After upgrading your system

After upgrading to A32.60 or to a hotfix version of the build, follow the steps in this topic before running your ASMS system.

Check upgrade success

To make sure that the upgrade to A32.60 was successful, perform system sanity checks.

Do the following:

  1. In the algosec_conf main menu, select 17 System health.

  2. Select 1: Check services status to check that basic ASMS processes are running on your machines.

  3. Select 2: Check system health and run a Full check.

Run all firewalls

Run a manual analysis to create an unscheduled report on all on individual devices, groups, and matrices defined in AFA. See Run a manual AFA analysis.

SSO integration (if applicable)

If you used custom UID parsers (in pre-existing SSO environments), you may need additional adjustments to your local code. See Configure a customized UID parser​.

Existing open Change Requests for Panorama devices

If you did not close Change Requests for panorama devices before the upgrade (see Close any open Change Requests for Panorama devices ), note the following:

  • For each Change Request in the Implement stage: Recalculate the work order.

  • For Change Requests in the Validate stage: Since the Change Request from before the upgrade doesn't have a URL Category field but the matched rule does, if you recalculate the validation after the upgrade, the recommended compatibility check will incorrectly show a failure in the Destination/URL Category column.

For Check Point R80 device R80.30 and lower | configure SFTP

For an R80 device version R80.30 and lower, enable SFTP on the device. To enable SFTP, see Check Point SecureKnowledge article sk82281.

For Azure Subscriptions

Note: In A32.60, to see Azure topology in the ASMS map (used for Traffic Simulation Queries and FireFlow automation), you must onboard the Azure Subscription in both ASMS and CloudFlow.

Do the following:

Case Do this
If you already have all your Azure subscription(s) onboarded to both CloudFlow and ASMS
  1. Offboard AlgoSec SaaS. Follow instructions here.

  2. Reconnect CloudFlow to ASMS. Follow instructions here.

  3. Make sure to add the Azure permission in Cloudflow Microsoft.Network/virtualHubs/effectiveRoutes/action. See HERE.

If you have CloudFlow, but don't have all your Azure susbscriptions onboarded to both CloudFlow and ASMS
  1. Offboard AlgoSec SaaS. See instructions here.

  2. Reconnect CloudFlow to ASMS. See instructions here.

  3. Make sure all your Azure subscriptions are onboarded to ASMS, if required. See instructions here.

  4. Make sure all your Azure subscriptions are onboarded to CloudFlow, if required. See instructions here.

  5. Make sure to add the Azure permission in Cloudflow Microsoft.Network/virtualHubs/effectiveRoutes/action. See HERE.

If you don't have CloudFlow connected to ASMS
  1. Connect between your CloudFlow tenant and ASMS. See ASMS integration to SaaS services

  2. Make sure all your Azure subscriptions are onboarded to ASMS, if required. See instructions here.

  3. Make sure all your Azure subscriptions are onboarded to CloudFlow, if required. See instructions here.

  4. Make sure to add the Azure permission in Cloudflow Microsoft.Network/virtualHubs/effectiveRoutes/action. See HERE.

Ensure compatibility of FireFlow customizations

The upcoming AlgoSec ASMS release A33.00 features an a significant operating system upgrade from CentOS 7, which is reaching end of life, to Rocky Linux 8. This change includes a shift to Perl version 5.26.3 from the currently used 5.16.

Some of our customers have created FireFlow customizations which are code or scripts in Perl that enable FireFlow customized workflows, integrations with external systems, and customized email responses. These may block the upgrade to A33.00 if the code is not compatible with the Perl version used by A33.00.

To ensure a smooth transition and maintain functionality of your FireFlow customizations in A33.00, it may be necessary to make some adjustments. To assist you in this process, we have introduced the Compatibility Check Tool as part of the latest HF build (A32.60 Build A32.60.300-140 (released May 13) and above). This tool is designed to efficiently identify and help you address potential Perl-related compatibility issues with your FireFlow customizations.

Tip: If you received this message at end of the upgrade to the latest HF build:

Compatibility issues were found in customization scripts on ip <node_ip> that will impact upgrade to ASMS version A33.00.
These issues have no impact on A32.60 but must be fixed before upgrading to A33.00.

This indicates that your customizations will need to be modified prior to upgrading ASMS A33.00, to ensure that your custom solutions remain functional and optimized for the updated operating environment.

Following the upgrade to latest HF build, you can see details of the FireFlow customizations compatibility issues in /home/afa/customizations_check/check-perl-syntax.log.

Based on the results, when customizations compatibility issues are found:

  • Customer / Third party Customizations: If your team or a third party have implemented customizations that require adjustments independently, you will be responsible for updating or fixing these to ensure compatibility with Perl version 5.26.3 supported by Rocky Linux 8.

  • Customizations by AlgoSec Technical Services: AlgoSec Technical Services will update customizations implemented by them.

Do the following:

  1. Following the upgrade to the latest A32.60 HF, see the details of the compatibility issues found in your system in /home/afa/customizations_check/check-perl-syntax.log.

  2. Update AlgoSec with your current FireFlow compatibility status by filling out this ASMS A33.00 FireFlow Customizations Compatibility Questionnaire.

  3. When compatibility issues are found, ensure you have backups and your current configurations are documented. This is critical to safeguard your customizations and to provide a fallback option, if needed.

  4. For FireFlow customizations created by Customer / Third party :

    1. Update your FireFlow customizations. For information how to do this, see below:

    1. Validate your changes:

      Once you have fixed the compatibility issues, use the Check Perl Syntax script (locally) to verify:

      1. Locally on the ASMS machine (with latest A32.60 Build) run the command:

        cd /home/afa/customizations_check/
        /usr/share/fireflow/local/sbin/copy_fireflow_customization.pl --run -d -c

        (this creates a .tar file that contains all the customization data in the location where you ran the command. For example , /home/afa/customizations_check/user_customizations_2024-05-01-080420.tar.gz)

      2. Backup the file /usr/share/fireflow/local/lib/algosec_perllibs.pm

      3. Run the following:

        sed -i 's#/opt/algosec/perl5/lib/perl5#/opt/algosec_perl526/perl5/lib/perl5#g' /usr/share/fireflow/local/lib/algosec_perllibs.pm

      1. Then run:

        /usr/bin/check_perl_syntax -f <Path to tar file>

        For example, /usr/bin/check_perl_syntax -f /home/afa/customizations_check/user_customizations_2024-05-01-080420.tar.gz

      2. Revert /usr/share/fireflow/local/lib/algosec_perllibs.pm by replacing it with the backup file (saved in step ii)

      3. The output is written to the file /home/afa/customizations_check/check-perl-syntax.log. If errors are still found, fix them and verify again.

  5. For FireFlow customizations created by AlgoSec Technical Services: AlgoSec Technical Services will update customizations implemented by them.