Working with Gemalto HSM
Configuration Steps
Use this workflow to configure a Check Point Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. / ClusterXL / Scalable Platform Security Group to work with the Gemalto HSM Server.
Use the Gemalto configuration documents to configure the Gemalto HSM environment.
Step | Instructions | ||
---|---|---|---|
1 |
Download this package: Gemalto SafeNet HSM Help package (007-011136-012_Net_HSM_6.2.2_Help_RevA)
|
||
2 |
Use a Windows-based computer. |
||
3 |
Extract the Gemalto HSM Help package to some folder. |
||
4 |
Open the extracted Gemalto HSM Help folder. |
||
5 |
Double-click the START_HERE.html file. The Gemalto SafeNet Network HSM 6.2.2 Product Documentation opens. |
Use the Gemalto Help documents to install and configure the Gemalto HSM Server.
Step | Instructions | |||||||||
---|---|---|---|---|---|---|---|---|---|---|
1 |
Install the Gemalto HSM Appliance. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Installation Guide > SafeNet Network HSM Hardware Installation. |
|||||||||
2 |
Do the initial configuration of the Gemalto HSM Appliance and the Gemalto HSM Server. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Configuration Guide > follow from [Step 1] to [Step 6]. |
|||||||||
3 |
Run the " From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Configuration Guide > [Step 7] Create a trusted link and register Client and Appliance with each other. |
|||||||||
4 |
Complete the configuration of the Gemalto HSM Server to work with the Check Point Security Gateway / ClusterXL / Security Group:
|
You use the Gemalto HSM Client workstation to create a CA Certificate on the Gemalto HSM Server.
Check Point Security Gateway / ClusterXL / Scalable Platform Security Group uses this CA Certificate for HTTPS Inspection Feature on a Security Gateway that inspects traffic encrypted by the Secure Sockets Layer (SSL) protocol for malware or suspicious patterns. Synonym: SSL Inspection. Acronyms: HTTPSI, HTTPSi. to store and to access SSL keys on the Gemalto HSM Server.
|
Note - You can also use Check Point Security Gateway / ClusterXL / Scalable Platform Security Group with the installed HSM Client package as an HSM Client workstation. |
Step | Instructions | |
---|---|---|
1 |
Get this HSM Client package from the Gemalto vendor: 610-012382-017_SW_Client_HSM_6.2.2_RevA |
|
2 |
Install a Windows-based or Linux-based computer to use as a Gemalto HSM Client Workstation. |
|
3 |
Install the HSM Client package on the computer: From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Installation Guide > SafeNet HSM Client Software Installation. |
|
4 |
Establish a Trust Link between the Gemalto HSM Client Workstation and the Gemalto HSM Server. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Configuration Guide > [Step 7] Create a trusted link and register Client and Appliance with each other. On the Gemalto HSM Client Workstation, run in LunaCM:
|
Step | Instructions | ||||
---|---|---|---|---|---|
1 |
On the Gemalto HSM Client workstation, open a command prompt or a terminal window. |
||||
2 |
Use the " From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Utilities Reference Guide > Certificate Management Utility (CMU) > cmu generatekeypair. Example:
|
||||
3 |
When prompted, enter the password for the partition on Gemalto HSM Server (you configured it in Step 2 of 5: Configuring the Gemalto HSM Server to Work with a Check Point Security Gateway / ClusterXL / Scalable Platform Security Group). Example:
|
||||
4 |
Select the RSA mechanism by entering the corresponding number:
|
||||
5 |
View the handles of the key pair you created. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Utilities Reference Guide > Certificate Management Utility (CMU) > cmu list.
Example output:
|
||||
6 |
Use the handle numbers from the previous step to create the CA certificate. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Utilities Reference Guide > Certificate Management Utility (CMU) > cmu selfsigncertificate Example:
|
||||
7 |
View the handles of the CA certificate you created.
Example output:
|
||||
8 |
Export the CA certificate to a file. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Utilities Reference Guide > Certificate Management Utility (CMU) > cmu export
|
This step has three sub-steps.
|
Important:
|
Step | Instructions | |||
---|---|---|---|---|
1 |
In SmartConsole Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on., enable and configure the HTTPS Inspection. See the R81 Security Management Administration Guide > Chapter HTTPS Inspection. |
|||
2 |
On the Security Gateway / each Cluster Member / Security Group, disable the HSM in the
|
|||
3 |
In SmartConsole, install the applicable Access Control Policy on the Security Gateway / ClusterXL object. |
|||
4 |
Make sure that HTTPS Inspection works correctly without the HSM Server:
|
|
Important:
|
|
Notes:
|
Procedure for a Security Gateway / ClusterXL:
Step | Instructions | |||
---|---|---|---|---|
1 |
Open the Gemalto HSM Client package you received from Gemalto: 610-012382-017_SW_Client_HSM_6.2.2_RevA Go to this directory: |
|||
2 |
Install the HSM Client package. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Installation Guide > SafeNet HSM Client Software Installation. |
|||
3 |
In the Expert mode, copy the libCryptoki2.so file to the /usr/lib/hsm_client/ directory:
|
|||
4 |
Establish a Trust Link between the Gemalto HSM Client on the Security Gateway / each Cluster Member and the Gemalto HSM Server. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Configuration Guide > [Step 7] Create a trusted link and register Client and Appliance with each other. On the Security Gateway / each Cluster Member, run in LunaCM:
|
|||
5 |
Examine the partition access on the Security Gateway / each Cluster Member:
|
Procedure for a Scalable Platform Security Group:
Step | Instructions | |||
---|---|---|---|---|
1 |
Open the Gemalto HSM Client package you received from Gemalto: 610-012382-017_SW_Client_HSM_6.2.2_RevA |
|||
2 |
Transfer the software package to the Security Group to some directory. For example, create /var/log/HSM_Client/ on all Security Group Members:
|
|||
3 |
Connect to the command line on the Security Group. |
|||
4 |
Log in to the Expert mode. |
|||
5 |
Extract the Gemalto HSM Client package:
|
|||
6 |
Install the Gemalto HSM Client packages on all Security Group Members:
|
|||
7 |
Establish a Trust Link between the Gemalto HSM Client on the Security Group and the Gemalto HSM Server. From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Configuration Guide > [Step 7] Create a trusted link and register Client and Appliance with each other. On the Security Group, run in LunaCM:
|
|||
8 |
Examine the partition access on the Security Group:
|
|
Important:
|
|
Notes:
|
Step | Instructions | ||||||
---|---|---|---|---|---|---|---|
1 |
Connect to the command line on the Security Gateway / each Cluster Member / Scalable Platform Security Group. |
||||||
2 |
Log in to the Expert mode. |
||||||
3 |
Back up the
|
||||||
4 |
Edit the
|
||||||
5 |
Configure the required values for these attributes:
|
||||||
|
Example: Copy
|
||||||
6 |
Apply the new configuration.
|
||||||
7 |
Make sure that the Security Gateway / each Cluster Member / Security Group can connect to the HSM Server and that HTTPS Inspection is activated successfully on the outbound traffic. Run this command:
The output must show:
For more information, see Monitoring HTTPS Inspection with HSM in CLI. |
||||||
8 |
Make that HTTPS Inspection is activated successfully on the outbound traffic:
|
Additional Actions for a Gemalto HSM Server
If you need to establish new Trust Link between a Check Point Security Gateway and an HSM Server, you have to delete the current Trust Link.
Use Case: When you replace or reconfigure a Check Point Security Gateway, or an HSM Server.
Step | Instructions | ||||
---|---|---|---|---|---|
1 |
Delete the current Trust Link on the Check Point Security Gateway / each Cluster Member / Scalable Platform Security Group:
|
||||
2 |
Delete the current Trust Link on the HSM Appliance:
|
|
Note - For more information, see the Gemalto SafeNet Network HSM 6.2.2 Product Documentation. |
Step | Instructions | |
---|---|---|
1 |
Connect to the HSM Appliance over SSH. |
|
2 |
Examine all the configured interfaces:
|
|
3 |
Add a new interface:
|
|
4 |
Enable Network Trust Link Service (NTLS) on all the interfaces. |
|
Note - For more information, see the Gemalto SafeNet Network HSM 6.2.2 Product Documentation > LunaSH Command Reference Guide > LunaSH Commands. |