- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello, I would like to know if there is an official procedure to change a cluster to other management server without loosing its current policies and config?
I have two cluster with two diferent managament server but we need to have only one management server controling these two cluster, the management server is r80.10.
the are two management server A and B, each one have a cluster of gateways which are C and B.
I need to migrate the cluster B to be managed in Manamenet server A without loosing the current configuration, so I understand I need to migrate the config (policies, host, netwoks, services) of management server B to A so I could install policies again to the gateway and starts to operate normally.
if there is not an offcial procedure for this, whats is the recomended option?
I'm curious to hear what folks may suggest for this one. Are you trying to accomplish this with no outage? Or are you willing to accept some downtime?
Hello Daniel, Yes, I am willing to accept some downtime!
Are you using MDS or only SMS ?
In case you want to migrate both clusters to the MDS, the best way would be to create separate CMA for each cluster. Using migrate export/import tool and job done
Hello Jozko, I am using SMS.
Step 1: ExportImportPolicypackage - sk120342 (formerly cp_merge) the management configuration from management server B to A or do it manually if it isn't too much configuration / rules / objects
Step 2: Create a new cluster object for cluster B on management server A, check all settings for logging settings, nat, policy installation target etc. related to that cluster object (compare with the configuration on management server B)
Step 3: Reset SIC on cluster B (sk86521, sk65764) and re-establish with management server A
Step 4: Install security policy, check operation status, done
Hi Danny,
Yes, I tried that on a lab environment but I have a problem, when I import the policy package to the destination management server thair appear 1 cluster object, and 1 gateway objetc for each site to site VPN in the "GW and server tab".
the problem with this is that I cant delete this objects and I can't install policies because that objects are having some issues like "the cluster object is empty" and "there is not sync with the gateway objects" (I mean the new ones, those that appear with the imported policie package).
I understand. Then delete a new cluster object manually as I outlined in Step 2 and use this one for policy installation. Delete the one that was create during the import.
I cant delete those objects, it do not allow me that. if I could delete the object then I would have no issues xD
Delete on managenent server B before doing the export.
Hello Danny,
in preparation of our upcoming migration from R77.30 to R80.20 I followed your steps.
Step1: I installed a fresh SMS R80.20 with a new IP in the same subnet as the old one and moved the configuration from the old management server manually, including obejects and rule base.
Because I was moving the objects and rule base on my own I was able to clean it up and consolidate some rules.
Step2: I created the new cluster object in R80.20 with the same configuration like on the old mgmt server.
Step3: I've resetted the SIC on the standby node and established the trust with the new mgmt. As the new policy was installed I did the same with the former active node. Both Nodes of the cluster was connected to the new management server R80.20
Step4: I installed the policy on both nodes an verified it with "fw stat".
After pushing the policy a couple of network problems reached me.
Problem 1
The cluster was not build. One member had the active role and the other one was in ready state and told me that the configuration was not identical. I guess the following message belongs to the issue but i was not able to solve it. I checked both Nodes and they have the same cluster ID 254. I'm not if the configuration for the cluster object in SMS is proper to the nodes regarding the Cluster ID.
[fw4_0];CPHA: Found another machine with same cluster ID. There is probably another cluster connected to the same switch/hub as this one.
[fw4_0];CPHA: This is an illegal configuration. Each cluster should be connected to another set of switches/hubs.
routed[22044]: api_get_member_info: failed to get memberinfo. selector = 83147e1, data = 0
Problem 2
A couple of netwerk services wasn't permanently reachable for example ldap. I guess it could be related to Problem 1.
Problem 3
Our SAP Portal was not reachable with the web browser. The firewall log shows that the communication was allowed but with tcp dump I saw that the connection is reseted from the destination since installing the new policy.
Maybe it is related to Problem 1 too but I can't say why. Another idea is that the default threat prevention policy is responsible for it. Under "Manage Policy and Layers" i saw, that Threat prevention is also pushed to the cluster. Because I don't checked "Threat Prevention Features" for the cluster object, I'm not sure if pushing threat prevention policy to the nodes has an effect.
Problem 4
Our two VPN tunnels wasn't working after pushing the policy. I guess because the service "tunnel_test" was blocked by the firewall which I fixed already in the new policy. When moving the cluster to new management again I will see if it was the reason.
Maybe you are familiar with some of that issues?
I hope that some of them belong to the cluster which was not build correctly in my opinion.
I reverted to the snapshots I took before and than all issues was gone. Next time I hope to be better prepeared about those issues.
Best regards
Martin
Hi Martin ,
Have you tried reboot the second member that you added to the new Mgmt .
I am guessing adding the standby member cased the network to see it as a new CXL master member ( so you had both members in Active for a short time )
and on this point those messages where seen ,
[fw4_0];CPHA: Found another machine with same cluster ID. There is probably another cluster connected to the same switch/hub as this one.
[fw4_0];CPHA: This is an illegal configuration. Each cluster should be connected to another set of switches/hubs.
now its sound like there was a problem on the second member that you added i would sagest to try reboot on that member .
before adding a second member to the cluster in that method cphastop is been used to prevent split bairn
Thanks
Roy
Hi Martin,
1) you can not have a cluster with member SIC with management, both member will try to use the VIP address (you will have a duplicate IP)
2) I think the cluster is R77.30 as the "old" management, if yes please remember you have to use different cluster ID if two cluster are connected share at least 1 vlan
So please consider a maintenance windows because it is impossible not to have downtime.
Emanuele
cp_merge is no longer supported unfortunately:
"cp_merge" tool support on Security Management Server R80 and above
There is a python utility that allows you to perform these tasks, but I do not believe it is officially supported by Check Point either
Hi Vladimir,
Yes, I tried that on a lab environment but I have a problem, when I import the policy package to the destination management server thair appear 1 cluster object, and 1 gateway objetc for each site to site VPN in the "GW and server tab".
the problem with this is that I cant delete this objects and I can't install policies because that objects are having some issues like "the cluster object is empty" and "there is not sync with the gateway objects" (I mean the new ones, those that appear with the imported policie package).
Hi,
you have to remove all the references in "Where Used", set a "fake" IP for the CP objects imported and remove the flag from VPN.
Usually this trick fix the error and allow the object deletion.
Manu
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
31 | |
17 | |
5 | |
4 | |
3 | |
3 | |
3 | |
3 | |
2 | |
2 |
Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY