Multi-Version Cluster Upgrade Procedure - Gateway Mode
|
Important - Before you upgrade a Cluster:
|
|
Note - MVC supports Cluster Members with different Gaia Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems. kernel editions (R81.10 64-bit and R77.30 / R80.10 32-bit). |
The procedure described below is based on an example cluster with three Cluster Members M1, M2 and M3.
However, you can use it for clusters that consist of two or more.
Action plan:
-
In SmartConsole Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on., change the cluster object version to R81.10.
-
On the Cluster Member Security Gateway that is part of a cluster. M3:
-
Upgrade to R81.10
Note - If you perform a Clean Install Installation of a Check Point Operating System from scratch on a computer. of R81.10, then you must establish SIC Secure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server. in SmartConsole with this Cluster Member and install Access Control Policy on it
-
Enable the MVC
-
-
In SmartConsole, install the Access Control Policy on the Cluster Member M3.
-
On the next Cluster Member M2:
-
Upgrade to R81.10
Note - If you perform a Clean Install of R81.10, then you must establish SIC in SmartConsole with this Cluster Member and install Access Control Policy on it
-
Enable the MVC
-
-
In SmartConsole, install the Access Control Policy on the Cluster Member M3 and M2.
-
On the remaining Cluster Member M1:
-
Upgrade to R81.10
Note - If you perform a Clean Install of R81.10, then you must establish SIC in SmartConsole with this Cluster Member
-
-
In SmartConsole, install the Access Control Policy and the Threat Prevention Policy on the Cluster object.
Procedure:
-
In SmartConsole, change the version of the cluster object
Step
Instructions
1
Connect with SmartConsole to the R81.10 Security Management Server Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. or Domain Management Server that manages this cluster.
2
From the left navigation panel, click Gateways & Servers.
3
Open the Cluster object.
4
From the left tree, click the General Properties page.
5
In the Platform section > Version field, select R81.10.
6
Click OK to close the Gateway Cluster Properties window.
-
On the Cluster Member M3, upgrade to R81.10 with CPUSE, or perform a Clean Install of R81.10
Important - You must reboot the Cluster Member after the upgrade or clean install.
-
In SmartConsole, establish SIC with the Cluster Member M3
Important - This step is required only if you performed a Clean Install of R81.10 on this Cluster Member.
Step
Instructions
1
Connect with SmartConsole to the R81.10 Security Management Server or Main Domain Management Server that manages this Cluster.
2
From the left navigation panel, click Gateways & Servers.
3
Open the cluster object.
4
From the left tree, click Cluster Members.
5
Select the object of this Cluster Member.
6
Click Edit.
7
On the General tab, click the Communication button.
8
Click Reset.
9
In the One-time password field, enter the same Activation Key you entered during the First Time Configuration Wizard of the Cluster Member.
10
In the Confirm one-time password field, enter the same Activation Key again.
11
Click Initialize.
12
The Trust state field must show Trust established.
13
Click Close to close the Communication window.
14
Click OK to close the Cluster Member Properties window.
15
Click OK to close the Gateway Cluster Properties window.
16
Publish the SmartConsole session.
-
In SmartConsole, install the Access Control Policy on the R81.10 Cluster Member M3
Important - This step is required only if you performed a Clean Install of R81.10 on the Cluster Member M3.
Step
Instructions
1
Click Install Policy.
2
In the Install Policy window:
-
In the Policy field, select the applicable Access Control Policy.
-
In the Install Mode section, select these two options:
-
Select Install on each selected gateway independently.
-
Clear For gateway clusters, if installation on a cluster member fails, do not install on that cluster.
-
-
Click Install.
3
The Access Control Policy installation:
-
Succeeds on the upgraded Cluster Member M3.
-
Fails on the old Cluster Members M1 and M2 with a warning. Ignore this warning.
-
-
On the R81.10 Cluster Member M3, enable the MVC mechanism
Step
Instructions
1
Connect to the command line on the Cluster Member.
2
Enable the MVC Mechanism:
-
set cluster member mvc on
-
In the Expert mode:
cphaconf mvc on
3
Examine the state of the MVC Mechanism:
-
In Gaia Clish:
show cluster members mvc
-
In the Expert mode:
cphaprob mvc
-
-
In SmartConsole, install the Access Control Policy on the R81.10 Cluster Member M3
Step
Instructions
1
Click Install Policy.
2
In the Install Policy window:
-
In the Policy field, select the applicable Access Control Policy.
-
In the Install Mode section, select these two options:
-
Select Install on each selected gateway independently.
-
Clear For gateway clusters, if installation on a cluster member fails, do not install on that cluster.
-
-
Click Install.
3
The Access Control Policy installation:
-
Succeeds on the upgraded Cluster Member M3.
-
Fails on the old Cluster Members M1 and M2 with a warning. Ignore this warning.
-
-
On each Cluster Member, examine the cluster state
Step
Instructions
1
Connect to the command line on each Cluster Member.
2
Examine the cluster state in one of these ways:
-
In Gaia Clish, run:
show cluster state
-
In the Expert mode, run:
cphaprob state
Important:
-
In the High Availability mode, one of the upgraded Cluster Members (M2 or M3) changes its cluster state to Active.
The other upgraded Cluster Member (M2 or M3) changes its cluster state to Standby.
-
In the Load Sharing modes, all Cluster Members must be in the Active state.
-
-
On the Cluster Member M2, upgrade to R81.10 with CPUSE, or perform a Clean Install of R81.10
Important - You must reboot the Cluster Member after the upgrade or clean install.
-
In SmartConsole, establish SIC with the Cluster Member M2
Important - This step is required only if you performed a Clean Install of R81.10 on this Cluster Member.
Step
Instructions
1
Connect with SmartConsole to the R81.10 Security Management Server or Main Domain Management Server that manages this Cluster.
2
From the left navigation panel, click Gateways & Servers.
3
Open the cluster object.
4
From the left tree, click Cluster Members.
5
Select the object of this Cluster Member.
6
Click Edit.
7
On the General tab, click the Communication button.
8
Click Reset.
9
In the One-time password field, enter the same Activation Key you entered during the First Time Configuration Wizard of the Cluster Member.
10
In the Confirm one-time password field, enter the same Activation Key again.
11
Click Initialize.
12
The Trust state field must show Trust established.
13
Click Close to close the Communication window.
14
Click OK to close the Cluster Member Properties window.
15
Click OK to close the Gateway Cluster Properties window.
16
Publish the SmartConsole session.
-
In SmartConsole, install the Access Control Policy on the R81.10 Cluster Member M3 and M2
Important - This step is required only if you performed a Clean Install of R81.10 on the Cluster Member M2.
Step
Instructions
1
Click Install Policy.
2
In the Install Policy window:
-
In the Policy field, select the applicable Access Control Policy.
-
In the Install Mode section, select these two options:
-
Select Install on each selected gateway independently.
-
Clear For gateway clusters, if installation on a cluster member fails, do not install on that cluster.
-
-
Click Install.
3
The Access Control Policy installation:
-
Succeeds on the upgraded Cluster Members M3 and M2.
-
Fails on the old Cluster Member M1 with a warning. Ignore this warning.
-
-
On the R81.10 Cluster Member M2, enable the MVC mechanism
Step
Instructions
1
Connect to the command line on the Cluster Member.
2
Enable the MVC Mechanism:
-
In Gaia Clish:
set cluster member mvc on
-
In the Expert mode:
cphaconf mvc on
3
Examine the state of the MVC Mechanism:
-
In Gaia Clish:
show cluster members mvc
-
In the Expert mode:
cphaprob mvc
-
-
In SmartConsole, install the Access Control Policy on the R81.10 Cluster Members M3 and M2
Step
Instructions
1
Click Install Policy.
2
In the Install Policy window:
-
In the Policy field, select the applicable Access Control Policy.
-
In the Install Mode section, select these two options:
-
Select Install on each selected gateway independently.
-
Clear For gateway clusters, if installation on a cluster member fails, do not install on that cluster.
