334
[Classification: Protected] 27 January 2020 VSX R80.40 Administration Guide

VSX R80.40 Administration Guide - InfoSec

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: VSX R80.40 Administration Guide - InfoSec

[Classification:Protected]

27 January 2020

VSX

R80.40

Administration Guide

Page 2: VSX R80.40 Administration Guide - InfoSec

Check Point Copyright Notice©2020 Check Point Software Technologies Ltd.

All rights reserved. This product and related documentation are protected by copyright and distributedunder licensing restricting their use, copying, distribution, and decompilation. No part of this product orrelated documentation may be reproduced in any form or by any means without prior written authorizationof Check Point. While every precaution has been taken in the preparation of this book, Check Pointassumes no responsibility for errors or omissions. This publication and features described herein aresubject to change without notice.

RESTRICTEDRIGHTS LEGEND:

Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR52.227-19.

TRADEMARKS:

Refer to the Copyright page for a list of our trademarks.

Refer to the Third Party copyright notices for a list of relevant copyrights and third-party licenses.

Page 3: VSX R80.40 Administration Guide - InfoSec

VSX R80.40 Administration Guide

VSX R80.40 Administration Guide      |      3

Important Information

Latest SoftwareWe recommend that you install the most recent software release to stay up-to-date with thelatest functional improvements, stability fixes, security enhancements and protectionagainst new and evolving attacks.

CertificationsFor third party independent certification of Check Point products, see the Check PointCertifications page.

Check Point R80.40For more about this release, see the R80.40 home page.

Latest Version of this DocumentOpen the latest version of this document in aWeb browser.Download the latest version of this document in PDF format.

FeedbackCheck Point is engaged in a continuous effort to improve its documentation.Please help us by sending your comments.

Revision History

Date Description

27 January 2020 First release of this document

Page 4: VSX R80.40 Administration Guide - InfoSec

Table of Contents

VSX R80.40 Administration Guide      |      4

Table of ContentsGlossary 15

Introduction 26

How VSX Works 27

Example Physical Network Topology 27

Example VSXVirtual Network Topology 28

VSX Architecture and Concepts 29

Management Server Connections 30

Local Management Connection 30

Remote Management Connection 33

VSXManagement Interface 35

Dedicated Management Interface (DMI) 35

Non-Dedicated Management Interface 35

Virtual Devices 36

Interfaces 38

Interface Types 38

Physical Interfaces 39

VLAN Interfaces 39

Warp Links 39

Unnumbered Interfaces 40

VSXManagement Overview 42

Security Management Server Model 42

Multi-Domain Security Management Model 42

Management Model Comparison 44

VSXTraffic Flow 45

Overview 45

Context Determination 45

Direct Connection to a Physical Interface 45

Connection through a Virtual Switch 47

Connection through a Virtual Router 48

Security Enforcement 49

Page 5: VSX R80.40 Administration Guide - InfoSec

Table of Contents

VSX R80.40 Administration Guide      |      5

Forwarding to Destination 49

VSXRouting Concepts 50

Routing Overview 50

Routing Between Virtual Systems 50

Route Propagation 52

Overlapping IP Address Space 52

More for Virtual Switch Route Propagation 54

NAT 54

Dynamic Routing 54

VSXClusters 55

High Availability 55

Virtual System Load Sharing (VSLS) 55

Deploying VSX - Internal Network Deployment Strategies 56

Security Gateway Deployment on a Physical Network 57

VSXVirtual System Deployment Strategies 58

Physical Internal Interface for Each Virtual System 58

Virtual Systems with Internal VLAN Interfaces 59

Internal Virtual Router with Source-Based Routing 60

Virtual Systems in Bridge Mode 62

Deploying VSX - Organizational Deployment Strategies 63

Enterprise Deployments 63

Core Network Security 63

Dynamic Routing 65

Perimeter Security 65

Managed Service Providers Using Multi-Domain Server 67

Data Centers 69

Data Centers in an Enterprise 71

Configuring VSX 73

Overview 73

Rules and Security Policies 73

Configuring VSXGateways 74

Creating a New VSXGateway 74

Wizard Step 1: Defining VSXGateway General Properties 75

Page 6: VSX R80.40 Administration Guide - InfoSec

Table of Contents

VSX R80.40 Administration Guide      |      6

Wizard Step 2: Selecting Virtual Systems Creation Templates 75

Wizard Step 3: Establishing SIC Trust 76

Initializing SIC Trust 76

Troubleshooting SIC Trust Initialization Problems 76

Wizard Step 4: Defining Physical Interfaces 76

Wizard Step 5: Virtual Network Device Configuration 77

Wizard Step 6: VSXGateway Management 77

Completing the VSXWizard 78

Configuring the Security Policy 78

Working with VSXGateways 79

Changing VSXGateway Definitions 79

VSXGateway - General Properties 79

Secure Internal Communication (SIC) 80

Check Point Software Blades 80

VSXGateway - Creation Templates 80

VSXGateway - Physical Interfaces 80

VSXGateway - Topology 81

Interfaces 81

Routes 81

Topology Calculation 82

Deleting a VSXGateway 82

Backing up and Restoring VSXGateway 83

Working with Virtual Systems 84

Introduction 84

Creating a New Virtual System 85

Defining General Properties 86

Defining Network Configuration 86

Shared Interface or Separate Interfaces 86

Separate Interfaces in Bridge Mode 87

Custom Configuration or Override - Non-Bridge Mode 87

Custom Configuration or Override in Bridge Mode 88

Completing the Definition 88

Modifying a Virtual System 88

Page 7: VSX R80.40 Administration Guide - InfoSec

Table of Contents

VSX R80.40 Administration Guide      |      7

Virtual System - General Properties 88

Virtual System - Topology 89

Virtual System - NAT > Advanced 89

Deleting a Virtual System 90

Working with Virtual Switches 91

Introduction 91

Creating a New Virtual Switch 92

Modifying a Virtual Switch 92

Virtual Switch - General Properties 93

Virtual Switch - Topology 93

Deleting a Virtual Switch 93

Working with Virtual Routers 94

Introduction 94

Creating a New Virtual Router 96

Modifying a Virtual Router Definition 96

Virtual Router - General Properties 97

Virtual Router - Topology 97

Deleting a Virtual Router 97

Working with Source-Based Routing 98

Introduction 98

Defining Source-Based Routing Rules 99

CoreXL for Virtual Systems 100

Introduction 100

Configuring CoreXL on a VSXGateway 100

Configuring CoreXL on Virtual Systems 100

Dynamic Routing for Virtual Devices 102

Working with Interface Definitions 103

Adding a New Interface 103

Configuring Connection Properties - General 103

Configuring Connections Leading to Virtual Routers and Switches 103

Configuring Interface Topology 104

Configuring Anti-Spoofing 104

Configuring Multicast Restrictions 104

Page 8: VSX R80.40 Administration Guide - InfoSec

Table of Contents

VSX R80.40 Administration Guide      |      8

Changing an Interface Definition 105

Deleting an Interface 105

Working with Authentication 106

Authentication Schemes 106

Configuring SecurID Authentication 107

Configuring RADIUS or TACACSAuthentication 107

Tracking the Status of VSXObjects 110

Working with Network Address Translation (NAT) 111

Using Application &URL Filtering with VSX 114

Using Anti-Bot and Anti-Virus with VSX 115

Using IPSwith VSX 116

Using Threat Emulation with VSX 117

Using Threat Extraction with VSX 118

Licensing VSX 119

VSX Licenses 119

Upgrading Licenses 119

The Trial Period 119

Using VSX with Multi-Domain Server 120

VSXProvisioning 122

Defining Multi-Domain Servers 123

Working with Virtual Devices 124

Adding a Virtual System to a Domain Management Server 124

Adding Virtual Routers and Virtual Switches to a Domain Management Server 124

Introduction to VSX Clusters 125

VSXCluster Overview 125

Physical Clusters 125

VSXClusters 126

Planning a VSXCluster Deployment 128

VSXCluster Architecture 128

Synchronization Network 128

Internal Communication Network 129

Virtual IP Addresses 129

VSXHigh Availability 130

Page 9: VSX R80.40 Administration Guide - InfoSec

Table of Contents

VSX R80.40 Administration Guide      |      9

Virtual System Load Sharing (VSLS) 131

Introduction 131

Requirements 133

Virtual System Priority 133

Virtual SystemWeight 133

Virtual System States 134

Normalized VSLSDeployment Scenario 134

VSXCluster Member Failure Scenario 136

Virtual System Failure Scenario 137

Failure Recovery 138

Using Virtual Switches in a VSXCluster 139

Working with VSX Clusters 140

Configuration Overview 140

Creating VSXClusters 140

Defining Cluster General Properties 140

Selecting Virtual Systems Creation Templates 141

Adding VSXCluster Member 141

Defining Cluster Interfaces 141

Configuring VSXCluster Members 142

Cluster Management 142

Completing the Wizard 143

Modifying a VSXCluster Definition 144

General Properties 145

VSXCluster Members 145

Gateway VSXCluster Member List 145

Where Used 146

Internal IP Address and Net Mask 146

ClusterXL 146

Creation Templates 146

Physical Interfaces 146

Synchronization 147

Topology 147

Interfaces 147

Page 10: VSX R80.40 Administration Guide - InfoSec

Table of Contents

VSX R80.40 Administration Guide      |      10

Routes 147

Calculating Topology Automatically Based on Routing Information 149

VPNDomain 149

NAT 149

VSXBridge Configuration 150

Changing the Cluster Management IP and/or Subnet 150

Changing the Internal Communication Network IP 150

Working with VSXCluster Members 151

Adding a New VSXCluster Member 151

Deleting a VSXCluster Member 153

Changing the VSXCluster Type 154

Converting from VSLS to High Availability 154

Converting from High Availability to VSLS 156

Configuring VSXCluster in High Availability Mode 157

Configuring Virtual System Load Sharing 158

Enabling VSLS 159

Creating a New VSLSCluster 159

Using the "vsx_util vsls" Command 160

Distributing Virtual Systems Between VSXCluster Members 161

Distributing Virtual Systems for Equal Member Loading 161

Placing All Active Systems on the Same Member 161

Assigning Priorities and Weights for a Single Virtual System 161

Viewing VSLSStatus 163

Exporting and Importing VSLSConfigurations 164

VSLSConfiguration File 165

Exporting a VSLS configuration 165

Processing Options 166

Importing a VSLS configuration 166

Advanced Clustering Configuration 167

Monitoring all VLANs in VSXCluster 167

Configuring CoreXL in a VSLSVSXCluster 167

Working with Link Aggregation 168

Link Aggregation Overview 168

Page 11: VSX R80.40 Administration Guide - InfoSec

Table of Contents

VSX R80.40 Administration Guide      |      11

How Link Aggregation Works 169

Link Aggregation High Availability 169

Link Aggregation Load Sharing 170

Bond Interface Limitations 171

Configuring Bond High Availability Mode 172

Configuring the High Availability Bond 172

Updating the Interface Topology 172

Reconfiguring the Bond 173

Reconfiguring Topology with 'vsx_util change_interfaces' 174

Configuring Bond Load Sharing Mode 175

Configuring the Load Sharing Bond 175

Setting Critical Required Interfaces 176

Affinities of Bond Slave Interfaces to CPUCores 176

Bond Failover 178

Link State Initiated Failover 178

Failover Initiated by Cluster Control Protocol (CCP) 178

Failover Support for VLANs 178

Configuring Cisco Switches for Link Aggregation Load Sharing Mode 180

For 802.3ad (LACP) 180

For XOR 180

Troubleshooting Bonded Interfaces 181

Troubleshooting Workflow 181

Connectivity Delays on Switches 182

Warning Regarding Use of PortFast 182

Optimizing VSX 183

QoS 184

QoSManagement 185

QoSEnforcement 186

Differentiated Services Support 186

Inbound Prioritization 187

Policy with Global Scope 187

Resource Allocation 187

Latency 187

Page 12: VSX R80.40 Administration Guide - InfoSec

Table of Contents

VSX R80.40 Administration Guide      |      12

WRED 188

QoSConfiguration (cpqos) 189

The cpqos Command 189

QoSPolicy File 191

QoSDefault Configuration 191

Sample Differentiated Services Implementation 192

Monitoring Memory Resources (vsx mstat) 195

Monitoring CPUResources (vsx resctrl) 196

SNMPMonitoring 197

Supported SNMPVersions 197

Supported SNMPModes 197

SNMPDefault Mode 198

SNMPVSMode 199

SNMPVS in the "vs-direct-access" Mode 200

Configuring SNMPModes 201

Example SNMP queries for Virtual Systems 202

The VSXSNMPTree 205

Configuring Jumbo Frames 206

Jumbo Frames on a Virtual Switch 206

Jumbo Frames on a Virtual Router 206

Jumbo Frames on a Virtual System in Bridge Mode 207

Bridge Mode 208

Active/Active Bridge Mode (Spanning Tree Protocol) 208

Active/Standby Bridge Mode 209

VLAN Shared Interface Deployment 209

Virtual System in Bridge Mode 211

Core Network Security 211

Configuring Virtual Systems for Active/Standby Bridge Mode 212

Custom Configuration or Override in Bridge Mode 213

Separate Interfaces in Bridge Mode 213

Multi Bridges 214

VSXCluster in Bridge Mode 217

Enabling Active/Standby Bridge Mode on a New VSXCluster 217

Page 13: VSX R80.40 Administration Guide - InfoSec

Table of Contents

VSX R80.40 Administration Guide      |      13

Enabling Active/Standby Bridge Mode on an Existing VSXCluster 218

Enabling Active/Active Bridge Mode on an Existing VSXCluster 218

VSX Diagnostics and Troubleshooting 219

General Troubleshooting Steps 220

Troubleshooting Specific Problems 221

Command Line Reference 225

Syntax Legend 226

cpconfig 227

vsenv 230

vsx 231

vsx fetch 233

vsx fetch_all_cluster_policies 235

vsx fetchvs 236

vsx get 237

vsx initmsg 238

vsx mstat 239

vsx resctrl 243

vsx showncs 245

vsx sicreset 246

vsx stat 247

vsx unloadall 249

vsx vspurge 250

vsx_util 251

vsx_util add_member 254

vsx_util change_interfaces 256

vsx_util change_mgmt_ip 259

vsx_util change_mgmt_subnet 260

vsx_util change_private_net 261

vsx_util convert_cluster 262

vsx_util reconfigure 263

vsx_util remove_member 267

vsx_util show_interfaces 268

vsx_util upgrade 270

Page 14: VSX R80.40 Administration Guide - InfoSec

Table of Contents

VSX R80.40 Administration Guide      |      14

vsx_util view_vs_conf 271

vsx_util vsls 274

vsx_provisioning_tool 275

Transactions 278

vsx_provisioning_tool Commands 279

Explicit Transaction Commands 280

Adding a VSXGateway 281

Adding a VSXCluster 283

Adding a Virtual Device 285

Deleting a Virtual Device 288

Modifying Settings of a Virtual Device 289

Adding an Interface to a Virtual Device 291

Removing an Interface from a Virtual Device 294

Modifying Settings of an Interface 295

Adding a Route 298

Removing a Route 300

Showing Virtual Device Data 301

Script Examples 302

Example 1 302

Example 2 303

Example 3 303

Configuration Examples 304

Example 1: VSXGateway managed by Security Management Server 305

Topology 305

Action Plan 306

Example 2: VSXCluster managed by Multi-Domain Server 315

Topology 316

Action Plan 318

Working with Kernel Parameters on Security Gateway 333

Kernel Debug on Security Gateway 334

Page 15: VSX R80.40 Administration Guide - InfoSec

Glossary

VSX R80.40 Administration Guide      |      15

GlossaryA

AdministratorA user with permissions to manage Check Point security products and the networkenvironment.

APIIn computer programming, an application programming interface (API) is a set ofsubroutine definitions, protocols, and tools for building application software. In generalterms, it is a set of clearly defined methods of communication between various softwarecomponents.

ApplianceA physical computer manufactured and distributed by Check Point.

B

BondA virtual interface that contains (enslaves) two or more physical interfaces forredundancy and load sharing. The physical interfaces share one IP address and oneMAC address. See "Link Aggregation".

BondingSee "Link Aggregation".

Bridge ModeA Security Gateway or Virtual System that works as a Layer 2 bridge device for easydeployment in an existing topology.

Page 16: VSX R80.40 Administration Guide - InfoSec

Glossary

VSX R80.40 Administration Guide      |      16

C

CACertificate Authority. Issues certificates to gateways, users, or computers, to identifyitself to connecting entities with Distinguished Name, public key, and sometimes IPaddress. After certificate validation, entities can send encrypted data using the publickeys in the certificates.

CertificateAn electronic document that uses a digital signature to bind a cryptographic public keyto a specific identity. The identity can be an individual, organization, or software entity.The certificate is used to authenticate one identity to another.

ClusterTwo or more Security Gateways that work together in a redundant configuration - HighAvailability, or Load Sharing.

Cluster MemberA Security Gateway that is part of a cluster.

CoreXLA performance-enhancing technology for Security Gateways on multi-core processingplatforms. Multiple Check Point Firewall instances are running in parallel on multipleCPU cores.

CoreXL Firewall InstanceAlso CoreXL FW Instance. On a Security Gateway with CoreXL enabled, the Firewallkernel is copied multiple times. Each replicated copy, or firewall instance, runs on oneprocessing CPU core. These firewall instances handle traffic at the same time, andeach firewall instance is a complete and independent firewall inspection kernel.

Page 17: VSX R80.40 Administration Guide - InfoSec

Glossary

VSX R80.40 Administration Guide      |      17

CoreXL SNDSecure Network Distributer. Part of CoreXL that is responsible for: Processing incomingtraffic from the network interfaces; Securely accelerating authorized packets (ifSecureXL is enabled); Distributing non-accelerated packets between Firewall kernelinstances (SND maintains global dispatching table, which maps connections that wereassigned to CoreXL Firewall instances). Traffic distribution between CoreXL Firewallinstances is statically based on Source IP addresses, Destination IP addresses, and theIP 'Protocol' type. The CoreXL SND does not really "touch" packets. The decision tostick to a particular FWK daemon is done at the first packet of connection on a very highlevel, before anything else. Depending on the SecureXL settings, and in most of thecases, the SecureXL can be offloading decryption calculations. However, in some othercases, such as with Route-Based VPN, it is done by FWK daemon.

CPUSECheck Point Upgrade Service Engine for Gaia Operating System. With CPUSE, youcan automatically update Check Point products for the Gaia OS, and the Gaia OS itself.For details, see sk92449.

D

DAIP GatewayA Dynamically Assigned IP (DAIP) Security Gateway is a Security Gateway where theIP address of the external interface is assigned dynamically by the ISP.

Data TypeA classification of data. The Firewall classifies incoming and outgoing traffic accordingto Data Types, and enforces the Policy accordingly.

DatabaseThe Check Point database includes all objects, including network objects, users,services, servers, and protection profiles.

Dedicated Management InterfaceA separate physical interface on VSX Gateway or VSX Cluster Members, through whichCheck Point Security Management Server or Multi-Domain Server connects directly toVSX Gateway or VSX Cluster Members. DMI is restricted to management traffic, suchas provisioning, logging and monitoring. Acronym: DMI.

Distributed DeploymentThe Check Point Security Gateway and Security Management Server products aredeployed on different computers.

Page 18: VSX R80.40 Administration Guide - InfoSec

Glossary

VSX R80.40 Administration Guide      |      18

DomainA network or a collection of networks related to an entity, such as a company, businessunit or geographical location.

Domain Log ServerA Log Server for a specified Domain. It stores and processes logs from SecurityGateways that are managed by the corresponding Domain Management Server.Acronym: DLS.

Domain Management ServerA virtual Security Management Server that manages Security Gateways for oneDomain, as part of a Multi-Domain Security Management environment. Acronym: DMS.

E

Expert ModeThe name of the full command line shell that gives full system root permissions in theCheck Point Gaia operating system.

External NetworkComputers and networks that are outside of the protected network.

External UsersUsers defined on external servers. External users are not defined in the SecurityManagement Server database or on an LDAP server. External user profiles tell thesystem how to identify and authenticate externally defined users.

F

FirewallThe software and hardware that protects a computer network by analyzing the incomingand outgoing network traffic (packets).

G

GaiaCheck Point security operating system that combines the strengths of bothSecurePlatform and IPSO operating systems.

Page 19: VSX R80.40 Administration Guide - InfoSec

Glossary

VSX R80.40 Administration Guide      |      19

Gaia ClishThe name of the default command line shell in Check Point Gaia operating system. Thisis a restrictive shell (role-based administration controls the number of commandsavailable in the shell).

Gaia PortalWeb interface for Check Point Gaia operating system.

H

HotfixA piece of software installed on top of the current software in order to fix some wrong orundesired behavior.

I

ICAInternal Certificate Authority. A component on Check Point Management Server thatissues certificates for authentication.

Internal NetworkComputers and resources protected by the Firewall and accessed by authenticatedusers.

IPv4Internet Protocol Version 4 (see RFC 791). A 32-bit number - 4 sets of numbers, eachset can be from 0 - 255. For example, 192.168.2.1.

IPv6Internet Protocol Version 6 (see RFC 2460 and RFC 3513). 128-bit number - 8 sets ofhexadecimal numbers, each set can be from 0 - ffff. For example,FEDC:BA98:7654:3210:FEDC:BA98:7654:3210.

J

Jumbo Hotfix AccumulatorCollection of hotfixes combined into a single package. Acronyms: JHA, JHF.

Page 20: VSX R80.40 Administration Guide - InfoSec

Glossary

VSX R80.40 Administration Guide      |      20

L

Link AggregationVarious methods of combining (aggregating) multiple network connections in parallel toincrease throughput beyond what a single connection could sustain, and to provideredundancy in case one of the links should fail.

LogA record of an action that is done by a Software Blade.

Log ServerA dedicated Check Point computer that runs Check Point software to store and processlogs in Security Management Server or Multi-Domain Security Managementenvironment.

M

Main Domain Management ServerA Domain Management Server on a Multi-Domain Server, on which you defined theobject of your VSX Gateway or VSX Cluster. In this case, objects of your VirtualSystems are defined on different Domain Management Servers (Target DomainManagement Servers).

Management High AvailabilityDeployment and configuration mode of two Check Point Management Servers, in whichthey automatically synchronize the management databases with each other. In thismode, one Management Server is Active, and the other is Standby. Acronyms:Management HA, MGMT HA.

Management InterfaceInterface on Gaia computer, through which users connect to Portal or CLI. Interface on aGaia Security Gateway or Cluster member, through which Management Serverconnects to the Security Gateway or Cluster member.

Management ServerA Check Point Security Management Server or a Multi-Domain Server.

Page 21: VSX R80.40 Administration Guide - InfoSec

Glossary

VSX R80.40 Administration Guide      |      21

Multi-Domain Log ServerA computer that runs Check Point software to store and process logs in Multi-DomainSecurity Management environment. The Multi-Domain Log Server consists of DomainLog Servers that store and process logs from Security Gateways that are managed bythe corresponding Domain Management Servers. Acronym: MDLS.

Multi-Domain Security ManagementA centralized management solution for large-scale, distributed environments with manydifferent Domain networks.

Multi-Domain ServerA computer that runs Check Point software to host virtual Security Management Serverscalled Domain Management Servers. Acronym: MDS.

N

Network ObjectLogical representation of every part of corporate topology (physical machine, softwarecomponent, IP Address range, service, and so on).

Non-Dedicated Management InterfaceA shared physical interface on VSX Gateway or VSX Cluster Members, which carriesuser "production" traffic and through which Check Point Security Management Server orMulti-Domain Server connects to VSX Gateway or VSX Cluster Members. Non-DMIconfiguration requires the use of a Virtual Router or Virtual Switch. Acronym: Non-DMI.

O

Open ServerA physical computer manufactured and distributed by a company, other than CheckPoint.

P

Primary Multi-Domain ServerThe Multi-Domain Server in Management High Availability that you install as Primary.

Page 22: VSX R80.40 Administration Guide - InfoSec

Glossary

VSX R80.40 Administration Guide      |      22

R

RuleA set of traffic parameters and other conditions in a Rule Base that cause specifiedactions to be taken for a communication session.

Rule BaseAlso Rulebase. All rules configured in a given Security Policy.

S

Secondary Multi-Domain ServerThe Multi-Domain Server in Management High Availability that you install asSecondary.

SecureXLCheck Point product that accelerates IPv4 and IPv6 traffic. Installed on SecurityGateways for significant performance improvements.

Security GatewayA computer that runs Check Point software to inspect traffic and enforces SecurityPolicies for connected network resources.

Security Management ServerA computer that runs Check Point software to manage the objects and policies in CheckPoint environment.

Security PolicyA collection of rules that control network traffic and enforce organization guidelines fordata protection and access to resources with packet inspection.

SICSecure Internal Communication. The Check Point proprietary mechanism with whichCheck Point computers that run Check Point software authenticate each other overSSL, for secure communication. This authentication is based on the certificates issuedby the ICA on a Check Point Management Server.

Page 23: VSX R80.40 Administration Guide - InfoSec

Glossary

VSX R80.40 Administration Guide      |      23

Single Sign-OnA property of access control of multiple related, yet independent, software systems. Withthis property, a user logs in with a single ID and password to gain access to aconnected system or systems without using different usernames or passwords, or insome configurations seamlessly sign on at each system. This is typically accomplishedusing the Lightweight Directory Access Protocol (LDAP) and stored LDAP databaseson (directory) servers. Acronym: SSO.

SmartConsoleA Check Point GUI application used to manage Security Policies, monitor products andevents, install updates, provision new devices and appliances, and manage a multi-domain environment and each domain.

SmartDashboardA legacy Check Point GUI client used to create and manage the security settings inR77.30 and lower versions.

Software BladeA software blade is a security solution based on specific business needs. Each blade isindependent, modular and centrally managed. To extend security, additional blades canbe quickly added.

SSOSee "Single Sign-On".

StandaloneA Check Point computer, on which both the Security Gateway and SecurityManagement Server products are installed and configured.

T

Target Domain Management ServerA Domain Management Server on a Multi-Domain Server, on which you defined theobjects of your Virtual Systems. In this case, object of your VSX Gateway or VSXCluster are defined on a different Domain Management Server (Main DomainManagement Server).

TrafficFlow of data between network devices.

Page 24: VSX R80.40 Administration Guide - InfoSec

Glossary

VSX R80.40 Administration Guide      |      24

U

UsersPersonnel authorized to use network resources and applications.

V

Virtual DeviceA logical object that emulates the functionality of a type of physical network object.

Virtual RouterA Virtual Device on a VSX Gateway or VSX Cluster Member that functions as aphysical router. Acronym: VR.

Virtual SwitchA Virtual Device on a VSX Gateway or VSX Cluster Member that functions as aphysical switch. Acronym: VSW.

Virtual SystemA Virtual Device on a VSX Gateway or VSX Cluster Member that implements thefunctionality of a Security Gateway. Acronym: VS.

Virtual System Load SharingA VSX Cluster technology that assigns Virtual System traffic to different Active ClusterMembers. Acronym: VSLS.

VLANVirtual Local Area Network. Open servers or appliances connected to a virtual network,which are not physically connected to the same network.

VLAN TrunkA connection between two switches that contains multiple VLANs.

VSLSSee "Virtual System Load Sharing".

Page 25: VSX R80.40 Administration Guide - InfoSec

Glossary

VSX R80.40 Administration Guide      |      25

VSXVirtual System Extension. Check Point virtual networking solution, hosted on acomputer or cluster with virtual abstractions of Check Point Security Gateways andother network devices. These Virtual Devices provide the same functionality as theirphysical counterparts.

VSX GatewayPhysical server that hosts VSX virtual networks, including all Virtual Devices thatprovide the functionality of physical network devices. It holds at least one VirtualSystem, which is called VS0.

W

Warp LinkAn interface between a Virtual System and a Virtual Switch or Virtual Router that iscreated automatically in a VSX topology.

Page 26: VSX R80.40 Administration Guide - InfoSec

VSX R80.40 Administration Guide

VSX R80.40 Administration Guide      |      26

IntroductionThe VSXAdministration Guide describes the Virtual System eXtension product that runs several virtualfirewalls on the same hardware.

Page 27: VSX R80.40 Administration Guide - InfoSec

How VSX Works

VSX R80.40 Administration Guide      |      27

How VSXWorksEach Virtual System works as a Security Gateway, typically protecting a specified network. When packetsarrive at the VSXGateway, it sends traffic to the Virtual System protecting the destination network. TheVirtual System inspects all traffic and allows or rejects it according to rules defined in the security policy.

In order to better understand how virtual networks work, it is important to compare physical networkenvironments with their virtual (VSX) counterparts. While physical networks consist of many hardwarecomponents, VSX virtual networks reside on a single configurable VSXGateway or cluster that defines andprotects multiple independent networks, together with their virtual components.

Example Physical Network Topology

In a typical deployment with multiple Security Gateways, each protects a separate network.

Each physical Security Gateway has interfaces to the perimeter router and to the network it protects.

Item Description

1 Internet

2 Router

3 Security Gateways

4 Network

Page 28: VSX R80.40 Administration Guide - InfoSec

How VSX Works

VSX R80.40 Administration Guide      |      28

Example VSX Virtual Network Topology

Deploy one VSXGateway with four Virtual Systems to protect multiple networks.

Item Description

1 Internet

2 Router

3 VSXGateway.Each Virtual System in a VSX environment is a Security Gateway, with the same security andnetworking functionality as a physical gateway.Each handles packet traffic to and from the one network it protects.

4 Warp Links.Virtual interfaces and network cables connect the Virtual Systems and the Virtual Switch.

5 Virtual Switch.Connects all the Virtual Systems to the Internet router.

6 Networks

Page 29: VSX R80.40 Administration Guide - InfoSec

VSX Architecture and Concepts

VSX R80.40 Administration Guide      |      29

VSX Architecture and ConceptsAVSXGateway is a physical machine that hosts virtual networks of Virtual Devices, with the functionalityof their physical network counterparts such as: Security Gateways, routers and switches.

A VSXGateway handles these tasks:

n Communicates with the Management Server to deploy, configure, and manage all Virtual Devices.

n Manages state synchronization for High Availability and for Load Sharing in cluster deployments.

Page 30: VSX R80.40 Administration Guide - InfoSec

Management Server Connections

VSX R80.40 Administration Guide      |      30

Management Server ConnectionsAManagement Server (Security Management Server or Multi-Domain Server) connects to the VSXGateway and provides provisioning and configuration services for Virtual Devices located on the VSXGateway. You can connect the Management Server to the VSXGateway using one of the followingscenarios.

n Local Management Connection

n Remote Management Connection

Local Management ConnectionThe Management Server connects directly to the VSXGateway using a dedicated VSXmanagementinterface.

When using a local Management Server (Security Management Server or Multi-Domain Server), allmanagement traffic is handled by a Dedicated Management Interface (DMI) that connects the VSXGateway to the Management Server. The IP address of this dedicated management interface can beeither private or public.

Page 31: VSX R80.40 Administration Guide - InfoSec

Management Server Connections

VSX R80.40 Administration Guide      |      31

Item Description Item Description

1 Network 1 6 VSXGateway

2 Network 2 7 Router

Page 32: VSX R80.40 Administration Guide - InfoSec

Management Server Connections

VSX R80.40 Administration Guide      |      32

Item Description Item Description

3 Network 3 8 Internet

4 Network 4 9 Management Server

5 Switch 10 SmartConsole

Page 33: VSX R80.40 Administration Guide - InfoSec

Management Server Connections

VSX R80.40 Administration Guide      |      33

Remote Management ConnectionThe Management Server connects to the VSXGateway by means of a router connected to a VSXmanagement interface.

This method ensures segregation of management traffic from all other traffic.

When using a remote Management Server (Security Management Server or Multi-Domain Server),management traffic travels via an internal or external network to a VSXGateway to the managementinterface.

This architecture segregates management traffic from all other traffic passing through the VSXGateway.

Check Point recommends that remote management connections use a dedicated management interface(DMI) that connects directly to a router or switch that leads to the external network or the Internet.

Item Description Item Description

1 SmartConsole 9 Virtual Switch

Page 34: VSX R80.40 Administration Guide - InfoSec

Management Server Connections

VSX R80.40 Administration Guide      |      34

Item Description Item Description

2 Management Server 10 Warp Link

3 Management traffic 11 Virtual System 1

4 Internet 12 Virtual System 2

5 Router 13 Switch

6 Dedicated management interface (eth0) 14 Network 1

7 External interface 15 Network 2

8 VSXGateway

You can choose to use a non-dedicated management interface by connecting a Virtual Router or VirtualSwitch to the management interface.

When management traffic passes through a Virtual Router or Virtual Switch, you must ensure that theassociated Warp Link IP address originates from the remote network.

Furthermore, if the remote management connection arrives via the Internet, you must assign a routable,public IP address.

Page 35: VSX R80.40 Administration Guide - InfoSec

VSX Management Interface

VSX R80.40 Administration Guide      |      35

VSX Management InterfaceAVSX deployment can be managed using one of the following interface schemes:

n Dedicated Management Interface (DMI)

n Non-Dedicated Management Interface

Dedicated Management Interface (DMI)Uses a separate interface that is restricted to management traffic, such as provisioning, logging andmonitoring.

Best Practice - Use a DMI for management to segregate management traffic fromroutine "production" traffic enhanced performance, especially for end users.

Non-Dedicated Management InterfaceUses a shared internal or external interface that also carries routine user traffic

When configuring a non-DMI deployment, you can define remote management connections only via aVirtual Switch or Virtual Router.

Remote management connects via a Virtual System are not supported.

When using non-DMI for the following reasons:

n Provisioning and logging may degrade user performance.

n Non-DMI is irreversible - you cannot change a non-DMI gateway to DMI.

Page 36: VSX R80.40 Administration Guide - InfoSec

Virtual Devices

VSX R80.40 Administration Guide      |      36

Virtual DevicesThis section describes virtual network components and their characteristics:

n Virtual Systems

AVirtual System is a virtual security and routing domain that provides the functionality of aSecurity Gateway with full Firewall and VPN facilities.

Multiple Virtual Systems can run concurrently on a single VSXGateway.

Each Virtual System functions independently.

Each Virtual System maintains its own Software Blades, interfaces, IP addresses, routing table,ARP table, and dynamic routing configuration. Each Virtual System also maintains its own:

l State Tables: Each Virtual System has its own kernel tables with configuration and runtimedata, such as active connections and IPsec tunnel information.

l Security and VPN policies: Each Virtual System enforces its own security and VPNPolicies (including INSPECT code). Policies are retrieved from the Management Serverand stored separately on the local disk and in the kernel. In a Multi-Domain Serverenvironment, each Domain database is maintained separately on the Management Serverand on the VSXGateway.

l Configuration Parameters: Each Virtual System maintains its own configuration, such asIPS settings and TCP/UDP time-outs. Different Virtual Systems can run in Layer 2 or Layer3 mode and co-exist on the same VSXGateway.

l Logging Configuration: Each Virtual System maintains its own logs and runs loggingaccording to its own rules and configuration.

n Virtual Routers

AVirtual Router is an independent routing domain within a VSXGateway that performs thefunctionality of physical routers.

Virtual Routers are useful for connecting multiple Virtual Systems to a shared interface, such asthe interface leading to the Internet, and for routing traffic from one Virtual System to another.Virtual Routers support dynamic routing.

Virtual Routers perform the following routing functions:

l Packets arriving at the VSXGateway through a shared interface to the designated VirtualSystem based on the source or destination IP address.

l Traffic arriving from Virtual Systems directed to a shared interface or to other VirtualSystems.

l Traffic to and from shared network resources such as a DMZ.

As with physical routers, each Virtual Router maintains a routing table with a list of route entriesdescribing known networks and directions on how to reach them.

Depending on the deployment requirements, multiple Virtual Routers can be configured.

Page 37: VSX R80.40 Administration Guide - InfoSec

Virtual Devices

VSX R80.40 Administration Guide      |      37

To protect themselves, Virtual Routers inspect all traffic destined to, or emanating fromthemselves (for example, an ICMP ping to the Virtual Router IP address) based on the securitypolicy. Traffic that is not sent to, or coming from the Virtual Router is not inspected by the VirtualRouter policy and is sent to its destination.

n Virtual Switches

By providing Layer 2 connectivity, a Virtual Switch connects Virtual Systems and facilitatessharing a common physical interface without segmenting the existing IP network. As with aphysical switch, each Virtual Switch maintains a forwarding table with a list of MAC addresses andtheir associated ports.

In contrast to a Virtual Router, when sharing a physical interface via a Virtual Switch there is noneed:

l To allocate an additional subnet for IP addresses of Virtual Systems connected to theswitch.

l To manually configure the routing on the routers adjacent to the shared interface.

You can create multiple Virtual Switches in a virtual network topology.

Note - When sharing a physical interface via a Virtual Switch, the IPaddresses for Virtual Systems connected to a Virtual Switch should beallocated from the same subnet as the shared interface. If the only functionthe Virtual Switch performs is to connect Virtual Systems, then the VirtualSwitch can be defined without interfaces (unless Virtual System Load Sharingis enabled).

Page 38: VSX R80.40 Administration Guide - InfoSec

Interfaces

VSX R80.40 Administration Guide      |      38

InterfacesThis section describes the various types of interfaces and how they are used in a VSX configuration.

Interface TypesThe principal interface types are:

n Physical Interface

n VLAN interface

n Warp Link (including unnumbered interfaces)

Item Description Item Description

1 Internet 8 Management Server

2 Router 9 Virtual Switch

3 Physical interface 10 Warp interface

4 VLAN Switch 11 Virtual System 1

5 Network 1 12 Virtual System 2

Page 39: VSX R80.40 Administration Guide - InfoSec

Interfaces

VSX R80.40 Administration Guide      |      39

Item Description Item Description

6 Network 2 13 VLAN Interface

7 VSXGateway 14 VLAN Trunk

Notes:

n Warp Links connect the Virtual Switch to each Virtual System.n APhysical Interface connects the Virtual Switch to an external router leading to the

Internet.n VLAN Interfaces connect the Virtual Systems to the VLAN Switch, via A VLAN trunk.n The VLAN switch connects to the protected networks.

Physical InterfacesPhysical interfaces connect a VSXGateway to Management Server and to internal and external networks.

There are different types of physical interfaces used in a VSXGateway:

n Dedicated Management Interface: Connects the VSXGateway to the Management Server when itis locally managed.

If the VSXGateway is remotely managed, the management connection arrives through the externalor internal interface.

n External interface: Connects the VSXGateway to the Internet or other untrusted networks.

n Internal Interface: Connects the VSXGateway to a protected network.

n Synchronization Interface: Connects one VSXCluster Member to other VSXCluster Members forstate synchronization.

You can install and configure more physical interfaces to a Virtual Device as required.

A VSXGateway can theoretically contain as many physical interfaces as permitted by gateway hardwareand memory constraints.

VLAN InterfacesVirtual Systems typically connect to protected VLAN networks using IEEE 802.1q compliant VLANInterfaces.

The networks are connected to ports on an 802.1q-compliant switch that trunks all traffic via a singlephysical interface to the VSXGateway.

VSX uses VLAN tags to direct the Ethernet frames to the specific Virtual System handling each network.

VSX assigns a virtual VLAN interface to each VLAN tag on a specific physical interface.

For example: VLAN tag 100 on eth3will be assigned a virtual interface named eth3.100.

Warp LinksAWarp Link is a virtual point-to-point connection between a Virtual System and a Virtual Router or VirtualSwitch.

Each side of a Warp Link represents a virtual interface with the appropriate Virtual Device.

VSX automatically assigns a name to each virtual interface when administrators create the link.

Page 40: VSX R80.40 Administration Guide - InfoSec

Interfaces

VSX R80.40 Administration Guide      |      40

Warp Interfaces on the Virtual System side are assigned the prefix wrp and those on the Virtual Router /Virtual Switch side are assigned the prefix wrpj.

In both cases, VSX appends a unique number to the prefix to form the interface name.

When connected to a Virtual Switch, VSX also assigns a unique MAC address to each Warp Link.

Unnumbered InterfacesVSX lets you reduce the number of IP addresses required for a VSX network deployment when using oneor more Virtual Routers.

AWarp Link connected to a Virtual Router can "borrow" an existing IP address from another interface,instead of assigning a dedicated address to the interface leading to a Virtual Router.

This capability is known as an Unnumbered Interface.

Item Description

1 VSXGateway

2 The external interface serves as the next hop from the Virtual Router

Page 41: VSX R80.40 Administration Guide - InfoSec

Interfaces

VSX R80.40 Administration Guide      |      41

Item Description

3 External

4 Virtual Router

5 Unnumbered External Interfaces IP "borrowed" from internal interfaces

6 Internal Interfaces with predefined IP addresses

7 Internal

In this example, the external interfaces for each Virtual System are unnumbered and borrow the IPaddress of the internal interfaces.

Unnumbered interfaces act as the next hop from the Virtual Router.

Unnumbered Interface Limitations

The following limitations apply to Unnumbered Interfaces:

n Unnumbered interfaces must connect to a Virtual Router.

n You can only "borrow" an individual interface IP address once.

n In order to use VPN or Hide NAT, the borrowed address must be routable.

Page 42: VSX R80.40 Administration Guide - InfoSec

VSX Management Overview

VSX R80.40 Administration Guide      |      42

VSX Management OverviewVSX supports two Check Point management models: Security Management Server and Multi-DomainServer.

Both models provide central configuration, management and monitoring for multiple VSXGateways andVirtual Systems.

The choice of management model depends on several factors, including:

n The scale of the current deployment and anticipated expansion

n Administrative requirements

n Physical and operational requirements

n Licensing restrictions

You can use either management model to manage a "physical" Security Gateway together with a VSXGateway and Virtual Systems.

You can also manage VPN communities and remote connections with either model.

Note - According to the Check Point EULA (End User License Agreement), a SecurityGateway can only manage security policies for Virtual Systems belonging to a singlelegal entity. In order to manage Virtual Systems belonging to multiple legal entities, youneed to deploy a Multi-Domain Security Management solution with a separate DomainManagement Server for each legal entity. For more information regarding Licensing,refer to your Check Point Reseller.

Security Management Server ModelThe Security Management Server model is for enterprise deployments with many Virtual Systems, but onedomain.

SmartConsole connects to the VSXGateway, which contains the Virtual Systems, and directly manageseach Virtual System.

Multi-Domain Security Management ModelWith Multi-Domain Security Management, you centrally manage multiple networks, typically of differentDomains, divisions, or branches.

The Multi-Domain Server is the central management node that controls the policy databases for each ofthese networks.

Each Domain network is managed by a Domain Management Server, which provides the full functionalityof a Security Management Server and can host multiple Virtual Systems, virtual and physical devices.

The Domain Management Server that manages a VSXGateway or VSXCluster is theMainDomainManagement Server.

A VSXGateway or VSXCluster can host Virtual Systems that are managed by different DomainManagement Servers.

The Domain Management Server that manages a VSXVirtual System or VSXVirtual Router is the TargetDomain Management Server.

Page 43: VSX R80.40 Administration Guide - InfoSec

VSX Management Overview

VSX R80.40 Administration Guide      |      43

Item Description

1 SmartConsole

2 Multi-Domain Server

3 Domain Management Server

4 Main Domain Management Server

5 VSXGateway

6 Virtual Systems in Domain Management Servers

From a SmartConsole connected to a Multi-Domain Server, provision and configure Domains and DomainManagement Servers.

Each Domain Management Server uses its own SmartConsole instance to provision and configure itsVirtual Systems, Virtual Devices, and policies.

Page 44: VSX R80.40 Administration Guide - InfoSec

VSX Management Overview

VSX R80.40 Administration Guide      |      44

Management Model ComparisonThe following table summarizes the capabilities and differences between the two management models.

The capacity figures shown for Multi-Domain Server represent estimated, practical limits that will sustainacceptable performance levels under normal conditions.

Actual performance is dependent on many factors, including deployed hardware, network topology, trafficload and security requirements.

Feature Security Management Server Multi-Domain Server (Practical Limit)

Management Domains 1 250

Concurrent Administrators 1 250

Object Databases 1 250

Policies 250 250

Certificate Authorities 1 250

Virtual Systems 25 (recommended) 250

Management Server Communication - SIC

All communication between the Management Server and the VSXGateway is accomplished by means ofSecure Internal Communication (SIC), a certificate based channel that authenticates communicationbetween Check Point components.

The Management Server uses SIC for provisioning Virtual Devices, policy installation, logging, and statusmonitoring.

SIC trust is initially established using a one-time password during configuration of the VSXGateway or VSXCluster Members.

For Multi-Domain Security Management deployments, SIC trust is established between the DomainManagement Server associated with the VSXGateway or VSXCluster (Main Domain ManagementServer).

The Virtual Devices establish trust in a different manner than their physical counterparts.

When you create a Virtual Device, VSX automatically establishes SIC trust using the securecommunication channel defined between the Management Server and the VSXGateway.

The VSXGateway uses its management interface for Secure Internal Communication between theManagement Server and all Virtual Devices.

Page 45: VSX R80.40 Administration Guide - InfoSec

VSX Traffic Flow

VSX R80.40 Administration Guide      |      45

VSX Traffic FlowIn This Section:

Overview 45

Context Determination 45

Direct Connection to a Physical Interface 45

Connection through a Virtual Switch 47

Connection through a Virtual Router 48

Security Enforcement 49

Forwarding to Destination 49

OverviewAVSXGateway processes traffic according to the following steps:

n Context determination

n Security enforcement

n Forwarding to destination

Context DeterminationVSX incorporates VRF (Virtual Routing and Forwarding) technology that allows creation of multiple,independent routing domains on a single VSXGateway or VSXCluster. The independence of theserouting domains makes possible the use of Virtual Devices with overlapping IP addresses. Each routingdomain is known as a context.

When traffic arrives at a VSXGateway, a process known asContext Determinationdirects traffic to theappropriate Virtual System, Virtual Router or Virtual Switch. The context determination process dependson the virtual network topology and the connectivity of the Virtual Devices.

The basic Virtual System connection scenarios are:

n Virtual System directly connected to a physical or VLAN interface

n Virtual System connected through a Virtual Switch

n Virtual System connected through a Virtual Router

Direct Connection to a Physical InterfaceWhen traffic arrives at an interface (either physical or VLAN) that directly connects to a Virtual System, theconnection itself determines the context and traffic passes directly to the appropriate Virtual System viathat interface.

This diagram shows traffic from a physical VLAN switch that is sent to an interface on the VSXGateway.

Page 46: VSX R80.40 Administration Guide - InfoSec

VSX Traffic Flow

VSX R80.40 Administration Guide      |      46

Item Description Item Description

1 Internet 8 Virtual System 2

2 Router 9 VLAN Switch

3 VSXGateway 10 VLAN 100

4 Virtual Switch 11 VLAN 200

5 Virtual System 1 VLAN Interface

6 eth1.100 VLAN Trunk

7 eth1.200 Warp Link

VSX automatically directs traffic arriving via VLAN Interface eth1.200 to Virtual System 2 according tothe context defined by the VLAN ID.

Page 47: VSX R80.40 Administration Guide - InfoSec

VSX Traffic Flow

VSX R80.40 Administration Guide      |      47

Connection through a Virtual SwitchTraffic arriving via a Virtual Switch passes to the appropriate Virtual System based on the destination MACaddress, as defined in the Virtual Switch forwarding table.

Traffic arrives at the Virtual System via the Warp Link associated with the designated MAC address.

Item Description Item Description

1 Internet 8 MAC 00:12:C!:Ce:00:03

2 Router 9 VLAN Switch

3 VSXGateway 10 VLAN 100

4 Virtual Switch 11 VLAN 200

5 MAC 00:12:C!:Ce:00:01 VLAN Interface

6 Virtual System 1 VLAN Trunk

7 Virtual System 2 Warp Link

Page 48: VSX R80.40 Administration Guide - InfoSec

VSX Traffic Flow

VSX R80.40 Administration Guide      |      48

If the destination MAC address does not exist in the Virtual Switch forwarding table, the traffic is broadcastover all defined Warp Links.

The Virtual Switch scenario is common for inbound traffic from external networks or the Internet.

Connection through a Virtual RouterTraffic arriving via a Virtual Router passes to the appropriate Virtual System based on entries in the VirtualRouter routing table.

Routing may be destination-based, source-based or both. Traffic arrives to the designated Virtual Systemvia its Warp Link.

Item Description Item Description

1 Internet 8 172.69.22.30

2 Router 9 VLAN Switch

3 VSXGateway 10 VLAN 100

4 Virtual Router 11 VLAN 200

5 172.23.10.11 VLAN Interface

Page 49: VSX R80.40 Administration Guide - InfoSec

VSX Traffic Flow

VSX R80.40 Administration Guide      |      49

Item Description Item Description

6 Virtual System 1 VLAN Trunk

7 Virtual System 2 Warp Link

Security EnforcementSince each Virtual System functions as an independent Security Gateway, it maintains its own, uniquesecurity policy to protect the network behind it. The designated Virtual System inspects all traffic and allowsor blocks it based on the rules contained in the security policy.

Forwarding to DestinationEach Virtual System maintains its own unique configuration and rules for processing and forwarding trafficto its final destination. This configuration also includes definitions and rules for NAT, VPN, and otheradvanced features.

Page 50: VSX R80.40 Administration Guide - InfoSec

VSX Routing Concepts

VSX R80.40 Administration Guide      |      50

VSX Routing ConceptsIn This Section:

Routing Overview 50

Routing Between Virtual Systems 50

Route Propagation 52

Overlapping IP Address Space 52

More for Virtual Switch Route Propagation 54

NAT 54

Dynamic Routing 54

Routing OverviewThe traffic routing features in VSX network topologies are analogous to those available for physicalnetworks.

This section discusses several routing features and strategies as they apply to a VSX environment.

Routing Between Virtual SystemsVirtual Routers and Virtual Switches can be used to send traffic between networks located behind VirtualSystems, much in the same way as their physical counterparts.

The figure below shows an example of how Virtual Systems, connected to a Virtual Switch and a physicalVLAN switch, communicate with each other.

In this example, a host in VLAN 100 sends data to a server located in VLAN 200.

Page 51: VSX R80.40 Administration Guide - InfoSec

VSX Routing Concepts

VSX R80.40 Administration Guide      |      51

Item Description Item Description

1 VLAN 100 7 VLAN 200

2 VLAN Switch 8 VSXGateway

3 VLAN Trunk VLAN Interface

4 Virtual System 1 VLAN Trunk

5 Virtual Switch Warp Link

6 Virtual System 2

1. Traffic from the VLAN 100 host arrives at the VLAN switch, which inserts a VLAN tag and sends it tothe VSXGateway by way of a VLAN trunk.

2. Based on its VLAN tag, the VSXGateway assigns the traffic to the Virtual System named VS1.

3. VS1 inspects the traffic according to its security policy and sends the traffic on to the Virtual Switch.

Based on its routing configuration, VS1 sends the traffic to VS2 by way of the Virtual Switch.

4. VS2 inspects the traffic according to its security policy, inserts a VLAN tag, and sends it to back theVLAN switch.

5. The VLAN switch sends the traffic to the server located on VLAN 200.

Page 52: VSX R80.40 Administration Guide - InfoSec

VSX Routing Concepts

VSX R80.40 Administration Guide      |      52

Route PropagationWhen a Virtual System is connected to a Virtual Router or to a Virtual Switch, you can choose to propagateits routing information to adjacent Virtual Devices.

This feature enables network nodes located behind neighboring Virtual Systems to communicate withoutthe need for manual configuration.

Route propagation works by automatically updating Virtual Device routing tables with routes leading to theappropriate Virtual Systems.

Route Propagation using a Virtual Router

When Virtual Systems are connected to a Virtual Router, VSX propagates routes by automatically addingentries to the routing table contained in the Virtual Router.

Each entry contains a route pointing to the destination subnet using the Virtual System router-side WarpInterface (wrpj) as the next hop.

Route Propagation using a Virtual Switch

When Virtual Systems are connected to a Virtual Switch, VSX propagates routes by automatically addingentries to the routing table in each Virtual System.

Each entry contains a route pointing to the destination subnet using the Virtual SystemWarp Interface(wrp) IP address.

Overlapping IP Address SpaceVSX facilitates connectivity when multiple network segments share the same IP address range (IPaddress space).

This scenario occurs when a single VSXGateway protects several independent networks that assign IPaddresses to endpoints from the same pool of IP addresses.

Thus, it is feasible that more than one endpoint in a VSX environment will have the identical IP address,provided that each is located behind different Virtual System.

Overlapping IP address space in VSX environments is possible because each Virtual System maintains itsown unique state and routing tables.

These tables can contain identical entries, but within different, segregated contexts.

Virtual Systems use NAT to facilitate mapping internal IP addresses to one or more external IP addresses.

The below figure demonstrates how traffic passes from the Internet to an internal network with overlappingIP address ranges, using NAT at each Virtual System.

Page 53: VSX R80.40 Administration Guide - InfoSec

VSX Routing Concepts

VSX R80.40 Administration Guide      |      53

Item Description Item Description

1 Internet 6 Virtual System 2

2 Router 7 Switch

3 Virtual Switch 8 Network 1

4 VSXGateway 9 Network 2

5 Virtual System 1 Warp Link

In this case, Network 1 and Network 2 share the same network address pool, which might result in identicaloverlapping IP addresses.

To prevent this, packets originating from or targeted to these networks are processed by their respectiveVirtual System using NAT to translate the original/overlapping addresses to unique routable addresses.

Page 54: VSX R80.40 Administration Guide - InfoSec

VSX Routing Concepts

VSX R80.40 Administration Guide      |      54

More for Virtual Switch Route PropagationYou are not required to manually define the topology, because this is done automatically.

But there are required manual steps in the VSX objects.

To update the topology map for each Virtual System after you enable route propagation:

1. For each Virtual System object that is connected to the Virtual Switch:

a. Edit the object properties.

Make sure Anti-Spoofing and VPN features are set correctly.

b. Save the object.

2. Install the security policy for the affected Virtual Systems.

NATVirtual Systems support Network Address Translation (NAT), much in the same manner as a physicalfirewall.

When a Virtual System, using either Static or Hide NAT, connects to a Virtual Router, you must propagatethe affected routes to the Virtual Router.

To do so, you need to first define NAT addresses for Virtual Systems connected to a Virtual Router.

Dynamic RoutingThe Virtual Devices can communicate and distribute routes using dynamic routing.

Each Virtual Device has its own routing daemon.

Virtual Systems support:

n OSPF

n RIP

n BGP

n PIM

Virtual Routers support:

n OSPF

Page 55: VSX R80.40 Administration Guide - InfoSec

VSX Clusters

VSX R80.40 Administration Guide      |      55

VSX ClustersAVSXCluster has two or more identical, interconnected VSXGateways for continuous datasynchronization and transparent failover.

Virtual System Load Sharing (VSLS) enhances throughput by distributing Virtual Systems, with their trafficload, among multiple, redundant machines.

For more about Check Point ClusterXL features and functionality see the R80.40 ClusterXL AdministrationGuide.

High AvailabilityVSX supports High Availability and transparent failover for VSXGateways and for Virtual Systems.

If the Active VSXCluster Member fails, all sessions continue to run, securely and without interruption, on aStandby VSXCluster Member.

Users stay connected and do not notice the failover. They are not required to authenticate again onfailover.

Use Selective Sync to activate, delay, or disable VSXCluster Member synchronization.

Virtual System Load Sharing (VSLS)Load Sharing offers significant performance advantages while providing failover for individual VirtualSystems.

Using multiple Gateways instead of a single gateway significantly increases performance for CPU intensiveapplications such as VPNs, Security Servers, Policy Servers, and Active Directory (LDAP).

By distributing Virtual System instances between different VSXCluster Members, the performance load isefficiently spread amongst the VSXCluster Members.

For example, Active Virtual System 1 runs on VSXCluster Member A, while Active Virtual System 2 runs onVSXCluster Member B.

Standby and Backup Virtual System instances are likewise distributed amongst VSXCluster Members tomaximize throughput, even in a failover scenario.

VSLS provides an excellent scalability solution, allowing administrators to add additional VSXClusterMembers to an existing VSLS cluster as traffic loads and performance requirements increase.

Page 56: VSX R80.40 Administration Guide - InfoSec

Deploying VSX - Internal Network Deployment Strategies

VSX R80.40 Administration Guide      |      56

Deploying VSX - Internal NetworkDeployment StrategiesIn This Section:

Security Gateway Deployment on a Physical Network 57

VSX Virtual System Deployment Strategies 58

Physical Internal Interface for Each Virtual System 58

Virtual Systems with Internal VLAN Interfaces 59

Internal Virtual Router with Source-Based Routing 60

Virtual Systems in Bridge Mode 62

Page 57: VSX R80.40 Administration Guide - InfoSec

Deploying VSX - Internal Network Deployment Strategies

VSX R80.40 Administration Guide      |      57

Security Gateway Deployment on a PhysicalNetworkIn large physical network deployments, multiple Check Point security products, such as SecurityGateways, are deployed to protect network segments.

Item Description

1 Internet

2 Router

3 Security Gateways

4 Network 1

5 Network 2

Each Security Gateway physically connects to its own internal protected network and to a router for accessto other internal networks and the Internet.

Page 58: VSX R80.40 Administration Guide - InfoSec

Deploying VSX - Internal Network Deployment Strategies

VSX R80.40 Administration Guide      |      58

VSX Virtual System Deployment StrategiesIn a VSX environment, Virtual Systems protect internal networks.

This section shows sample VSX deployments with Virtual Systems to protect internal networks.

Each example highlights different VSX features.

In a real-world deployment, you can combine features to create a powerful cyber security solution forcomplex enterprise environments.

Physical Internal Interface for Each VirtualSystemIn a basic VSX configuration, Virtual Systems connect directly to protected internal networks throughphysical interfaces on the VSXGateway.

A Virtual Switch connects between internal networks, and to the Internet.

This deployment is suitable for protecting a small, fixed quantity of internal networks.

The main disadvantage of this deployment is that each protected network requires its own dedicatedphysical interface on the VSXGateway.

Obviously, this deployment is not suitable for networks that require many Virtual Systems.

Page 59: VSX R80.40 Administration Guide - InfoSec

Deploying VSX - Internal Network Deployment Strategies

VSX R80.40 Administration Guide      |      59

Item Description Item Description

1 Internet 6 Virtual System 2

2 Router 7 Switch

3 Virtual Switch 8 Network 1

4 VSXGateway 9 Network 2

5 Virtual System 1 Warp Link

Virtual Systems with Internal VLAN InterfacesIn this deployment example, Virtual Systems connect to internal protected networks through VLANinterfaces.

The VSXGateway connects to a VLAN switch with an 802.1q VLAN trunk, which is an aggregate of allVLANs passing through it.

This deployment option is appropriate for environments where many Virtual Systems protect many internalnetworks with one VSXGateway or cluster.

VLANs provide scalability and granularity, to provision more Virtual Systems and protected networksquickly, without changing the existing IP address structure.

Page 60: VSX R80.40 Administration Guide - InfoSec

Deploying VSX - Internal Network Deployment Strategies

VSX R80.40 Administration Guide      |      60

Item Description Item Description

1 Internet 8 Management Server

2 Router 9 Virtual Switch

3 Physical interface 10 Warp interface

4 VLAN Switch 11 Virtual System 1

5 Network 1 12 Virtual System 2

6 Network 2 13 VLAN Interface

7 VSXGateway 14 VLAN Trunk

Internal Virtual Router with Source-BasedRoutingThis deployment scenario enables Virtual Systems to connect to protected networks using a singlephysical interface without VLAN technology.

The Virtual Router uses source-based routing rules to forward traffic to the appropriate Virtual Systembased on its source IP address.

In a VSX deployment with each Virtual System connected to a single Virtual Router: You can configure theVirtual Router to use source-based routing rules, to forward traffic to the appropriate Virtual System, basedon the source IP address.

Page 61: VSX R80.40 Administration Guide - InfoSec

Deploying VSX - Internal Network Deployment Strategies

VSX R80.40 Administration Guide      |      61

Item Description Item Description

1 Internet 7 Virtual Router

2 Router 8 Router

3 Virtual Switch 9 Network 1

4 VSXGateway 10 Network 2

5 VS 1 Warp link

6 VS 2

Notes to this scenario:

n Each Virtual System uses a public IP address to connect to the Virtual Switch.

n Each local network connected to a Virtual Router uses private IP addresses.

n This deployment does not support overlapping IP addresses.

n Anti-Spoofing protection does function for packets originating from the shared internal interface.

We recommend that you configure the internal physical router to perform Anti-Spoofing protection.

Page 62: VSX R80.40 Administration Guide - InfoSec

Deploying VSX - Internal Network Deployment Strategies

VSX R80.40 Administration Guide      |      62

Virtual Systems in Bridge ModeAVirtual System in bridge mode implements native Layer 2 bridging instead of IP routing and can co-existwith Layer 3 Virtual Systems on the same VSXGateway.

This allows network administrators to easily and transparently deploy a Virtual System in an existingnetwork topology without reconfiguring the existing IP routing scheme.

Bridge Mode deployments are particularly suitable for large-scale clustered environments.

See "BridgeMode" on page 208.

Page 63: VSX R80.40 Administration Guide - InfoSec

Deploying VSX - Organizational Deployment Strategies

VSX R80.40 Administration Guide      |      63

Deploying VSX - OrganizationalDeployment StrategiesIn This Section:

Enterprise Deployments 63

Core Network Security 63

Dynamic Routing 65

Perimeter Security 65

Managed Service Providers Using Multi-Domain Server 67

Data Centers 69

Data Centers in an Enterprise 71

This section presents deployment scenarios for different types of large organizations and illustrates howVSX provides security both internally and at the perimeter.

The discussion covers the following types of organizations:

n Large Enterprises

n Managed Service Providers

n Data Centers

Enterprise DeploymentsLarge enterprise network environments typically have a variety of diverse networks, distributed overmultiple locations around the world. These networks often have different security and access requirementsfor various departments and branches. The ability to centrally manage cyber security, and to maintainthroughput, is a critical requirement.

Core Network Security

Many Enterprise environments are based on core networks. Situated adjacent to core network backboneswitches, VSX protects the internal network by providing security at Layer 2, Layer 3 or both. VSXcommunicates with the core network using the existing infrastructure. With Virtual Systems in the BridgeMode, VSX can protect departmental networks, while simultaneously preventing network segmentation. Inthis case, switches are located at the entrance to each department's network.

Page 64: VSX R80.40 Administration Guide - InfoSec

Deploying VSX - Organizational Deployment Strategies

VSX R80.40 Administration Guide      |      64

Item Description Item Description

1 Internet 8 LAN Switches

2 Core Network Backbone switch 9 Sales

3 VSXCluster 10 Finance

4 Router Sync Network

5 VLAN Physical Interface

6 Member 1 VLAN Trunk

7 Member 2

VSX ensures connectivity between the core network and the Internet or external networks, while providingperimeter security.

Security can be configured on a per VLAN basis.

Page 65: VSX R80.40 Administration Guide - InfoSec

Deploying VSX - Organizational Deployment Strategies

VSX R80.40 Administration Guide      |      65

Dynamic Routing

In an enterprise network with dynamic routing protocols (OSPF/BGP), VSX secures the DMZ services,VPN peers, Domains and partner networks.

In this example, BGP neighbor updates in the routed core network are selectively redistributed toapplication networks.

OSPF provides connectivity between Virtual Routers, Virtual Systems, the core network and applicationnetworks.

Item Description Item Description

1 Internet 6 Partner Network

2 Virtual Routers 7 BGP

3 OSPF 8 OSPF 802.1q

4 Virtual Systems 9 BGP in Routed Core

5 Extranet 10 DMZ

Perimeter Security

For example, security is enforced on each VLAN. The OSPF and BGPDynamic routing protocols provideconnectivity to multiple security zones along the perimeter.

Page 66: VSX R80.40 Administration Guide - InfoSec

Deploying VSX - Organizational Deployment Strategies

VSX R80.40 Administration Guide      |      66

Item Description Item Description

1 Partner Access 6 BGP

2 Customers 7 VSXCluster

Page 67: VSX R80.40 Administration Guide - InfoSec

Deploying VSX - Organizational Deployment Strategies

VSX R80.40 Administration Guide      |      67

Item Description Item Description

3 IPsec tunnel 8 802.1q VLAN Trunk

4 Internet 9 Internal Network

5 Partner 10 DMZ

Notes to this scenario:

n Partners access network resources remotely via Virtual Systems

n Each Virtual System has its own security policy based on its requirements

n Logs and audit information for each partner is collected separately, and saved to a private database

n Applications and services are segregated by private Virtual Systems

n Multiple Virtual Routers / Virtual Switches are used to control the access paths

Managed Service Providers Using Multi-DomainServerManaged service providers give connectivity and security services for Domain networks.

Some of these Domains require remote access capabilities.

In this service oriented environment, VSX and Multi-Domain Server provide central management andmake connectivity and security easier, without affecting the existing IP topology.

In this scenario, a VSXCluster is in a Point of Presence (POP) deployment for a service provider.

VSX consolidates hardware for the service provider and ensures privacy and secure connectivity solutions(VPN) for users.

This scenario is appropriate for High Availability and Virtual System Load Sharing cluster modes.

VSX and Multi-Domain Server provide a centralized, granular provisioning system for a number ofDomains.

Applications and services are separated by discrete Virtual Systems.

Access to these services and applications is based on need.

Page 68: VSX R80.40 Administration Guide - InfoSec

Deploying VSX - Organizational Deployment Strategies

VSX R80.40 Administration Guide      |      68

Item Description

1 Internet. Routers are between the VSXCluster Members and the Internet.

2 VSXCluster. One VSXCluster Member handles the Local Exchange, and another VSXClusterMember handles server traffic of different Domains.

3 Core IP VPNNetwork.

4 Multi-Domain Server at the Network Operation Center monitors POP and connects to VSXGateway.The Multi-Domain Log Server in the NOC collects data for each Domain and stores the logs inseparate private databases.

5 Multi-Domain Server at the NOC and the VSXGateway make the Local Exchange.

6 Domain Aweb servers.

7 Domain BDMZ.

Page 69: VSX R80.40 Administration Guide - InfoSec

Deploying VSX - Organizational Deployment Strategies

VSX R80.40 Administration Guide      |      69

Item Description

8 Domain Cmail servers.

9 PERouter.

10,11,12

Domain A, B, and C.Each Domain manages its own security and cannot define Virtual Systems or other networkcomponents.Domains have secure VPN connectivity.

13 Remote access

Data CentersData center providers supply external hosting services for Domain servers and databases.

The service typically includes infrastructure, connectivity, and security for multiple Domains.

For example, you can have a scenario such as:

n Multiple Domain networks sharing a common physical infrastructure.

n Backbone that provides connectivity between each Domain and the data center.

n Domain A connects to its web hosting servers.

n Domain B connects to its mail servers.

n Domain C connects to its database servers.

For cyber security and management, the data center provider deploys a VSXGateway with one VirtualSystem for each Domain.

Page 70: VSX R80.40 Administration Guide - InfoSec

Deploying VSX - Organizational Deployment Strategies

VSX R80.40 Administration Guide      |      70

Item Description Item Description

1 Remote Users 10 Virtual System for Customer A

2 Internet 11 Virtual System for Customer C

3 Remote network behind VPN-1Edge

12 Customer C

4 Customer B 13 Data Center

5 Customer A 14 Customer Aweb servers each with separateVLAN ID

Page 71: VSX R80.40 Administration Guide - InfoSec

Deploying VSX - Organizational Deployment Strategies

VSX R80.40 Administration Guide      |      71

Item Description Item Description

6 MPLSBackbone 15 Customer Bmail servers

7 802.1q 16 Customer A Extranet

8 VSXGateway 17 Customer C databases

9 Virtual System for Customer A

This scenario offers a cost effective scalability solution for network expansion by means of remoteconnectivity.

In this example, a VPN connection between a Domain Virtual System and a Check Point appliance thatprotects a remote network, integrates that network in the MPLS core.

A Virtual System can give access to remote users who connect intermittently.

Data Centers in an Enterprise

This example scenario illustrates how VSX provides security management for enterprise data centers.

By assigning Layer 2 connections to Virtual Systems, VSX reduces the number of physically manageddevices within a data center while providing the same high level of security.

For example, a VSXGateway allows authorized users to access data center resources.

The objective here is to protect shared resources with differing access permissions and securityrequirements, while implementing network granularity.

Page 72: VSX R80.40 Administration Guide - InfoSec

Deploying VSX - Organizational Deployment Strategies

VSX R80.40 Administration Guide      |      72

Item Description Item Description

1 Internet 7 VLAN Trunk

2 VSXGateway 8 Web Servers VLAN 02

3 VLAN 02 9 Data Bases VLAN 03

4 VLAN 03 10 Application A VLAN 04

5 VLAN 04 11 Application B VLAN 05

6 VLAN 05

For example, one Virtual System protects databases against SQL vulnerabilities.

Another Virtual System protects Web Servers using IPS.

When new applications and services are added to the enterprise data center, new Virtual Systems areeasily created to secure them according to their specific requirements.

Page 73: VSX R80.40 Administration Guide - InfoSec

Configuring VSX

VSX R80.40 Administration Guide      |      73

Configuring VSXOverviewThis chapter explains how to use SmartConsole provision, configure and manage Virtual Devices in a VSXenvironment.

If you define or configure VSX objects in a Multi-Domain Server deployment: connect with SmartConsole tothe Domain Management Server that manages the Virtual Devices. For procedures, see "Using VSX withMulti-Domain Server" on page 120.

To configure Virtual Devices, make sure:

n The Management Servers (Security Management Server or Multi-Domain Server) are configuredand running.

n SmartConsole is installed on the appropriate computer.

This chapter assumes that you are familiar with SmartConsole and how to configure standard SecurityGateway objects and Security Policies.

Many Virtual Device and policy operations are the same as physical Security Gateways and thesestandard procedures are not in this Administration Guide.

Rules and Security PoliciesYou use the same procedures to define and install Security Policies on a VSXGateway or Virtual Systemas for a physical Security Gateway.

This statement also applies to the use of IPv6 in Security Policies. These procedures are not included inthis Administration Guide.

Page 74: VSX R80.40 Administration Guide - InfoSec

Configuring VSX Gateways

VSX R80.40 Administration Guide      |      74

Configuring VSX GatewaysIn This Section:

Creating a New VSX Gateway 74

Wizard Step 1: Defining VSX Gateway General Properties 75

Wizard Step 2: Selecting Virtual Systems Creation Templates 75

Wizard Step 3: Establishing SIC Trust 76

Initializing SIC Trust 76

Troubleshooting SIC Trust Initialization Problems 76

Wizard Step 4: Defining Physical Interfaces 76

Wizard Step 5: Virtual Network Device Configuration 77

Wizard Step 6: VSX Gateway Management 77

Completing the VSX Wizard 78

Configuring the Security Policy 78

Creating a New VSX GatewayThis section explains how to create a new VSXGateway using the VSX Gateway Wizard.

After you complete the VSXGatewayWizard, you can change the VSXGateway definition fromSmartConsole.

For example, you can add or delete interfaces, or configure existing interfaces to support VLANs.

To start the VSX Gateway wizard:

1. Connect with SmartConsole to the Security Management Server or Main Domain ManagementServer used to manage the VSXGateway.

2. From the left navigation panel, clickGateways & Servers.

3. At the top, clickNew >VSX >Gateway.

TheGeneral Properties page of the VSX Gateway Wizard opens.

Page 75: VSX R80.40 Administration Guide - InfoSec

Configuring VSX Gateways

VSX R80.40 Administration Guide      |      75

Wizard Step 1: Defining VSX Gateway General PropertiesConfigure these parameters on theGeneral Properties page:

n VSX Gateway Name: Unique, alphanumeric name for the VSXGateway. The name cannot containspaces or special characters except the underscore.

n VSX Gateway Addresses: Management interface addresses.

Note - If you define an IPv6 IP address you must also define an IPv4 address.

n VSX Gateway Version: Select the VSX version installed on the VSXGateway from the drop-downlist.

Wizard Step 2: Selecting Virtual Systems CreationTemplatesThe Creation Templates page lets you provision predefined, default topology and routing definitions toVirtual Systems.

This makes sure Virtual Systems are consistent and makes the definition process faster.

You always have the option to override the default creation template when you create or change a VirtualSystem.

The default Creation Templates are:

n Shared Interface: Virtual Systems share one external interface, but maintain separate internalinterfaces.

n Separate Interfaces: Virtual Systems use their own separate internal and external interfaces. Thistemplate creates a Dedicated Management Interface (DMI) by default.

If the default templates are not appropriate, you can create a custom configuration:

n Custom Configuration: Define Virtual System, Virtual Router, Virtual Switch, and Interfaceconfigurations.

Page 76: VSX R80.40 Administration Guide - InfoSec

Configuring VSX Gateways

VSX R80.40 Administration Guide      |      76

Wizard Step 3: Establishing SIC TrustInitialize SIC trust between the VSXGateway and the Management Server.

They cannot communicate without Trust.

Initializing SIC Trust

When you create a VSXGateway, you must enter the same Activation Key you entered during the FirstTime Configuration Wizard.

Enter and confirm the activation key and then click Initialize.

If you enter the correct activation key, the Trust State changes to Trust established.

Troubleshooting SIC Trust Initialization Problems

If SIC trust was not successfully established, clickCheck SIC Status to see the reason for the failure.

The most common issues are an incorrect activation key and connectivity problems between theManagement Server and the VSXGateway.

Troubleshooting to resolve SIC initialization problems:

n Re-enter and re-confirm the activation key.

n Make sure that the IP address defined inGeneral Properties is correct.

n Ping the Management Server to test the connectivity. Resolve connectivity issues.

n From the VSXGateway command line, use the cpconfig command to re-initialize SIC.

After this process completes, clickReset in the wizard and then re-enter the activation key.

For more about resolving SIC initialization, see the R80.40 SecurityManagement Administration Guide.

Wizard Step 4: Defining Physical InterfacesIn the VSX Gateway Interfaces window, define physical interfaces as VLAN trunks.

The window shows the interfaces currently defined on the VSXGateway.

To define an interface as a VLAN trunk, select VLAN Trunk for the interface.

Page 77: VSX R80.40 Administration Guide - InfoSec

Configuring VSX Gateways

VSX R80.40 Administration Guide      |      77

Wizard Step 5: Virtual Network Device ConfigurationIf you chose the Custom Configuration option, the Virtual Network Device Configurationwindow opens.

In this window, define a Virtual Device with an interface shared with the VSXGateway.

If you do not want to define a Virtual Device at this time, clickNext to continue.

To define a Virtual Device with a shared interface:

1. SelectCreate a Virtual Device.

2. Select the Virtual Network Device type (Virtual Router or Virtual Switch).

3. Select the shared physical interface to define a non-DMI gateway.

Do not select the management interface if you want to define a Dedicated Management Interface(DMI) gateway.

If you do not define a shared Virtual Device, a DMI gateway is created by default.

Important - This setting cannot be changed after you complete the VSXGatewayWizard. If you define a non-DMI gateway, you cannot change it to aDMI gateway later.

4. Define the IP address and Net Mask for a Virtual Router.

These options are not available for a Virtual Switch.

5. Optional:Define a Default Gateway for a Virtual Router (DMI only).

Wizard Step 6: VSX Gateway ManagementIn the VSX Gateway Managementwindow, define security policy rules that protect the VSXGateway.

This policy is installed automatically on the new VSXGateway.

Note - This policy applies only to traffic destined for the VSXGateway. Traffic destinedfor Virtual Systems, other Virtual Devices, external networks, and internal networks isnot affected by this policy.

The security policy consists of predefined rules for these services:

n UDP - SNMP requests

n TCP - SSH traffic

n ICMP - ICMP Echo (ping)

n TCP - HTTPS traffic

Page 78: VSX R80.40 Administration Guide - InfoSec

Configuring VSX Gateways

VSX R80.40 Administration Guide      |      78

Completing the VSX WizardClickNext to continue and then click Finish to complete the VSXGateway wizard.

This may take several minutes to complete.

Amessage shows successful or unsuccessful completion of the process.

If the process ends unsuccessfully, click View Report to see the error messages.

See "VSX Diagnostics and Troubleshooting" on page 219.

Configuring the Security Policy1. Allow: Select to pass traffic on the selected services.

Clear this option to block traffic on this service.

By default, all services are blocked.

For example, to be able to ping the gateway from the Management Server, allow ICMP traffic.

2. Source: Click the arrow and select a Source Object from the list.

The default value is *Any.

ClickNew Source Object to define a new source.

Page 79: VSX R80.40 Administration Guide - InfoSec

Working with VSX Gateways

VSX R80.40 Administration Guide      |      79

Working with VSX GatewaysIn This Section:

Changing VSX Gateway Definitions 79

VSXGateway - General Properties 79

Secure Internal Communication (SIC) 80

Check Point Software Blades 80

VSXGateway - Creation Templates 80

VSXGateway - Physical Interfaces 80

VSXGateway - Topology 81

Interfaces 81

Routes 81

Topology Calculation 82

Deleting a VSX Gateway 82

Backing up and Restoring VSX Gateway 83

AVSXGateway is a physical machine that serves as a container for Virtual Systems and other virtualnetwork components.

This section has step-by-step procedures for creating and configuring standalone VSXGateways.

Changing VSX Gateway DefinitionsAfter you create a VSXGateway, you can modify the topology, other parameters, and advancedconfigurations in the VSX Gateway Properties window.

To open this window, double-click on the VSXGateway object in SmartConsole.

The VSX Gateway Properties window opens.

VSX Gateway - General Properties

In theGeneral Properties page, check and re-establish SIC trust, and activate Check Point products forthis VSXGateway.

You can change these properties:

n Comment - Free text description for the Object List and elsewhere.

n Color - Color of the object icon as it appears in the Object Tree.

n Secure Internal Communication - Check and re-establish SIC trust.

n Check Point Products - Select Check Point products for this gateway.

Page 80: VSX R80.40 Administration Guide - InfoSec

Working with VSX Gateways

VSX R80.40 Administration Guide      |      80

Secure Internal Communication (SIC)

You can test and reset SIC trust and also see the VSXGateway Relative Distinguished Name.

To initialize SIC trust:

1. InGateways & Servers view orObject Explorer, double-click the VSXGateway.

You can also search for the VSXGateway in theObject Explorer.

2. In the VSX Gateway Properties window, clickCommunication.

3. In the Trusted Communicationwindow, enter and confirm the SIC Activation Key.

4. Click Initialize.

Note - If you cannot establish trust, click Test SIC Status to see the reason for thefailure. The most common issues are an incorrect activation key and connectivityproblems between the Management Server and the VSXGateway.

To reset SIC trust with the VSX Gateway:

1. From the VSXGateway CLI, use the cpconfig utility to re-initialize the SIC.

2. In the Communicationwindow, clickReset.

3. Click Yes in the confirmation window.

4. Enter and confirm the SIC authentication password.

5. Click Initialize.

6. Install the applicable policy (<Name of VSX GatewayObject>_VSX) on the VSXGateway objectonly.

7. On the VSXGateway CLI, run: cpstop;cpstart

Check Point Software Blades

Select the Check Point Software Blades to install on this VSXGateway from the list. The items you see areavailable for the product version and your license agreement.

VSX Gateway - Creation Templates

The Creation Templates page displays the creation template used to create the Virtual Systems for thisVSXGateway. You can change from the current creation template to the Custom Configuration templateand change the shared physical interface if the Shared Interface template is active.

n SelectCustom Configuration to change from the Shared Interfaces or Separate Interfacestemplates. You cannot change back from the Custom Configuration template once you havecompleted the definition and saved it to the VSXGateway.

n For a Shared Interface template, click Settings to change the shared interface.

VSX Gateway - Physical Interfaces

The Physical Interfaces page lets you add or delete a physical interface on the VSXGateway, and todefine a VLAN trunk.

Page 81: VSX R80.40 Administration Guide - InfoSec

Working with VSX Gateways

VSX R80.40 Administration Guide      |      81

n To add a new physical interface, click Add and enter the interface name in the appropriate field.

n To remove a physical interface, select the interface and clickRemove.

n To define an interface as a VLAN trunk, select VLAN Trunk for the interface.

VSX Gateway - Topology

The Topology page contains definitions for interfaces and routes between interfaces and Virtual Devices.

Interfaces

The Interfaces section defines interfaces and links to devices. You can add new interfaces, and delete ormodify existing interfaces.

To add an interface:

1. ClickNew and select one of these options:

n Regular - Create a new interface

n Leads to Virtual Router

n Leads to Virtual Switch

TheInterface Properties window opens.

Click Actions >Copy to Clipboard to copy the Interfaces table in CSV format.

2. Define the appropriate properties. See "Working with Interface Definitions" on page 103.

3. ClickOK.

Routes

The Routes section of the Topology window defines routes between network devices, network addresses,and Virtual Devices. Some routes are defined automatically based on the interface definitions. You canadd, change, and delete routes.

To add a default route to the routing table:

1. Click Add Default Route.

The Default Gateway window opens.

2. Enter the default route IP address or select the default Virtual Router.

3. ClickOK.

The default route is added to the routing table.

4. Select the default route and click Edit.

The Route Configurationwindow opens.

5. Configure the settings for the default route.

6. ClickOK.

Page 82: VSX R80.40 Administration Guide - InfoSec

Working with VSX Gateways

VSX R80.40 Administration Guide      |      82

To add a new route to the routing table:

1. Click Add.

The Route Configurationwindow opens.

2. Configure the Destination IP address and netmask.

3. Configure the next hop IP address or Virtual Router.

4. Optional: Select Propagate route to adjacent Virtual Devices to "advertise" the route toneighboring Virtual Devices, and enable connectivity between them.

5. ClickOK.

To change a route:

1. Select the route.

2. Click Edit.

The Route Configurationwindow opens.

3. Change the settings.

4. ClickOK.

To delete a route:

1. Select the route.

2. ClickRemove.

A confirmation window opens.

3. ClickOK.

Topology Calculation

Select the Calculating topology automatically based on routing information option to let VSXautomatically calculate the network topology based on interface and routing definitions. When enabled,VSX creates automatic links, or connectivity cloud objects linked to existing internal or external networks.

n This option is not available in Bridge Mode.

n We recommend that you do not use this option with dynamic routing configurations.

Note - If you wish to enable Anti-Spoofing protection when there are no routes pointingto internal networks, disable the Calculating topology automatically based onrouting information option. Modify the appropriate interface definitions to enable Anti-Spoofing.

Deleting a VSX GatewayWhen you delete a VSXGateway object, the operation automatically deletes all Virtual Systems and otherVirtual Devices associated with that VSXGateway from the management database.

Page 83: VSX R80.40 Administration Guide - InfoSec

Working with VSX Gateways

VSX R80.40 Administration Guide      |      83

To delete a VSX Gateway:

1. From the Gateways & Servers view or Object Explorer tree, right-click the VSXGateway object onthe Object Tree and selectDelete.

2. In the window that opens, click Yes.

Backing up and Restoring VSX GatewayIn the event of a catastrophic VSXGateway failure, you can restore the VSXGateway configuration and itsVirtual Device configuration.

Follow the instructions in the sk100395: How to backup and restore VSX gateway.

Page 84: VSX R80.40 Administration Guide - InfoSec

Working with Virtual Systems

VSX R80.40 Administration Guide      |      84

Working with Virtual SystemsIn This Section:

Introduction 84

Creating a New Virtual System 85

Defining General Properties 86

Defining Network Configuration 86

Shared Interface or Separate Interfaces 86

Separate Interfaces in Bridge Mode 87

Custom Configuration or Override - Non-Bridge Mode 87

Custom Configuration or Override in Bridge Mode 88

Completing the Definition 88

Modifying a Virtual System 88

Virtual System - General Properties 88

Virtual System - Topology 89

Virtual System - NAT > Advanced 89

Deleting a Virtual System 90

This section presents procedures for creating and configuring Virtual Systems.

IntroductionThe Virtual System definition process varies somewhat according to the template selected when creatingthe VSXGateway.

A typical Virtual System contains two interfaces:

n External interface leading to external networks, a DMZ, or the Internet

n Internal interface leading to internal networks or servers, often by means of a VLAN trunk

VSX supports up to 128 interfaces for each Virtual Device and a total of up to 4096 interfaces per VSXGateway or cluster.

The supported interfaces include VLANs and Warp Links.

Note - By default, a Virtual System supports up to 64 interfaces. For more about how toincrease the number of supported interfaces, see sk99121.

You can add as many interfaces to a Virtual System as required, according to system resources.

Here is an example of a typical VSXGateway deployment with two Virtual Systems, each with twointerfaces.

Page 85: VSX R80.40 Administration Guide - InfoSec

Working with Virtual Systems

VSX R80.40 Administration Guide      |      85

Item Description Item Description

1 Internet 8 Virtual System 2

2 Router 9 VLAN Switch

3 VSXGateway 10 Network 1

4 Virtual Switch 11 Network 2

5 External Interface VLAN Interface

6 Virtual System 1 VLAN Trunk

7 Internal Interface Warp Link

Creating a New Virtual SystemYou use the Virtual Systems Wizard to create a new Virtual System. Modify the initial definition andconfigure advanced options after you complete the wizard.

Page 86: VSX R80.40 Administration Guide - InfoSec

Working with Virtual Systems

VSX R80.40 Administration Guide      |      86

To start the Virtual System wizard:

1. Connect with SmartConsole to the Security Management Server or Target Domain ManagementServer used to manage the new Virtual System.

2. From the left navigation panel, clickGateways & Servers.

3. Create a new Virtual System object in one of these ways:

n From the top toolbar, click theNew ( ) > VSX > New Virtual System.

n In the top left corner, clickObjects menu > More object types > Network Object >Gateways and Servers > VSX > New Virtual System.

n In the top right corner, clickObjects Pane > New > More > Network Object > Gatewaysand Servers > VSX > Virtual System.

The Virtual System Wizard opens.

Defining General Properties

TheGeneral Properties wizard page defines the Virtual System object and the hosting VSXGateway.

These are the parameters in this page:

n Name: Unique, alphanumeric for the Virtual System. The name cannot contain spaces or specialcharacters except the underscore.

n VSX Gateway / Cluster: Select the VSXGateway that is hosting the Virtual System.

n Bridge Mode: Select this option to create a Virtual System in the Bridge Mode.

n Override Creation Template: Select this option to override the creation template that was used forthe initial configuration of the VSXGateway.

Defining Network Configuration

In the Virtual System Network Configuration page, define internal and external interfaces and the IPaddress topology behind the internal interface. The process to define Virtual System network properties isdifferent in different environments:

n Use the VSX Gateway Creation template to define the VSXGateway that contains the VirtualSystem.

n If you choose to override the default VSXGateway Creation template, you can use the CustomConfiguration template.

n You can create the Virtual System in Bridge Mode.Note - Bridge mode is not available for a VirtualSystem created with the Shared Interface template.

Shared Interface or Separate Interfaces

The Virtual System Network Configuration page for the Shared Interface and Separate Interfacestemplates appears as shown.

Page 87: VSX R80.40 Administration Guide - InfoSec

Working with Virtual Systems

VSX R80.40 Administration Guide      |      87

To configure the external and internal interfaces:

1. Select the applicable interfaces from the appropriate list.

2. If the selected Interface is a VLAN interface, enter the VLAN tag in the appropriate field. This field isnot available for non-VLAN interfaces.

3. Enter the IP address and net mask in the appropriate fields. Optionally, enter a default gateway forthe external interface.

4. Complete the definition process.

Separate Interfaces in Bridge Mode

The Virtual System Network Configuration page for the Separate Interfaces template in the Bridge Modeopens.

To configure the external and internal interfaces:

1. Select the applicable interfaces for the internal and external networks from the appropriate list.

If the selected Interface is a VLAN interface, enter the same VLAN tag in both the external andinternalVLAN Tag fields. This field is not available for non-VLAN interfaces.

2. Define the topology for the internal interface:

n SelectNot Defined if you do not wish to define an IP address.

n Select Specific and then select an IP address definition from the list. IP address definitionscan be based on object groups or predefined networks that define the topology.

3. To create a new IP address definition:

a. Select Specific, and clickNew.

b. SelectGroup to define an object group, or Network to define network properties.

4. Enable Layer 3 bridge interface monitoring to enable Layer 3 network fault detection for this VirtualSystem.

Enter an IP address and subnet mask, which continuously monitors the specified network for faultsor connectivity issues. The IP address/Subnet Mask define the network, on which the Virtual Systemresides.

5. Complete the definition process.

Custom Configuration or Override - Non-Bridge Mode

If you used the Custom Configuration template when creating the VSXGateway, or if you selectedOverride Creation Template, manually define the network interfaces and connections. The VirtualSystem Network Configuration page for Custom Configuration opens.

To configure the external and internal interfaces:

1. In the interface table, define the applicable interfaces.

You can add new interfaces and delete and change existing interfaces.

Page 88: VSX R80.40 Administration Guide - InfoSec

Working with Virtual Systems

VSX R80.40 Administration Guide      |      88

To add an interface, click Add. The Interface Properties window opens. Select an interface from thelist and define its properties.

2. Select theMain IP Address from the list.

This IP address is usually assigned to the external interface and specifies the Virtual Systemaddress used with NAT or VPN connections.

To make an external IP address routable, select the external interface IP address as the main IPaddress.

3. Define network routing for your deployment.

Some routes are automatically defined by the interface definitions. For example, you define adefault gateway route leading to an external Virtual Router or to the Virtual System externalinterface.

To manually add a default route to the Routes table, click Add Default Routes. Enter the defaultroute IP address, or select the default Virtual Router. The Route Configurationwindow opens.

4. Complete the definition.

Custom Configuration or Override in Bridge Mode

If you used the Custom Configuration template to create the VSXGateway, or if you selected theOverride Creation Template option for a Virtual System in Bridge Mode, then manually define the networkinterfaces.

Interfaces: To configure the external and internal interfaces, define interfaces and links to devices in theInterfaces table. You can add, change, and remove interfaces. To add an interface, click Add. TheInterface Properties window opens. Select an interface from the list and define is properties.

Completing the Definition

ClickNext and then click Finish to create the Virtual System.

Note that this may take several minutes to complete.

Amessage appears indicating successful or unsuccessful completion of the process.

If the process ends unsuccessfully, click View Report to view the error messages.

For further assistance, see "VSX Diagnostics and Troubleshooting" on page 219.

After you create a Virtual System using the Virtual SystemWizard, you can modify the topology and allother parameters (except the name of the Virtual System) using the Virtual System Properties window.

Modifying a Virtual System1. Connect with SmartConsole to the Security Management Server or Target Domain Management

Server used to manage the Virtual System.

2. From theGateways & Servers view orObject Explorer, double-click the Virtual System object.

Virtual System - General Properties

TheGeneral Properties page lets you specify the main IP address and to enable various Check Pointproducts for a Virtual System.

Page 89: VSX R80.40 Administration Guide - InfoSec

Working with Virtual Systems

VSX R80.40 Administration Guide      |      89

Virtual System - Topology

The Topology page contains definitions for Virtual System interfaces, routes and Warp Links. Based onthese interface settings, VSX automatically creates routes to Virtual Devices and the VSXGateway.

Note - If you modify the topology for a specific Virtual System in a cluster environment,the cluster topology is not updated until you install a policy on that Virtual System.

n Interfaces: The Interfaces table defines interfaces and links to devices. You can add new interfacesas well as delete and modify existing interfaces.

To add an interface, clickNewand select one of these options:

l Regular - Create a new interface

l Leads to Virtual Router

l Leads to Virtual Switch

The Interface Properties window opens. Select the interface from the list and define the appropriateproperties. The section"Working with Interface Definitions" on page 103 and the SmartConsoleonline help provides explanations of the various properties and options.

Click Actions >Copy to Clipboard to copy the Interfaces table in CSV format.

n Routes: To add a default route to the Routes table, click Add Default Routes and either enter an IPaddress or select a Virtual Router. The Route Configurationwindow opens. ClickHelp for detailsregarding the various properties and options. You can also add, change and remove routes (see"Working with VSX Gateways" on page 79).

n Calculate topology automatically based on routing information:Enable this option to allow VSX toautomatically calculate the network topology based on interface and routing definitions (enabled bydefault). VSX creates automatic links, or connectivity cloud objects linked to existing internal orexternal networks.

l When this option is enabled, you cannot configure the topology using Topologytab in theInterface Properties window. These options are unavailable on the tab.

l This option is not available in the Bridge Mode.

l When employing dynamic routing, it is recommended to disable this option.

n VPN Domain: The VPNDomain defines the set of hosts located behind a given Virtual System thatcommunicate via a VPN tunnel with peer Virtual Systems. These options are only available if youselected VPN in the Check Point Products section on theGeneral Properties page.

When including a Virtual Device as part of a VPN connection, you must specify a VPNDomain. Thedomain definition specifies Virtual System interfaces that are included in the VPN. You can define aVPNDomain in one of two ways by enabling the appropriate option:

n All IP Addresses behindgateway based on topology information: Includes all hosts not locatedbehind an external gateway cluster interface.

n Manually Defined: Includes all hosts in the selected network or group.

Virtual System - NAT > Advanced

The NAT >Advanced page lets you configure NAT rules for packets originating from a Virtual System.

Page 90: VSX R80.40 Administration Guide - InfoSec

Working with Virtual Systems

VSX R80.40 Administration Guide      |      90

To enable and configure NAT for a Virtual System:

1. Select Add Automatic Address Translation.

2. Select a translation method:

n Hide: Hide NAT only allows connections originating from the internal network. Internal hostscan access internal destinations, the Internet and other external networks. External sourcescannot initiate a connection to internal network addresses.

n Static: Static NAT translates each private address to a corresponding public address.

3. If you selectHide, select one of these options:

n Hide behind Gateway hides the real IP address behind the Virtual System external interfaceIP address,

or

n Hide behind IP Address hides the real address behind a virtual IP address, which is aroutable, public IP address that does not belongs to any real machine.

4. If you selected Static NAT, enter the static IP address in the appropriate field.

5. Select the VSXGateway from the Install on Gateway list.

In addition, see "Working with Network Address Translation (NAT)" on page 111.

Deleting a Virtual System

To delete a Virtual System:

1. From the Gateways & Servers view or Object Explorer tree, right-click the Virtual System object andselectDelete.

2. In the window that opens, click Yes.

Page 91: VSX R80.40 Administration Guide - InfoSec

Working with Virtual Switches

VSX R80.40 Administration Guide      |      91

Working with Virtual SwitchesIn This Section:

Introduction 91

Creating a New Virtual Switch 92

Modifying a Virtual Switch 92

Virtual Switch - General Properties 93

Virtual Switch - Topology 93

Deleting a Virtual Switch 93

This section describes how to define and configure a Virtual Switch.

IntroductionVirtual Switches provide level-2 connectivity between Virtual Systems and internal or external networks.

As with physical switches, each Virtual Switch maintains a forwarding table containing entries that describeknown networks and directions for reaching them.

You can define Virtual Switches for external and internal communications.

Page 92: VSX R80.40 Administration Guide - InfoSec

Working with Virtual Switches

VSX R80.40 Administration Guide      |      92

Item Description Item Description

1 Internet 6 Virtual Systems

2 Router VLAN Interface

3 VSXGateway VLAN Trunk

4 VLAN Switch Warp Link

5 Virtual Switch

The figure shows a typical deployment using a Virtual Switch for external connections and a VLAN trunkleading to the internal, protected network.

Creating a New Virtual SwitchUse the Virtual Switch Wizard to create a new Virtual Switch. You can modify the initial definition andconfigure advanced options after completing the wizard.

To create a new Virtual Switch:

1. Connect with SmartConsole to the Security Management Server or Target Domain ManagementServer used to manage the new Virtual System.

2. From the left navigation panel, clickGateways & Servers.

3. Create a new Virtual Switch object in one of these ways:

n From the top toolbar, click theNew ( ) > VSX > New Virtual Switch.

n In the top left corner, clickObjects menu > More object types > Network Object >Gateways and Servers > VSX > New Virtual Switch.

n In the top right corner, clickObjects Pane > New > More > Network Object > Gatewaysand Servers > VSX > Virtual Switch.

The Virtual Switch Wizard opens.

4. In the Name field, enter the name for the new Virtual Switch.

5. In the VSX Gateway / Cluster field, select the applicable VSXGateway or VSXCluster.

6. ClickNext.

7. In the Interfaces section, click Add to add the interface, to which the Virtual Switch connects.

8. ClickNext.

9. Click Finish.

Modifying a Virtual Switch1. Connect with SmartConsole to the Security Management Server or Target Domain Management

Server used to manage the Virtual Switch.

2. From theGateways & Servers view orObject Explorer, double-click the Virtual Switch object.

Page 93: VSX R80.40 Administration Guide - InfoSec

Working with Virtual Switches

VSX R80.40 Administration Guide      |      93

Virtual Switch - General Properties

TheGeneral Properties page allows you to add comments and change the icon color as displayed inSmartConsole.

Virtual Switch - Topology

The Topology page defines Virtual Switch interfaces. You can only modify the single defined interface. Youcannot change the settings for Warp interfaces in this window.

To add an interface:

1. ClickNew.

The Interface Properties window opens.

2. Select an interface from the list and define the IP address, net mask and other properties.

3. Optional:Click Actions >Copy to Clipboard to copy the Interfaces table in CSV format.

Deleting a Virtual Switch

To delete a Virtual Switch:

1. Connect with SmartConsole to the Security Management Server or Target Domain ManagementServer used to manage the new Virtual Switch.

2. From theGateways & Servers view orObject Explorer, double-click the Virtual Switch object.

3. From the left tree, click Topology.

4. In the Interfaces section, remove all interfaces.

5. ClickOK.

6. Right-click the Virtual Switch object and selectDelete.

7. Click Yes in the confirmation box.

8. Publish the SmartConsole session.

Page 94: VSX R80.40 Administration Guide - InfoSec

Working with Virtual Routers

VSX R80.40 Administration Guide      |      94

Working with Virtual RoutersIn This Section:

Introduction 94

Creating a New Virtual Router 96

Modifying a Virtual Router Definition 96

Virtual Router - General Properties 97

Virtual Router - Topology 97

Deleting a Virtual Router 97

This section describes how to define and configure a Virtual Router.

IntroductionAs with physical routers, each Virtual Router maintains a routing table containing entries that describeknown networks and directions on how to reach them.

You can define Virtual Routers for both external and internal communications.

A Virtual Router that connects to external networks, including a DMZ and the Internet, are referred to as anexternal Virtual Router.

A Virtual Router that connects to internal, protected networks is known as an internal Virtual Router.

Page 95: VSX R80.40 Administration Guide - InfoSec

Working with Virtual Routers

VSX R80.40 Administration Guide      |      95

Item Description Item Description

1 Internet 6 External Virtual Router

2 Router 7 Virtual Systems

3 Security Management Server VLAN Interface

4 VSXGateway VLAN Trunk

5 VLAN switch Warp Link

An external Virtual Router functions as the external gateway for Virtual Systems, allowing them to share asingle secure physical interface leading to external networks and the Internet.

Item Description Item Description

1 Internet 7 Unnumbered

2 Router 8 Virtual Systems

3 Security Management Server 9 Internal Virtual Router

4 VSXGateway VLAN Interface

5 Switch VLAN Truck

6 External Virtual Router Warp link

Page 96: VSX R80.40 Administration Guide - InfoSec

Working with Virtual Routers

VSX R80.40 Administration Guide      |      96

In this scenario, VSX createsWarp interfaces between the Virtual Systems and both Virtual Routers. Notethat the external Virtual System interfaces are defined as unnumbered interfaces.

An internal Virtual Router typically connects with one interface leading to internal networks through aswitch with additional Warp Links leading to other Virtual Systems located in the VSXGateway.

After you create a new Virtual Router, add new interfaces to the Virtual Systems to connect to the VirtualRouter.

Creating a New Virtual RouterUse the Virtual Router Wizard to create a new Virtual Router. You can modify the initial definition andconfigure advanced options after you complete the wizard.

On interfaces and routes, you can select the Propagate route to adjacent Virtual Devices option tobroadcast the IP address to neighboring Virtual Devices. This option enables connectivity with these VirtualDevices.

To create a Virtual Router:

1. Connect with SmartConsole to the Security Management Server or Target Domain ManagementServer used to manage the new Virtual System.

2. From the left navigation panel, clickGateways & Servers.

3. Create a new Virtual Router object in one of these ways:

n From the top toolbar, click theNew ( ) > VSX > New Virtual Router.

n In the top left corner, clickObjects menu > More object types > Network Object >Gateways and Servers > VSX > New Virtual Router.

n In the top right corner, clickObjects Pane > New > More > Network Object > Gatewaysand Servers > VSX > Virtual Router.

The Virtual Router Wizard opens.

4. In the Name field, enter the name for the new Virtual Router.

5. In the VSX Gateway / Cluster field, select the applicable VSXGateway or VSXCluster.

6. ClickNext.

7. In the Interfaces section, click Add to add the interface, to which the Virtual Router connects.

8. In the Routes section, click Add to add the applicable network routes.

9. Optional:Click Add Default Route and configure the default route.

10. ClickNext.

11. Click Finish.

Modifying a Virtual Router Definition1. Connect with SmartConsole to the Security Management Server or Target Domain Management

Server used to manage the Virtual Router.

2. From theGateways & Servers view orObject Explorer, double-click the Virtual Router object.

Page 97: VSX R80.40 Administration Guide - InfoSec

Working with Virtual Routers

VSX R80.40 Administration Guide      |      97

Virtual Router - General Properties

TheGeneral Properties page enables you change the Virtual Router IP address as well as to addcomments and change the icon color as displayed in SmartConsole.

Virtual Router - Topology

The Virtual Router Network Configuration page defines the network topology for the Virtual Router. Foran external interface, you define one or more shared external interfaces and a default gateway.

Topology is defined by these properties:

n Interfaces: Add new interfaces, or modify or delete existing interfaces.

To add an interface, clickNew. The Interface Properties window opens. Select an interface fromthe list and define the IP address, net mask and other properties (see "Working with InterfaceDefinitions" on page 103).

n Routes: Add network routes between this Virtual Router, Virtual Systems, external network devicesand network addresses. SomeWarp Link routes are defined automatically and cannot be modifiedor deleted. You can manually add new routes as well as delete and modify non-Warp Link routes.

n Add Default Route: Define the default route as an IP address or Virtual System.

n Advanced Routing: Configure source-based routing rules. See "Working with Source-BasedRouting" on page 98.

Deleting a Virtual Router1. Connect with SmartConsole to the Security Management Server or Target Domain Management

Server used to manage the new Virtual Router.

2. From theGateways & Servers view orObject Explorer, double-click the Virtual Router object.

3. From the left tree, click Topology.

4. In the Interfaces section, remove all interfaces.

5. ClickOK.

6. Right-click the Virtual Router object and selectDelete.

7. Click Yes in the confirmation box.

8. Publish the SmartConsole session

Page 98: VSX R80.40 Administration Guide - InfoSec

Working with Source-Based Routing

VSX R80.40 Administration Guide      |      98

Working with Source-Based Routing

Introduction

Source-based routing directs traffic to a specific destination based on the source IP address or acombination of the source and destination IP addresses.

Rules defining Source-based routing take precedence over ordinary destination-based routing rules.

This section describes how to configure sourced-based routing rules when working in a VSX environment.

The procedures for defining source-based rules are the same for Virtual Routers in both VSXGatewaysand VSXClusters.

Item Description Item Description

1 Internet 8 Wrp Unnumbered interface

2 Router 9 Virtual Systems

3 Security Management Server 10 Internal Virtual Router

4 VSXGateway VLAN Interface

5 Switch VLAN Truck

6 External Virtual Router Warp link

7 wrpj

Page 99: VSX R80.40 Administration Guide - InfoSec

Working with Source-Based Routing

VSX R80.40 Administration Guide      |      99

Defining Source-Based Routing Rules

Define Source-based Routing rules in the Topology page of the Virtual Router definition window.

To define source-based routing rules:

1. Connect with SmartConsole to the Security Management Server or Target Domain ManagementServer that manages the Virtual Router.

2. From theGateways & Servers view orObject Explorer, right-click the Virtual Router object andselect Edit.

TheGeneral Properties window opens.

3. From the left navigation tree, select Topology.

4. Click Advanced Routing.

The Advanced Routing Rules window opens.

5. Click Add to define a new rule. or select an existing rule and click Edit to change it.

The Add/Edit Route Rulewindow opens.

6. Define these settings:

n Source IP Address and Net Mask

n Destination IP Address and Net Mask

n Next Hop Gateway

7. ClickOK.

Page 100: VSX R80.40 Administration Guide - InfoSec

CoreXL for Virtual Systems

VSX R80.40 Administration Guide      |      100

CoreXL for Virtual Systems

IntroductionCoreXL creates multiple Firewall instances that are, in reality, independent firewalls. You can use CoreXLto increase the performance of the VSXGateway with multiple CPU cores. You can also assign eachCoreXL Firewall instance to a group of CPU cores with the fw ctl affinity command.

You configure CoreXL Firewall instances differently for the VSXGateway (VS0) than for other VirtualSystems.

n VSX Gateway - Use the CLI to configure the number of CoreXL Firewall instances.

n Other Virtual Systems - Use SmartConsole to configure the number of CoreXL Firewall instances.

You can configure several CoreXL Firewall instances for each Virtual System. When you change thenumber of CoreXL Firewall instances on a Virtual System, there is some downtime for that Virtual System.

Important:

n Each CoreXL Firewall instance you create uses additional system memory. AVirtual System with five CoreXL Firewall instances would use approximately thesame amount of memory as five separate Virtual Systems.

n The number of IPv6 instances cannot exceed the number of IPv4 CoreXLFirewall instances. For more about IPv6 CoreXL Firewall instances and VSX,see sk97997.

For more about configuring CoreXL, see the R80.40 Performance Tuning Administration Guide.

Configuring CoreXL on a VSX GatewayUse the cpconfig command to configure CoreXL on the VSXGateway (VS0).

The number of instances for the VSXGateway is limited to the physical number of cores on the server orappliance.

To configure the number of instances on the VSX Gateway:

1. From the CLI, run cpconfig.

2. SelectConfigure Check Point CoreXL.

3. Make sure that CoreXL is enabled.

4. Configure the number of firewall instances for the VSXGateway.

5. Exit the cpconfigmenu.

Note - It is not necessary to reboot the VSXGateway after you configure CoreXL.

Configuring CoreXL on Virtual SystemsUse SmartConsole to configure the number of CoreXL Firewall instances on the Virtual Systems.

Page 101: VSX R80.40 Administration Guide - InfoSec

CoreXL for Virtual Systems

VSX R80.40 Administration Guide      |      101

n In 32-bit VSX, you can assign up to 10 CoreXL Firewall instances on a Virtual System.

n In 64-bit VSX, you can assign up to 32 CoreXL Firewall instances on a Virtual System.

The number of CoreXL Firewall instances is not limited by the physical CPU cores on the VSXGateway.

You can assign the number of IPv6 CoreXL Firewall instances. It must be less or equal to the number ofIPv4 CoreXL Firewall instances. The number of IPv6 CoreXL Firewall instances may be zero. IPv6 CoreXLFirewall instances are only enabled, if an IPv6 address is configured for that Virtual System.

Notes:

n We recommend that you use the number of CoreXL Firewall instances for eachVirtual System according to the expected network traffic on the Virtual System.Configuring unnecessary CoreXL Firewall instances can have a negative impacton performance.

n We recommend that you do not configure more CoreXL Firewall instances thanthe total number of physical CPU cores on the VSXGateway.

To configure CoreXL on a Virtual System:

1. Connect with SmartConsole to the Security Management Server or Target Domain ManagementServer that manages the Virtual System.

2. From theGateways & Servers view orObject Explorer, double-click the Virtual System object.

The Virtual System General Properties window opens.

3. From the left navigation tree, selectCoreXL.

4. Select the number of CoreXL Firewall instances for the Virtual System.

5. ClickOK.

6. Install the Access Control Policy on the Virtual System object.

Page 102: VSX R80.40 Administration Guide - InfoSec

Dynamic Routing for Virtual Devices

VSX R80.40 Administration Guide      |      102

Dynamic Routing for Virtual DevicesThis section presents procedures for configuring dynamic routing for Virtual Systems and Virtual Routers.The Virtual Devices can use dynamic routing protocols to communicate and distribute routes amongstthemselves and with external routers and other devices. VSX uses the Gaia routing daemon (routed).

You can configure dynamic routing for each of these Virtual Devices:

n Virtual System

n Virtual Router

Each of these Virtual Devices has its own dynamic routing instance and configuration file. Use the sameprocedures to configure the dynamic routing protocols for Warp Links as regular interfaces. You can alsoconfigure dynamic routing separately on each VSXCluster Member.

Important - You cannot use the CLI to configure static routes for VSX. You can onlyconfigure them in SmartConsole in the applicable VSX object.

For more about configuring dynamic routing, see the R80.40Gaia Advanced Routing AdministrationGuide.

To configure dynamic routing for a Virtual Device:

1. Connect to the command line on the VSXGateway or each VSXCluster Member.

2. Log in to Gaia Clish.

3. Change the context to the Virtual Device:

set virtual-system <VSID>

4. Run the applicable commands to configure the dynamic routing daemon for the Virtual Device.

5. Save the changes:

save config

Page 103: VSX R80.40 Administration Guide - InfoSec

Working with Interface Definitions

VSX R80.40 Administration Guide      |      103

Working with Interface DefinitionsAll VSXGateways and Virtual Routers and Virtual Switches contain at least one interface definition.

Typically, you define the interfaces during the process of configuring the topology for a given object.

Warp interfaces, however, are created automatically based on Virtual Device definitions and theirtopology.

You cannot modify or delete a Warp interface.

Adding a New InterfaceThe procedure and options for defining an interface vary according to the object and the network topology.

Some properties and pages are not available for certain interface definitions.

To add a new interface:

1. Open the Virtual Device object.

2. From the navigation tree, click Topology.

3. From the Interfaces section, clickNew and select one of these options:

n Regular

n Leads to Virtual Router

n Leads to Virtual Switch

The Interface Properties window for the selected option opens.

Configuring Connection Properties - General

TheGeneral tab defines the network connections associated with an interface.

One or more of these properties show, depending on the context.

n Interface: Select a physical interface from the list (physical interfaces only).

n VLAN Tag: VLAN tag associated with the defined interface.

n IP Addressand Net Mask: IP address and net mask of the device associated with the interface.

n Propagate route to adjacent Virtual Devices: Enable to "advertise" the associated device toneighboring devices, thereby enabling connectivity between them. See "VSX Routing Concepts" onpage 50.

n MTU: Maximum transmission unit size in bytes (default = 1,500).

Configuring Connections Leading to Virtual Routers and Switches

TheGeneral tab for interface connections leading to Virtual Routers or Virtual Switches containsconnection properties specific to those Virtual Devices.

n Leads to: Select a Virtual Router or Virtual Switch.

n Enter the dedicated Virtual SystemIP address for this interface.

Page 104: VSX R80.40 Administration Guide - InfoSec

Working with Interface Definitions

VSX R80.40 Administration Guide      |      104

n The Net Mask property is always defined as 255.255.255.255 for IPv4 and /128for IPv6.

n Propagate route to adjacent Virtual Devices: Enable to "advertise" the associated device toneighboring devices, thereby enabling connectivity between them. See "VSX Routing Concepts" onpage 50.

n MTU: Maximum transmission unit size in bytes (default = 1,500). The minimum and maximum MTUvalues are:

l IPv6 MTU: 1280 - 16000

l IPv4 MTU: 68 - 16000

Configuring Interface Topology

For some interface types, you can change some or all of these topology properties:

n External: The interface leads to external networks or to the Internet.

n Internal: The interface leads to internal networks or a DMZ, and includes these properties:

l Not Defined: IP routing is not defined for this device.

l Network: Routing is defined by the IP and net mask defined in General Properties.

l Specific: Routing is defined by a specific network or network group.

l Interface leads to DMZ: Defines an interface as leading to a DMZ, which isolates avulnerable, externally accessible resource from the rest of a protected, internal network.

Configuring Anti-Spoofing

Attackers can gain access to protected networks by falsifying or "spoofing" a trusted source IP addresswith high access privileges. It is important to configure Anti-Spoofing protection for VSXGateways andVirtual Systems, including internal interfaces. You can configure Anti-Spoofing for an interface, providedthat the topology for the interface is properly defined.

If you are using dynamic routing, disable the Calculate topology automatically based on routinginformation option, and manually configure the topology of the Virtual System.

To enable Anti-Spoofing for an interface:

1. From the Topology tab in the Interface Properties window, select Perform Anti-Spoofing based oninterface topology.

2. Configure the tracking options.

Configuring Multicast Restrictions

IPmulticasting applications send one copy of each datagram (IP packet) and address it to a group ofcomputers that wish to receive it. Multicast restrictions allow you to define rules that block outbounddatagrams from specific multicast groups (IP address ranges). You can define multicast accessrestrictions for physical and Warp interfaces in a VSX environment.

From To

IPv4 (defined in RFC 1112) 224.0.0.0 239.255.255.255

Page 105: VSX R80.40 Administration Guide - InfoSec

Working with Interface Definitions

VSX R80.40 Administration Guide      |      105

From To

IPv6 ff00:: ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff

To enable multicast restrictions:

1. From theMulticast Restrictions tab in the Interface Properties window, selectDrop multicastpackets by the following conditions.

1. Select a restriction type:

n Drop multicast packets whose destination is in the list

n Drop all multicast packets except those whose destination is in the list

2. Click Add.

The Add Objectwindow opens.

3. ClickNew > Multicast Address Range.

TheMulticast Address Range Properties window opens.

4. Configure these settings:

n Name

n Type

n If you selected IP Address Range, enter the First and Last IP addresses.

5. ClickOK.

6. From the Interface Properties window, select a tracking option.

7. ClickOK and close theGeneral Properties window.

8. Add a rule to the Rule Base that allows traffic for the specified multicast groups and install the policy.

Changing an Interface DefinitionThis section presents procedures for modifying existing interface definitions and related features.

Interfaces definitions are always associated with a Virtual Gateway or a Virtual System definition.

To change an existing interface definition:

1. Double-click the interface in the Interfaces section.

2. In the Interface Properties window, define the interface properties.

Deleting an Interface

To delete an interface:

1. From the Topology page, select the interface and clickDelete.

2. ClickOK.

Page 106: VSX R80.40 Administration Guide - InfoSec

Working with Authentication

VSX R80.40 Administration Guide      |      106

Working with Authentication

Authentication SchemesAuthentication schemes employ user names and passwords to identify valid users.

Some schemes are maintained locally, storing user names and passwords on the VSXGateway, whileothers store authentication information on an external authentication server.

Some schemes, such as SecurID, are based on providing a one-time password.

For more information, see the R80.40 SecurityManagement Administration Guide > Section ConfiguringAuthenticationMethods for Users.

Check Point Password

Check Point password is a static password that is configured in SmartConsole. For administrators, thepassword is stored in the local database on the Security Management Server. For users, it is stored onthe local database on the Security Gateway. No additional software is required.

Operating System Password

OSPassword is stored on the operating system of the computer on which the Security Gateway(forusers) or Security Management Server (for administrators) is installed. You can also use passwordsthat are stored in a Windows domain. No additional software is required.

RADIUS

Remote Authentication Dial-In User Service (RADIUS) is an external authentication method thatprovides security and scalability by separating the authentication function from the access server.

Using RADIUS, the Security Gateway forwards authentication requests by remote users to the RADIUSserver. For administrators, the Security Management Server forwards the authentication requests. TheRADIUS server, which stores user account information, does the authentication.

The RADIUS protocol uses UDP to communicate with the gateway or the Security Management Server.

RADIUS servers and RADIUS server group objects are defined in SmartConsole.

TACACS

Terminal Access Controller Access Control System (TACACS) provides access control for routers,network access servers and other networked devices through one or more centralized servers.

TACACS is an external authentication method that provides verification services. Using TACACS, theSecurity Gateway forwards authentication requests by remote users to the TACACS server. Foradministrators, it is the Security Management Server that forwards the requests. The TACACS server,which stores user account information, authenticates users. The system supports physical card keydevices or token cards and Kerberos secret key authentication. TACACS encrypts the user name,password, authentication services and accounting information of all authentication requests to ensuresecure communication.

Page 107: VSX R80.40 Administration Guide - InfoSec

Working with Authentication

VSX R80.40 Administration Guide      |      107

SecurID

SecurID requires users to both possess a token authenticator and to supply a PIN or password. Tokenauthenticators generate one-time passwords that are synchronized to an RSAAuthentication Manager(AM) and may come in the form of hardware or software. Hardware tokens are key-ring or credit card-sized devices, while software tokens reside on the PC or device from which the user wants toauthenticate. All tokens generate a random, one-time use access code that changes approximatelyevery minute. When a user attempts to authenticate to a protected resource, the one-time use codemust be validated by the AM.

Using SecurID, the Security Gateway forwards authentication requests by remote users to the AM. Foradministrators, it is the Security Management Server that forwards the requests. The AM manages thedatabase of RSA users and their assigned hard or soft tokens. The Security Gateway or the SecurityManagement Server act as an AM agent and direct all access requests to the RSAAM forauthentication. For additional information on agent configuration, refer to RSAAuthentication Managerdocumentation.

There are no specific parameters required for the SecurID authentication method. Authenticationrequests can be sent over SDK-supported API or through REST API.

There are no specific parameters required for the SecurID authentication method.

Configuring SecurID AuthenticationSee the R80.40 SecurityManagement Administration Guide > ChapterManaging User and AdministratorAccounts > SectionManaging User Accounts > Section SecurID Authentication for Security Gateway.

Configuring RADIUS or TACACS AuthenticationThese are the options to enable connectivity between Virtual Systems and a RADIUS orTACACS/TACACS+ server:

n Shared configuration: All authentication servers are accessible by all Virtual Systems through theVSXGateway. This is the default option.

n Private configuration: Authentication servers are accessed directly by the Virtual System and usethe Virtual System cluster IP address as the source address.

For Multi-Domain Server configurations, make sure that you configure the SecurID or RemoteAuthentication settings of the Domain Management Server that manages the Virtual Systems.

Configuring Shared Authentication

Configure shared authentication so that all the Virtual Systems on the VSXGateway authenticate to theremote RADIUS or TACACS/TACACS+ server.

To configure shared authentication for RADIUS or TACACS/TACACS+:

1. Configure shared authentication on the Virtual Systems.

a. Connect with SmartConsole to the Management Server.

b. From the left navigation panel, clickGateways & Servers.

c. Double-click the Virtual System object.

The Virtual Systems General Properties window opens.

Page 108: VSX R80.40 Administration Guide - InfoSec

Working with Authentication

VSX R80.40 Administration Guide      |      108

d. From the navigation tree, selectOther >Authentication.

e. Make sure thatRADIUS or TACACS and Shared are selected.

f. ClickOK.

g. Install the policy on the Virtual Systems.

Repeat these Steps for each Virtual System.

2. For a VSXCluster:

On the Management Server that manages this VSXCluster, make sure that Hide NAT isdisabled.

On Multi-Domain Server, work in the context of the Target Domain Management Server thatmanages the Virtual System.

a. Edit the applicable table.def file. See sk98339.

b. Make sure that the no_hide_services_ports parameter contains the UDP ports forRADIUS or TACACS, or the TCP ports for TACACS+.

The default ports are:

n RADIUS - 1645

n TACACS/TACACS+ - 49

Sample RADIUS parameter with Hide NAT disabled:

no_hide_services_ports = { <49, 6>, <49, 17>, <500, 17>,<259, 17>, <1701, 17>, <123, 17>, <1645, 17> };

c. Save the changes in the file and exit the editor.

d. In SmartConsole, install the policy on the Virtual Systems.

Configuring Private Authentication

For private configurations, the active and standby Virtual Systems use the same encryption key toauthenticate to the remote RADIUS or TACACS/TACACS+ server.

For High Availability configurations, make sure that the Active and Standby Virtual Systems on eachVSXCluster Member use the same VIP address.

To configure private authentication:

1. Configure private authentication on the VSXGateway and the Virtual Systems.

a. Connect with SmartConsole to the Management Server.

b. From the left navigation panel, clickGateways & Servers.

c. Double-click the VSXGateway object.

TheGeneral Properties view opens.

d. From the navigation tree, selectOther > Legacy Authentication.

e. Make sure thatRADIUS or TACACS are selected.

Page 109: VSX R80.40 Administration Guide - InfoSec

Working with Authentication

VSX R80.40 Administration Guide      |      109

f. ClickOK.

g. From SmartConsole, install the Access Control Policy on the Virtual System.

Repeat these steps for each Virtual System.

2. For VSXCluster:

On the Management Server that manages this VSXCluster, make sure that Hide NAT is enabled.

For Multi-Domain Server, use the Domain Management Server that manages the Virtual System.

a. Edit the applicable table.def file (see sk98339) in a plain-text editor.

b. Make sure that the no_hide_services_ports parameter DOESNOT contain theUDP ports for RADIUS or TACACS, or the TCP ports for TACACS+.

The default ports are:

n RADIUS - 1645

n TACACS/TACACS+ - 49

Sample parameter with Hide NAT enabled:

no_hide_services_ports = { <500, 17>, <259, 17>, <1701,17>, <123, 17> };

c. Save the changes in the file and exit the editor.

d. From SmartConsole, install the Access Control Policy on each Virtual System.

Page 110: VSX R80.40 Administration Guide - InfoSec

Tracking the Status of VSX Objects

VSX R80.40 Administration Guide      |      110

Tracking the Status of VSX ObjectsUse the SmartConsole Logs & Monitor features to show the status of all Security Gateways, VSXGateways and other Virtual Devices.

TheOverall status of a Virtual Device is the most serious status of its Software Blades.

For example, if all the Software Blades statuses areOK except for the SmartEvent blade, which has aProblem status, then theOverall status will be Problem.

Status Icon Description

OK The gateway and all its Software Blades are working properly.

Attention At least one Software Blade has a minor issue, but the gateway works.

Problem At least one Software Blade reported a malfunction, or an enabled Software Blade isnot installed.

Waiting SmartViewMonitor is waiting for the Security Management Server to send data fromSecurity Gateways.

DisconnectedCannot reach the Security Gateway.

Untrusted Cannot make Secure Internal Communication between the Security ManagementServer and the gateway.

Page 111: VSX R80.40 Administration Guide - InfoSec

Working with Network Address Translation (NAT)

VSX R80.40 Administration Guide      |      111

Working with Network Address Translation(NAT)This section describes the process for using Network Address Translation (NAT) in a VSX deployment.The procedures described in this section assume that the reader is familiar with NAT concepts and theirimplementation in Check Point products.

For more about NAT, see the R80.40 SecurityManagement Administration Guide - Section ConfiguringNAT Policy.

VSX supports NAT for Virtual Systems much in the same manner as a physical firewall. When a NATenabled (Static or Hide) Virtual System connects to a Virtual Router, the translated routes areautomatically forwarded to the appropriate Virtual Router.

Configure NAT using the NAT page in the Virtual System window. Hide or Static NAT addressesconfigured in this manner are automatically forwarded to the Virtual Router to which the Virtual System isconnected. Alternatively, you can manually add NAT routes on the Topology page in the Virtual Routerwindow.

To configure NAT for a Virtual System on a VSX Gateway:

Step Description

1 Connect with SmartConsole to the Security Management Server / Target Domain ManagementServer that manages this Virtual System.

2 From the left navigation panel, clickGateways & Servers.

3 Open the Virtual System object.

4 From the navigation tree, clickNAT >Advanced.The Advanced page opens.

5 Select Add Automatic Address Translation.

6 Select the Translation method.

n Hide - Hide NAT only allows connections originating from the internal network. Internalhosts can access internal destinations, the Internet and other external networks. Externalsources cannot initiate a connection to internal network addresses.Select one of these options:

l Hide behind Gateway - Hides the real address behind the VSXGateway externalinterface address. This is equivalent to hiding behind the address 0.0.0.0 forIPv4, or :: for IPv6.

l Hide behind IP Address - Hides the real address behind a virtual IP address,which is a routable, public IP address that does not belongs to any real machine.

n Static - Static NAT translates each private address to a corresponding public address.Enter the static IP address.

7 From the Install on Gateway list, select the VSXGateway.

Page 112: VSX R80.40 Administration Guide - InfoSec

Working with Network Address Translation (NAT)

VSX R80.40 Administration Guide      |      112

Step Description

8 ClickOK.

9 Install the Access Control Policy on this Virtual System.

To configure NAT for a Virtual System on a VSX Cluster:

Use case - Perform Hide NAT on traffic a Virtual System itself generates in a VSXCluster, so that theVirtual System could connect to external resources (for example, update Anti-Bot signatures from theCheck Point cloud).

Step Description

1 Connect to the command line on each VSXCluster Member.

2 Log in to the Expert mode.

3 Switch to the context of the applicable Virtual System:[Expert@HostName:0]# vsenv <VSID>

4 Get the Funny IP address of the applicable Virtual System interface, through which theapplicable traffic goes out.Note - Funny IP address is the IP address that belongs to cluster's internal communicationsnetwork (open the VSXCluster object properties and go to the "Cluster Members" pane).Run one of these commands:

n [Expert@HostName:<VSID>]# fw getifsn [Expert@HostName:<VSID>]# \ifconfig

Write down the Funny IP address.

5 Connect with SmartConsole to the Security Management Server / Target Domain ManagementServer that manages this Virtual System.

6 From the left navigation panel, clickGateways & Servers.

7 Create a newNode Host object and assign to it the Funny IP address you wrote down in Step 4.

8 Create a newNode Host object and assign to it the NATed IP address.

9 From the left navigation panel, click Security Policies.

Page 113: VSX R80.40 Administration Guide - InfoSec

Working with Network Address Translation (NAT)

VSX R80.40 Administration Guide      |      113

Step Description

10 In the Access Control > NAT policy, create the applicable NAT rule to hide the traffic from theVirtual System behind the NATed IP address:

n Original Source - Must be a Node Host object with the Funny IP address of the VirtualSystem

n Original Destination - * Anyn Original Services -* Anyn Translated Source - Must be a Node Host object with the NATed IP address of the

Virtual Systemn Translated Destination - = Originaln Translated Services - = Originaln Install On - * Policy Targets, or the Virtual System objectn Comment - Applicable text (for example, "Manual NAT rule for VSXcluster3-VS2 Funny

IP")

11 Install the Access Control Policy on this Virtual System.

Page 114: VSX R80.40 Administration Guide - InfoSec

Using Application & URL Filtering with VSX

VSX R80.40 Administration Guide      |      114

Using Application & URL Filtering with VSXWhen you configure Virtual Systems to use the Application Control and URL Filtering, make sure that theVSXGateway (VS0) can connect to the Internet. Updates are done only through this Virtual System.

To enable Application & URL Filtering Categories on Virtual Systems:

1. If applicable, configure proxy settings for the VSXGateway (VS0):

a. In SmartConsole, from theGateways & Servers view, double-click the VSXGateway (VS0).

b. From the navigation tree, selectNetwork Management > Proxy.

c. Configure the proxy settings, and clickOK.

2. Enable Application Control and URL Filtering on the required Virtual Systems.

Note - You do not have to enable these Software Blades on the VSXGateway (VS0).

3. Install policies on the relevant Virtual Systems.

For more about Application &URL Filtering, see the R80.40 SecurityManagement Administration Guide.

For more information about these Software Blades on VSXGateway, see sk106496 and sk79700.

Page 115: VSX R80.40 Administration Guide - InfoSec

Using Anti-Bot and Anti-Virus with VSX

VSX R80.40 Administration Guide      |      115

Using Anti-Bot and Anti-Virus with VSXWhen you configure Virtual Systems to use the Anti-Bot and Anti-Virus Software Blades, make sure theSoftware Blade:

n Is enabled and configured on the relevant Virtual Systems and enabled and configured on the VSXGateway (VS0)

VS0 handles contract validation for all Virtual Systems.

n Can connect to the interne

A Virtual System gets updates through the VSXGateway (VS0). If the VSXGateway fails, eachVirtual System uses its proxy settings to get the update from the internet.

Note - Where applicable, make sure the routing, DNS, and proxy settings for the VSXGateway (VS0) are configured correctly.

To enable Anti-Bot and Anti-Virus on Virtual Systems:

1. If applicable, configure proxy settings for the VSXGateway (VS0) or the Virtual Systems or both:

a. From the Network Object tree, double-click the VSXGateway (VS0).

b. From the navigation tree, select Topology > Proxy.

c. Configure the proxy settings.

d. ClickOK.

2. Enable Anti-Bot and Anti-Virus on the VSXGateway (VS0):

a. From the Network Object tree, double-click the Virtual System.

b. In the Network Security section, select Anti-Bot and Anti-Virus.

c. ClickOK.

3. Repeat Steps 1-2 for all Virtual Systems that use Anti-Bot and Anti-Virus.

4. Configure the Threat Prevention Policies for the VSXGateway (VS0) and the relevant VirtualSystems.

5. Install the Threat Prevention Policies (and Access Control Policies if needed) on the VSXGateway(VS0) the relevant Virtual Systems.

For more about Anti-Bot and Anti-Virus, see the R80.40 Threat Prevention Administration Guide.

For more information about these Software Blades on VSXGateway, see sk106496 and sk79700.

Page 116: VSX R80.40 Administration Guide - InfoSec

Using IPS with VSX

VSX R80.40 Administration Guide      |      116

Using IPS with VSX

To enable IPS on Virtual Systems:

1. If applicable, configure proxy settings for the VSXGateway (VS0):

a. In SmartConsole, from theGateways & Servers view, double-click the VSXGateway (VS0).

b. From the navigation tree, selectNetwork Management > Proxy.

c. Configure the proxy settings, and clickOK.

2. Enable IPS on the required Virtual Systems.

Note - You do not have to enable this Software Blade on the VSXGateway (VS0).

3. Configure the Threat Prevention Policies for the relevant Virtual Systems.

4. Install the Threat Prevention Policies (and Access Control Policies if needed) on the relevant VirtualSystems.

The Security Management Server / Domain Management Server downloads the updates for IPS SoftwareBlade and then transfers them to the VSXGateway during policy installation.

For more about IPS, see the R80.40 Threat Prevention Administration Guide.

For more information about this Software Blade on VSXGateway, see sk106496 and sk79700.

Page 117: VSX R80.40 Administration Guide - InfoSec

Using Threat Emulation with VSX

VSX R80.40 Administration Guide      |      117

Using Threat Emulation with VSX

To enable Threat Emulation on Virtual Systems:

1. If applicable, configure proxy settings for the VSXGateway (VS0):

a. In SmartConsole, from theGateways & Servers view, double-click the VSXGateway (VS0).

b. From the navigation tree, selectNetwork Management > Proxy.

c. Configure the proxy settings, and clickOK.

2. Enable Threat Emulation on the required Virtual Systems.

Note - You do not have to enable this Software Blade on the VSXGateway (VS0).

3. Configure the Threat Prevention Policies for the relevant Virtual Systems.

4. Install the Threat Prevention Policies (and Access Control Policies if needed) on the relevant VirtualSystems.

For more about Threat Emulation, see the R80.40 Threat Prevention Administration Guide.

For more information about this Software Blade on VSXGateway, see sk106496 and sk79700.

Page 118: VSX R80.40 Administration Guide - InfoSec

Using Threat Extraction with VSX

VSX R80.40 Administration Guide      |      118

Using Threat Extraction with VSX

To enable Threat Emulation on Virtual Systems:

1. If applicable, configure proxy settings for the VSXGateway (VS0):

a. In SmartConsole, from theGateways & Servers view, double-click the VSXGateway (VS0).

b. From the navigation tree, selectNetwork Management > Proxy.

c. Configure the proxy settings, and clickOK.

2. Enable Threat Extraction on the required Virtual Systems.

Note - You do not have to enable this Software Blade on the VSXGateway (VS0).

3. Configure the Threat Prevention Policies for the relevant Virtual Systems.

4. Install the Threat Prevention Policies (and Access Control Policies if needed) on the relevant VirtualSystems.

For more about Threat Extraction, see the R80.40 Threat Prevention Administration Guide.

For more information about this Software Blade on VSXGateway, see sk106496 and sk79700.

Page 119: VSX R80.40 Administration Guide - InfoSec

Licensing VSX

VSX R80.40 Administration Guide      |      119

Licensing VSXCheck Point software is activated with a license key. To obtain a license key, register the certificate key(that appears on the back of the software media pack) with the Check Point User Center. The certificatekey is used to generate a license key for the products that you are either evaluating or purchasing. Topurchase the required Check Point products, contact your reseller. Check Point software that has not yetbeen purchased functions for 15 days only.

VSX LicensesEach VSXGateway or VSXCluster Member requires its own license, bound to the VSXGateway or VSXCluster Member IP address. Each VSXGateway or VSXCluster license covers a predefined number ofVirtual Systems (3, 10, 25, and 50) and these licenses are cumulative. The VSX licenses are applied inaddition to the Security Gateway license (container and Software Blades).

Upgrading LicensesBefore upgrading a gateway or Security Management Server to R80.40, you need to have a valid supportcontract that includes software upgrade and major releases registered to your Check Point User Centeraccount. The Security Management Server stores the contract file and downloads it to Security Gatewaysduring the upgrade. By verifying your status with the User Center, the contract file enables you to easilyremain compliant with current Check Point licensing standards.

The license upgrade procedure can be performed if you have purchased any of the Enterprise SoftwareSubscription services. To upgrade a VSX license, do the Software Blades upgrade procedure. Seesk65850.

The Trial PeriodWhen installing a Check Point product for the first time, users receive a 15 day trial period, during which theproduct is fully functional. Once the trial period expires, you must purchase and install the appropriatepermanent product licenses. During the trial period, you can define up to 25 Virtual Systems.

Page 120: VSX R80.40 Administration Guide - InfoSec

Using VSX with Multi-Domain Server

VSX R80.40 Administration Guide      |      120

Using VSX with Multi-Domain ServerYou can manage a VSX deployment using Multi-Domain Server.

Only procedures specific to VSX deployments are discussed.

This chapter assumes that you are familiar with the Multi-Domain Server product.

For more about Multi-Domain Server, see the R80.40Multi-Domain SecurityManagement AdministrationGuide.

Check Point Multi-Domain Server is a centralized security management solution that addresses the uniquerequirements of service providers and large enterprises. By using Multi-Domain Server, administrators cancentrally manage multiple independent networks, often belonging to different Domains, divisions, orbranches.

Item Description

1 SmartConsole

2 Multi-Domain Server

3 Domain Management Server

4 Main Domain Management Server

5 VSXGateway

Page 121: VSX R80.40 Administration Guide - InfoSec

Using VSX with Multi-Domain Server

VSX R80.40 Administration Guide      |      121

Item Description

6 Virtual Systems in Domain Management Servers

TheMulti-Domain Server is a central Management Server that hosts the network management andsecurity policy databases for these networks. Each independent domain is represented by a Domain,which provides the full functionality of a Security Gateway. Each Domain Management Server can hostVirtual Systems, Virtual Routers and Virtual Switches as well as physical Check Point Security Gateways.

The Domain Management Server that manages a VSXGateway or cluster is known as aMain DomainManagement Server. You can host multiple Gateways and/or clusters on one Multi-Domain Server.Virtual Systems belonging to a given Domain can be distributed among multiple VSXGateways andclusters.

When connected to a Multi-Domain Server, SmartConsole offers a centralized management solution forDomains, Domain Management Servers and the Multi-Domain Server environment. Each DomainManagement Server uses its own instance of SmartConsole, which is accessible only via the Multi-DomainServer, to provision its Virtual Devices and physical Gateways, as well as to manage their Security Policies.

Page 122: VSX R80.40 Administration Guide - InfoSec

VSX Provisioning

VSX R80.40 Administration Guide      |      122

VSX ProvisioningThe procedures for provisioning and configuring VSXGateways, clusters and Virtual Devices using theMulti-Domain Server model are essentially the same as described for the Security Gateway managementmodel.

The most important difference is that you must first create and configure each Domain and its associatedDomain Management Server objects using the SmartConsole connected to a Multi-Domain Server.

Each Domain Management Server is the functional equivalent of one VSXGateway.

You connect to each Domain Management Server with SmartConsole to work with network objects,security policies and other objects for that VSXGateway.

This is the basic workflow for provisioning a VSX environment in a Multi-Domain Server deployment:

1. Define and configure Multi-Domain Server and Multi-Domain Log Server as applicable for yourdeployment.

2. Create and configure a Domain and Domain Management Server for each VSXGateway and/orVSXCluster.

3. With SmartConsole, connect to the Domain Management Server to create and configure the VSXGateway and/or VSXCluster objects.

See "Working with VSX Gateways" on page 79 and "Working with VSX Clusters" on page 140.

Configure the default security policy for these objects as necessary.

4. Define individual Domains and Domain Management Servers as required for your deployment.

5. Create and configure Virtual Systems and other Virtual Devices for each Domain in theSmartConsole connected to that Domain.

See "Working with Virtual Systems" on page 84, "Working with Virtual Switches" on page 91, and"Working with Virtual Routers" on page 94.

Page 123: VSX R80.40 Administration Guide - InfoSec

Defining Multi-Domain Servers

VSX R80.40 Administration Guide      |      123

Defining Multi-Domain ServersThis section briefly presents the procedures for installing and deploying Multi-Domain Server machines ina VSX / Multi-Domain Server environment.

See the R80.40Multi-Domain SecurityManagement Administration Guide for conceptual information anddetailed procedures for configuring Multi-Domain Servers and Domain Management Servers.

When working with Management High Availability, define at least two Multi-Domain Server machines.

You can also use multiple Multi-Domain Server machines to efficiently distribute management traffic(management Load Sharing) with more than one Domain Management Server for each Domain. For aLoad Sharing deployment, define a Domain Management Server for each Multi-Domain Server.

Page 124: VSX R80.40 Administration Guide - InfoSec

Working with Virtual Devices

VSX R80.40 Administration Guide      |      124

Working with Virtual DevicesWhen working with Virtual Devices in Multi-Domain Server, you must use the applicable DomainManagement Server SmartConsole.

Otherwise, the configuration procedures are the same to those for a Security Management Server.

Multi-Domain Server treats Virtual Devices in the same way as physical devices.

You can add as many Virtual Systems to Domain Management Servers as your license permits.

Virtual Systems added to a Domain Management Server do not have to reside on the same VSXGatewayor cluster.

Adding a Virtual System to a Domain Management Server

To add a new Virtual System to a Domain Management Server:

1. Launch SmartConsole from the appropriate Domain Management Server.

2. Create and configure the Virtual System (see "Working with Virtual Systems" on page 84).

3. Define and install a security policy.

Adding Virtual Routers and Virtual Switches to a DomainManagement Server

To add Virtual Routers and Virtual Switches to a Domain Management Server:

1. Launch SmartConsole from the appropriate Domain Management Server.

2. Create and configure Virtual Routers (see "Working with Virtual Routers" on page 94) and VirtualSwitches (see "Working with Virtual Switches" on page 91) as required.

Page 125: VSX R80.40 Administration Guide - InfoSec

Introduction to VSX Clusters

VSX R80.40 Administration Guide      |      125

Introduction to VSX ClustersThis chapter presents a conceptual overview of VSXCluster deployments, with emphasis on clusteringfeatures and their application.

It assumes you are familiar with network cluster applications and environments, particularly ClusterXL.

For more about Check Point ClusterXL features and functionality, see the R80.40 ClusterXLAdministration Guide

VSX Cluster OverviewVSXClusters provide redundancy and load sharing features for Virtual Systems and other Virtual Devices.

A VSXCluster consists of two or more identical, interconnected VSXGateways that ensure continuousdata synchronization.

VSXHigh Availability ensures continuous operation by means of transparent VSXCluster Member failover.

Virtual System Load Sharing (VSLS) enhances system performance by distributing Active VirtualSystems amongst VSXCluster Members.

The advantages of using clusters in a VSX environment include:

n Transparent failover in case of VSXCluster Member or Virtual System failure

n State synchronization ensures zero downtime for mission-critical environments

n Load Sharing maintains system throughput during peak demand

n Enhanced scalability for future traffic growth

Physical ClustersVSXCluster is based on Check Point ClusterXL concepts. This section reviews these concepts, and thendemonstrates how these principles apply to VSX virtualization.

In typical Security Gateway deployment, a cluster consists of two or more identical, interconnectedphysical Security Gateways that provide redundancy and/or Load Sharing. This cluster behaves as asingle Security Gateway and is assigned its own IP address, which is known as itsCluster IP or Virtual IPaddress. This IP address is distinct from the physical IP addresses of its VSXCluster Members, which arehidden from the networks connected to the cluster.

Traffic from external networks or the Internet directed to the internal networks arrives at the externalcluster IP address. Depending on the clustering mode (High Availability or Load Sharing), a designatedVSXCluster Member receives the traffic and performs the required inspection. After inspection, traffic iseither sent to its destination on the internal network, or dropped.

Internal networks send traffic destined for the Internet or external networks, to the cluster IP address. Thistraffic is processed by the designated VSXCluster Member, inspected, and forwarded to its externaldestination.

Each member interface has a unique, physical IP addresses. These IP addresses, which are invisible tophysical networks, are used for internal communication between VSXCluster Members and theManagement Server for such tasks as downloading Security Policies, sending logs and checking the statusof individual VSXCluster Members.

Page 126: VSX R80.40 Administration Guide - InfoSec

Introduction to VSX Clusters

VSX R80.40 Administration Guide      |      126

VSX ClustersVSXClusters, like their physical counterparts, connect two or more synchronized Gateways in such a waythat if one fails, another immediately takes its place.

VSXClusters are defined at two levels:

VSX ensures that Virtual Systems, Virtual Routers, Virtual Switches and their interfaces are provisionedand configured identically on each VSXCluster Member.

The figure below shows that each VSXCluster Member contains identical instances of each Virtual Device.

These identical instances are referred to as peers.

Item Description Item Description

1 Virtual System 2 7 VSXCluster Member 1

2 Virtual System 1 8 VSXCluster Member 2

3 Internet 9 VLAN switch

4 Router 10 Network 2

5 External Cluster Interface 11 Network 1

Page 127: VSX R80.40 Administration Guide - InfoSec

Introduction to VSX Clusters

VSX R80.40 Administration Guide      |      127

Item Description Item Description

6 Sync VLAN Trunk

VSX provides the management functionality to support network and security virtualization, including:

n Assigning virtual IP addresses: Each Virtual Device interface requires its own virtual IP address.

n State synchronization: Virtual Device state tables are synchronized to peers on other VSXClusterMembers.

Page 128: VSX R80.40 Administration Guide - InfoSec

Planning a VSX Cluster Deployment

VSX R80.40 Administration Guide      |      128

Planning a VSX Cluster DeploymentAs with physical network deployments, advance planning is the key to successfully creating a workingnetwork.

IP address allocation for a VSX deployment requires particular attention.

This section takes you through the basics of IP address allocation for a VSXCluster environment.

Your VSXCluster configuration choices affect the number of IP addresses required, both public andprivate.

VSX Cluster ArchitectureVSX IP address allocation is similar to physical networks.

Both real and virtual IP addresses are required for network connectivity (internal and external),management, and state synchronization.

VSX simplifies the IP address management task by automatically assigning IP addresses to Warp Linksbetween Virtual Devices.

For example, Warp Links between a Virtual Router and its associated Virtual Systems are createdautomatically and assigned IP addresses without user intervention.

A VSXCluster network has these components:

n Synchronization Network

n Internal Communications Network

n Virtual IP addresses

Synchronization NetworkThe synchronization network is a physical network that carries state synchronization data between VSXCluster Members.

You configure the synchronization network during the initial VSXCluster definition and can make changesas necessary when adding or removing VSXCluster Members.

State Synchronization can be used ClusterXL deployments as well as other OPSEC-certified VSXsolutions.

The synchronization network must be configured using unique IP addresses that are not used anywhereelse in the enterprise network.

Page 129: VSX R80.40 Administration Guide - InfoSec

Planning a VSX Cluster Deployment

VSX R80.40 Administration Guide      |      129

Internal Communication NetworkThe internal communication network is a virtual network that is required for ClusterXL environments, inaddition to the synchronization network.

The internal communication network is invisible to external networks and lets VSXCluster Memberscommunicate and recognize the state of the environment.

VSX assigns an IP address to the internal communication network during the cluster creation process.

This eliminates the need to manually assign an IP address to each VSXCluster Member:

IPv4 address: 192.168.196.0, netmask: 255.255.252.0 (a range of four class C networks).

IPv6 address and netmask: FD9A::1FFE:0:0:0/80

You can modify the default IP address using theGateway Cluster Properties >Cluster Members page ofthe VSXCluster object, but only before creating Virtual Systems.

Once Virtual Systems have been created, the IP range of the internal communication network cannot bemodified.

Note - To avoid overlapping IP addresses, before creating any Virtual Devices, makesure the default IP address range of the Internal Communication network is not usedanywhere else in the external network.

Virtual IP AddressesCluster Virtual IP addresses are the only IP addresses visible to the external network.

The assigned cluster IP addresses must correspond to the directly-connected subnet and server as a validnext hop address.

These IP addresses are similar to virtual addresses configured across traditional cluster setups.

Page 130: VSX R80.40 Administration Guide - InfoSec

VSX High Availability

VSX R80.40 Administration Guide      |      130

VSX High AvailabilityVSXGateway High Availability is the default cluster configuration.

All VSXCluster Members of a VSXCluster must be configured to use the same clustering mode.

In VSXGateway High Availability, each VSXCluster Member functions as a VSXGateway and issynchronized with the other VSXCluster Members.

If one member goes down, it immediately fails over to another member.

Likewise, if an individual Virtual System, Virtual Router or Virtual Switch goes down, the entire VSXClusterMember fails over to another member.

All VSXCluster Members and Virtual Systems function in an Active/Standby mode and are continuouslysynchronized.

Page 131: VSX R80.40 Administration Guide - InfoSec

Virtual System Load Sharing (VSLS)

VSX R80.40 Administration Guide      |      131

Virtual System Load Sharing (VSLS)In This Section:

Introduction 131

Requirements 133

Virtual System Priority 133

Virtual SystemWeight 133

Virtual System States 134

Normalized VSLS Deployment Scenario 134

VSX Cluster Member Failure Scenario 136

Virtual System Failure Scenario 137

Failure Recovery 138

IntroductionVSXClusters can efficiently balance network traffic load by distributing active Virtual Systems amongstVSXCluster Members. This capability is known as Virtual System Load Sharing (VSLS).

Virtual System Load Sharing is a cluster technology that assigns traffic for Virtual Systems to differentActive VSXCluster Members, which has these benefits:

n Capacity: VSLS leverages the cluster machines to handle greater network volume by efficientlydividing the load.

n Redundancy: VSLS gives full redundancy by maintaining connectivity for all Virtual Systems evenwhen individual VSXCluster Members fail.

n Scalability:VSLS provides linear scalability for throughput and session rate.

n Cost Effectiveness: A VSLS cluster uses standard network switches to achieve cost effective LoadSharing.

n Ease of Configuration: Virtual Systems are automatically distributed among all the VSXClusterMembers - no special configuration is required.

n Priority Designation: Mission-critical Virtual Systems can be separated from the other VirtualSystems, providing advantages in terms of bandwidth and resources.

n System Scalability: Every VSXCluster Member added to the cluster increases the overall systemcapacity and redundancy.

Note - These Virtual Devices are not supported when the Per Virtual System state is enabled:- Virtual Routers- Virtual Switches without physical or VLAN interfaces

In an example deployment scenario with three VSXCluster Members, each with three Virtual Systems: anequalized Load Sharing deployment might have one Active Virtual System on each VSXCluster Member.

Page 132: VSX R80.40 Administration Guide - InfoSec

Virtual System Load Sharing (VSLS)

VSX R80.40 Administration Guide      |      132

Item Description Item Description

1 VSXCluster Member 1 8 Virtual System 2 is Backup

2 VSXCluster Member 2 9 Virtual System 3 is Active

3 VSXCluster Member 3 10 Virtual System 1 is Backup

4 Virtual System 1 is Active 11 Virtual System 2 is Active

5 Virtual System 2 is Standby 12 Virtual System 3 is Standby

6 Virtual System 3 is Backup Sync Network

7 Virtual System 1 is Standby

A different member hosts the active peer for each Virtual System. This distribution spreads the load equallyamongst the VSXCluster Members. When you create a Virtual System, VSX automatically assignsStandby and Backup states to the appropriate peers and distributes them among the other VSXClusterMembers.

In the event that a VSXCluster Member fails, VSLS directs traffic destined to affected Virtual Systems totheir fully synchronized Standby peers, which then become Active. At the same time, a Backup VirtualSystem switches to Standby, and synchronizes with the newly Active Virtual System.

In the event that an individual active Virtual System fails, it immediately fails over to its Standby peer andone of its Backup peers becomes the Standby, synchronizing with the newly Active peer.

Page 133: VSX R80.40 Administration Guide - InfoSec

Virtual System Load Sharing (VSLS)

VSX R80.40 Administration Guide      |      133

VSLS lets administrators manually assign Virtual Systems to specified VSXCluster Members, or lets VSXautomatically assign Virtual System traffic dynamically.

RequirementsAll Virtual Systems in all VSXCluster Members must have direct connectivity with each other.

Connectivity must be accomplished using switches or VLAN connections.

This is required for detecting and assigning Virtual System states.

Note - VSLS does not support Virtual Routers.

Virtual System PriorityVirtual System priority refers to a preference regarding which member hosts a Virtual System's Active,Standby, and Backup states.

This preference is expressed as an integer value.

Priority Definition

0 Highest priority, indicating the cluster designated to host the Virtual System Active state.

1 Second highest priority, indicating the member designated to host the Virtual SystemStandby state.

> 1 Lower priorities, indicating the VSXCluster Members designated to host a Virtual SystemBackup state.The VSXCluster Member assigned priority 2 will be the first to switch the Virtual System to theStandby state in the event of a failure of either the Active or Standby Virtual System.A VSXCluster Member assigned priority 3 would be the next in line to come online in theevent of another failure.

You can change the priority designation with the "vsx_util vsls" command on the ManagementServer. See"Configuring Virtual System Load Sharing" on page 158 .

Virtual System WeightSince all Virtual Systems are not equal in terms of traffic and load, VSLS allows you to assign "weights" toindividual Virtual Systems. The weight of a Virtual System affects the dispersal pattern of other VirtualSystems across VSXCluster Members. Assigning a heavier weight to a Virtual System gives it a largershare of a particular member's resources, and accordingly, disperses the other Virtual Systems to otherVSXCluster Members.

By default, all Virtual Systems are assigned an equal weight factor of 10. You can change the weight factorwith the "vsx_util vsls" command on the Management Server. See"Configuring Virtual System LoadSharing" on page 158 .

Page 134: VSX R80.40 Administration Guide - InfoSec

Virtual System Load Sharing (VSLS)

VSX R80.40 Administration Guide      |      134

Virtual System StatesVSLS adds a Backup state to the existing Active and Standby states. The Backup state contains the latestconfiguration settings for each Virtual System, but does not receive state table synchronization. The figurebelow illustrates the relationship between Virtual System states.

Item Description

1 VSXCluster with 3 Cluster Members, each running 3 Virtual Systems (2, 3, and 4)

2 Virtual System 1 on VSXCluster Member 1 is Active

3 Virtual System 1 on VSXCluster Member 2 is Standby

4 Virtual System 1 on VSXCluster Member 3 is Backup

5 Policy updates only

6 State tables are synchronized

Each Virtual System peer in a VSLS cluster is replicated on all VSXCluster Members, and each copy existsin a different state.

The Active and Standby states are synchronized, so that the Standby peer can immediately become Activein the event of a failure of the Active Virtual System or VSXCluster Member.

When this happens, the Backup peer becomes the Standby, and immediately synchronizes with the newActive Virtual System.

VSLS reduces the load on the synchronization network by not synchronizing the Backup Virtual Systemstate tables with the Active Virtual System until a failover occurs.

Normalized VSLS Deployment ScenarioFor example, you can have three VSXCluster Members, each with three Virtual Systems. In thisconfiguration, an equalized Load Sharing deployment could have one Active Virtual System on each VSXCluster Member.

Page 135: VSX R80.40 Administration Guide - InfoSec

Virtual System Load Sharing (VSLS)

VSX R80.40 Administration Guide      |      135

Item Description Item Description

1 VSXCluster Member 1 8 Virtual System 2 is Backup

2 VSXCluster Member 2 9 Virtual System 3 is Active

3 VSXCluster Member 3 10 Virtual System 1 is Backup

4 Virtual System 1 is Active 11 Virtual System 2 is Active

5 Virtual System 2 is Standby 12 Virtual System 3 is Standby

6 Virtual System 3 is Backup Sync Network

7 Virtual System 1 is Standby

A different VSXCluster Member can host the Active state of each Virtual System.

This distribution of Virtual Systems spreads the load among the VSXCluster Members.

When a Virtual System is created, the system automatically creates Standby and Backup states anddistributes them among the other VSXCluster Members.

Page 136: VSX R80.40 Administration Guide - InfoSec

Virtual System Load Sharing (VSLS)

VSX R80.40 Administration Guide      |      136

VSX Cluster Member Failure ScenarioIn the event that a member fails or experiences a connectivity problem, VSLS detects the problem androutes traffic for the affected Virtual Systems to their respective standby Virtual Systems.

Standby Virtual Systems, which are fully synchronized with their active peers, change immediately to theactive state and preserve active connections.

At the same time, the backup Virtual Systems switch to standby, and synchronize fully with the newly activeVirtual Systems.

Item Description Item Description

1 VSXCluster Member 1 8 Virtual System 2 is Standby

2 VSXCluster Member 2 9 Virtual System 3 is Active

3 VSXCluster Member 3 10 Virtual System 1 is Standby

4 Virtual System 1 is Down 11 Virtual System 2 is Active

5 Virtual System 2 is Down 12 Virtual System 3 is Standby

6 Virtual System 3 is Down Sync Network

Page 137: VSX R80.40 Administration Guide - InfoSec

Virtual System Load Sharing (VSLS)

VSX R80.40 Administration Guide      |      137

Item Description Item Description

7 Virtual System 1 is Active Network Traffic

In this scenario, VSXCluster Member 1 fails and its Active and Standby Virtual Systems fail over to VSXCluster Member 2 and VSXCluster Member 3.

The Active Virtual System (VS1) moves to VSXCluster Member 2 and directs all VS1 traffic itself.

Its Backup peer on VSXCluster Member 3 synchronizes with the new Active Virtual System and becomesthe Standby.

VS2 on VSXCluster Member 2 becomes the Standby and synchronizes with the Active peer on VSXCluster Member 3.

For VS3, the Active and Standby peers remain the same.

Virtual System Failure ScenarioIn a failure scenario where an active Virtual System fails on one member, but the standby and backupVirtual Systems remain up: the active Virtual System fails over to its standby peer, and its backup becomesthe standby.

The new standby synchronizes with the new active member.

Item Description Item Description

1 Member 1 8 VS 2 Backup

Page 138: VSX R80.40 Administration Guide - InfoSec

Virtual System Load Sharing (VSLS)

VSX R80.40 Administration Guide      |      138

Item Description Item Description

2 Member 2 9 VS 3 Active

3 Member 3 10 VS 1 Standby

4 VS 1 Down 11 VS 2 Active

5 VS 2 Standby 12 VS 3 Standby

6 VS 3 Backup Sync Network

7 VS 1 Active

All other Virtual Systems continue to function normally and no failover occurs.

Failure RecoveryWhen the failed VSXCluster Member or Virtual System comes back online, the system returns to itsoriginal Load Sharing configuration.

Page 139: VSX R80.40 Administration Guide - InfoSec

Using Virtual Switches in a VSX Cluster

VSX R80.40 Administration Guide      |      139

Using Virtual Switches in a VSX ClusterIn a VSXCluster, Virtual Switches are also clustered for redundancy and are defined as Active/Active.

By means of the ClusterXL Control Protocol (CCP), the physical interface connected to the Virtual Switch ismonitored.

In the event of a failover, all Virtual Systems on Standby become Active, and send Gratuitous ARPRequests from the warp interface between the Virtual System and the Virtual Switch.

Item Description

1 Active VSXCluster Member

2 Standby VSXCluster Member

3 Virtual Switch Cluster

4 Active Virtual Switch

5 Virtual System 1

Physical Link

Warp Link

In the above figure, a simplified VSXCluster contains two VSXCluster Members, one Active, and the otherStandby.

The Virtual Switches within each VSXCluster are Active/Active.

When the physical interface connected to either Virtual Switch fails to respond, a failover occurs.

Page 140: VSX R80.40 Administration Guide - InfoSec

Working with VSX Clusters

VSX R80.40 Administration Guide      |      140

Working with VSX ClustersConfiguration OverviewYou use SmartConsole for most of the basic cluster configurations. Many cluster management proceduresrequire the command line. For example, you need the CLI to change the VSXCluster definitions.

Creating VSX ClustersThis section describes how to create a new VSXCluster using the VSX Cluster Wizard. The wizardguides you through the steps to configure a VSXCluster.

After completing the VSXCluster Wizard, you can modify most VSXCluster and VSXCluster Memberproperties directly from SmartConsole.

1. Connect with SmartConsole to the Security Management Server or Main Domain ManagementServer used to manage the VSXCluster.

2. From the left navigation panel, clickGateways & Servers.

3. At the top, clickObjects menu> More object types > Network Object > Gateways and Servers >VSX > New Cluster.

The VSX Cluster Wizard >General Properties opens.

Defining Cluster General Properties

The Cluster General Properties page contains basic properties for VSXClusters:

n VSX Cluster Name: Unique, alphanumeric name for the cluster. The name cannot contain spacesor special characters except the underscore.

n VSX Cluster IPv4 Address: IPv4 address of the cluster.

n VSX Cluster IPv6 Address: IPv6 address of the cluster.

n VSX Cluster Version: VSX version to use for this cluster.

n VSX Cluster Platform: Platform type hosting the VSXCluster Members:

l To create a High Availability cluster, select ClusterXL.

l To create a Load Sharing (VSLS) cluster, selectClusterXL Virtual System Load Sharing.

Note - All VSXCluster Members must use the same type of platform, with the samespecifications and configuration.

Page 141: VSX R80.40 Administration Guide - InfoSec

Working with VSX Clusters

VSX R80.40 Administration Guide      |      141

Selecting Virtual Systems Creation Templates

The Virtual Systems Creation Templates allows you to select a Virtual System Creation Template thatautomatically applies predefined, default topology and routing definitions to Virtual Systems when they arefirst created. This feature ensures consistency among Virtual Systems and speeds up the provisioningprocess.

You always have the option of overriding the default creation template when creating or modifying a VirtualSystem

The available creation templates are as follows:

n Shared Interface: All Virtual Systems share a single external interface, but maintain separateinternal interfaces.

n Separate Interfaces: All Virtual Systems use their own separate internal and external interfaces.This template creates a Dedicated Management Interface (DMI) by default.

n Custom Configuration: You manually create a custom configuration without any template.

Adding VSX Cluster Member

The VSX Cluster Members window defines the members of the new cluster. You must define at least twoVSXCluster Members. You can add more members later.

1. In the VSX Cluster Members window, click Add.

2. TheMember Properties window opens.

3. Enter the name and IP addresses for the VSXCluster Member.

Note: If you define an IPv6 IP address, you must also have an IPv4 address.

4. Enter and confirm the Activation Key to initialize SIC trust between the VSXCluster Member and theManagement Server.

Note - You defined this Activation Key during the First Time Configuration Wizard of the VSXClusterMember.

5. Follow these steps for all VSXCluster Members.

6. ClickNext to continue.

Defining Cluster Interfaces

The VSX Cluster Interfaces window lets you define physical interfaces as VLAN Trunks.

The list shows all interfaces currently defined on the VSXGateway or VSXCluster object.

To configure a VLAN Trunk:

Select one or more interfaces to define them as VLAN Trunks. You can clear an interface to remove theVLAN Trunk assignment.

Important - You cannot define the management interface as a VLAN trunk. To use themanagement interface as a VLAN, you must define the VLAN on the VSXGatewaybefore you use SmartConsole to create the VSXGateway object.

Page 142: VSX R80.40 Administration Guide - InfoSec

Working with VSX Clusters

VSX R80.40 Administration Guide      |      142

Configuring VSX Cluster Members

If you selected the custom configuration option, the VSX Cluster Members window appears.

In this window, you define the synchronization IP address for each VSXCluster Member.

To configure the VSX Cluster Members:

1. Select the synchronization interface from the list.

2. Enter the synchronization interface addresses and net mask for each VSXCluster Member.

To use a VLAN as a synchronization interface:

1. On each VSXCluster Member, define the VLAN interface on the applicable physical interface.

2. In SmartConsole, create the VSXCluster object.

3. On each VSXCluster Member, set the value of the kernel parameter fwha_monitor_all_vlanto 1 in the $FWDIR/boot/modules/fwken.conf file. For more information, see sk92826 and"Working with Kernel Parameters on Security Gateway" on page 333.

Cluster Management

The VSX Gateway Management page allows you to define several security policy rules that protect thecluster itself. This policy is installed automatically on the new VSXCluster.

Note - This policy applies only to traffic destined for the cluster. Traffic destined forVirtual Systems, other Virtual Devices, external networks, and internal networks is notaffected by this policy.

The security policy consists of predefined rules covering the following services:

n UDP: SNMP requests

n TCP: SSH traffic

n ICMP: Echo-request (ping)

n TCP: HTTPS (secure HTTP) traffic

Configuring the Cluster Security Policy

1. Allow: Enable a rule to allow traffic for those services for which you wish to allow traffic. Clear a ruleto block traffic. By default, all services are blocked.

For example, you may wish to allow UDP echo-request traffic in order to be able to ping VSXCluster Member from the Management Server.

2. Source: Click the arrow and select a Source Object from the list. The default value is *Any.

ClickNew Source Object to define a new source.

For more about Security Policies, see the R80.40 SecurityManagement Administration Guide.

Page 143: VSX R80.40 Administration Guide - InfoSec

Working with VSX Clusters

VSX R80.40 Administration Guide      |      143

Completing the Wizard

1. ClickNext to continue and then click Finish to complete the VSXCluster wizard.

It can take several minutes to complete. Amessage appears indicating successful or unsuccessfulcompletion of the process.

If the process ends unsuccessfully, click View Report to view the error messages.

Refer to the troubleshooting steps for more information - "VSX Diagnostics and Troubleshooting"on page 219.

2. In SmartConsole, double-click the new VSXCluster object.

3. Configure the applicable settings.

4. ClickOK.

5. Install the Access Control Policy.

6. Install the Threat Prevention Policy.

Page 144: VSX R80.40 Administration Guide - InfoSec

Modifying a VSX Cluster Definition

VSX R80.40 Administration Guide      |      144

Modifying a VSX Cluster DefinitionIn This Section:

General Properties 145

VSX Cluster Members 145

Gateway VSXCluster Member List 145

Where Used 146

Internal IP Address and Net Mask 146

ClusterXL 146

Creation Templates 146

Physical Interfaces 146

Synchronization 147

Topology 147

Interfaces 147

Routes 147

Calculating Topology Automatically Based on Routing Information 149

VPNDomain 149

NAT 149

VSX Bridge Configuration 150

Changing the Cluster Management IP and/or Subnet 150

Changing the Internal Communication Network IP 150

After you create a cluster with the wizard, you can change the topology and other parameters in theClusterMembers Properties window. This window lets you configure many advanced features not available withthe wizard.

To work with a VSXCluster definition, double-click a cluster object in SmartConsole. The VSX ClusterProperties window opens.

You can define most cluster objects with SmartConsole. There are some features or properties that youmust CLI commands to configure.

A brief explanation for each of the definition pages follows. More detailed explanations for features that arenot specific to VSX (NAT, IPS, VPN, etc.) are available in the online help or in the applicable productdocumentation.

Page 145: VSX R80.40 Administration Guide - InfoSec

Modifying a VSX Cluster Definition

VSX R80.40 Administration Guide      |      145

General PropertiesSee theGeneral Properties page to view general properties and to activate Software Blades for use withthis VSXCluster.

You can modify the following properties:

n Comment: Free text comment that appears in the Object List and elsewhere

n Color: Color of the object icon as it appears in SmartConsole

n Network Security: Select Software Blades on this VSXCluster and its Cluster Members

VSX Cluster MembersThe Cluster Members page lets you view and modify several properties for individual VSXClusterMembers, including IP addresses for Cluster Members and the Internal Communication Network.

Gateway VSX Cluster Member List

The Cluster Members page shows all the VSXCluster Members.

To edit a VSX Cluster Member:

From the Cluster Member page, select a VSXCluster Member and click Edit.

The Cluster Member Properties window opens. These are the settings that you can edit:

n General tab:

l Comment: Free text comment that appears in the Object List and elsewhere

l Color: Color of the object icon as it appears in SmartConsole

l Secure Internal Communication: Check and reset SIC trust

n Topology tab: Displays the Cluster Member IP address and Net Mask for each interface. Double-click an interface to see its properties.

n NAT tab: Define NAT rules for VSXCluster Members connected to a Virtual Router.

n VPN tab: Contains a variety of configuration properties for Site-To-Site VPN deployments.

This window is only available if the IPsec VPN is enabled on theGeneral Properties page.

For more about VPN concepts and configurations, see the R80.40 Site to Site VPN Administration Guide.

Page 146: VSX R80.40 Administration Guide - InfoSec

Modifying a VSX Cluster Definition

VSX R80.40 Administration Guide      |      146

Where Used

ClickWhere used to show information about the selected member in the objects database.

n Name: Cluster name.

n Table: Name of the table in the database under which the selected object is listed.

n Is removable: Specifies whether or not you are allowed to remove the selected object. If the objectis not removable and nevertheless you choose to remove it, it will impact the database or Rule Base.

n Refresh: Click to update the window display if you make changes.

n Context: Where the object is used.

Internal IP Address and Net Mask

VSX creates an internal communication network and automatically assigns it an IP address and net maskfrom a predefined pool. You can change this IP address here if you have not yet defined a Virtual System.Although traffic from this address is never sent to any networks, you must ensure that this IP address isunique and not in use anywhere on your defined network.

ClusterXLTo manage state synchronization, open the ClusterXLwindow, or run the "vsx_util" on page 251 commandon the Management Server.

n Enable or disable state synchronization.

n Select tracking options for VSXCluster Member state changes.

All other ClusterXL configuration properties are disabled.

Creation TemplatesThe Creation Templates page displays the creation template used to create Virtual Systems. You canchange from the current creation template to the Custom Configuration template and change the sharedphysical interface if the Shared Interface template is active.

n Select the Custom Configuration option to change from the Shared Interfaces or SeparateInterfaces templates.

You cannot change back from the Custom Configuration template once you have completed thedefinition and saved it to the configuration to cluster.

n To change the shared interface, click Settings and select an interface from the list that appears.

Physical InterfacesThe Physical Interfaces page allows you to add or delete a physical interface on the VSXGateway, and todefine interfaces to be used as VLAN trunks.

n To add a new physical interface, click Add and enter the interface name in the appropriate field.

n To define an interface as a VLAN trunk, select the applicable interface and enable the VLAN Trunkoption. To disable a VLAN trunk, clear the option.

Page 147: VSX R80.40 Administration Guide - InfoSec

Modifying a VSX Cluster Definition

VSX R80.40 Administration Guide      |      147

SynchronizationThe Synchronizationwindow displays the state synchronization network. There are no configurableproperties.

TopologyOn the Topology page, you can see and configure interface and routing definitions.

Interfaces

The Interfaces section defines interfaces and links to devices. You can add new interfaces as well asdelete and modify existing interfaces.

To add an interface:

1. ClickNew and select one of these options:

n Regular - Create a new interface

n State Synchronization

n Leads to Virtual Router

n Leads to Virtual Switch

TheInterface Properties window opens.

Click Actions >Copy to Clipboard to copy the Interfaces table in CSV format.

2. Define the appropriate properties.

3. ClickOK.

To change an interface:

1. Double-click an interface.

TheInterface Properties window opens.

2. Change the parameters for the interface.

3. ClickOK.

To delete an interface:

1. From the Topology page, select the interface and clickDelete.

2. ClickOK.

Routes

The Routes section of the Topology window defines routes between network devices, network addresses,and Virtual Devices. Some routes are defined automatically based on the interface definitions. You canadd, change, and delete routes.

Page 148: VSX R80.40 Administration Guide - InfoSec

Modifying a VSX Cluster Definition

VSX R80.40 Administration Guide      |      148

To add a default route to the routing table:

1. Click Add Default Route.

The Default Gateway window opens.

2. Enter the default route IP address or select the default Virtual Router.

3. ClickOK.

The default route is added to the routing table.

4. Select the default route and click Edit.

The Route Configurationwindow opens.

5. Configure the settings for the default route.

6. ClickOK.

To add a new route to the routing table:

1. Click Add.

The Route Configurationwindow opens.

2. Configure the Destination IP address and netmask.

3. Configure the next hop IP address or Virtual Router.

4. Optional: Select Propagate route to adjacent Virtual Devices to "advertise" the route toneighboring Virtual Devices, and enable connectivity between them.

5. ClickOK.

To change a route:

1. Select the route.

2. Click Edit.

The Route Configurationwindow opens.

3. Change the settings.

4. ClickOK.

To delete a route:

1. Select the route.

2. ClickRemove.

A confirmation window opens.

3. ClickOK.

Page 149: VSX R80.40 Administration Guide - InfoSec

Modifying a VSX Cluster Definition

VSX R80.40 Administration Guide      |      149

Calculating Topology Automatically Based on Routing Information

Enable this option to allow VSX to automatically calculate the network topology based on interface androuting definitions (enabled by default). VSX creates automatic links, or connectivity cloud objects linked toexisting internal or external networks.

n This option is not available in Bridge mode.

n When employing dynamic routing, it is recommended to disable this option.

VPN Domain

The VPN Domain section in the Topology page defines the set of hosts that use a VPN tunnel tocommunicate with peer Virtual Systems.

Define a VPNDomain to include a Virtual Device as part of the VPN connection. The domain defines theVirtual System interfaces that are in the VPN. You can define a VPNDomain in different ways:

n All IP Addresses behind Cluster Members are based on topology information: Includes all hostsnot located behind an external gateway cluster interface.

n Manually Defined: Includes all hosts in the selected network or group.

n Remote Access Communities: Define an alternative VPN domain for Remote Access Communitytraffic.

To specify the VPN domain:

1. Click Set domain for Remote Access Community.

The VPN Domain per Remote Access Community window opens.

2. Double-click a Remote Access Community.

The Set VPN Domainwindow opens.

3. Select a VPN domain from the list, or clickNew, to define a new domain.

4. ClickOK.

NATThe NAT >Advanced page lets you configure NAT rules for packets originating from a Virtual System.

Page 150: VSX R80.40 Administration Guide - InfoSec

Modifying a VSX Cluster Definition

VSX R80.40 Administration Guide      |      150

To enable and configure NAT for a Virtual System:

1. Select Add Automatic Address Translation.

2. Select a translation method:

n Hide: Hide NAT only allows connections originating from the internal network. Internal hostscan access internal destinations, the Internet and other external networks. External sourcescannot initiate a connection to internal network addresses.

n Static: Static NAT translates each private address to a corresponding public address.

3. If you selectHide, select one of these options:

n Hide behind Gateway hides the real IP address behind the Virtual System external interfaceIP address,

or

n Hide behind IP Address hides the real address behind a virtual IP address, which is aroutable, public IP address that does not belongs to any real machine.

4. If you selected Static NAT, enter the static IP address in the appropriate field.

5. Select the VSXGateway from the Install on Gateway list.

VSX Bridge ConfigurationThe VSX Bridge Configuration page allows you to specify the loop detection algorithm when working inthe Bridge mode.

Enable the Check Point ClusterXLoption to enable the Active/Standby Bridge Mode loop detectionalgorithms contained in ClusterXL.

Enable the Standard Layer 2 Loop Detection Protocols to use standard loop detection protocols, such asSTP or PVST+.

See "BridgeMode" on page 208.

Changing the Cluster Management IP and/or SubnetTo add, change or delete the cluster management IP address and/or subnet, run the "vsx_util change_mgmt_ip" on page 259 and "vsx_util change_mgmt_subnet" on page 260 commands on the ManagementServer.

Changing the Internal Communication Network IPYou can change the internal communication network IP address by using the "vsx_util change_private_net" on page 261 command on the Management Server.

Page 151: VSX R80.40 Administration Guide - InfoSec

Working with VSX Cluster Members

VSX R80.40 Administration Guide      |      151

Working with VSX Cluster MembersThis section presents procedures for adding and deleting VSXCluster Members.

Adding a New VSX Cluster MemberImportant - Make sure that no other administrators are connected to the ManagementServer before you perform this procedure. The vsx_util command cannot modifythe management database, if the database is locked because other administrators areconnected.

1. Install the new VSXCluster Member.

See the R80.40 Installation and UpgradeGuide.

2. Close all SmartConsole windows.

3. Create a full backup of the environment (see sk100395).

4. Connect to the command line on the Management Server.

5. Log in the Expert mode.

6. Run this command and follow the on-screen instructions:

vsx_util add_member

a. Enter the IP address of the Security Management Server or Main Domain ManagementServer.

b. Enter the Management Server administrator user name and password.

c. Follow the on-screen instructions.

7. Wait until the add member operation finished successfully message appears, indicating that thedatabase has been successfully updated and saved.

Note - In a Multi-Domain Server environment, this operation skips all DomainManagement Servers locked by an administrator. If this should occur, run thecommand again for the affected Domain Management Servers once theybecome available.

8. Connect with SmartConsole to the Security Management Server or Main Domain ManagementServer used to manage the VSXCluster.

9. From the left navigation panel, clickGateways & Servers.

10. Double-click the VSXCluster object.

11. From the left tree, clickCluster Members.

12. Make sure you see an object representing the new VSXCluster Member.

13. If necessary, modify the VSXCluster object configuration and clickOK.

14. Close all SmartConsole windows.

15. Connect to the command line on the Management Server.

16. Log in the Expert mode.

Page 152: VSX R80.40 Administration Guide - InfoSec

Working with VSX Cluster Members

VSX R80.40 Administration Guide      |      152

17. Run this command and follow the on-screen instruction:

vsx_util add_member_reconf

18. Wait until the Reconfigure module operation completed successfully summary notice appears.

Note - In a Multi-Domain Server environment, this operation skips all DomainManagement Servers locked by an administrator. If this should occur, run thecommand again for the affected Domain Management Servers once theybecome available.

19. Reboot the new VSXCluster Member.

20. Connect to the command line on each VSXCluster Member.

21. Examine the VSXCluster configuration:

cphaprob state

22. If the VSXCluster runs in the VSLSmode:

a. Connect to the command line on the Management Server.

b. Log in the Expert mode.

c. Redistribute Virtual Systems to the newly added VSXCluster Member:

vsx_util vsls

d. Connect to the command line on each VSXCluster Member.

e. Examine the VSXCluster configuration:

cphaprob state

Page 153: VSX R80.40 Administration Guide - InfoSec

Working with VSX Cluster Members

VSX R80.40 Administration Guide      |      153

Deleting a VSX Cluster Member

Important - Make sure that no other administrators are connected to the ManagementServer before you perform this procedure. The vsx_util command cannot modifythe management database if the database is locked.

1. Close all SmartConsole windows.

2. Create a full backup of the environment (see sk100395).

3. Detach the license from the VSXCluster Member to be removed.

Otherwise, you cannot remove a VSXCluster Member.

4. Close all SmartConsole windows.

5. Connect to the command line on the Management Server.

6. Log in the Expert mode.

7. Run this command and follow the on-screen instructions:

vsx_util remove_member

a. Enter the IP address of the Security Management Server or Main Domain ManagementServer.

b. Enter the Management Server administrator user name and password.

c. Type 'y' to confirm that you have detached the license from the VSXCluster Member.

d. Select the VSXCluster.

e. Select the VSXCluster Member.

f. Type 'y' to confirm that the VSXCluster Member to be removed is disconnected.

8. Wait until the remove member operation finished successfully message appears.

Note - In a Multi-Domain Server environment, this operation skips all DomainManagement Servers locked by an administrator. If this should occur, run thecommand again for the affected Domain Management Servers once theybecome available.

The management database is now updated and saved.

9. Connect with SmartConsole to the Security Management Server or Main Domain ManagementServer used to manage the VSXCluster.

10. From the left navigation panel, clickGateways & Servers.

11. Double-click the VSXCluster object.

12. From the left tree, clickCluster Members.

13. Make sure you do not see an object representing the removed VSXCluster Member.

Page 154: VSX R80.40 Administration Guide - InfoSec

Changing the VSX Cluster Type

VSX R80.40 Administration Guide      |      154

Changing the VSX Cluster TypeThis section presents procedures for converting VSXCluster between High Availability and VSLS.

Changing the VSXCluster mode involves the use of the vsx_util convert_cluster command onthe Management Server.

Converting from VSLS to High Availability1. Redistribute all Active Virtual Systems to one VSX Cluster Member

a. Close all SmartConsole windows.

b. Connect to the command line on the Management Server.

c. Log in to the Expert mode.

d. Run:

vsx_util vsls

e. Enter the IP address for the Security Management Server or Domain Management Server.

f. Enter the Management Server administrator user name and password.

g. Select the VSXCluster.

h. From the Load Sharing menu, enter 3. Set all VSs active on one member.

i. Enter the number of the VSXCluster Member that is hosting the Active Virtual Systems.

j. Enter Y to save and apply the configuration.

k. Exit the VSLSmenu.

2. Disable the VSLS options

Perform these steps on each VSXCluster Member:

a. Connect to the command line.

b. Log in to the Expert mode.

c. Run:

cpconfig

d. Disable the Per Virtual System State.

e. Disable the ClusterXL for Bridge Active/Standby.

f. Restart the Check Point services (this can cause cluster failover):

cpstop ; cpstart

3. Convert the VSX Cluster to High Availability

a. Connect to the command line on the Management Server.

b. Log in to the Expert mode.

Page 155: VSX R80.40 Administration Guide - InfoSec

Changing the VSX Cluster Type

VSX R80.40 Administration Guide      |      155

c. Run:

vsx_util convert_cluster

d. Enter the IP address for the Security Management Server or Main Domain ManagementServer used to manage this VSXCluster.

e. Enter the Management Server administrator user name and password.

f. From the Load Sharing menu, enter 3. Set all VSs active on one member.

g. Select the VSXCluster.

h. Enter:

HA

i. Reboot each VSXCluster Members (this can cause cluster failover).

j. On each VSXCluster Member:

i. Connect to the command line.

ii. Examine the VSX configuration:

vsx state -v

iii. Examine the VSXCluster state and configuration:

cphaprob state

When the vsx_util convert_cluster command finishes, there should be only one ActiveVSXCluster Member, on which all Virtual Systems are in the Active state, and one Standby VSXCluster Member, on which all Virtual Systems are in the Standby state. Any additional VSXCluster Members should be in Standby state, and their Virtual Systems in the Down state.

Page 156: VSX R80.40 Administration Guide - InfoSec

Changing the VSX Cluster Type

VSX R80.40 Administration Guide      |      156

Converting from High Availability to VSLS

Note - You cannot convert a VSXCluster to the VSLSmode, if it contains VirtualSystems in the Active/Active Bridge Mode, or contains Virtual Routers.

1. Close all SmartConsole windows.

2. On each VSXCluster Member:

a. Run:

cpconfig

b. Enable the Per Virtual System State.

c. Enable ClusterXL for Bridge Active/Standby.

a. Restart the Check Point services:

cpstop ; cpstart

3. On the Management Server:

a. Connect to the command line.

b. Log in to the Expert mode.

c. Run:

vsx_util convert_cluster

d. Enter the IP address of the Security Management Server or Domain Management Server.

e. Enter the Management Server administrator user name and password.

f. Select the VSXCluster.

g. Enter:

LS

h. At the Proceed with conversion? prompt, enter: y

i. Select an option to distribute Virtual Systems among VSXCluster Members:

n Distribute all Virtual Systems equally.

n Set all Virtual Systems as Activeon the same VSXCluster Member.

4. Reboot each VSXCluster Member.

5. On each VSXCluster Member:

a. Connect to the command line.

b. Examine the VSX configuration:

vsx state -v

c. Examine the VSXCluster state and configuration:

cphaprob state

Page 157: VSX R80.40 Administration Guide - InfoSec

Configuring VSX Cluster in High Availability Mode

VSX R80.40 Administration Guide      |      157

Configuring VSX Cluster in High AvailabilityModeVSXGateway High Availability is the default cluster configuration.

If Virtual System Load Sharing (VSLS) is not active, a VSXCluster functions in the VSXGateway HighAvailability mode.

All VSXCluster Members must be configured to use the same clustering mode.

To configure VSX Cluster Members for VSX Gateway High Availability:

During the Gaia First Time Configuration Wizard, on the Products page, selectClusterXL.

For more information, see the R80.40 Installation and UpgradeGuide.

Page 158: VSX R80.40 Administration Guide - InfoSec

Configuring Virtual System Load Sharing

VSX R80.40 Administration Guide      |      158

Configuring Virtual System Load SharingIn This Section:

Enabling VSLS 159

Creating a New VSLS Cluster 159

Using the "vsx_util vsls" Command 160

Distributing Virtual Systems Between VSX Cluster Members 161

Distributing Virtual Systems for Equal Member Loading 161

Placing All Active Systems on the Same Member 161

Assigning Priorities and Weights for a Single Virtual System 161

Viewing VSLS Status 163

Exporting and Importing VSLS Configurations 164

VSLSConfiguration File 165

Exporting a VSLS configuration 165

Processing Options 166

Importing a VSLS configuration 166

This section presents the various procedures for configuring VSLS deployments.

You use the "vsx_util vsls" command on the Management Server to perform various VSLSconfigurations tasks.

1. Connect to the command line on the Management Server.

2. Log in to the Expert mode.

3. Run:

vsx_util vsls

4. Enter the IP address of the Security Management Server or Domain Management Server.

5. Enter the Management Server administrator user name and password.

6. Select the VSXCluster from the menu.

7. From the VSLSmenu, select the configuration option.

Page 159: VSX R80.40 Administration Guide - InfoSec

Configuring Virtual System Load Sharing

VSX R80.40 Administration Guide      |      159

Enabling VSLSIn order to use VSLS for VSX, you must first activate the Per Virtual System State mode on each VSXCluster Member. You can then create a Load Sharing cluster, either by creating a new cluster object, or byconverting an existing High Availability cluster to Load Sharing mode. After completing this process, youcan modify Virtual Systems as required.

The Per Virtual System Statemode enables active Virtual Systems to be placed on different VSXClusterMembers, and for Virtual System-specific failover. This setting is mandatory for VSLS. On each VSXCluster Member, do the following:

Note - These Virtual Devices are not supported when the Per Virtual System state is enabled:

n Virtual Routersn Virtual Switches that do not have physical or VLAN interfaces

1. Connect to the command line.

2. Log in to the Expert mode.

3. Run:

cpconfig

4. Select:

Enable Check Point Per Virtual System State

5. When the question appears:

Would you like to enable Per Virtual System state?

Enter y to confirm.

6. Reboot the VSXCluster Member.

Creating a New VSLS Cluster1. Connect with SmartConsole to the Security Management Server or Main Domain Management

Server used to manage the VSXCluster.

2. From the navigation panel, clickGateways & Servers.

3. At the top, clickObjects menu > More object types > Network Object > Gateways and Servers> VSX > New Cluster.

The VSX Cluster Wizard >General Properties opens.

4. Create and configure the new cluster.

See "Working with VSX Clusters" on page 140.

a. On theGeneral Properties page, from VSX Cluster Platform, selectClusterXL VirtualSystem Load Sharing.

b. On the Creation Templates page, select the creation template.

c. Complete the VSXCluster Wizard.

Page 160: VSX R80.40 Administration Guide - InfoSec

Configuring Virtual System Load Sharing

VSX R80.40 Administration Guide      |      160

Using the "vsx_util vsls" CommandYou use the vsx_util vsls command on the Management Server to perform various Virtual System LoadSharing configuration tasks, including:

n Show the current VSLS configuration

n Distribute Virtual Systems equally amongst VSXCluster Members

n Set all Virtual Systems as Active on one VSXCluster Member

n Manually define the priority and weight for individual Virtual Systems

n Import VSLS configuration from CSV text files

n Export VSLS configuration to CSV text files

Procedure:

1. Connect to the command line on the Management Server.

2. Log in to the Expert mode.

3. Run:

vsx_util vsls

4. Enter the IP address of the Security Management Server or Domain Management Server.

5. Enter the Management Server administrator user name and password.

6. Select the applicable option from the VSLSmenu.

'vsls_config vsls' main menu

This sample output is for versions R77.10 and higher.

Enter Administrator Name: aaEnter Administrator Password:Select VSX cluster object name:1) vsx_cluster_A2) vsx_cluster_B

Select: 1VS Load Sharing - Menu________________________________1. Display current VS Load sharing configuration2. Distribute all Virtual Systems so that each cluster member is equally loaded3. Set all VSs active on one member4. Manually set priority and weight5. Import configuration from a file6. Export configuration to a file7. ExitEnter redistribution option (1-7) [1]:

Page 161: VSX R80.40 Administration Guide - InfoSec

Configuring Virtual System Load Sharing

VSX R80.40 Administration Guide      |      161

Distributing Virtual Systems Between VSX Cluster MembersThe primary advantage of VSLS is the ability to distribute Active, Standby and Backup Virtual Systemsamongst VSXCluster Members to maximize throughput and user response time. You can choose todistribute Virtual Systems according to one of the following options:

n Automatically distribute Active Virtual Systems amongst VSXCluster Members, so that all VSXCluster Members are equally loaded, based on assigned weights and existing or default prioritydefinitions.

n Automatically place all Active Virtual Systems on the same VSXCluster Member.

n Manually define priorities and weights for each Virtual System.

Distributing Virtual Systems for Equal Member Loading

1. From the VSLSmenu, select 2. Distribute all Virtual Systems so that each cluster member isequally loaded.

2. At the Save & apply configuration? prompt, enter "y" to continue.

The process update process may take several minutes or longer to complete, depending on the quantity ofVirtual Systems and VSXCluster Members.

Placing All Active Systems on the Same Member

1. From the VSLSmenu, select 3. Set all VSs active on one member.

2. When prompted, enter the number corresponding to the member designated as the Primarymember.

3. When prompted, enter the number corresponding to the member designated as the Standbymember.

All other VSXCluster Members will be designated as Backup members.

4. At the Save & apply configuration? prompt, enter "y" to continue.

The process update process may take several minutes or longer to complete, depending on the quantity ofVirtual Systems and VSXCluster Members.

Assigning Priorities and Weights for a Single Virtual System

Methods to change priorities and weights:

n Automatically assign weights only to Virtual Systems. This method prompts you for a weight for eachVirtual System and then automatically updates the settings.

n Manually assign priorities and weights to individual Virtual Systems.

Note - After you save changes, the update requires time (several minutes or longer),depending on the quantity of Virtual Systems and VSXCluster Members.

Page 162: VSX R80.40 Administration Guide - InfoSec

Configuring Virtual System Load Sharing

VSX R80.40 Administration Guide      |      162

To assign automatically weights to all Virtual Systems:

1. From the VSLSmenu, select 4. Manually set priority and weight.

2. Scroll through each Virtual System. Enter: a

3. For each Virtual System, enter a weight value and press Enter.

If you do not enter a weight value for a Virtual System, the assigned weight is not changed. OnlyVirtual Systems with a new weight value are updated.

To stop entering weight values, enter s.

4. At the Save & apply configuration prompt, enter: y.

To update manually both priorities and weights for individual Virtual Systems:

1. From the VSLSmenu, select 4. Manually set priority and weight.

2. Enter: m

3. At the Would you like to change the Virtual System's priority list?prompt, enter: y.

4. Enter the number of the member to get the highest priority.

5. Enter the number of the member to get the next highest priority.

6. Continue until all VSXCluster Members have a priority.

7. At the Would you like to change the Virtual System's weight? prompt, enter:y.

8. Enter the new weight value. A valid value is an integer between 1 and 100.

9. At the Do you wish to configure another Virtual System? prompt, enter y toconfigure a different Virtual System or enter n to continue.

10. At the Save & apply configuration? prompt, enter: y.

Page 163: VSX R80.40 Administration Guide - InfoSec

Configuring Virtual System Load Sharing

VSX R80.40 Administration Guide      |      163

Viewing VSLS StatusTo view the current VSLS status and Virtual System distribution amongst VSXCluster Members, select 1.Display current VS Load Sharing configuration from the VSLSmenu.

The output is similar to the below example:

----+---------+-----------+-----------+-----------+--------+VSID| VS name | gw150 | gw151 | gw152 | Weight |----+---------+-----------+-----------+-----------+--------+

2 | vs1 | 0 | 1 | 2 | 10 |3 | vs2 | 2 | 0 | 1 | 10 |4 | vs3 | 1 | 2 | 0 | 10 |5 | vs5 | 0 | 2 | 1 | 10 |6 | vs4 | 1 | 0 | 2 | 10 |

----+---------+-----------+-----------+-----------+--------+Total weight | 20 | 20 | 10 | 50 |

----+---------+-----------+-----------+-----------+--------+

Legend:0 - Highest priority1 - Next priority2 - Lowest priority

Virtual System Priority

Virtual System priority refers to a preference regarding which VSXCluster Member hosts a VirtualSystem's Active, Standby, and Backup states. This preference is expressed as an integer value.

Priority Definition

0 Highest priority, indicating the VSXCluster Member designated to host the Virtual SystemActive state.

1 Second highest priority, indicating the VSXCluster Member designated to host the VirtualSystem Standby state.

> 1 Lower priorities, indicating VSXCluster Members designated to host a Virtual System'sBackup state.The VSXCluster Member assigned priority 2 will be the first to switch the Virtual System to theStandby state in the event of a failure of either the Active or Standby Virtual System.A VSXCluster Member assigned priority 3 would be the next in line to come online in theevent of another failure.

Virtual SystemWeight

Each Virtual System is assigned a weight factor, which indicates its traffic volume relative to the total trafficvolume (the sum of all weight factors) on a given VSXCluster Member. VSX uses the weight factor todetermine the most efficient distribution of Virtual Systems amongst VSXCluster Members. Systemresource allocation is not affected by the weight factor, nor does VSX take weight into consideration for anyother purpose.

By default, all Virtual Systems are assigned an equal weight factor of 10.

Page 164: VSX R80.40 Administration Guide - InfoSec

Configuring Virtual System Load Sharing

VSX R80.40 Administration Guide      |      164

Exporting and Importing VSLS ConfigurationsWhen working with large scale VSLS deployments consisting of many Virtual Systems, multiple VSXCluster Members, using the vsx_util command on the Management Server to perform configurationtasks can be quite time consuming. To allow administrators to efficiently configure such deployments, VSXsupports uploading VSLS configuration files containing configuration information for all Virtual Systemsdirectly to Management Servers and VSXCluster Members.

This capability offers the following advantages:

n Rapid VSLS configuration of large-scale deployments with many Virtual Systems and VSXClusterMembers.

n Efficient migration and scalability for complex deployments.

n External backup of VSLS configurations.

VSLS configuration files are CSV files that are editable using a text editor or other applications, such asMicrosoft Excel. You can use the configuration file to rapidly change the weight and VSXCluster Memberpriority for each Virtual Systems in the list.

Note - You cannot use the VSLS configuration file to add or remove VSXClusterMembers. You must use the appropriate vsx_util commands to accomplish this.You can use the VSLS configuration file to change member priorities for VirtualSystems after adding or removing a VSXCluster Member.

Page 165: VSX R80.40 Administration Guide - InfoSec

Configuring Virtual System Load Sharing

VSX R80.40 Administration Guide      |      165

VSLS Configuration File

The VSLS configuration file is a comma separated value (CSV) text file that contains configuration settingsfor all Virtual Systems controlled by a Management Server. All lines preceded by the # symbol arecomments and are not imported into the management database.

# Check Point VSX - VS Load Sharing configuration file## Administrator : aa# SmartCenter/Main Domain Management Server : 192.168.50.160# Generated on : Thu Jul 23 13:08:42 2009#### VSID, Weight, Active member, Standby member, Backup member #1# Virtual System name: vs12,10,gw150,gw151,gw152

# Virtual System name: vs23,10,gw151,gw152,gw150

# Virtual System name: vs34,10,gw152,gw150,gw151

# Virtual System name: vs46,10,gw151,gw150,gw152

# Virtual System name: vs55,10,gw150,gw152,gw151

The configuration file contains one line for each Virtual System, consisting of the following data as shownbelow:

Each line contains the VSID, the weight assigned the Virtual System, one primary VSXCluster Member,and one Standby VSXCluster Member.

Additional Backup VSXCluster Members are listed after the Standby VSXCluster Member.

Exporting a VSLS configuration

The most common way to use VSLS configuration files is to initially define your cluster environment andVirtual Systems using SmartConsole.

1. From the VSLSmenu, select 6. Export configuration to a file.

2. Enter a file name, include its fully qualified path, for example:

/home/admin/MyConfiguration

Page 166: VSX R80.40 Administration Guide - InfoSec

Configuring Virtual System Load Sharing

VSX R80.40 Administration Guide      |      166

Processing Options

You can insert the following commands in the VSLSConfiguration file to display audit trail information whilevalidating and processing data. Each of the commands act as a toggle, whereby the first occurrence of acommand enables the action and the next occurrence disables it. These options his allow you to efficientlydebug very long configuration files by displaying or logging only suspicious sections of the data.

Command Action

!comments Sequentially displays comment lines (those preceded with the '#' character) contained inthe configuration file.You can insert comments into the configuration file to indicate which Virtual Systems arecurrently being processed or to provide status information as the parser processes thedata.

!verbose Shows whether or not each data line has been successfully verified and the configurationparameters for each Virtual System.

!log Saves !comments and !verbose information in the vsx_util.log file.

Importing a VSLS configuration

1. From the VSLSmenu, select 5. Import configuration from a file.

2. Enter the file name, include its fully qualified path, for example:

/home/admin/MyConfiguration

3. At the Save & apply configuration? prompt, enter "y" to continue.

During the import process, the parser reads the configuration file and attempts to validate the contents.Errors are displayed on the screen together with the offending line number. If either the !comments or!verbose processing options are enabled, the appropriate information appears on the screen.

The process update process may take several minutes or longer to complete, depending on the quantity ofVirtual Systems, Domain Management Servers, and VSXCluster Members.

Page 167: VSX R80.40 Administration Guide - InfoSec

Advanced Clustering Configuration

VSX R80.40 Administration Guide      |      167

Advanced Clustering ConfigurationThis section presents several advanced cluster scenarios and procedures for their configuration.

Monitoring all VLANs in VSX ClusterBy default, ClusterXL only monitors two VLANS for failure detection and failover.

These are the highest and lowest VLAN tags defined for a given interface.

For example, if the topology for interface eth1 includes several VLAN tags in the range of eth1.10 toeth1.50, ClusterXL only monitors VLANs eth1.10 and eth1.50 for failure. Failures on any of the otherVLANs are not detected in the default configuration.

Note - The command "cphaprob -a if" (or Gaia Clish command "showcluster interfaces vlans") shows the highest and lowest VLANs that aremonitored.

When both the highest and lowest VLANs fail, all the VLANs are considered down, and a failover occurs.

This means that if a VLAN, which is not listed as the highest or lowest goes down, the VLAN Trunk is stillconsidered "up", and no failover occurs.

There are instances in which it would be advantageous to monitor all the VLANs in the trunk, not just thehighest and lowest, and initiate a failover when any one of the VLANs goes down.

To enable monitoring of all VLANs, set the value of the kernel parameter "fwha_monitor_all_vlan"to 1 in the $FWDIR/boot/modules/fwkern.conf file. For more information, see sk92826 and"Working with Kernel Parameters on Security Gateway" on page 333.

Configuring CoreXL in a VSLS VSX ClusterIn VSLSVSXClusters of version R80.10 and higher, changing the CoreXL configuration or running thecphastop command in the context of VS0 results in failover of all the Active Virtual Systems on that VSXCluster Member.

This behavior is by design. Active Virtual Systems on other VSXCluster Members do not fail over.

Page 168: VSX R80.40 Administration Guide - InfoSec

Working with Link Aggregation

VSX R80.40 Administration Guide      |      168

Working with Link AggregationIn This Section:

Link Aggregation Overview 168

How Link Aggregation Works 169

Link Aggregation High Availability 169

Link Aggregation Load Sharing 170

Bond Interface Limitations 171

Link Aggregation OverviewLink aggregation, also known as interface bonding, joins multiple physical interfaces together into a virtualinterface, known as a bond interface. A bond interface can be configured for High Availability redundancyor for load sharing, which increases connection throughput above that which is possible using one physicalinterface.

For more about Bond Interfaces (Link Aggregation), see the R80.40Gaia Administration Guide andR80.40 ClusterXL Administration Guide.

Bonding (Link Aggregation) Terminology

n Link Aggregation (Interface Bonding): Networking technology that binds multiple physicalinterfaces together into one virtual interface.

n Bond: A group of physical interfaces that operate together as one virtual interface and share an IPaddress and MAC address. A bond is identified by the cluster by its Bond ID (for example: bond0).

n Bond Interface: The logical representation of the bond.

n Slave (enslaved interface): A physical interface that is a member of a bond. Slaves do not have anIP Address and in some cases share the same MAC address.

Page 169: VSX R80.40 Administration Guide - InfoSec

Working with Link Aggregation

VSX R80.40 Administration Guide      |      169

How Link Aggregation WorksA bond contains a minimum of one and may contain up to eight slave interfaces. All slave interfacescontained in a bond share a common IP address and may share the same MAC address. We recommendthat each cluster member contain the same quantity of identical slave interfaces.

Item Description

1 Switch

2 bond 0

3 Cluster

You can configure Link Aggregation using one of the following strategies:

n High Availability (Active/Backup): Ensures redundancy in the event of interface or link failure. Thisoption also provides switch redundancy.

n Load Sharing (Active/Active): All interfaces are active, but handle different connectionssimultaneously. Traffic is balanced amongst slave interfaces to maximize throughput. The LoadSharing option does not support switch redundancy.

Link Aggregation High AvailabilityClusters, by definition, provide redundancy and high availability at the gateway level.

Link Aggregation, however, adds interface and switch redundancy by providing automatic failover to astandby interface card within the same VSXGateway.

In a High Availability deployment, only one interface is active at a time. If an interface or connection fails,the bond fails over to a standby slave interface.

Bonding High Availability failover occurs in one of these cases:

n An active interface detects a link state failure in a monitored interface.

n ClusterXL detects a failure in sending or receiving Cluster Control Protocol (CCP) keep-alivepackets.

Page 170: VSX R80.40 Administration Guide - InfoSec

Working with Link Aggregation

VSX R80.40 Administration Guide      |      170

Fully Meshed Redundancy through Interface Bonding

The Link Aggregation High Availability mode, when deployed with ClusterXL, enables a higher level ofreliability by providing granular redundancy in the network.

This granular redundancy is achieved by using a fully meshed topology, which provides for independentbackups for both NICs and switches.

Item Description Item Description

1 Switch 1 5 Network connection 2

2 Switch 2 6 Network connection 3

3 Network connection 1 7 VSXCluster Member 1

4 Network connection 4 8 VSXCluster Member 2

In this scenario - VSXCluster Members 1 and 2 are configured in the High Availability mode.

Link Aggregation Load SharingLoad Sharing provides the ability to spread traffic over multiple slave interfaces, in addition to providinginterface redundancy.

All interfaces are always active.

Traffic is balanced between interfaces in a manner similar to the way load sharing balances traffic betweenVSXCluster Members.

Link Aggregation Load Sharing operates according to either the IEEE 802.3ad or the XOR standard.

In Load Sharing mode, each individual connection is assigned to a specific slave interface.

For a specific connection, only the designated slave interface is active.

In the event of a failure of the designated slave interface, the traffic fails over to another interface, addingthat connection's to the traffic it is already handling.

Page 171: VSX R80.40 Administration Guide - InfoSec

Working with Link Aggregation

VSX R80.40 Administration Guide      |      171

Bond Interface Limitationsn You can define a maximum of 4096 interfaces on a Gaia server or appliance.

The total number of bond interfaces in use is the sum of bonds plus the number of slave interfacescontained in each bond.

n Up to eight interfaces can be defined in a Link Aggregation deployment for each bond interface.

Page 172: VSX R80.40 Administration Guide - InfoSec

Configuring Bond High Availability Mode

VSX R80.40 Administration Guide      |      172

Configuring Bond High Availability ModeThis section explains how to configure High Availability on a bond interface.

Run the CLI commands from the VSXGateway (VS0) context.

In a VSXCluster, run these commands on each VSXCluster Member.

Use the "active-backup" value for the "mode" parameter to configure High Availability.

Configuring the High Availability BondThis is a workflow of CLI commands to configure Link Aggregation in High Availability mode.

Notes:

n For exact commands, see R80.40Gaia Administration Guide.n When you are enslaving configured interfaces, make sure that these interfaces

are not used in other configurations and that IP addresses are not assigned tothem.

To configure the Link Aggregation in High Availability mode:

1. Add the bonding group.

2. Add slave interfaces to the bonding group.

3. Make sure that the bond is configured correctly.

4. Open SmartConsole and configure the cluster object.

n For a new Link Aggregation installation, create a new cluster object.

n For updating an existing configuration, update the interface topology.

Updating the Interface TopologyWhen you are updating an existing configuration to Link Aggregation, it is necessary to reconfigure therelevant objects to connect to the newly created bond. This includes Virtual Systems, Virtual Routers andVirtual Switches. You can perform these actions in SmartConsole. In most cases, these definitions can befound in the object Properties window.

For large existing VSX deployments containing many Domain Management Servers and Virtual Devices,use the vsx_util change_interfaces command on the Management Server to reconfigureexisting object topologies. For example, in a Multi-Domain Server deployment with 200 Domains, eachwith many Virtual Devices, it is faster to us vsx_util change_interfaces. This commandautomatically replaces the interface with the new bond on all relevant objects.

Page 173: VSX R80.40 Administration Guide - InfoSec

Configuring Bond High Availability Mode

VSX R80.40 Administration Guide      |      173

Reconfiguring the Bond

To configure the newly created bond for a cluster:

1. Connect with SmartConsole to the Security Management Server or Main Domain ManagementServer used to manage the VSXCluster.

2. Delete the slave interfaces from the bond that you are not using.

a. From the navigation tree, click Topology.

b. From the navigation tree, click Physical Interfaces.

c. Select the slave interface, and clickRemove.

d. ClickOK.

e. Do these steps again for all the slave interfaces.

3. From Gaia Clish on each VSXCluster Member, create the new bond interface.

4. Connect with SmartConsole to the Security Management Server or Main Domain ManagementServer used to manage the VSXCluster.

5. From the Gateways & Servers view or Object Explorer, double-click the VSXCluster object.

6. From the left navigation tree, click Physical Interfaces.

7. Click Add, and configure the bond interface.

The Physical Interface Properties window opens.

a. Enter the bond name.

b. If the bond is a VLAN trunk, select VLAN Trunk.

c. ClickOK.

8. From the left navigation tree, click Topology.

9. Do these steps for each interface that you are adding to the bond:

a. Double-click the interface.

The Interface Properties window opens.

b. From Interface, select the bond interface.

c. ClickOK.

10. Install the VSXPolicy (<Name of VSX Cluster Object>_VSX) on the VSXCluster object.

Page 174: VSX R80.40 Administration Guide - InfoSec

Configuring Bond High Availability Mode

VSX R80.40 Administration Guide      |      174

Reconfiguring Topology with 'vsx_util change_interfaces'

Important - In a Multi-Domain Server environment, all Domain Management Serversmust be unlocked in order for this operation to succeed. Meaning, you need todisconnect all SmartConsole clients from all Domain Management Servers.

