Checkpoint SMS Migration Process
Checkpoint SMS Migration Process
Desired Result:
Migrate from existing SMS to a brand new SMS. Changing the IP (LAN and External), Linux
Hostname and SMS name within SmartDashboard and ICA.
The new SMS in this example is built with a different hostname to the old one.
Process:
1. Create separate dummy node objects for both the LAN IP and the Internet/NAT IP of the new SMS,
in the OLD SMS rule base. Also, add the static NAT IP to the LAN node and select to install on its
local gateway. Ensure the names used will not conflict with the actual name of the new SMS, anything
else can be used here, E.G MGT1-LAN MGT1-NAT. (Before creating a separate node object for
the NAT IP I was getting blocks in tracker)
2. Right click the node object for the LAN IP of the new SMS > More > Convert to Checkpoint Host.
Open the host object and enable the relevant management blades, match your current SMS object for
example. (I did this to ensure any implied rules specifically for management were applied to the IPs of
the new SMS) Dont establish SIC, its not required
3. Push to all Gateways and close SmartDashboard
4. Migrate export from the old SMS (Using latest upgrade tools)
5. Migrate import to the new SMS (Using latest upgrade tools)
6. Add the newly generated MGT license to the SMS, reflecting the LAN IP change
7. Connect to the new SMS using SmartDashboard
8. Change the previously created dummy objects IPs from the new SMS to the old SMS IPs (this
ensures the old SMS can communicate with the gateways in the event of requiring to roll back the
change and migrate gateways back to the old SMS)
9. Change the interface name, IP and topology of the old SMS object to reflect the new SMS details
10. Change the platform info of the old SMS object to reflect the new box platform OS
11. SSH to the new SMS and enter expert mode
12. Navigate to $FWDIR/conf
cd /$FWDIR/conf
13. Backup the database
cp objects_5_0.C objects_5_0.orig
14. Open objects_5_0.C in vi
vi objects_5_0.C
15. Use the search and replace function in vi to replace all instances of the old hostname with the new
one
:%s/oldHostname/newHostname
Exit VI with :wq
16. If you have created IKE certificates, remove them from the objects_5_0.C file. This command
string will do this and backup the file
cp $FWDIR/conf/objects_5_0.C /var/tmp/objects_5_0.C.old; awk 'BEGIN {c=0}; /:certificates \(\)/
{print;next}; /:certificates \(/ {c=1;print;next}; c>0 && /\(/ {c++}; c>0 && /\)/ {c--}; c<=0 {print}'
$FWDIR/conf/objects_5_0.C > /var/tmp/objects.new; cp /var/tmp/objects.new
$FWDIR/conf/objects_5_0.C
17. Destroy the Internal Certificate Authority
fwm sic_reset
18. Recreate the CA
cpconfig
Certificate Authority
19. Make sure it shows the new hostname here. If not, make sure you set the hostname correctly
20. After the CA is initialised, exit cpconfig
21. Reboot the SMS
22. Connect with SmartDashboard and make sure the SMS object name reflects the new hostname
24. SSH to the first gateway you need migrate
25. In Expert, navigate to the root directory
Cd /
26. Create a script that will run cpconfig, then unload the firewall policy straight after. This is a
precautionary measure to ensure you are not locked out of gateway after SIC is reset and default
policy is loaded.
Vi sic.bat
Type i to enter insert mode
The content of the file should read:
Cpconfig
Fw unloadlocal
Press escape to exit insert mode
Type :wq and hit enter to save and exit the file
27. Once the file is created, you need to make it executable
Chmod 777 sic.bat
28. Run the batch file
./sic.bat
29. Within cpconfig, select Secure Internal Communication, confirm you want to reset SIC, enter the
activation code and exit cpconfig. The changes are only applied upon exit!!
By using the script, you are ensuring that after SIC is reset and cpconfig is exited, an fw unloadlocal
command is run.
30. In SmartDashboard reset SIC on the corresponding gateway and click OK to close the gateway
properties window. A new certificate will be generated and can be viewed in the gateway objects
IPSec VPN tab
Now you need to open and close (click OK) for each gateway in SmartDashboard. This action
generates a new certificate from the ICA, otherwise verification will fail as not all gateways
have a certificate. If this does not generate a certificate for any reason, you can get around
this by manually generating a certificate with the Add button. Enter any nickname, click
Generate and click OK. This certificate can be removed later if required.
31. Push policy to the gateway that now has SIC with the new SMS.
32. I suggest repeating the above with one other gateway within the same VPN community first, to
ensure these sites can communicate. Ping the remote site and check SmartView Monitor for the
active VPN tunnel. If successful, repeat the SIC steps and push to all other gateways.
Remember you need to push to Edge and any applicable Appliance profiles to ensure the
policy is there next time these devices perform a pull. You may also need to HTTPS to any of
these devices to manually reset SIC and specify a new management IP if this has changed as a
result of the migration. For edge appliances or 1200 series appliances, you do not need to
script the SIC reset process, doing this from the WebUI will not cut you off. I cannot comment
for any other appliances.
Reference: