0% found this document useful (0 votes)
175 views

VSX Admin Guide

Uploaded by

Luis Rodrigues
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
175 views

VSX Admin Guide

Uploaded by

Luis Rodrigues
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

https://sc1.checkpoint.com/documents/R77/CP_R77_VSX_WebAdmi...

Check Point VSX R77 Versions Administration


Guide
Contents Index

Contents

Check Point VSX


R77 Versions
Introduction to VSX
Administration Guide
Terms
Introduction to In This Section:
VSX
VSX VSX Overview
Architecture and How VSX Works
Concepts
SmartDashboard Toolbar
Configuring
VSX
Using VSX with
Multi-Domain
Security VSX Overview
Management
Introduction to VSX (Virtual System Extension) is a security and VPN solution for large-scale environments based
VSX Clusters proven security of Check Point Security Gateway. VSX provides comprehensive protection for mu
Managing VSX networks or VLANs within complex infrastructures. It securely connects them to shared resources
Clusters as the Internet and/or a DMZ, and allows them to safely interact with each other. VSX is support
Deploying VSX IPS™ Services, which provide up-to-date preemptive security.
Working with VSX incorporates the same patented Stateful Inspection and Software Blades technology used in
Link Aggregation Check Point Security Gateway product line. Administrators manage VSX using a Security Manage
Optimizing VSX Server or a Multi-Domain Server, delivering a unified management architecture that supports
VSX enterprises and service providers.
Diagnostics and A VSX Gateway contains a complete set of virtual devices that function as physical network comp
Troubleshooting such as Security Gateway, routers, switches, interfaces, and even network cables. Centrally man
Command Line and incorporating key network resources internally, VSX lets businesses deploy comprehensive fi
Reference and VPN functionality, while reducing hardware investment and improving efficiency.
Index

How VSX Works


Each Virtual System works as a Security Gateway, typically protecting a specified network. When
arrive at the VSX Gateway, it sends traffic to the Virtual System protecting the destination netwo
Virtual System inspects all traffic and allows or rejects it according to rules defined in the security

In order to better understand how virtual networks work, it is important to compare physical netw
environments with their virtual (VSX) counterparts. While physical networks consist of many hard
components, VSX virtual networks reside on a single configurable VSX Gateway or cluster that de
and protects multiple independent networks, together with their virtual components.

Physical Network Topology


The figure below shows a typical deployment with four physical Security Gateways, each protecti
separate network. Each Security Gateway is a separate, physical machine that is hard-wired to th
perimeter router and its corresponding network.

1 of 1 16-07-2014 11:59

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy