- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
hi there,
I need to consolidate multiple standalone checkpoint gateway devices to one single higher end model of hardware. Both old and new gateway will be registering to the same Security Management server. Could you please help to break up the procedure and give me the steps. Relatively new checkpoint user.
Gateway and Management Server Version Gaia 77.30
Best Regards,
Matthew
The exact steps are going to depend on current state of the environment, proposed state of the environment, and constraints you have to work around (i.e. the gateway protecting X can only be down during Y times).
At an extremely high-level:
I'm probably missing a few minor steps above, but it should be a good starting point.
I strongly encourage engaging the services of a local partner or Check Point Professional Services to assist with this task.
Hello Dameon,
Thanks a lot for your reply. In my case, the software version ( R77.30 ) is same on all the appliance (management & gateway). All the gateways (OLD and NEW) is connected to same management server as well.
New Gateway is added and enabled with all the routes and interface configurations, layer 2 & layer 3 reachability checked. Just that IP address given is another one in place of the live gateway. SIC connection also established.
In regards your point 3, is there an alternate way other than copy paste policy from each firewall. Just wondering if that is the best practise ?
I have VPN tunnels terminating on one of the gateways which will be moved to the new box. Would there be an option to copy and paste the VPN configurations as well?
Please let me know. Thanks.
Present setup - 4 Checkpoint standalone Gateway
Expected Setup - 1 Checkpoint cluster replacing all the 4 above gateways. All running with same software version now.
You can use copy/paste of the rules as a starting point for a new rulebase.
You can, of course, rebuild the policy from scratch, but if the policy is complex, you might miss something.
Either way, it's a manual task, it just depends on how you want to approach it.
The VPN configuration is mainly three items:
Hi Maradona,
have you already thought about migrating to VSX?
This will provide the the possibility to keep old policies as they are and having virtual systems
in the same way you have physical clusters today.
VSX is a bit more expensive, but it helps to seperate policies and ressources.
BR
Sven
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 17 | |
| 15 | |
| 7 | |
| 5 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY