- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi Checkmates community,
My name is Gregory, my group and I are responsible for different tools for machine provisioning and monitoring like – CPUSE, CDT, Zero Touch, Blink, CPveiew and more…
In this post I would like to talk to you about a “new-ish” capability that we introduced in recent version that allows you to keep you Gaia Security Gateways up to date from the comfort of your smart console.
Starting R81, we have added the option to install Hotfixes and Major version to a multiple gateways and clusters (while performing all needed operation to ensure zero down time)
You can check a short video that describes this capability
I’m reaching out in order for me and my group to get feedback about this capability –
Thanks,
Gregory
Yes, with R80.40 only Jumbo fixes are the option. Unfortunately, error message got already washed away. Well, if I will encounter another error with next Jumbo fix, I will post the update.
In my view automation is about tools like ansible not clicking buttonds in SmartConsole. So how can we do real automation here? For example ansible playbooks to managed this all.
I respectively disagree, the automation is not only about ansible. 🙂
In this specific case, please let us know which APIs and automation related feature you miss. And I hear what you said already, you do want this to be present in ansible.
I can kind of see the distinction. This feels like mechanization: a machine doing an exact series of steps under human direction. A human must still initiate the process via SmartConsole, right?
In the future, it would be nice if we could build a longer workflow, especially with integration with other tools. New GA jumbo release? A tool opens a series of tickets in my ticket tracking system. When the tickets are approved through my change control process, another tool schedules the upgrades to be executed in waves (this group of firewalls first, then the next group a week later, then another group a week after that, and so on) via CDT in appropriate windows for each firewall.
It would be nice to have API calls to:
@Gregory_Azratz this is for you 🙂
Hi @Bob_Zimmerman ,
thanks for the feedback.
it would be great if we can have a short session so we can fully understand how you currently install/upgrade your CP systems.
and what will be the perfect solution for you.
regarding the API calls -
I've mostly been targeting APIv1.3, and it turns out I completely missed the Software Package section in the APIv1.7 documentation. Neat!
For the "Get a list of packages available on the User Center" part, it doesn't have to be an API call against the management server. It could be against some well-defined public endpoint. I just want some way to get the authoritative list of "Here's all the official packages" to programmatically discover that I'm missing an update without a human having to read an SK article. I then want to use this knowledge to file a bunch of tickets via my ticket tracking system's API. Ideally, the first awareness a human should have of this is "Hey, we have a firewall update scheduled. Does that date conflict with anything else?"
I guess I can get the major and minor version from the objects in the management. The human-defined property shouldn't ever be incorrect, or policy push wouldn't work properly. All I'm really missing now is the ability to identify that there's a newer version out and get the name of the newer package to feed to the rest of the calls.
Hi @Hugo_vd_Kooij ,
regarding automation - we are always trying to work on API first approach.
so for each option that you see in the smart console there is an API command that can do the same and much more.
on top of that API you can use any tool that fits your need - Ansible, Terraform, etc..
you can check the following api documentation
I finally have most of my managements (we've acquired several companies, and haven't had time to merge the managements) upgraded to R81.10, and I've been using this feature. Just upgraded a firewall from R80.30 to R81.10 in ten minutes. It's great.
I did hit one weird glitch. My management server and the firewall I was about to upgrade both had CPUSE 2205. I told the management to start the upgrade on the firewall, and it complained that I had to update CPUSE first. Turns out the firewall had somehow found out about CPUSE 2208, but the management server didn't know about it yet. The firewall can't connect out to the Internet (so I'm really not sure how it found out about 2208), and running 'installer agent update' on the management told me there was no update. Eventually, I downloaded 2208 from the Support Center, uploaded it to the management, copied it to the firewall via cprid_util putfile, installed it on both, then the upgrade worked.
This definitely wasn't a big problem, but it was surprising given how little manual intervention the tool takes otherwise. It would be nice if the firewall's knowledge of a newer version didn't prevent the management from working on it.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 27 | |
| 23 | |
| 15 | |
| 14 | |
| 12 | |
| 10 | |
| 6 | |
| 6 | |
| 5 | |
| 4 |
Wed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY