<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ansible Demo with R80.20 Gateways and Management in Ansible</title>
    <link>https://community.checkpoint.com/t5/Ansible/Ansible-Demo-with-R80-20-Gateways-and-Management/m-p/49262#M125</link>
    <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/6593"&gt;@Ryan_Darst&lt;/a&gt;&amp;nbsp;had originally created an Ansible Demo using R80.10 management and R77.30 gateways in AWS. I upgraded both the management and gateways in this demo to R80.20. This required changing Ryan's original demo a little bit. Herein, I provide the changes I made to make this work.&lt;/P&gt;
&lt;P&gt;What this requires:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;An Amazon Web Services account&lt;/LI&gt;
&lt;LI&gt;An R80.20 Manager (I built it in AWS, but I assume you can use an on-premise one as well)&lt;/LI&gt;
&lt;LI&gt;Ryan's &lt;A href="https://community.checkpoint.com/t5/Developers-API-CLI/CheckMates-Aug15-Demos-zip/td-p/38886" target="_self"&gt;original demo scripts&lt;/A&gt;, which include the instructions for building the demo environment.&lt;/LI&gt;
&lt;LI&gt;The attached&amp;nbsp;CheckMates-aws-vpc-create.yml file, which replaces the one included in Ryan's demo.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The complete changes made include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Using R80.20 images for gateways instead of R77.30&lt;/LI&gt;
&lt;LI&gt;Changed a few messages to say “CloudGuard” instead of vSEC&lt;/LI&gt;
&lt;LI&gt;Using c5 instance types instead of c4 instances&lt;/LI&gt;
&lt;LI&gt;Changes to the Security Groups applied to the instances&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;One change I highly recommend you make to vars_ohio.yml is to use blink_config to provision the Security Gateways. This reduces the amount of time it takes for the gateway instances to become viable. You can use something like the following:&lt;/P&gt;
&lt;PRE&gt;gateway_cluster_member=false&amp;amp;ftw_sic_key=vpn12345&amp;amp;upload_info=true&amp;amp;download_info=true&amp;amp;admin_hash=&amp;lt;password_hash&amp;gt;' ; shutdown -r now;&lt;/PRE&gt;
&lt;P&gt;Replace &amp;lt;password-hash&amp;gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Using blink_config to provision the gateways
&lt;UL&gt;
&lt;LI&gt;This is actually a change to vars_ohio.yml, replace the config_system line with something like:&lt;/LI&gt;
&lt;LI&gt;blink_config -s 'gateway_cluster_member=false&amp;amp;ftw_sic_key=vpn12345&amp;amp;upload_info=true&amp;amp;download_info=true&amp;amp;admin_hash=$1$BW4mjz6R$80jxV2CLBVoFTI06AiQmu.' ; shutdown -r now;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;One known issue:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;At least for me, the CloudGuard autoprovisioning service isn't starting automatically. You can manually "start" it using the command &lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;service autoprovision restart&lt;/STRONG&gt;&lt;/FONT&gt; from expert mode.&lt;/LI&gt;
&lt;/UL&gt;</description>
    <pubDate>Sat, 30 Mar 2019 00:39:02 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-03-30T00:39:02Z</dc:date>
    <item>
      <title>Ansible Demo with R80.20 Gateways and Management</title>
      <link>https://community.checkpoint.com/t5/Ansible/Ansible-Demo-with-R80-20-Gateways-and-Management/m-p/49262#M125</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/6593"&gt;@Ryan_Darst&lt;/a&gt;&amp;nbsp;had originally created an Ansible Demo using R80.10 management and R77.30 gateways in AWS. I upgraded both the management and gateways in this demo to R80.20. This required changing Ryan's original demo a little bit. Herein, I provide the changes I made to make this work.&lt;/P&gt;
&lt;P&gt;What this requires:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;An Amazon Web Services account&lt;/LI&gt;
&lt;LI&gt;An R80.20 Manager (I built it in AWS, but I assume you can use an on-premise one as well)&lt;/LI&gt;
&lt;LI&gt;Ryan's &lt;A href="https://community.checkpoint.com/t5/Developers-API-CLI/CheckMates-Aug15-Demos-zip/td-p/38886" target="_self"&gt;original demo scripts&lt;/A&gt;, which include the instructions for building the demo environment.&lt;/LI&gt;
&lt;LI&gt;The attached&amp;nbsp;CheckMates-aws-vpc-create.yml file, which replaces the one included in Ryan's demo.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The complete changes made include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Using R80.20 images for gateways instead of R77.30&lt;/LI&gt;
&lt;LI&gt;Changed a few messages to say “CloudGuard” instead of vSEC&lt;/LI&gt;
&lt;LI&gt;Using c5 instance types instead of c4 instances&lt;/LI&gt;
&lt;LI&gt;Changes to the Security Groups applied to the instances&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;One change I highly recommend you make to vars_ohio.yml is to use blink_config to provision the Security Gateways. This reduces the amount of time it takes for the gateway instances to become viable. You can use something like the following:&lt;/P&gt;
&lt;PRE&gt;gateway_cluster_member=false&amp;amp;ftw_sic_key=vpn12345&amp;amp;upload_info=true&amp;amp;download_info=true&amp;amp;admin_hash=&amp;lt;password_hash&amp;gt;' ; shutdown -r now;&lt;/PRE&gt;
&lt;P&gt;Replace &amp;lt;password-hash&amp;gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Using blink_config to provision the gateways
&lt;UL&gt;
&lt;LI&gt;This is actually a change to vars_ohio.yml, replace the config_system line with something like:&lt;/LI&gt;
&lt;LI&gt;blink_config -s 'gateway_cluster_member=false&amp;amp;ftw_sic_key=vpn12345&amp;amp;upload_info=true&amp;amp;download_info=true&amp;amp;admin_hash=$1$BW4mjz6R$80jxV2CLBVoFTI06AiQmu.' ; shutdown -r now;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;One known issue:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;At least for me, the CloudGuard autoprovisioning service isn't starting automatically. You can manually "start" it using the command &lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;service autoprovision restart&lt;/STRONG&gt;&lt;/FONT&gt; from expert mode.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Sat, 30 Mar 2019 00:39:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Ansible/Ansible-Demo-with-R80-20-Gateways-and-Management/m-p/49262#M125</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-30T00:39:02Z</dc:date>
    </item>
  </channel>
</rss>

