Installing a VSX Cluster
|
Notes:
|
Procedure:
-
Install the VSX Cluster Members
Step
Instructions
1
Install the Gaia Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems. Operating System:
2
3
During the First Time Configuration Wizard, you must configure these settings:
-
In the Installation Type window, select Security Gateway and/or Security Management.
-
In the Products window:
-
In the Products section, select Security Gateway only.
-
In the Clustering section, select these two options:
-
Unit is a part of a cluster
-
ClusterXL
-
-
-
In the Secure Internal Communication window, enter the applicable Activation Key (between 4 and 127 characters long).
4
Install a valid license.
-
-
Configure the VSX Cluster object in SmartConsole
Notes:
-
The steps below are only for a Clean Install Installation of a Check Point Operating System from scratch on a computer. of a new VSX Cluster. To configure a VSX Cluster Member Security Gateway that is part of a cluster. that failed, see the R81.10 VSX Administration Guide > Chapter Command Line Reference > Section vsx_util > Section vsx_util reconfigure.
-
The steps below are for the Dedicated Management Interfaces (DMI) configuration. For the non-DMI configuration, see the R81.10 VSX Administration Guide.
Step
Instructions
1
Connect with SmartConsole Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. to the Security Management Server Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. or Main Domain Management Server Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. that should manage this VSX Cluster.
2
From the left navigation panel, click Gateways & Servers.
3
Create a new VSX Cluster object in one of these ways:
-
From the top toolbar, click the New () > VSX > Cluster.
-
In the top left corner, click Objects menu > More object types > Network Object > Gateways and Servers > VSX > New Cluster.
-
In the top right corner, click Objects Pane > New > More > Network Object > Gateways and Servers > VSX > Cluster.
4
On the VSX Cluster General Properties (Specify the object's basic settings) page:
-
In the Enter the VSX Cluster Name field, enter the applicable name for this VSX Cluster object.
-
In the Enter the VSX Cluster IPv4 field, enter the Cluster Virtual IPv4 address that is configured on the Dedicated Management Interfaces (DMI).
-
In the Enter the VSX Cluster IPv6 field, enter the Cluster Virtual IPv6 address that is configured on the Dedicated Management Interfaces (DMI).
-
In the Select the VSX Cluster Version field, select R81.10.
-
In the Select the VSX Cluster Platform field, select the applicable VSX Cluster mode:
-
ClusterXL (for High Availability)
-
ClusterXL Virtual System Load Sharing
-
-
Click Next.
5
On the VSX Cluster Members (Define the members of this VSX Cluster) page, add the objects for the VSX Cluster Members:
-
Click Add.
-
In the Cluster Member Name field, enter the applicable name for this Cluster Member object.
-
In the Cluster Member IPv4 Address field, enter the IPv4 address of the Dedicated Management Interface (1) Interface on a Gaia Security Gateway or Cluster member, through which Management Server connects to the Security Gateway or Cluster member. (2) Interface on Gaia computer, through which users connect to Gaia Portal or CLI. (DMI).
-
In the Cluster Member IPv6 Address field, enter the applicable IPv6 address.
-
In the Activation Key and Confirm Activation Key fields, enter the same Activation Key you entered during the Cluster Member's First Time Configuration Wizard.
-
Click Initialize.
-
Click OK.
-
Repeat Steps a-f to add the second VSX Cluster Member, and so on.
If the Trust State field does not show Trust established, perform these steps:
-
Connect to the command line on the VSX Cluster Member.
-
Make sure there is a physical connectivity between the VSX Cluster Member and the Management Server (for example, pings can pass).
-
Run:
cpconfig
-
Enter the number of this option:
Secure Internal Communication
-
Follow the instructions on the screen to change the Activation Key.
-
In SmartConsole, click Reset.
-
Enter the same Activation Key you entered in the
cpconfig
menu. -
In SmartConsole, click Initialize.
6
On the VSX Cluster Interfaces (Physical Interfaces Usage) page:
-
Examine the list of the interfaces - it must show all the physical interfaces on the VSX Gateway Physical server that hosts VSX virtual networks, including all Virtual Devices that provide the functionality of physical network devices. It holds at least one Virtual System, which is called VS0..
-
If you plan to connect more than one Virtual System directly to the same physical interface, you must select VLAN Trunk for that physical interface.
-
Click Next.
7
On the VSX Cluster members (Synchronization Network) page:
-
Select the interface that will be used for state synchronization.
-
Configure the IPv4 addresses for the Sync interfaces on each Cluster Member.
-
Click Next.
8
On the Virtual Network Device Configuration (Specify the object's basic settings) page:
-
You can select Create a Virtual Network Device and configure the first applicable Virtual Network Device at this time (we recommend to do this later) - Virtual Switch or Virtual Router.
-
Click Next.
9
On the VSX Gateway Management (Specify the management access rules) page:
-
Examine the default access rules.
-
Select the applicable default access rules.
-
Configure the applicable source objects, if needed.
-
Click Next.
Important - These access rules apply only to the VSX Gateway (context of VS0), which is not intended to pass any "production" traffic.
10
On the VSX Gateway Creation Finalization page:
-
Click Finish and wait for the operation to finish.
-
Click View Report for more information.
-
Click Close.
11
Examine the VSX Cluster configuration:
-
Connect to the command line on each VSX Cluster Member.
-
Log in to the Expert mode.
-
Run:
vsx stat -v
12
In SmartConsole, open the VSX Cluster object.
13
On the General Properties page > the Network Security tab:
-
Make sure the ClusterXL Software Blade Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. is selected.
-
Enable the additional applicable Software Blades for the VSX Cluster object itself (context of VS0).
Refer to:
-
sk106496: Software Blades updates on VSX R75.40VS and above - FAQ
-
Applicable Administration Guides on the R81.10 Home Page.
14
Click OK to push the updated VSX Configuration.
Click View Report for more information.
15
Install the default policy on the VSX Cluster object:
-
Click Install Policy.
-
In the Policy field, select the default policy for this VSX Cluster object.
This policy is called:
<Name of VSX Cluster object>_VSX
-
Click Install.
16
Examine the VSX configuration and cluster state:
-
Connect to the command line on each VSX Cluster Member.
-
Examine the VSX configuration:
In the Expert mode, run:
vsx stat -v
Important:
-
Make sure all the configured Virtual Devices are loaded.
-
Make sure all Virtual Systems and Virtual Routers have SIC Secure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server. Trust and policy.
-
-
Examine the cluster state in one of these ways:
-
set virtual-system 0
show cluster state
-
In the Expert mode, run:
vsenv 0
cphaprob state
Important:
-
All VSX Cluster Members must show the same information about the states of all VSX Cluster Members.
-
One VSX Cluster Member must be in the Active state, and all other VSX Cluster Members must be in Standby state.
-
All Virtual Systems must show the same information about the states of all Virtual Systems.
-
-
Examine the cluster interfaces in one of these ways:
-
In Gaia Clish, run:
set virtual-system 0
show cluster members interfaces all
-
In the Expert mode, run:
vsenv 0
cphaprob -a if
-
-
-
Configure the Virtual Devices and their Security Policies in SmartConsole
Step
Instructions
1
Connect with SmartConsole to the Security Management Server, or each Target Domain Management Server that should manage each Virtual Device.
2
Configure the applicable Virtual Devices on this VSX Cluster.
3
Configure the applicable Access Control and Threat Prevention Policies for these Virtual Devices.
4
Install the configured Security Policies Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. on these Virtual Devices.
5
Examine the VSX configuration and cluster state:
-
Connect to the command line on each VSX Cluster Member.
-
Examine the VSX configuration:
In the Expert mode, run:
vsx stat -v
Important:
-
Make sure all the configured Virtual Devices are loaded.
-
Make sure all Virtual Systems and Virtual Routers have SIC Trust and policy.
-
-
Examine the cluster state in one of these ways:
-
In Gaia Clish, run:
set virtual-system 0
show cluster state
-
In the Expert mode, run:
vsenv 0
cphaprob state
Important:
-
All VSX Cluster Members must show the same information about the states of all VSX Cluster Members.
-
One VSX Cluster Member must be in the Active state, and all other VSX Cluster Members must be in Standby state.
-
All Virtual Systems must show the same information about the states of all Virtual Systems.
-
-
Examine the cluster interfaces in one of these ways:
-
In Gaia Clish, run:
set virtual-system 0
show cluster members interfaces all
-
In the Expert mode, run:
vsenv 0
cphaprob -a if
-
-
For more information, see the:
-
Applicable Administration Guides on the R81.10 Home Page.