Working with Gemalto HSM
Configuration Steps
Use this workflow to configure a Check Point Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. / ClusterXL / Scalable Platform Security Group to work with the Gemalto HSM Server.
 Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. / ClusterXL / Scalable Platform Security Group to work with the Gemalto HSM Server.
 Step 1 of 5: Extracting the Gemalto Help Package
Step 1 of 5: Extracting the Gemalto Help Package
                                            Use the Gemalto configuration documents to configure the Gemalto HSM environment.
| Step | Instructions | ||
|---|---|---|---|
| 1 | Download this package: Gemalto SafeNet HSM Help package (007-011136-012_Net_HSM_6.2.2_Help_RevA) 
 | ||
| 2 | Use a Windows-based computer. | ||
| 3 | Extract the Gemalto HSM Help package to some folder. | ||
| 4 | Open the extracted Gemalto HSM Help folder. | ||
| 5 | Double-click the START_HERE.html file. The Gemalto SafeNet Network HSM 6.2.2 Product Documentation opens. | 
 Step 2 of 5: Configuring the Gemalto HSM Server to Work with a Check Point Security Gateway / ClusterXL / Scalable Platform Security Group
Step 2 of 5: Configuring the Gemalto HSM Server to Work with a Check Point Security Gateway / ClusterXL / Scalable Platform Security Group
                                            Use the Gemalto Help documents to install and configure the Gemalto HSM Server.
| Step | Instructions | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| 1 | Install the Gemalto HSM Appliance. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Installation Guide > SafeNet Network HSM Hardware Installation. | |||||||||
| 2 | Do the initial configuration of the Gemalto HSM Appliance and the Gemalto HSM Server. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Configuration Guide > follow from [Step 1] to [Step 6]. | |||||||||
| 3 | Run the " From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Configuration Guide > [Step 7] Create a trusted link and register Client and Appliance with each other. | |||||||||
| 4 | Complete the configuration of the Gemalto HSM Server to work with the Check Point Security Gateway / ClusterXL / Security Group: 
 | 
 Step 3 of 5: Configuring the Gemalto HSM Client workstation
Step 3 of 5: Configuring the Gemalto HSM Client workstation
                                            You use the Gemalto HSM Client workstation to create a CA Certificate on the Gemalto HSM Server.
Check Point Security Gateway / ClusterXL / Scalable Platform Security Group uses this CA Certificate for HTTPS Inspection Feature on a Security Gateway that inspects traffic encrypted by the Secure Sockets Layer (SSL) protocol for malware or suspicious patterns. Synonym: SSL Inspection. Acronyms: HTTPSI, HTTPSi. to store and to access SSL keys on the Gemalto HSM Server.
 Feature on a Security Gateway that inspects traffic encrypted by the Secure Sockets Layer (SSL) protocol for malware or suspicious patterns. Synonym: SSL Inspection. Acronyms: HTTPSI, HTTPSi. to store and to access SSL keys on the Gemalto HSM Server.
| 
                                                                     | Note - You can also use Check Point Security Gateway / ClusterXL / Scalable Platform Security Group with the installed HSM Client package as an HSM Client workstation. | 
| Step | Instructions | |
|---|---|---|
| 1 | Get this HSM Client package from the Gemalto vendor: 610-012382-017_SW_Client_HSM_6.2.2_RevA | |
| 2 | Install a Windows-based or Linux-based computer to use as a Gemalto HSM Client Workstation. | |
| 3 | Install the HSM Client package on the computer: From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Installation Guide > SafeNet HSM Client Software Installation. | |
| 4 | Establish a Trust Link between the Gemalto HSM Client Workstation and the Gemalto HSM Server. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Configuration Guide > [Step 7] Create a trusted link and register Client and Appliance with each other. On the Gemalto HSM Client Workstation, run in LunaCM: 
 | 
 Step 4 of 5: Creating the CA Certificate on the Gemalto HSM Server
Step 4 of 5: Creating the CA Certificate on the Gemalto HSM Server
                                            | Step | Instructions | ||||
|---|---|---|---|---|---|
| 1 | On the Gemalto HSM Client workstation, open a command prompt or a terminal window. | ||||
| 2 | Use the " From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Utilities Reference Guide > Certificate Management Utility (CMU) > cmu generatekeypair. Example: 
 | ||||
| 3 | When prompted, enter the password for the partition on Gemalto HSM Server (you configured it in Step 2 of 5: Configuring the Gemalto HSM Server to Work with a Check Point Security Gateway / ClusterXL / Scalable Platform Security Group). Example: 
 | ||||
| 4 | Select the RSA mechanism by entering the corresponding number: 
 | ||||
| 5 | View the handles of the key pair you created. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Utilities Reference Guide > Certificate Management Utility (CMU) > cmu list. 
 Example output: 
 | ||||
| 6 | Use the handle numbers from the previous step to create the CA certificate. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Utilities Reference Guide > Certificate Management Utility (CMU) > cmu selfsigncertificate Example: 
 | ||||
| 7 | View the handles of the CA certificate you created. 
 Example output: 
 
 | ||||
| 8 | Export the CA certificate to a file. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Utilities Reference Guide > Certificate Management Utility (CMU) > cmu export 
 | 
 Step 5 of 5: Configuring the Security Gateway to Work with the Gemalto HSM Server
Step 5 of 5: Configuring the Security Gateway to Work with the Gemalto HSM Server
                                            This step has three sub-steps.
 Sub-Step 5-A: Configuring HTTPS Inspection on the Security Gateway / Cluster Members / Security Group to work without the Gemalto HSM Server
Sub-Step 5-A: Configuring HTTPS Inspection on the Security Gateway / Cluster Members / Security Group to work without the Gemalto HSM Server
                                                    | 
                                                                             | Important: 
 | 
| Step | Instructions | |||
|---|---|---|---|---|
| 1 | In SmartConsole See the R81 Security Management Administration Guide > Chapter HTTPS Inspection. | |||
| 2 | On the Security Gateway / each Cluster Member / Security Group, disable the HSM in the  
 | |||
| 3 | In SmartConsole, install the applicable Access Control Policy on the Security Gateway / ClusterXL object. | |||
| 4 | Make sure that HTTPS Inspection works correctly without the HSM Server: 
 | 
 Sub-Step 5-B: Installing the Gemalto HSM Simplified Client Software Packages on the Security Gateway / ClusterXL / Security Group
Sub-Step 5-B: Installing the Gemalto HSM Simplified Client Software Packages on the Security Gateway / ClusterXL / Security Group
                                                    | 
                                                                             | Important: 
 | 
| 
                                                                             | Notes: 
 | 
Procedure for a Security Gateway / ClusterXL:
| Step | Instructions | |||
|---|---|---|---|---|
| 1 | Open the Gemalto HSM Client package you received from Gemalto: 610-012382-017_SW_Client_HSM_6.2.2_RevA Go to this directory:  | |||
| 2 | Install the HSM Client package. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Installation Guide > SafeNet HSM Client Software Installation. | |||
| 3 | In the Expert mode, copy the libCryptoki2.so file to the /usr/lib/hsm_client/ directory: 
 
 | |||
| 4 | Establish a Trust Link between the Gemalto HSM Client on the Security Gateway / each Cluster Member and the Gemalto HSM Server. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Configuration Guide > [Step 7] Create a trusted link and register Client and Appliance with each other. On the Security Gateway / each Cluster Member, run in LunaCM: 
 | |||
| 5 | Examine the partition access on the Security Gateway / each Cluster Member: 
 | 
Procedure for a Scalable Platform Security Group:
| Step | Instructions | |||
|---|---|---|---|---|
| 1 | Open the Gemalto HSM Client package you received from Gemalto: 610-012382-017_SW_Client_HSM_6.2.2_RevA | |||
| 2 | Transfer the software package to the Security Group to some directory. For example, create /var/log/HSM_Client/ on all Security Group Members: 
 | |||
| 3 | Connect to the command line on the Security Group. | |||
| 4 | Log in to the Expert mode. | |||
| 5 | Extract the Gemalto HSM Client package: 
 | |||
| 6 | Install the Gemalto HSM Client packages on all Security Group Members: 
 | |||
| 7 | Establish a Trust Link between the Gemalto HSM Client on the Security Group and the Gemalto HSM Server. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Configuration Guide > [Step 7] Create a trusted link and register Client and Appliance with each other. On the Security Group, run in LunaCM: 
 | |||
| 8 | Examine the partition access on the Security Group: 
 | 
 Sub-Step 5-C: Configuring HTTPS Inspection on the Security Gateway / ClusterXL / Security Group to work with the Gemalto HSM Server
Sub-Step 5-C: Configuring HTTPS Inspection on the Security Gateway / ClusterXL / Security Group to work with the Gemalto HSM Server
                                                    | 
                                                                             | Important: 
 | 
| 
                                                                             | Notes: 
 | 
| Step | Instructions | ||||||
|---|---|---|---|---|---|---|---|
| 1 | Connect to the command line on the Security Gateway / each Cluster Member / Scalable Platform Security Group. | ||||||
| 2 | Log in to the Expert mode. | ||||||
| 3 | Back up the  
 | ||||||
| 4 | Edit the  
 | ||||||
| 5 | Configure the required values for these attributes: 
 | ||||||
| 
 | 
 Example: Copy
                                                                              | ||||||
| 6 | Apply the new configuration. 
 | ||||||
| 7 | Make sure that the Security Gateway / each Cluster Member / Security Group can connect to the HSM Server and that HTTPS Inspection is activated successfully on the outbound traffic. Run this command: 
 The output must show: 
 For more information, see Monitoring HTTPS Inspection with HSM in CLI. | ||||||
| 8 | Make that HTTPS Inspection is activated successfully on the outbound traffic: 
 | 
Additional Actions for a Gemalto HSM Server
 Deleting a Trust Link with the HSM Server
Deleting a Trust Link with the HSM Server
                                            If you need to establish new Trust Link between a Check Point Security Gateway and an HSM Server, you have to delete the current Trust Link.
Use Case: When you replace or reconfigure a Check Point Security Gateway, or an HSM Server.
| Step | Instructions | ||||
|---|---|---|---|---|---|
| 1 | Delete the current Trust Link on the Check Point Security Gateway / each Cluster Member / Scalable Platform Security Group: 
 | ||||
| 2 | Delete the current Trust Link on the HSM Appliance: 
 | 
| 
                                                                     | Note - For more information, see the Gemalto SafeNet Network HSM 6.2.2 Product Documentation. | 
 Configuring a Second Interface on a Gemalto HSM Appliance for NTLS
Configuring a Second Interface on a Gemalto HSM Appliance for NTLS
                                            | Step | Instructions | |
|---|---|---|
| 1 | Connect to the HSM Appliance over SSH. | |
| 2 | Examine all the configured interfaces: 
 | |
| 3 | Add a new interface: 
 | |
| 4 | Enable Network Trust Link Service (NTLS) on all the interfaces. | 
| 
                                                                     | Note - For more information, see the Gemalto SafeNet Network HSM 6.2.2 Product Documentation > LunaSH Command Reference Guide > LunaSH Commands. | 
 
                                             
                                                                                