How To Upgrade a Management Server February 2003 1. Introduction 1.1. General This document describes the upgrade procedure of Check Point’s Management Server, from 4.1 (or a pre NG FP3 version), to NG FP3. Check Point’s Management Server upgrade consists of two main phases: • Changing the Management Server software. • Upgrading the server database format to the one required by the new software. This document describes in detail the alternative methods of upgrading Check Point’s Management Server to NG FP3, allowing you to select the method best to fit your needs. This document focuses on an upgrade procedure using a duplicate machine. 1.2. Terms 1. Production machine – The production Management Server you wish to upgrade. 2. Duplicate machine – A new machine, which, at the end of the process, will be identical to the production machine, and will be upgraded to NG FP3. 1.3. Assumptions This document assumes that your duplicate machine has the same IP/hostname and the same OS as the production machine. Otherwise, refer to the relevant appendices. 1.4. Basics There are two basic methods of upgrading Check Point’s Management Server: • Upgrade on the actual production management machine. • Upgrade on a duplicate machine, while the production Management Server is fully operational. Testing the full functionality of the new Management 1 Server, with the ability to either switch to new upgraded machine or copy the upgraded environment onto the production machine. Upgrade on the production management is done by choosing upgrade when installing NG FP3 software from the Check Point’s CD. Upgrade on a duplicate machine can be done in two ways that will be explained thoroughly throughout this document. Cases in which the machines have different IP addresses, host names or Operation Systems, will also be addressed. 1.5. Common Upgrade Scenarios on a Duplicate Machine There are two common scenarios for upgrading Check Point’s Management Server on a duplicate machine (Manual Upgrade is the recommended path, though the second method will yield with the same results): 1.5.1. Manual Upgrade 1. Install the Check Point NG FP3 Management Server software on the duplicate machine. 2. Copy the database files from the production Management Server onto the newly installed server. 3. Perform a manual upgrade to translate the database files into the NG FP3 format. 1.5.2. Replication and Upgrade 1. Replicate the production Management Server on the duplicate machine. 2. Install the NG FP3 Management Server software on the duplicate machine from the Check Point CD choosing the Upgrade option. The following sections describe each of the scenarios listed in 1.5 above in detail. You can choose from either of these scenarios. 2. Manual Upgrade in Details 2.1. When the production machine Management Server software version is 4.1 1. Run the PreUpgrade_Verifier tool on the production machine to detect potential problems that need to be addressed prior to upgrading. This is a read only tool which will not change the database. 2. Install the Check Point NG FP3 software on the duplicate machine. Take extra care to install the exact same products that are installed on the production machine. There is no need to install a license at this stage as each new NG FP3 machine has a built- in evaluation license for 15 days. 2 3. Run the Manual Upgrade command on the new machine to change the database format into NG FP3 format: 3.1. Download the upgrade script from SecureKnowledge solution #SK11635. 3.2. Decompress the downloaded file to receive a structure of directories. Note: On Windows platforms, the manual upgrade script should be installed on the same disk drive as the Management Server installation. 3.3. Stop Check Point software on both machines by executing the cpstop command. 3.4. Copy the following files from the production machine to the 4.1 subdirectory on the duplicate machine: • $FWDIR/conf objects.C rulebases.fws fwauth.NDB* fgrulebases.fws (if exists) xlate.conf (if exists) aftpd.conf (if exists) smtp.conf (if exists) sync.conf (if exists) masters (if exists) clients (if exists) fwmusers (if exists) gui-clients (if exists) slapd.conf (if exists) serverkeys (if exists) product.conf (if exists) • $FWDIR/database InternalCA.DB (if exists) Note: In case your duplicate machine has an OS different from the duplicate machine, see Appendix B. 3.5. Restart the Check Point software on your production machine by executing the cpstart command to get it back into operation. 3.6. If $FWDIR/database/InternalCA.DB file exists, run fwm sic_reset on the duplicate machine. 3.7. Activate the Upgrade Script on the duplicate machine: • For UNIX platforms: upgrade.csh<upgrade_script_directory> FP3 • For Windows platforms: upgrade.bat <upgrade_script_directory> FP3; upgrade_script_directory is the path of the upgrade script, created after decompressing the script file. 3 4. Run the PostUpgrade_Verifier tool on the duplicate machine to validate integrity of the upgraded environment. 5. Use the Check Point Configuration Tool to initialize the Internal CA. 6. Disconnect the production machine from the network and connect the duplicate machine. 7. Test your duplicate machine according to the instructions listed under Appendix E. 8. If the duplicate machine will function as the production machine, go to step 12. 9. If duplicate machine works as expected, backup the production machine (backup the files as defined in sub-section 3.4). 10. Upgrade the production machine using the process defined above. 11. Disconnect new machine; connect the production machine. 12. Test your production machine according to Appendix E. 13. Done. 2.2. When the production machine Management Server software version is NG 1. Run the PreUpgrade_Verifier tool on the production machine to detect potential problems that need to be addressed prior to upgrade. This is a read only tool, which will not change the database. 2. Install the Check Point NG FP3 software on a duplicate machine. Take extra care to install the exact same products installed on the production machine. There is no need to install a license at this stage as each new NG FP3 machine has a built- in evaluation license for 15 days. 3. In cases where your duplicate machine has a different IP/hostname, see Appendix A. If your duplicate machine has a different OS, see Appendix B. 4. Stop Check Point software on both machines by executing the cpstop command. 5. Copy the following files to their corresponding destination on the duplicate machine: • • • $CPDIR/conf 1. cp.license 2. sic_cert.p12 $CPDIR/database 1. *.C $FWDIR/conf 1. lists/* 2. *.fws 3. *.conf (except for components_reg.conf fwrl.conf, cpmad_rulebase.conf) 4. fwmusers 4 • 5. *.C (except for mv_doc.C, classes.C, scheme.C, fields.C, tables.C, rtmclasses.C, default_objects.C) 6. db_versions/Database/versioning_db.fws 7. gui-clients 8. vpe/* 9. XML/* 10. cpsc/* 11. I* 12. crls/* 13. db_versions/repository/* 14. fwauth.NDB. 15. DiapCpdList.NDB 16. DiapFwmList.NDB 17. DAIP_RS_Database.NDB 18. robo-gateways.NDB 19. robo-control.NDB 20. robo-ike.NDB $FWDIR/log 1. *.* 6. Start the Check Point software on your production machine by executing the cpstart command to get it back into operation. 7. Activate the command $FWDIR/bin/fwm up <fpx> fp3 on the duplicate machine, where fpx is the current version of the production Management Server. For example: if the server version is NG FP1 run: fwm up fp1 fp3. 8. Run the PostUpgrade_Verifier tool on duplicate machine to validate the integrity of the upgraded environment. 9. Disconnect the production machine from the network and connect the duplicate machine. 10. Test your upgraded duplicate machine according to the instructions listed in Appendix E. 11. If the new duplicate machine will function as the production machine, go to step 14. 12. If the duplicate machine works as expected, backup the production machine. 13. Upgrade production machine: • Uninstall Check Point software. • Go over steps 2-10. 14. Disconnect the duplicate machine; connect the production machine. 15. Test your production machine according to Appendix E. 16. Done. 5 3. Replication and Upgrade 3.1. When the production machine Management Server software version is 4.1 1. Run the PreUpgrade_Verifier tool on the production machine to detect potential problems that need to be addressed prior to upgrade. This it is a read only tool with no effect on the database. 2. Install the 4.1 Check Point Management Server software on the duplicate machine. Take extra care to install the exact same products installed on the production machine. Put appropriate licenses on the duplicate machine. 3. Stop Check Point software on both machines by executing the cpstop command. 4. Copy the following files from the $FWDIR/conf directory of the production machine to $FWDIR/conf directory of the duplicate machine: • $FWDIR/conf objects.C rulebases.fws fwauth.NDB* fgrulebases.fws (if exists) xlate.conf (if exists) aftpd.conf (if exists) smtp.conf (if exists) sync.conf (if exists) masters (if exists) clients (if exists) fwmusers (if exists) gui-clients (if exists) slapd.conf (if exists) serverkeys (if exists) product.conf (if exists) • $FWDIR/database InternalCA.DB (if exists) Note: In case your duplicate machine has a different OS, see Appendix B. 5. Start Check Point software on your production machine by executing the cpstart command. 6. In order to make sure that the replicated Management Server has been successfully upgraded as expected, try to push policy on the modules, receive logs and check the module’s status. 7. Install the Check Point NG FP3 software on the duplicate machine using the NG FP3 CD, and select the upgrade option to automatically upgrade of the software and the database format. 8. Run the PostUpgrade_Verifier tool on the duplicate machine to validate integrity of the upgraded environment. 6 9. Disconnect the production machine from the network and connect the duplicate machine. 10. Test your upgraded machine according to the instructions listed under Appendix E. 11. If the duplicate machine will function as the production machine, go to step 15. 12. If duplicate machine works as expected, backup the production machine. 17. Upgrade the production machine: • Uninstall Check Point software. • Go over steps 2-10. 13. Disconnect the duplicate machine; reconnect the production machine. 14. Test your production machine according to Appendix E. 15. Done. 3.2. When the production machine Management Server software version is NG 1. Run the PreUpgrade_Verifier tool on the production machine to detect potential problems that need to be addressed prior to upgrade. This is a read only tool with no effect on the database. 2. Install the Check Point NG software on the duplicate machine. Take extra care to install the exact same FP (feature pack), hotfixes and products that are installed on the production server. Put the appropriate licenses on the duplicate machine. 3. If your duplicate machine has a different IP/hostname or has a different OS, See appendix A for different IP, and appendix B for a different OS. 4. Stop the Check Point software on both machines by executing the cpstop command. 5. Copy the following files from the production machine to their corresponding place on the duplicate machine: • • • $CPDIR/conf 1. cp.license 2. sic_cert.p12 $CPDIR/database 1. *.C $FWDIR/conf 1. lists/* 2. *.fws 3. *.conf (except for components_reg.conf fwrl.conf, cpmad_rulebase.conf) 4. fwmusers 5. masters 6. *.C (except for mv_doc.C, classes.C, scheme.C, fields.C, tables.C, rtmclasses.C, default_objects.C) 7 7. db_versions/Database/versioning_db.fws 8. gui-clients 9. vpe/* 10. XML/* 11. cpsc/* 12. I* 13. crls/* 14. db_versions/repository/* 15. fwauth.NDB. 16. DiapCpdList.NDB 17. DiapFwmList.NDB 18. DAIP_RS_Database.NDB 19. robo-gateways.NDB 20. robo-control.NDB 21. robo-ike.NDB • $FWDIR/log 1. *.* 6. Start the Check Point software on your production machine by executing the cpstart command. 7. If they exist, Remove the $FWDIR/conf/CPMILinksMgr.* and $FWDIR/conf/applications.*. 8. Copy the SIC key from the Check Point registry on the production machine to the registry on the duplicate machine. See appendix D for a detailed description of copying Check Point’s SIC regis try entries. 9. Install Check Point NG FP3 software on the duplicate machine using the NG FP3 CD, and select the Upgrade Option to automatically upgrade the software and database format. 10. Run the PreUpgrade_Verifier tool on the duplicate machine to fix potential upgrade problems that need to be addressed prior to upgrade. This is a read only tool, which will not change the database. 11. Disconnect the production machine from the network and connect the duplicate machine. 12. Test your upgraded machine according to the instructions listed under Appendix E. 13. If the duplicate machine will function as the production machine, go to step 15. 14. If the duplicate machine works as expected, backup the production machine. 18. Upgrade the production machine: • Uninstall Check Point software. • Go over steps 2-10. 15. Disconnect the duplicate machine; connect the production machine. 16. Test your production machine according to Appendix E. 17. Done. 8 Appendix A - Duplicate machine with a different IP address or hostname This appendix specifies the steps that should be taken in case the duplicate machine has a different IP address or host name. 1. Before stopping the production machine, add rules that allow the new duplicate machine to access the modules it is managing: • Create a Management Object that includes the duplicate machine’s IP address: Ø When the production machine Management Server software version is 4.1 – From the Policy Editor: Manage > Network Objects > New…> Workstation and mark it as a Management Station. Ø When the production machine Management Server software version is NG – From the Policy Editor: Manage > Network Objects > New…> Check Point > Host/Gateway and mark it as Secondary Management. Note: If this object already exists, make sure it is marked as a Management. Create a rule, on the production machine, which allows FireWall-1 and CPD (NG only) services from the above object you have just created, to go to all managed gateways. • Install the rule on all managed gateways. • Delete the rule once you have completed this process. Continue with the instructions given under section 2.2 or 3.2. Do not copy the $CPDIR/conf/cp.license file. Update the primary management object on the duplicate machine. 3.1. Start the Check Point Management Server on the duplicate machine by applying the cpstart command. 3.2. Connect to the SmartDashboard (Policy Editor). 3.3. If a new primary management object was created, its IP address and topology should be configured to match the duplicate machine. If the same primary object exists, edit its IP address and topology to match its new configuration. 3.4. Replace all occurrences of the production object with the newly created duplicate machine object. You can find all occurrences with the Where Used… utility (right-click on the object to choose the command). If a new primary object was created then both objects now have the same SIC name. This must be corrected: 4.1. Close the SmartDashboard (Policy Editor). 4.2. Use Check Point Database Tool or the dbedit command to clear the SIC name from the old object. The attribute is called sic_name; the object is in the network_objects table. After the update it should look like this “:sic_name ()”. If you would like to delete the production management object: • 2. 3. 4. 5. 9 6. 7. 8. 9. 5.1. Stop the duplicate machine by running the cpstop command. Make the following change in $FWDIR/conf/objects_5_0.C: 5.1.1. Find the production management’s object. 5.1.2. Change the attribute Deleteable (if exists) to true (under AdminInfo). 5.1.3. Save the changes. 5.2. Start the Management Server by running the cpstart command. 5.3. Connect to the SmartDashboard (Policy Editor) and delete the production management object. This will revoke all of Check Point’s internal CA IKE certificates for that object. If the $FWDIR/conf/mgmtha* where created: 6.1. Stop the duplicate machine by running the command cpstop. 6.2. Delete $FWDIR/conf/mgmtha* files. 6.3. Start the Management Server by running the cpstart command. Use the Check Point Configuration Tool by running the cpconfig commmand > Certificate Authority to set the FQDN (You should enter the FQDN of the duplicate machine). Exceptions: If the gateways managed by this Management Server are involved in VPN with external entities, and the authentication of these VPN connections is based on ICA certificates, then the external gateways will use the distribution point on these certificates to access the relevant CRL. There are two alternatives for succeeding after the upgrade procedure: 7.1. Change the FQDN in the ICA to the duplicate machine’s FQDN, and reassign new certificates to all gateways and users . 7.2. Update the DNS so that the production’s FQDN will now be resolved to the duplicate machine. After doing this, the production machine’s FQDN should be changed to avoid ambiguity. Adjust masters and log servers for each module before installing on it a policy. You should add the duplicate machine’s object to the ‘masters list’, and if needed, add it to the ‘log servers list’ on each module. Re-establish trust with any module by using the putkey command (for 4.1 modules). Appendix B - Duplicate machine using an OS different than the production machine This appendix specifies the steps that should be taken in case the duplicate machine is using an OS that differs from the production machine. When the production machine Management Server software is 4.1 1. See Appendix C for an explanation about copying NDB files. 10 2. When moving from a Windows platform to a UNIX like platform, run the dos2unix command on all the files you have copied, except fwauth.NDB and serverkeys. When the production machine Management Server software is NG 1. Clear the log files on the production machine, by applying $FWDIR/bin/fw logswitch. 2. Copy the files as specified in 3.2. If the production machine platform is Windows and the duplicate machine is Unix, copy the *.NDB files according to the explanation in Appendix C. 3. If the production machine platform is Windows and the duplicate machine is Unix, run the dos2unix command on all the files listed under 3.2, except for: 1. 2. 3. 4. 5. 6. 7. 8. 9. $FWDIR/conf/I* $FWDIR/conf/crls/* $CPDIR/conf/sic_cert.p12 $FWDIR/conf/ fwauth.NDB. $FWDIR/conf/DiapCpdList.NDB $FWDIR/conf/DiapFwmList.NDB $FWDIR/conf/DAIP_RS_Database.NDB $FWDIR/conf/robo- gateways.NDB $FWDIR/conf/robo-control.NDB 10. $FWDIR/conf/robo- ike.NDB 11. $FWDIR/conf/InternalCA.NDB 4. If it exists, remove $FWDIR/conf/CPMILinksMgr.* 5. Run the $FWDIR/bin/cpca_dbutil d2u command. 6. Copy the SIC key from the Check Point registry on the production machine to the registry on the duplicate machine, see appendix D for details. Appendix C – How to copy NDB files (Windows to Unix) In Windows platforms the *.NDB files are pointers to another file: 1. Open the .NDB file with a text editor. 2. Find the number of the link which appears after the string __FWNTLINK 3. Copy the .NDB file which includes that number in its NDB suffix, and rename its NDB suffix by removing that number on the duplicate machine. For example: • The file fwauth.NDB contains the line __FWNTLINK3 • Copy the file fwauth.NDB3 from the production machine to the duplicate machine and call it fwauth.NDB 11 Appendix D – Copy the ‘SIC’ registry key 1. Run the following command on the production machine: $CPDIR/bin/cpprod_util CPPROD_GetValue SIC 2. Run the following command on the duplicate machine: $CPDIR/bin/cpprod_util CPPROD_SetValue SIC output of the above command> 1 3. Run the following command on the production machine: $CPDIR/bin/cpprod_util CPPROD_GetValue SIC 4. Run the following command on the duplicate machine: $CPDIR/bin/cpprod_util CPPROD_SetValue SIC <the output of the above command> 1. 5. Run the following command on the production machine: $CPDIR/bin/cpprod_util CPPROD_GetValue SIC 6. Run the following command on the duplicate machine: $CPDIR/bin/cpprod_util CPPROD_SetValue SIC output of the above command> 1. 7. Run the following command on the production machine: $CPDIR/bin/cpprod_util CPPROD_GetValue SIC 8. Run the following command on the duplicate machine: $CPDIR/bin/cpprod_util CPPROD_SetValue SIC output of the above command> 1 9. Run the following command on the duplicate machine: $CPDIR/bin/cpprod_util CPPROD_GetCpdir. 10. Run the following command on the duplicate machine: $CPDIR/bin/cpprod_util CPPROD_SetValue SIC output of the last command>/sic_cert.p12 1 ICAdn 1. ICAdn 1 <the HasCertificate 1. HasCertificate 4 MySICname 1. MySICname 1 <the ICAState 1. ICAState 4 <the CertPath 1 <the Appendix E – Testing your upgraded machine 1. Start the Check Point software by applying the cpstart command. 2. Open your SmartDashboard client. 3. Make sure all the rule bases, network objects, resources, servers, users and administrators and VPN settings are properly set. 4. Test SIC communication with the modules. 5. Install policy on the modules. 6. Open the SmartView Status. Make sure each module has the proper status. 7. Try to fetch policy from each of your modules by running the fw fetch <management IP> command. 12 Notes and limitations: 1. If both Management Servers are used simultaneously, and changes are done to both, these changes cannot be merged automatically. To synchronize them you will need to manually apply all changes to both. 2. Special care should be given to operations that involve Check Point internal CA modifications, like issuing or revoking certificates. These changes cannot be merged, even manually, and will result in different CA databases on both servers. For example, revoking a certificate on one Management Server will add it to the CRL on that Management Server, but there is no way to add this certificate to the other CRL. It is highly recommended not to perform any such changes as long as both Management Servers are in use. 13
© Copyright 2024