. Update the licenses with the new IP address. If you use central licenses, they must also be updated with the new IP Address.
  2. Run cpstop and cpstart on Security Management Server.
  3. Connect to the new IP address with SmartConsole.
  4. Remove the host object and the rule that you created before migration.
  5. Update the primary Security Management Server object to make the IP Address and topology match the new configuration.
  6. Run evstop and evstart on SmartEvent servers.
  7. On the DNS, map the target Security Management Server host name to the new IP address.

Configuring the new IP address for Log Servers and SmartEvent:

  1. When you log in to SmartConsole for the first time, open the Domain Log Server or SmartEvent object.
  2. Change the IP address to the new IP address.
  3. Publish and install the database.
  4. Open the distributed Domain Log Server or SmartEvent object again.
  5. In the Platform section, click Get.

    This updates the server to the correct version.

  6. Click OK.
  7. Publish and install the database.

Restoring on Failure

If there are issues with the upgrade, you can restore the original database. Make sure you have the OS settings that you noted when you backed up.

  1. Clean install the original version.

    Use the Installation and Upgrade Guide for major versions, or the Release Notes for minor versions or hotfixes.

  2. Configure Gaia OS settings in the Gaia WebUI or CLI.
  3. Import the exported database.