Skip to content

CheckPointSW-Community/CPX-2025-Maestro

Repository files navigation

CPX-2025-Maestro-The-New-Frontier-Infrastructure-as-a-Code

This code allows you to create your own ElasticXL or Maestro Security Group using both Management API Reference and GAiA API Reference APIs. Currently, this uses bash scripts and mgmt_cli, but will be updated to use Ansible, in the coming months when the updates to the Check Point Ansible packages are available. The approach assumes devices of the same model therefore any device can be selected from the "pool". VSNext has also been used to add some extra granularity.

Each VS has 2 interfaces for data, and 1 for management.

In this example, the data network VLANs are simply rotated when used in the rule based (for example with 100+ VS in a test). Ensure your addressing aligns with your lab setup.

You must edit the Combined_vars.txt file to suit your own environment. All code is provided for lab use - use at your own risk. Make sure you are happy with what it does, and you know what you are doing, before using it anywhere else!

A Maestro MHO must be accessible (and any other MHO's connected) - as well as the Maestro Infrastructure in place.
What changes - is how we build and configure.

For ElasticXL, the Appliances must be connected as per documentation, with Sync network connected. One of the devices must have an IP address and subnet mask, as well as default gateway (or, at least be accessible from the management system performing actions on it). Configuration of the first (and only the first) appliance can be performed via console cable:

set interface Mgmt ipv4-address <Mgmt_IP> mask-length <CIDR_Mask>
set static-route default nexthop gateway address 192.168.1.254 off
set static-route default nexthop gateway address <System_DG> on

For an ElasticXL system

You run:

./01_CPX_EXL_create.sh
./02_CPX_EXL_Mgmt_vs0.sh CPX_EXL_VSN '172.31.100.114/22' vpn123
./03_CPX_EXL_VSN.sh
./04_CPX_EXL_Mgmt_VSN.sh

This will:

  • Will build the group and run FTW. Enabled ElasticXL and VSN Modes.
  • Adds the created system in the Mgmt. With the name, IP, and SIC key defined.
  • Adds bond, vlans, vswitches, and some extra VS. Tested to more than 100VS.
  • Bring all the created VS from 03 script, into the Mgmt, sets trust, policy and more, then installs a simple policy.

Many of the definitions for ElasticXL are in the Combined_vars.txt file.

For Maestro Security Group (SG) system

You run:

./01_CPX_SG_create.sh 1 1 'eth1-Mgmt1' 2 'eth1-49 eth2-49' CPX_Sec_Group '192.168.14.10/24' '192.168.14.1' '192.168.5.23'
./02_CPX_SG_Mgmt_vs0.sh CPX_Sec_Group '192.168.14.10/24' vpn123
./03_CPX_SG_VSN.sh  
./04_CPX_SG_Mgmt_VSN.sh 
./05_CPX_SG_extend.sh 3 1 '192.168.5.23'
./06_CPX_Addlic.sh 

This will build, via the MHO a security group:

  • Build a group with 1 Gateway, 1 Mgmt interface (eth1-Mgmt1), 2 data interfaces, (eth1-49 & eth2-49) call the system CPX_Sec_Group, set the Security Group IP & mask as 192.168.14.10/24 with Def GW 192.168.14.1 and connect to MHO 192.168.5.23 to make the changes.
  • Adds the created system in the the Mgmt. With the name, IP, and SIC key defined.
  • Adds bond, vlans, vswitches, and some extra Virtual Systems. Tested to more than 100VS.
  • Bring all the created Virtual Systems from script "03", into the Management server, establish trust (SIC). Creates a very simple policy and more, then installs a simple policy.
  • Optional: If you built with only 1 gateway - as in the example above, you may want to add more gateways, once you know the system works for you. This will expand Security Group 1 by adding 3 additional gateways on the MHO with IP address 192.168.5.23.
  • Optional: Add licenses for lab use (production systems will license automatically if they have internet access).

If you want to reset/delete

On ElasticXL, you login to the ElasticXL SMO IP address and then use the normal console set fcd revert R<VERSION> . This will factory reset all members of the ElasticXL Cluster! For Maestro, you can run this command from the Mgmt server (which contains the example scripts console ./CPX_SG_delete.sh <Group Number> '<MHO_IP>' . This will delete the Maestro Security Group! In the Management server, for speed, it is quicker to delete the policy packages that were added (2 for each platform), delete the gateway objects created, and delete the networks created. Then, publish the changes. After doing so, the systems can be recreated.

Requirements

TK

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages