- Products
- Learn
- Local User Groups
- Partners
- More
Maestro Masters
Round Table session with Maestro experts
Hi Checkamates,
Is there a workaround on this without doing a factory default on all 3 gateways?
We've recently reconfigured our maestro (dual maestro single site) management ip address and delete the objects from the SMC.
We can access the Maestro and SMC but we havent made a factory reset on the 3 security gateways.
We tried unloading the policy on the 3 security gateways via ssh but still couldn't add or register it on the SMC.
Both management ips were accessible via ssh;
-maestro
-smc
-security gateways
Thoughts?
Leangf
I have no clue if this makes sense, but this is what AI gave...
*****************************
Hey Leangf,
You’re in a pretty common situation after changing the management IP on a Maestro setup — the gateways still “think” they’re managed by the old management server identity (fingerprint, SIC, IP), so they refuse new SIC establishment attempts from the new management IP. The good news is that you usually don’t need to factory reset the SGMs (Security Group Members) to fix this.
Here’s the usual recovery path that works without a full reset 👇
In Maestro, the management connection (SIC) info is stored in:
/etc/appliance_config.xml
/opt/CPsuite-R81.10/fw1/conf/InternalCA.*
/var/opt/CPshared/5.0/tmp/.CPprofile.sh and related directories
So even though the MHO and SMC are reconfigured, the SGMs still have the old management certificate relationship.
Example:
ssh admin@<SGM-IP>
expert
Run:
cp_conf sic init <new_password>
You can choose a new one like MyNewSICpass123.
This clears the existing SIC trust but does not wipe your configuration or interfaces.
Add the gateways back under Security Gateways & Clusters.
Assign the correct IP (the one reachable from SMC).
When prompted for SIC, enter the same MyNewSICpass123 password you used above.
If SIC fails due to old certificates still being cached, you can also clean up the management side with:
cpca_client lscert
cpca_client revoke <certificate-number>
cpca_client delete <certificate-number>
Then try to re-establish SIC again.
Once SIC is established, push policy again — it should succeed, and the gateways will re-register with the new management IP.
If after the above, the gateways still refuse to register:
rm -rf /opt/CPsuite-R81.10/fw1/conf/InternalCA.*
rm -rf /opt/CPsuite-R81.10/fw1/conf/*.p12
Then re-init SIC again (cp_conf sic init <pw>) and retry.
Don’t use set factory default — it’s overkill here.
Don’t delete /etc/appliance_config.xml unless directed by TAC (that can break Maestro sync).
Make sure to do the SIC reset on all SGMs (since each one maintains its own SIC), or use:
asg diag all "cp_conf sic init MyNewSICpass123"
from the MHO CLI to apply it cluster-wide.
If you can share:
R81.x version (e.g., R81.10 or R81.20)
Whether this is Dual Site or Single Site Maestro
…I can tailor the exact asg command sequence for you (since the MHO CLI options differ slightly).
Thank you @the_rock , same results i had. One thing i need is to confirm from the experts if these were applicable in my case.
. I will go through with the procedures. Hopefully this will work as the devices were located from another remote location 🙂
By the way, the version we installed is R82.x across all devices - SMHO-140, SMC, Security Gateways (9100).
This is a dual maestro -single site deployment.
Leangf
Just an update on this;
-i managed to access the SGs within the maestro console using the loopback ip 198.x.x.x.x
-replaced the ip address of magg1
-replaced the default route of SGs.
-reset the sic password
now its working..
awesome.
I have no clue if this makes sense, but this is what AI gave...
*****************************
Hey Leangf,
You’re in a pretty common situation after changing the management IP on a Maestro setup — the gateways still “think” they’re managed by the old management server identity (fingerprint, SIC, IP), so they refuse new SIC establishment attempts from the new management IP. The good news is that you usually don’t need to factory reset the SGMs (Security Group Members) to fix this.
Here’s the usual recovery path that works without a full reset 👇
In Maestro, the management connection (SIC) info is stored in:
/etc/appliance_config.xml
/opt/CPsuite-R81.10/fw1/conf/InternalCA.*
/var/opt/CPshared/5.0/tmp/.CPprofile.sh and related directories
So even though the MHO and SMC are reconfigured, the SGMs still have the old management certificate relationship.
Example:
ssh admin@<SGM-IP>
expert
Run:
cp_conf sic init <new_password>
You can choose a new one like MyNewSICpass123.
This clears the existing SIC trust but does not wipe your configuration or interfaces.
Add the gateways back under Security Gateways & Clusters.
Assign the correct IP (the one reachable from SMC).
When prompted for SIC, enter the same MyNewSICpass123 password you used above.
If SIC fails due to old certificates still being cached, you can also clean up the management side with:
cpca_client lscert
cpca_client revoke <certificate-number>
cpca_client delete <certificate-number>
Then try to re-establish SIC again.
Once SIC is established, push policy again — it should succeed, and the gateways will re-register with the new management IP.
If after the above, the gateways still refuse to register:
rm -rf /opt/CPsuite-R81.10/fw1/conf/InternalCA.*
rm -rf /opt/CPsuite-R81.10/fw1/conf/*.p12
Then re-init SIC again (cp_conf sic init <pw>) and retry.
Don’t use set factory default — it’s overkill here.
Don’t delete /etc/appliance_config.xml unless directed by TAC (that can break Maestro sync).
Make sure to do the SIC reset on all SGMs (since each one maintains its own SIC), or use:
asg diag all "cp_conf sic init MyNewSICpass123"
from the MHO CLI to apply it cluster-wide.
If you can share:
R81.x version (e.g., R81.10 or R81.20)
Whether this is Dual Site or Single Site Maestro
…I can tailor the exact asg command sequence for you (since the MHO CLI options differ slightly).
Thank you @the_rock , same results i had. One thing i need is to confirm from the experts if these were applicable in my case.
. I will go through with the procedures. Hopefully this will work as the devices were located from another remote location 🙂
By the way, the version we installed is R82.x across all devices - SMHO-140, SMC, Security Gateways (9100).
This is a dual maestro -single site deployment.
Leangf
Glad we can help!
Just an update on this;
-i managed to access the SGs within the maestro console using the loopback ip 198.x.x.x.x
-replaced the ip address of magg1
-replaced the default route of SGs.
-reset the sic password
now its working..
awesome.
Excellent work.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 3 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY