What is the correct order of the steps below to successfully complete this procedure?

Typically, when you upgrade the Security Management Server, you install and configure a fresh
R77 installation on a new computer and then migrate the database from the original machine.
What is the correct order of the steps below to successfully complete this procedure?
1) Export databases from source.
2) Connect target to network.
3) Prepare the source machine for export.
4) Import databases to target.
5) Install new version on target.

6) Test target deployment.

Typically, when you upgrade the Security Management Server, you install and configure a fresh
R77 installation on a new computer and then migrate the database from the original machine.
What is the correct order of the steps below to successfully complete this procedure?
1) Export databases from source.
2) Connect target to network.
3) Prepare the source machine for export.
4) Import databases to target.
5) Install new version on target.

6) Test target deployment.

A.
3, 1, 5, 4, 2, 6

B.
5, 2, 6, 3, 1, 4

C.
3, 5, 1, 4, 6, 2

D.
6, 5, 3, 1, 4, 2



Leave a Reply 12

Your email address will not be published. Required fields are marked *


Brad

Brad

Shouldn’t we first connect the target to the network in order to check the deployment?

Love, Brad

FriedBacon

FriedBacon

Hmm..probably its the last, assuming it has the same IP so you CANNOt connect it to the network without removing the original(old) one first

maya

maya

I think it’s A

Edecus

Edecus

What about B?

Assuming that “Install new version on target” means a new fresh Security Management Server installation, the answer B really makes sense.

John

John

Think C is the correct

you sould connect to the network after you’ve tested that everything is OK with your installation

knabeowulf

knabeowulf

C is right

Vlad

Vlad

Edecus you don’t connect target machine to your network before importing config to it.

pranab

pranab

You connect the target machine to the network last because more than likely you want to keep the same IP addresses. You deploy the target machine using a new vlan which does not interfere with any IPs on the current source machine , do the export, test the deployment and finally join the two machines to the original VLAN . C is the right answer

Vlad

Vlad

Options are really strange.
I would keep down time as short as possible even if logging is local (FW) until SMS comes back online (in distributed deployment).
And while C option is probably the best from all how is Target Deployment tested without connecting it to network?

florentjustin

florentjustin

Answer is A:

see Advanced Upgrade and Database Migration: https://sc1.checkpoint.com/documents/R77/CP_R77_Gaia_Installation_and_Upgrade_Guide/16535.htm

Migration Workflow

This section includes a procedural overview for database migration and continues with detailed procedures for each platform. Also included are special procedures for migrating:

* A secondary Security Management Server
* To a server with a different IP address
* SmartReporter
* SmartEvent

Migration Workflow

1.Prepare the source Security Management Server for export.
2.Install the R77 Security Management Server or a standalone deployment on the target server.
3.Export the management database from source Security Management Server.
4.Import the management database to the target Security Management Server.
5.Test the target deployment.
6.Connect the target Security Management Server to the network.

florentjustin

florentjustin

Sorry I would say answer C

Esteban

Esteban

C. 3, 5, 1, 4, 6, 2

https://sc1.checkpoint.com/documents/R77/CP_R77_Gaia_Installation_and_Upgrade_Guide/html_frameset.htm?topic=documents/R77/CP_R77_Gaia_Installation_and_Upgrade_Guide/90083

Migration Workflow

Prepare the source Security Management Server for export.
Install the R77 Security Management Server or a standalone deployment on the target server.
Export the management database from source Security Management Server.
Import the management database to the target Security Management Server.
Test the target deployment.
Connect the target Security Management Server to the network.