-
-
Click Install.
3
The Access Control Policy installation:
-
Succeeds on the upgraded Cluster Members M3 and M2.
-
Fails on the old Cluster Member M1 with a warning. Ignore this warning.
-
-
On each Cluster Member, examine the cluster state
Step
Instructions
1
Connect to the command line on each Cluster Member.
2
Examine the cluster state in one of these ways:
-
In Gaia Clish, run:
show cluster state
-
In the Expert mode, run:
cphaprob state
Important:
-
In the High Availability mode, one of the upgraded Cluster Members (M2 or M3) changes its cluster state to Active.
The other upgraded Cluster Member (M2 or M3) changes its cluster state to Standby.
-
In the Load Sharing modes, all Cluster Members must be in the Active state.
-
-
On the old Cluster Member M1, upgrade to R81.10 with CPUSE, or perform a Clean Install of R81.10
Important - You must reboot the Cluster Member after the upgrade or clean install.
-
In SmartConsole, establish SIC with the Cluster Member M1
Important - This step is required only if you performed a Clean Install of R81.10 on this Cluster Member.
Step
Instructions
1
Connect with SmartConsole to the R81.10 Security Management Server or Main Domain Management Server that manages this Cluster.
2
From the left navigation panel, click Gateways & Servers.
3
Open the cluster object.
4
From the left tree, click Cluster Members.
5
Select the object of this Cluster Member.
6
Click Edit.
7
On the General tab, click the Communication button.
8
Click Reset.
9
In the One-time password field, enter the same Activation Key you entered during the First Time Configuration Wizard of the Cluster Member.
10
In the Confirm one-time password field, enter the same Activation Key again.
11
Click Initialize.
12
The Trust state field must show Trust established.
13
Click Close to close the Communication window.
14
Click OK to close the Cluster Member Properties window.
15
Click OK to close the Gateway Cluster Properties window.
16
Publish the SmartConsole session.
-
In SmartConsole, install the Access Control Policy and Threat Prevention Policy on the Cluster object
Step
Instructions
1
Connect with SmartConsole to the R81.10 Security Management Server or Domain Management Server that manages this cluster.
2
From the left navigation panel, click Gateways & Servers.
3
Install the Access Control Policy:
-
Click Install Policy.
-
In the Policy field, select the applicable Access Control Policy.
-
In the Install Mode section, select these two options:
-
Install on each selected gateway independently
-
For gateway clusters, if installation on a cluster member fails, do not install on that cluster
-
-
Click Install.
-
The Access Control Policy must install successfully on all the Cluster Members.
4
Install the Threat Prevention Policy:
-
Click Install Policy.
-
In the Policy field, select the applicable Threat Prevention Policy.
-
Click Install.
-
The Threat Prevention Policy must install successfully on all the Cluster Members.
-
-
On each Cluster Member, examine the cluster state
Step
Instructions
1
Connect to the command line on each Cluster Member.
2
Examine the cluster state in one of these ways:
-
In Gaia Clish, run:
show cluster state
-
In the Expert mode, run:
cphaprob state
Important:
-
All Cluster Members must show the same information about the states of all Cluster Members.
-
In the High Availability mode, one Cluster Member must be in the Active state, and all other Cluster Members must be in Standby state.
-
In the Load Sharing modes, all Cluster Members must be in the Active state.
-
-
On each Cluster Member, disable the MVC mechanism
Step
Instructions
1
Connect to the command line on each Cluster Member.
2
Disable the MVC Mechanism:
-
In Gaia Clish:
set cluster member mvc off
-
In the Expert mode:
cphaconf mvc off
3
Examine the state of the MVC Mechanism:
-
In Gaia Clish:
show cluster members mvc
-
In the Expert mode:
cphaprob mvc
-
-
Test the functionality
Step
Instructions
1
Connect with SmartConsole to the R81.10 Security Management Server or Domain Management Server that manages this cluster.
2
From the left navigation panel, click Logs & Monitor > Logs.
3
Examine the logs from this Cluster to make sure it inspects the traffic as expected.
For more information, see the: