Creating a SmartLSM Small Office Appliance Cluster
Make sure you have a SmartLSM cluster Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. Security Profile defined in SmartConsole
Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. before you create a Small Office Appliance cluster in SmartProvisioning
Check Point Software Blade on a Management Server (the actual name is "Provisioning") that manages large-scale deployments of Check Point Security Gateways using configuration profiles. Synonyms: Large-Scale Management, SmartLSM, LSM..

-
In the navigation tree, click Devices.
-
From the Launch File > New > Small Office Appliance Cluster.
, selectThe SmartLSM Security Cluster General Properties page opens.
-
Enter a unique Cluster Name Prefix (Suffix is optional).
The SmartLSM Security Cluster name is:
<prefix>cluster<suffix>
. -
In Cluster Main IP Address, enter the real external virtual IP address for your actual gateway cluster.
-
Click Next.
-
Configure these settings:
-
Hardware - Select the gateway hardware version.
-
Version - Select the firmware version for the device.
-
Security Profile - Select the SmartLSM Cluster Profile that was created in SmartConsole.
-
Provisioning - Select Enable Provisioning to enable the management of this gateway by provisioning configurations:
-
No Provisioning Profile - Select to enable provisioning but not yet assign a specific profile.
-
Provisioning Profile - Select to assign to this gateway from the drop-down list.
-
-
Click Next
The Cluster Names page opens.
The names of the cluster members are shown with the configured prefix.
-
Click Next.
The More Information page opens.
-
Click Edit to override the settings of the template topology on each of the interfaces. For example, select WAN and click Edit.
The interface's window opens:
-
In IP Address Override, enter the actual network IP address to override the template Network address.
-
Click OK and do this procedure again for all the interfaces.
-
Click Next.
-
-
Select a member and click Initialize:
-
Enter the trusted communication (SIC
Secure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server.) details.
Click OK.
-
Do this again for the second member.
-
Click Next.
-
-
Select how to create a VPN certificate:
-
For a VPN certificate from the Internal Check Point CA, select I wish to create a VPN Certificate from the Internal CA.
-
For a VPN certificate from a third party CA (for example, if your organization already has certificates from an external CA for other devices), clear this checkbox and request the certificate from the appropriate CA server.
-
-
Select Edit SmartLSM cluster properties after creation to work with the newly created object
-
Click Finish.
After the wizard finishes, the SIC initialization takes a few minutes to complete. When it completes, you can see the cluster object and its two members. Double-click the cluster object to see that the topology is configured with the actual addresses.
On each Small Office Appliance, open the WebUI Home > Security Management page and click Fetch Policy to manually pull the policy immediately. Alternatively, the appliance connects to the Security Management Server Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. at predefined periodic intervals to pull the policy.