- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
CME Quick Start Guide
For configuring Check Point Cloud Management Extension (CME)
This guide is meant as a tool to assist in basic CGNS architecture deployments using autoscaling features such as AWS’ AutoScaling Group (ASG), Azure’s Virtual Machine ScaleSet (VMSS) or GCP’s Machine Instance Group (MIG), such as testing or Proof of Concepts, to aggregate the most basic, and/or important, pieces of information used in those scenarios. It is not meant as a full guide. The full CME Admin Guide can be found here: Cloud Management Extension Administration Guide
Overview of Cloud Management Extension (CME)
CME is a tool that runs on Check Point's Security Management Server and Multi-Domain Security Management Server. CME allows cloud-native integration between Check Point CloudGuard Network solutions and Cloud platforms. As a Service, it continuously monitors CloudGuard Network solutions deployed in different cloud vendors and synchronizes them with the Security Management Server. The full online CME Administration Guide can be found here.
Check Point recommends always installing an updated version of CME when available. The CME should be pre-installed on any new deployment of the SMS, Management server. However, if it is not, or for other use cases, the CME package is available for online or for offline installation. Check Point recommends following the instructions in sk157492 to update CME to the latest version.
To install/update the CME utility:
This section describes the necessary steps for CME authentication with different public cloud platforms.
AWS
Refer to sk130372 > 3. Creating an AWS IAM User and IAM Role section. AWS Controller (account) connects to these URLs:
For example https://ec2.ap-northeast-2.amazonaws.com/
Azure
Create a Microsoft Entra ID (formerly Azure AD) and Service Principal
With the Microsoft Entra ID and Service Principal, the Check Point Security Management Server monitors the creation and status of the VMSS, so it can complete the provision of these Security Gateways.
After you create the application, write down these values to use in Step 5, ‘Using the autoprov_cfg Command Line Configuration Tool’.
Permissions:
Give the Azure Active Directory application a minimum role of Reader to the VMSS and the VNET.
GCP
To create a GCP service account:
Use these parameters:
Name: check-point-autoprovision
Role: Compute Engine \ Compute Viewer
Note - This JSON file will be used as the credentials file in "CME Structure and Configurations".
Permissions:
"Compute viewer"
GCP Controller (account) connects to this URL:
To connect to the cloud account and automatically provision Security Gateways deployed in the account, the Security Management Server needs cloud-specific information, such as credentials and regions. This information is tied to a ‘controller’ in the CME configuration.
Important:
Information required to automatically provision Security Gateways, such as what policy to install and which Software Blades to enable, is placed in a configuration template in the CME configuration.
For more information, consult the Cloud Management Extension Administration Guide, in the Configuration Templates (gateway-configurations) section here.
The autoprov_cfg is a command-line tool to configure autoscaling solutions, such as Azure VMSS, AWS ASG, and GCP MIG.
For instructions about how to use the autoprov_cfg, from the SMS Management server CLI, in Expert mode, run: autoprov_cfg -h
Commands Summary
|
Command |
Description |
|
init |
Initialize auto-provision with Management, a Configuration Template, and a Controller (account) configuration |
|
show |
Show all or specific configuration settings |
|
add |
1. Add a new Configuration Template or a Controller 2. Add a new configuration to the Management or to a Configuration Template or a Controller |
|
set |
Set values in an existing configuration of Management, Configuration Template or a Controller |
|
delete |
1. Remove a Configuration Template or a Controller 2. Remove a configuration from the Management or from a Configuration Template or a Controller |
|
-v |
Show the version of CME |
|
-h |
Shows specific help documentation |
Important - If you have an existing configuration, running the ‘autoprov_cfg init’ command will override it. To add one more auto-provisioned environment, use the ‘autoprov_cfg add’ command instead of ‘autoprov_cfg init’.
Specific help documentation is available for each option that you select. For example, this command shows the available initialization parameters for AWS and their definition:
autoprov_cfg init AWS -h
Azure Example: Initializing the Autoprovision Configuration
autoprov-cfg init Azure -mn "cpmgmt" -tn "Azure-Template" -otp "Checkpoint123" -ver "R81.20" -po "VMSS-Standard" -cn "Azure-Controller" -sb "123445" -at "123456" -aci "456456" -acs “123456”
Items Parameters Example
|
Item |
Parameter |
Example |
|
-mn |
<management-name> |
cpmgmt |
|
-tn |
<configuration-template-name> |
Azure-Template |
|
-opt |
<SIC-key> |
Checkpoint123 |
|
-ver |
<version> |
R81.20 |
|
-po |
<policy-name> |
VMSS-Standard |
|
-cn |
<controller-name> |
Azure-Controller |
|
-sb |
<Azure subscription> |
123445 |
|
-at |
<tenant-ID> |
123456 |
|
-aci |
<client-ID> |
456456 |
|
-acs |
<Client-secret> |
123456 |
AWS Example: Initializing the Autoprovision Configuration
autoprov-cfg init aws -mn “cpmgmt” -tn “AWS-Template” -otp “Checkpoint123” -ver “R81.20” -po “ASG-Standard” -cn “AWS-Controller” –r us-west-1 -iam
Items Parameters Example
|
Item |
Parameter |
Example |
|
-mn |
<management-name> |
cpmgmt |
|
-tn |
<configuration-template-name> |
AWS-Template |
|
-opt |
<SIC-key> |
Checkpoint123 |
|
-ver |
<version> |
R81.20 |
|
-po |
<policy-name> |
ASG-Standard |
|
-cn |
<controller-name> |
AWS-Controller |
|
-r |
<region> |
us-west-1 |
|
-iam |
No value |
|
|
|
|
|
GCP Example: Initializing the Autoprovision Configuration
autoprov-cfg init gcp -mn “cpmgmt” -tn “GCP-Template” -otp “Checkpoint123” -ver “R81.20” -po “MIG-Standard” -cn “GCP-Controller”
Items Parameters Example
|
Item |
Parameter |
Example |
|
-mn |
<management-name> |
cpmgmt |
|
-tn |
<configuration-template-name> |
GCP-Template |
|
-opt |
<SIC-key> |
Checkpoint123 |
|
-ver |
<version> |
R81.20 |
|
-po |
<policy-name> |
MIG-Standard |
|
-cn |
<controller-name> |
GCP-Controller |
When enabling or disabling software blades, it is always best to do so via the command line by modifying the CME template. This ensures that all instances created by scale-out events have the proper blades.
(See "Supported Configuration Template parameters" for parameter information.)
To Enable Software Blades in CLI on Security Gateways in the Future:
To Disable Software Blades in CLI on Security Gateways in the Future:
To Enable and, or Disable Software Blades in SmartConsole on Existing Security Gateways:
This information should be enough to get started with configuring CME. Always refer to the official Check Point documentation for the most up-to-date and comprehensive information. You may need to independently verify any information that is not from the given sources.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY