Hi, @Roshan_Sinha
Just make sure that you have a rule in your security policy:
src: gateway, dst: management, service: ssh, action: allow
src: management, dst: gateway, service: ssh, action: allow
This will most likely be allowed by default through "Accept control connections" under Global Properties in Smart Console. This makes it so that implied rules (rule #0) makes sure that traffic between the gateway and management server over the required ports and services are allowd in rule #0.
I just like to be sure before doing upgrades by having a manual rule making sure that I will have the correct access during the upgrade.
After doing the upgrade of the gateway it will boot up with initial policy. Initial policy will allow for SSH.
You should be able to change the version using mgmt_cli as well. Haven't done this before myself but I just tested it out in my LAB and it worked:
For a single gateway:
mgmt_cli set simple-gateway name "NAME-OF-THE-GATEWAY-OBJECT-IN-SMARTCONSOLE" version R81.10
For a cluster:
mgmt_cli set simple-cluster name "NAME-OF-THE-CLUSTER-OBJECT-IN-SMARTCONSOLE" version R81.10
So if you make sure that you have SSH access. You would simply start the upgrade on the gateway through SSH:
CLISH
installer download Check_Point_R81.10_T335_Fresh_Install_and_Upgrade.tar
installer verify Check_Point_R81.10_T335_Fresh_Install_and_Upgrade.tar
installer upgrade Check_Point_R81.10_T335_Fresh_Install_and_Upgrade.tar
Once it has upgraded and rebooted. You reconnect to the gateway using SSH:
Expert mode
ssh username@IP-OF-YOUR-MANAGEMENT
mgmt_cli set simple-gateway name "NAME-OF-THE-GATEWAY-OBJECT-IN-SMARTCONSOLE" version R81.10
mgmt_cli install-policy policy-package "NAME-OF-THE-POLICY-PACKAGE" access true
mgmt_cli install-policy policy-package "NAME-OF-THE-POLICY-PACKAGE" threat-prevention true
And you should be done.
Certifications: CCSA, CCSE, CCSM, CCSM ELITE, CCTA, CCTE, CCVS, CCME