Upgrading ElasticXL Environment from R82 to R82.10 - VSNext mode
This section describes the steps for upgrading an ElasticXL environment with Zero Downtime - as a Multi-Version Cluster (MVC).
This procedure supports only this upgrade path for an ElasticXL Security Group:
|
Source Version and Mode |
Target Version and Mode |
|---|---|
|
R82 in the VSNext mode |
R82.10 in the VSNext mode |
|
|
Important:
|
|
|
Important Notes for Security Groups:
|
Required software packages:
Download the required software packages from sk183506:
-
The required CPUSE Deployment Agent.
-
The required Take of the Jumbo Hotfix Accumulator for the current version.
-
The R82.10 Upgrade Package for Scalable Platforms.
Workflow:
-
On the Management Server - Upgrade to the required version that can manage an R82.10 Security Group (see sk113113).
-
On the Management Server - Change the software version in the object of each Virtual Gateway.
-
On the Management Server - Prepare the policy package for the object of each Virtual Gateway.
-
On the Security Group - Install the required CPUSE Deployment Agent package for the Security Group.
-
On the Security Group - Install the required Jumbo Hotfix Accumulator for the current version (using two logical groups of Security Group Members).
-
On the Security Group - Upgrade to R82.10 (using two logical groups of Security Group Members).
-
On the Security Group - Make sure the upgrade was successful.
Procedure:
Upgrade the Security Management Server / Multi-Domain Security Management Server to the required version that can manage an R82.10 Security Group.
See the R82.10 Release Notes or sk113113.
|
|
Important - You must perform this step for each Security Gateway object that represents each Virtual Gateway. |
|
Step |
Instructions |
|---|---|
|
A |
Connect with SmartConsole to the Management Server that manages the Virtual Gateway. |
|
B |
From the left navigation panel, click Gateways & Servers. |
|
C |
Double-click the Security Gateway object. |
|
D |
In the left panel, click the General Properties page. |
|
E |
Change the version to R82.10. |
|
F |
Click OK. |
|
G |
Publish the SmartConsole session. |
|
|
Important:
|
|
|
Note - See the Check Point Management API Reference (at the top, select the correct version) . You can run the required API command on the Management Server in several ways (locally in CLI, remotely in CLI, remotely over HTTP). The steps below show only the local command " |
|
Step |
Instructions |
|
|---|---|---|
|
A |
Connect to the command line on the Management Server. |
|
|
B |
Log in to the Expert mode. |
|
|
C |
Run this API command to prepare the policy package for the installation: Note - On a Multi-Domain Security Management Server, enter the IP address of the correct Domain Management Server.
|
|
|
Note - The SMO Image Cloning feature automatically clones all the required software packages to the Security Group Members during their boot. When you install or remove software packages gradually on Security Group Members, it is necessary to disable this feature, so that after a reboot the updated Security Group Members do not clone the software packages from the existing non-updated Security Group Members. Note - Enable the SMO Image Cloning feature only before you need to add a new Security Group Member and disable it immediately after it joins the Security Group. |
|
Step |
Instructions |
|
|---|---|---|
|
A |
Connect to the command line on the Security Group. |
|
|
B |
If your default shell is the Expert mode, then go to Gaia gClish:
|
|
|
C |
Examine the state of the SMO Image Cloning feature:
|
|
|
D |
Disable the SMO Image Cloning feature, if it is enabled:
|
|
|
E |
Examine the state of the SMO Image Cloning feature again:
|
|
|
Important - You must do this step even if you upgrade again after a rollback procedure on the Security Group. |
|
Step |
Instructions |
||
|---|---|---|---|
|
A |
Transfer the required CPUSE Deployment Agent package (from sk92449) to the Security Group (into some directory, for example |
||
|
B |
Connect to the command line on the Security Group. |
||
|
C |
If your default shell is the Expert mode, then go to Gaia gClish:
|
||
|
D |
Upgrade the CPUSE Deployment Agent:
Example:
|
||
|
E |
Make sure all Security Group Members have the same build of the CPUSE Deployment Agent:
|
|
|
Important:
|
|
Step |
Instructions |
|---|---|
|
A |
See the required Jumbo Hotfix Accumulator in sk183506. |
|
B |
Follow the Jumbo Hotfix Accumulator installation instructions in the R82 Scalable Platforms Administration Guide > Chapter "Common Procedures for Scalable Platforms" > Section "Installing and Uninstalling a Hotfix on Security Group Members". |
|
Step |
Instructions |
||
|---|---|---|---|
|
A |
Make sure you have the applicable CPUSE Offline package: R82.10 Upgrade Package for Scalable Platforms |
||
|
B |
Transfer the CPUSE Offline package to the Security Group (into some directory, for example |
||
|
C |
Connect to the command line on the Security Group. |
||
|
D |
If your default shell is the Expert mode (
|
||
|
E |
If you enabled MDPS (sk138672) on the Security Group, then go to the Management Plane:
|
||
|
F |
Import the CPUSE Offline package from the hard disk:
Example:
|
||
|
G |
Show the imported CPUSE packages:
|
||
|
H |
Make sure the imported CPUSE package can be installed on this Security Group:
Example: |
|
Step |
Instructions |
||||||
|---|---|---|---|---|---|---|---|
|
A |
Connect in one of these ways:
|
||||||
|
B |
Go to the context of one of the Security Group Members in the Logical Group "A":
Example:
|
||||||
|
C |
If your default shell is Gaia gClish (
|
||||||
|
D |
Go to the context of the Virtual Gateway with ID 0 (VS0):
|
||||||
|
E |
Set the Security Group Members in the Logical Group "A" to the state "
Syntax:
Example:
|
||||||
|
F |
Examine the state of the Security Group Members:
The state of the Security Group Members must be:
|
You are still working in the Expert mode in the Logical Group "A".
|
Step |
Instructions |
|||
|---|---|---|---|---|
|
A |
Go from the Expert mode to Gaia gClish:
|
|||
|
B |
Go to the context of the Virtual Gateway with ID 0 (VS0):
|
|||
|
C |
Upgrade the Security Group Members in the Logical Group "A":
Example: |
|||
|
D |
Go from Gaia gClish to the Expert mode:
|
|||
|
E |
Monitor the Security Group Members in the Logical Group "A" until they boot:
The state of the Security Group Members must be:
|
|||
|
F |
Make sure each Virtual Gateway installed its policy (Security Group Members pulled their policy automatically from the Management Server during their boot):
|
You are still working in the Expert mode in the Logical Group "A".
|
Step |
Instructions |
||||||
|---|---|---|---|---|---|---|---|
|
A |
Go to the context of the Virtual Gateway with ID 0 (VS0):
|
||||||
|
B |
Set the Security Group Members in the Logical Group "A" to the state "
Syntax:
Example:
|
||||||
|
C |
Examine the state of the Security Group Members:
The state of the Security Group Members must be:
|
|
|
Note - Because of the Multi-Version Cluster (MVC) mechanism design, the upgraded Security Group Members also process the traffic. |
|
|
Important: When the Security Group works in the VSX mode, the state of the upgraded Security Group Members may remain "DOWN" because the Critical Device " This issue may occur if before the upgrade you configured static CoreXL Affinity with the command " Follow these workaround steps:
|
|
|
Important - In the Multi-Version Cluster mode, it is not necessary to choose all of the remaining Security Group Members that you did not upgrade yet. You can repeat the previous steps for different logical groups of Security Group Members until you upgrade all Security Group Members in the Security Group. |
|
Step |
Instructions |
||||||
|---|---|---|---|---|---|---|---|
|
A |
Connect in one of these ways:
|
||||||
|
B |
Go to the context of one of the Security Group Members in the Logical Group "A":
Example:
|
||||||
|
C |
If your default shell is Gaia gClish (
|
||||||
|
D |
Go to the context of the Virtual Gateway with ID 0 (VS0):
|
||||||
|
E |
Set the Security Group Members in the Logical Group "A" to the state "
Syntax:
Example:
|
|
|
Note - At this time, the Security Group runs only with the upgraded Security Group Members. You can perform the required tests on your network to make sure the new version works as expected. If there are any issues:
|
You are still working in the Expert mode in the Logical Group "B".
|
Step |
Instructions |
|||
|---|---|---|---|---|
|
A |
Go to the context of one of the Security Group Members in the Logical Group "B":
Example:
|
|||
|
B |
Go from the Expert mode to Gaia gClish:
|
|||
|
C |
Go to the context of the Virtual Gateway with ID 0 (VS0):
|
|||
|
D |
Upgrade the Security Group Members in the Logical Group "B":
Example: |
|||
|
E |
Go from Gaia gClish to the Expert mode:
|
|||
|
F |
Monitor the Security Group Members in the Logical Group "B" until they boot:
The state of the Security Group Members must be:
|
You are still working in the Expert mode in the Logical Group "B".
|
Step |
Instructions |
||||||
|---|---|---|---|---|---|---|---|
|
A |
Go to the context of the Virtual Gateway with ID 0 (VS0):
|
||||||
|
B |
Set the Security Group Members in the Logical Group "B" to the state "
Syntax:
Example:
|
|
Step |
Instructions |
|
|---|---|---|
|
A |
Connect to the command line on the Security Group. |
|
|
B |
If your default shell is Gaia gClish (
|
|
|
C |
Examine the state of the Security Group Members:
Each Security Group Member must have the state "ACTIVE". |
|
|
D |
Run this command (see hcp):
|