To reconfigure objects with the "vsx_util change_interfaces" command:

1. Close SmartConsole windows for the Security Management Server and all Domain ManagementServers that use the designated interface.

2. Connect to the command line on the Management Server.

3. Log in the Expert Mode.

4. Run the "vsx_util change_interfaces" command and follow the on-screen instructions:

a. Enter the IP address of the Security Management Server or Main Domain ManagementServer.

b. Enter the management administrator name and password.

c. Select VSXCluster object.

d. Select Apply changes to the management database and to the VSX Gateway/Clustermembers immediately.

e. When prompted, select the interface to be replaced.

f. When prompted, select the replacement bond interface.

g. If you wish to replace additional interfaces, enter "y" when prompted and repeat the abovesteps.

h. To complete the process, enter "n".

Page 175: VSX R80.40 Administration Guide - InfoSec

Configuring Bond Load Sharing Mode

VSX R80.40 Administration Guide      |      175

Configuring Bond Load Sharing ModeThis section explains how to configure Load Sharing on a bond interface.

Run the CLI commands from the VSXGateway (VS0) context.

In a VSXCluster configuration, run these commands on each VSXCluster Member.

Configure one of these Load Sharing modes for the bond interface:

n Round Robin - Selects the Active slave interfaces sequentially.

n 802.3ad - Dynamically uses Active slave interfaces to share the traffic load. This mode uses theLACP protocol, which fully monitors the interface link between the Check Point Security Gatewayand a switch.

n XOR - All slave interfaces in the UP state are Active for Load Sharing. Traffic is assigned to Activeslave interfaces based on the transmit hash policy: Layer 2 information (XOR of hardware MACaddresses), or Layer 3+4 information (IP addresses and Ports).

Configuring the Load Sharing BondThis is a workflow of CLI commands to configure Link Aggregation in Load Sharing mode.

Notes:

n For exact commands, see R80.40Gaia Administration Guide.n When you are enslaving configured interfaces, make sure that these interfaces

are not used in other configurations and that IP addresses are not assigned tothem.

To configure the Link Aggregation in Load Sharing mode:

1. Add the bonding group.

2. Add slave interfaces to the bonding group.

3. Define the number of critical interfaces.

4. For configurations that use Performance Pack, configure the core affinities.

5. Make sure that the bond is configured correctly.

6. Open SmartConsole and configure the VSXCluster object.

n For a new Link Aggregation installation, create a new cluster object.

n For updating an existing configuration, update the interface topology.

Page 176: VSX R80.40 Administration Guide - InfoSec

Configuring Bond Load Sharing Mode

VSX R80.40 Administration Guide      |      176

Setting Critical Required Interfaces

Note - The Critical Required Interfaces feature is supported for ClusterXL only.

A Bond in Load Sharing mode is considered to be down when fewer than a critical minimal number of slaveinterfaces remain up. When not explicitly defined, the critical minimal number of slave interfaces, whichmust remain up, in a bond of n interfaces is n-1. Failure of an additional slave interface (when n-2 slaveinterfaces remain up) will cause the entire bond interface to be considered down, even if the bond containsmore than two slave interfaces.

If a smaller number of slave interfaces will be able to handle the expected traffic, you can increaseredundancy by explicitly defining the critical minimal number of slave interfaces. Divide your maximalexpected traffic speed by the speed of your slave interfaces and round up to a whole number to determinean appropriate number of critical slave interfaces.

To define the critical number of slave interfaces explicitly, create and edit the following file:

$FWDIR/conf/cpha_bond_ls_config.conf

Each line of the file should be written in the following syntax:

<Name of Bond> <Critical Minimal Number of Slaves>

For example, if bond0 has 7 slave interfaces, and bond1 has 6 slave interfaces, file contents could be:

bond0 5bond1 3

In this example:

n bond0 would be considered down when 3 of its slave interfaces have failed.

n bond1 would be considered down when 4 of its slave interfaces have failed.

Affinities of Bond Slave Interfaces to CPU Cores

For optimal performance, follow these guidelines:

1. Configure static affinities of bond slave interfaces to CPUCores.

2. Whenever possible, dedicate one processing core to each interface.

3. If there are more physical interfaces than CPU cores, then some CPU cores handle two or moreinterfaces.

Use pairs of slave interface of the same position with internal and external bonds.

Page 177: VSX R80.40 Administration Guide - InfoSec

Configuring Bond Load Sharing Mode

VSX R80.40 Administration Guide      |      177

a. To view positions of slave interface in a bond, run in the Expert mode:

cat /proc/net/bonding/<Name of Bond Interface>

b. Note the sequence of the interfaces in the output.

Compare this sequence for the two bonds (external bond and its respective internal bond).

Slave interfaces that appear in the same position in the two bonds are interface pairs.

Set these pairs to be handled by one processing CPU core.

Example configuration

An appliance has:

n Four processing CPU cores:

core 0, core 1, core 2, and core 3

n Two bond interfaces:

bond0 with slave interfaces eth0, eth1, and eth2

bond1 with slave interfaces eth3, eth4, and eth5

In such case, two of the CPU cores need to handle two slave interfaces each.

An optimal configuration can be:

CPU core bond0 bond1

0 eth0 eth3

1 eth1 eth4

2 eth2

3 eth5

For more information, see the R80.40 Performance Tuning Administration Guide:

n Chapter SecureXL > Section SecureXLCommands and Debug > Section 'sim' and 'sim6' > Sectionsim affinity.

n Chapter CoreXL > Section Configuring Affinity Settings.

n Chapter CoreXL > Section Affinity Settings for 16000 and 26000 Appliances.

Page 178: VSX R80.40 Administration Guide - InfoSec

Bond Failover

VSX R80.40 Administration Guide      |      178

Bond FailoverEither of the following failure scenarios can induce bond failover:

n An active interface detects a link state failure in another monitored interface

n ClusterXL detects a failure in sending or receiving Cluster Control Protocol (CCP) keep-alivepackets

Either of these occurrences will induce a failover, either to another slave interface within the bond, orbetween VSXCluster Members, depending on the circumstances.

Note - The bond failover operation requires a network interface card that supports theMedia-Independent Interface (MII) standard.

Link State Initiated FailoverLink-state initiated failover occurs in this sequence:

1. The active slave interface detects a downlink state.

2. The bond initiates failover to a standby interface. Since this is a failover within the bond, the status ofthe other VSXCluster Member is unaffected.

When the number of available slave interfaces is fewer than the critical minimumnumber ofinterfaces, failover to other VSXCluster Members occurs.

3. If the standby interface continues to detect a link failure, and the initial interface is still down, failoverto other VSXCluster Members occurs.

Failover Initiated by Cluster Control Protocol (CCP)CCP failover occurs only when other VSXCluster Members are not down, in this sequence.

1. ClusterXL detects a problem sending or receiving of CCP packets.

2. ClusterXL initiates an internal bond failover.

3. ClusterXL monitors CCP packet transmission and reception. If additional problems are detectedwithin three minutes, the system initiates a failover to another VSXCluster Member.

Failover Support for VLANsClusterXL monitors VLAN IDs for connectivity failure or miscommunication, and initiates failover whennecessary. By default, both the highest and the lowest VLAN IDs are monitored for failure. This is done bysending ClusterXL Control Protocol (CCP) packets on round-trip paths at a set interval.

You can configure VSX to monitor all VLANs.

Page 179: VSX R80.40 Administration Guide - InfoSec

Bond Failover

VSX R80.40 Administration Guide      |      179

Item Description Item Description

1 Cluster 5 VLAN 3

2 bond 0 6 S-1

3 VLAN 1 7 S-2

4 VLAN 2

When a failure is detected, a log of the failure is recorded in the Logs & Monitor view.

Monitoring the Highest and Lowest VLAN IDs

By default, the highest and lowest VLAN IDs indicate the status of the physical connection. These VLANIDs are always monitored and a connectivity failure in either initiates a failover. In most deployments this isthe desired setting, as it supports the primary purpose of the feature (detecting a connectivity failure) andthe traffic generated on the network is light. However, this setting only detects VLAN configurationproblems on the switch for the highest and lowest VLAN IDs.

Page 180: VSX R80.40 Administration Guide - InfoSec

Configuring Cisco Switches for Link Aggregation Load Sharing Mode

VSX R80.40 Administration Guide      |      180

Configuring Cisco Switches for Link AggregationLoad Sharing ModeThese are sample configuration commands for Cisco switches.

For 802.3ad (LACP)

Switch# conf tSwitch(config)# port-channel load-balance src-dst-ipSwitch(config)# interface FastEthernet <all the participating ports>Switch(config-if)# channel-group 1 mode activeSwitch(config-if)# channel-protocol lacpSwitch(config-if)# exitSwitch(config)# interface port-channel 1Switch(config-if)# switchport access vlan <desired vlan number>Switch(config-if)# endSwitch# write

For XOR

Switch# conf tSwitch(config)# port-channel load-balance src-dst-ipSwitch(config)# interface FastEthernet <all the participating ports>Switch(config-if)# channel-group 1 mode onSwitch(config-if)# exitSwitch (config)# interface port-channel 1Switch(config-if)# switchport access vlan <desired vlan number>Switch(config-if)# endSwitch# write

Page 181: VSX R80.40 Administration Guide - InfoSec

Troubleshooting Bonded Interfaces

VSX R80.40 Administration Guide      |      181

Troubleshooting Bonded Interfaces

Troubleshooting Workflow1. Connect to the command line.

2. Log in to the Expert mode.

3. Check the status of the bond:

cat /proc/net/bonding/<bond id>

4. If there is a problem, check if the physical link is down, as follows:

a. Execute the following command:

n In Gaia Clish:

show cluster bond name <bond_name>

n In the Expert mode:

cphaprob show_bond <bond_name>

b. Look for a slave interface that reports the status of the link as no.

c. Check the cable connections and other hardware.

d. Check the port configuration on the switch.

5. Check if a VSXCluster Member is down, by running:

n In Gaia Clish:

show cluster state

n In the Expert mode:

cphaprob state

If any of the VSXCluster Members has a State other than Active, see the R80.40 ClusterXLAdministration Guide - ChapterMonitoring and Troubleshooting Clusters.

On a VSXCluster Member, reboot is needed after the following actions on a bond interface:

1. Changing a bond mode.

2. Adding a slave interface into a bond

Note - Removing a slave interface does not require reboot.

For further information regarding bond status and failovers, view logs in the Logs & Monitor view. Anyinterface bond status change is logged and can be viewed in Logs & Monitor.

Page 182: VSX R80.40 Administration Guide - InfoSec

Troubleshooting Bonded Interfaces

VSX R80.40 Administration Guide      |      182

Connectivity Delays on SwitchesWhen using certain switches, connectivity delays may occur during some internal bond failovers. With thevarious features that are now included on some switches, it can take close to a minute for a switch to beginservicing a newly connected interface. The following are suggestions for reducing the startup time after linkfailure.

1. Disable auto-negotiation on the relevant interface.

2. On some Cisco switches, enable PortFast, as detailed below.

Note - PortFast is not applicable if the bond group on the switch is configured as Trunk.

Warning Regarding Use of PortFastThe PortFast feature should never be used on ports that connect to other switches or hubs. It is importantthat the Spanning Tree complete the initialization procedure in these situations.

Otherwise, these connections may cause physical loops where packets are continuously forwarded (oreven multiply) in such a way that network will ultimately fail.

Sample Configuration of PortFast on a Cisco Switch

The following are the commands necessary to enable PortFast on a Gigabit Ethernet 1/0/15 interface of aCisco 3750 switch running IOS.

1. Enter configuration mode:

cisco-3750A# conf t

2. Specify the interface to configure:

cisco-3750A(config)# interface gigabitethernet1/0/15

3. Set PortFast on this interface:

cisco-3750A(config-if)# spanning-tree portfast

Page 183: VSX R80.40 Administration Guide - InfoSec

Optimizing VSX

VSX R80.40 Administration Guide      |      183

Optimizing VSXThis section describes different features that let you monitor and optimize the VSX performance.

Page 184: VSX R80.40 Administration Guide - InfoSec

QoS

VSX R80.40 Administration Guide      |      184

QoSThis section descibes the Native QoS in VSX.

Page 185: VSX R80.40 Administration Guide - InfoSec

QoS Management

VSX R80.40 Administration Guide      |      185

QoS ManagementTo manage the network quality of service it is necessary to create and install a QoS policy.

The QoS policy consists of a list of up to 15 classes of service.

Each class is assigned certain traffic characteristics and DSCP values.

The QoS policy is managed using the cpqos command (see "QoS Configuration (cpqos)" on page 189).

Class of Service Definitions

The definition of a class of service includes:

n Name. The class name is a unique identifier which identifies the class during configuration andwhen presenting statistics

n Type. There are two types of classes, LLQ and regular classes.

Regular classes are non-LLQ classes which can be assigned a weight value.

n Priority. Each class is assigned a unique priority value between 1 and 15.

The priority value is effective in prioritizing LLQ classes and during congestion, when drops occur.

n Weight value. Each class is assigned a specific weight value.

n One or more DSCP values. The Differentiated Services Code Point.

Priority and LLQs

If there are multiple LLQ classes, packets are handled in a strict priority-based manner.

Packets from a class with a higher priority are handled before packets with a lower priority class.

Priority and Drop Precedence

Priority also determines the probability of drops. A class with a lower priority has a higher drop precedenceduring times of congestion.

The class priority is not the only factor that determines if drops occur.

Other factors affect drops, for example if the class is LLQ or if the class exceeds its assigned resourceallocation.

LLQs are not immune to drops.

Although LLQs are processed as soon as they arrive (and thus have a lower drop rate), drops may occur ifthere are many LLQ classes or if a large portion of the incoming traffic is LLQ.

Page 186: VSX R80.40 Administration Guide - InfoSec

QoS Enforcement

VSX R80.40 Administration Guide      |      186

QoS EnforcementQoSEnforcement for VSX (Native QoS) provides the ability to control the network quality of service in theVSX network environment.

QoS is based on the Differentiated Services architecture and allows assigning different transmissioncharacteristics to different classes of service.

Differentiated Services is a computer networking architecture that specifies a simple, scalable and coarse-grained mechanism for classifying, managing network traffic and providing quality of service (QoS)guarantees on modern IP networks.

Differential Services can, for example, be used to provide low-latency, guaranteed service (GS) to criticalnetwork traffic, such as voice or video while providing simple best-effort traffic guarantees to non-criticalservices such as web traffic or file transfers.

The major characteristics that are controllable by QoS are latency and bandwidth allocation.

QoS is designed to provide QoS functionality with minimal impact on performance.

QoSworks seamlessly with Check Point Performance Pack.

The VSX network usually includes various types of traffic such as:

n Real-time traffic (for example, VoIP) which requires low bandwidth, and is sensitive to latency(delays) and drops

n Traffic which is sensitive to latency but not to occasional drops

n High-volume, low-priority traffic which has a low sensitivity to latency and drops

n Other traffic which requires its own share of the bandwidth

Without QoSEnforcement, all these different traffic types are given equal priority on the VSXGateway andare handled in a simple FIFO (first in-first out) manner.

When the VSXGateway is congested, all traffic types suffer the same degree of latency and drops.

In addition, high-volume traffic may starve other types of low-volume traffic.

With QoS, the special requirements of each traffic type can be met.

For example:

n Latency-sensitive traffic will be given preference over other types of traffic

n Traffic which is sensitive to drops will suffer fewer drops than other types of traffic.

n High-volume traffic that consumes bandwidth will be limited during times of congestion.

Differentiated Services Support

QoS provides basic support for Differentiated Services, an architecture for specifying and controllingnetwork traffic by class so that certain types of traffic receive priority over others.

The differentiated services architecture PHB (per-hop behaviors).

When marked packets arrive to the VSXmachine, they are classified and prioritized according to theirDSCP (differential services code-point) values.

To enhance performance, QoS does not mark packets with DSCP and does not change their Type ofService (ToS) values.

QoS instead relies on peripheral devices (namely routers) to mark packets with the appropriate ToS value.

Page 187: VSX R80.40 Administration Guide - InfoSec

QoS Enforcement

VSX R80.40 Administration Guide      |      187

Inbound Prioritization

While Differentiated Services support in routers is usually performed on outbound traffic, QoS for VSXprioritizes traffic on the inbound side because, in VSX deployments, QoS is primarily governed by systemresources, namely the CPU, and not by network bandwidth.

To prevent the VSXmachine from becoming a bottleneck in the network, prioritization is enforced whenpackets arrive at the VSXmachine, and before CPU processing is assigned.

Inbound prioritization allows an earlier control on the loss and delay rate.

Policy with Global Scope

To minimize the impact of QoS functionality on performance, QoS is not done for each interface, but for allthe system.

One class of services applies to all traffic entering the VSXGateway or cluster, regardless of the specifiedinterface from which the traffic originates.

Note - On multiple-CPUmachines, enforcement is not done system-wide, but for eachCPU. Global enforcement is done separately on traffic processed by each CPU.

Resource Allocation

System resources are allocated by assigning different weights to different classes of service.

A weight is the relative portion of the available resources allocated to a class.

Allocating resources according to weights ensures full utilization of the line even if a specific class is notusing all of its resources.

In such a case, the remaining resources are divided among the remaining classes in accordance with theirrelative weights.

Latency

For some types of traffic, such as voice and video, it is necessary to minimize the latency (delay) ofpackets.

Latency is controlled by defining special LLQ (low-latency queuing) classes.

These classes are handled in a strict priority manner.

LLQ packets are handled immediately upon arrival, and before packets that do not belong to LLQ classes.

QoS supports multiple LLQ classes. In some cases, it may be necessary to define more than one LowLatency class, for example when different types of traffic have a different sensitivity to delays.

In such cases, a class with the higher sensitivity to delay receives a higher priority than a class with thelower sensitivity.

Note - When LLQ classes are used, it is assumed that the expected traffic will notexceed a relatively small amount of the available resources. Although QoS does notallow LLQ traffic to starve non-LLQ traffic, too much LLQ traffic reduces overallnetwork quality of service and prevents efficient management of weighted resources.

Page 188: VSX R80.40 Administration Guide - InfoSec

QoS Enforcement

VSX R80.40 Administration Guide      |      188

WRED

RED (Random Early Drop) is a congestion avoidance mechanism for detecting and preventingcongestions.

It takes advantage of TCP congestion control mechanism by randomly dropping packets during periods ofcongestion.

This causes TCP senders to slow down their transmission, thus preventing high congestion.

QoS implements WRED (Weighted RED) in which packets are dropped according to their priority.

WREDmostly affects traffic which is of low priority and which exceeds its weight.

Page 189: VSX R80.40 Administration Guide - InfoSec

QoS Configuration (cpqos)

VSX R80.40 Administration Guide      |      189

QoS Configuration (cpqos)In This Section:

The cpqos Command 189

QoS Policy File 191

QoS Default Configuration 191

Sample Differentiated Services Implementation 192

All user interactions with the QoSmodule are performed with the cpqos command on the VSXGateway(each VSXCluster Member).

Important - In Cluster, you must configure all the Cluster Members in the same way

The cpqos Command

The cpoqs command lets you manage the network Quality of Service on VSXGateway.

To showQoS statistics:

cpqos stats [-u]

Parameter Description

-u Shows statistics for each CPU.

This command prints a line of statistics for each of the defined classes. Each line includes the followingdata columns:

Column Value

rx Number of bytes that arrived to this class since the last time statistics were presented

tx Number of bytes that were transmitted from this class since the last time statistics werepresented

drops Number of bytes that were dropped from this class since the last time statistics werepresented

Notes:

n Statistics values show byte counts, not packet countsn Statistics values are reset after each queryn Statistics should be presented periodically with intervals of less than 1

minute.n We recommend to use the watch command to periodically present these

statistics

Page 190: VSX R80.40 Administration Guide - InfoSec

QoS Configuration (cpqos)

VSX R80.40 Administration Guide      |      190

To show the QoS policy status:

cpqos status

To install the previously created QoS policy:

cpqos install

Note - This command also validates the overall integrity of the QoS policy. Onceinstalled, the QoS policy remains installed even after the machine reboots.

To uninstall the previously installed QoS policy:

cpqos uninstall

Note - Once uninstalled, the QoS policy remains uninstalled even after the machine reboots.

To show the DiffServ classes defined in the QoS policy:

cpqos class show [-b]

Parameter Description

-b Shows DSCP values in 8 bits binary numbers.

To add new DiffServ class with specified name:

cpqos class add <class_name> prio <priority_value> type {llq | reg}[weight <weight_value>] dscp {default | <value[,value2[,value3...]]>}

Parameter Description

add <class_name> Unique class name.

prio <priority_value>

Priority value between 1-15. The lower the value, the higher the priority.

type {llq | reg} Class Type:

n llq - low-latencyn reg - regular (weighted classes)

weight <weight_value>

This parameter is used only for classes of type reg. It determines therelative portion of the resources that the class will receive in relation to otherweighted classes. Valid values are between 0 and 1000.

Page 191: VSX R80.40 Administration Guide - InfoSec

QoS Configuration (cpqos)

VSX R80.40 Administration Guide      |      191

Parameter Description

dscp {default |<value[,value2[,value3...]]>}

The DiffServ code-points assigned to the class. Multiple DSCPs can bespecified, separated by commas, with no spaces between values.Valid values are:

n defaultn decimal numbers (not binary format) between 0 to 63

Notes:

n There can be only one class with a "default" DSCP. The default class isused for traffic without DiffServ marking (for example, tos=0), ortraffic with DSCP values that are not assigned to any other class.

n If no class is used as "default", all 64 DSCP values must be assigned tothe classes.

n ADSCP value cannot be assigned to more than one class.

To delete a specified DiffServ class name:

cpqos class del <class_name>

Notes:

n Changes to the QoS policy will be are enforced only after the QoS policy isinstalled.

n All commands return a zero value for successn All commands return a non-zero value for failuren Options and argument are case-sensitive

QoS Policy File

The QoS policy file is $FWDIR/database/qos_policy.C.

The QoS policy file is created when the cpqos command is run for the first time.

Important - The QoS policy file should not be edited manually.

Use the "cpqos class {add | del}" commands to create entries.

To maintain multiple QoS policies, rename the qos_policy.C file or copy it to another directory, andcopy it back as $FWDIR/database/qos_policy.C when the policy needs to be enforced.

QoS Default Configuration

Default QoS configuration is set to "uninstall" (for example, not enforced).

Run the "cpqos install" or "cpqos uninstall" command to set the default configuration afterboot.

Page 192: VSX R80.40 Administration Guide - InfoSec

QoS Configuration (cpqos)

VSX R80.40 Administration Guide      |      192

Sample Differentiated Services Implementation

This section presents a sample differentiated services implementation. It includes examples forconfiguration, monitoring and statistics.

Sample Traffic Types

TrafficType Meaning...

Diamond Real-time traffic (for example, VoIP) which requires little bandwidth and is sensitive tolatency and drops.This traffic is usually assigned to the EF (Expedited-Forwarding) PHB (Per Hop Behavior).

Platinum Real-time traffic with low bandwidth requirements that is less sensitive to latency and dropsthan Diamond.

Gold Traffic which is sensitive to drops

Silver Traffic which is less sensitive to drops than Gold.

Bronze Various types of traffic which require resource allocation.This traffic is usually assigned to the Best-Effort PHB.

Copper High-volume traffic with a tendency to consume bandwidth

Configuration Guidelines

Your QoS policy should apply these guidelines:

n Diamond and Platinum classes should be defined as LLQ so they will have a lower latency thenother classes

n Diamond should receive a higher priority than Platinum so it have even less latency and drops

n Gold should receive a higher priority than Silver so it will have fewer drops

n Copper resource consumption should be limited to about 10%of the available resource duringperiods of congestion

n Other traffic should receive about 45%of bandwidth when the traffic load is high

Examples of the "cpqos class add" command to create classes for traffic of various types:

cpqos class add Diamond type llq prio 1 dscp 46cpqos class add Platinum type llq prio 2 dscp 32cpqos class add Gold type reg prio 3 weight 100 dscp 26cpqos class add Silver type reg prio 4 weight 100 dscp 28cpqos class add Bronze type reg prio 5 weight 200 dscp defaultcpqos class add Copper type reg prio 15 weight 50 dscp 10,12,14

Page 193: VSX R80.40 Administration Guide - InfoSec

QoS Configuration (cpqos)

VSX R80.40 Administration Guide      |      193

Example output that shows previously defined classes:

[Expert@HostName:0]# cpqos class showclass: Diamond

priority: 1type: llqweight: 0DSCPs: 46

class: Platinumpriority: 2type: llqweight: 0DSCPs: 32

class: Goldpriority: 3type: regweight: 100DSCPs: 26

class: Silverpriority: 4type: llqweight: 100DSCPs: 28

class: Bronzepriority: 5type: llqweight: 200DSCPs: default

class: Copperpriority: 15type: regweight: 50DSCPs: 10,12,14

Example output that shows statistics for the previously defined classes:

class priority type weight rx tx dropsDiamond 1 llq 0 2775 2650 0Platinum 2 llq 0 1024 1020 105Gold 3 reg 100 1775015 1773805 205Silver 4 reg 100 1862437 1862336 550Bronze 5 reg 200 3370033 2955120 3147Copper 15 reg 50 1862437 762336 100689

From this statistical output, it is apparent that:

n In the Diamond class there were no drops.

n In the Platinum class there were a few drops, even though less traffic arrived classed as Platinumthan did as Diamond.

n In the Gold class there were fewer drops than from the Silver class.

n In the Bronze class there were twice as many bytes transmitted than in the Silver and Gold classes,

Page 194: VSX R80.40 Administration Guide - InfoSec

QoS Configuration (cpqos)

VSX R80.40 Administration Guide      |      194

and four times as many bytes than there were in the Copper class.

n Most packets in the Copper class were dropped.

Page 195: VSX R80.40 Administration Guide - InfoSec

Monitoring Memory Resources (vsx mstat)

VSX R80.40 Administration Guide      |      195

Monitoring Memory Resources (vsx mstat)Use the "vsxmstat" on page 239 command to monitor the memory the VSXGateway uses.

The command shows an overview of the memory that the system and each Virtual Device is using.

These are the global memory resources that are shown:

n Memory Total - Total physical memory on the VSXGateway.

n Memory Free - Available physical memory.

n Swap Total - Total of swap memory.

n Swap Free - Available swap memory.

n Swap-in rate - Total memory swaps per second.

The Virtual Devices are listed according to the VSIDs.

Run the "vsx stat -v" command to show the VSID for the Virtual Devices.

You must be in the Expert mode to run this command.

Page 196: VSX R80.40 Administration Guide - InfoSec

Monitoring CPU Resources (vsx resctrl)

VSX R80.40 Administration Guide      |      196

Monitoring CPU Resources (vsx resctrl)Use the "vsx resctrl" on page 243 commands to monitor the CPU resources on a VSXGateway.

You can also see real-time statistics on the current and average CPU consumption by the Virtual Devices.

Note - You must enable VSXResource Control Monitoring to see data about CPUusage for each Virtual System over SNMP.

Page 197: VSX R80.40 Administration Guide - InfoSec

SNMP Monitoring

VSX R80.40 Administration Guide      |      197

SNMP MonitoringIn This Section:

Supported SNMP Versions 197

Supported SNMP Modes 197

SNMP Default Mode 198

SNMP VS Mode 199

SNMP VS in the "vs-direct-access" Mode 200

Configuring SNMP Modes 201

Example SNMP queries for Virtual Systems 202

The VSX SNMP Tree 205

For more about using SNMP, see:

n R80.40Gaia Administration Guide - Chapter SystemManagement - Section SNMP

n sk90860: How to configure SNMP onGaia OS

Supported SNMP VersionsSNMP v1, v2c, and v3 are supported in all monitor modes.

Note - For SNMP queries of Virtual Devices using the VS0 IP address:

n SNMP v1 and v2cQuery the Virtual Device using the VSID and the configured SNMPcommunity.

n SNMP v3Query the virtual device using the VSID and SNMP v3 contextmechanism.

Supported SNMP ModesVSX supports these SNMPmodes:

n SNMPDefault Mode

n SNMPVSMode

n SNMPVS in vs-direct accessmode

Page 198: VSX R80.40 Administration Guide - InfoSec

SNMP Monitoring

VSX R80.40 Administration Guide      |      198

SNMP Default ModeIn SNMP default mode:

n The SNMP daemon runs only in the context of VS0 (the VSXGateway).

n The VS0 SNMP daemon has a set of tables with counters (VSXSNMP tree) for each Virtual Device.

n SNMP queries must be sent to IP address of the VSXGateway (context is VS0).

Item Description Item Description

1 SNMPServer that sends SNMPRequests to VSXGateway

6 Virtual System 1 (ctx 1)

2 eth0 7 Virtual System in Bridge mode(ctx 2)

3 VSXGateway 8 Virtual Router (ctx 3)

4 SNMPDaemon 9 Virtual Switch (ctx 4)

5 Virtual System 0

Page 199: VSX R80.40 Administration Guide - InfoSec

SNMP Monitoring

VSX R80.40 Administration Guide      |      199

SNMP VS ModeIn SNMPVSmode:

n Each Virtual Device has separate SNMP daemon running in the context of that Virtual Device.

n Query for Virtual Devices uses the VS0 IP address.

n You must run the SNMP query using the interface on the VSXGateway.

l The query is relayed to the specified Virtual Device.

l The Virtual Device sends the response through the same VSXGateway interface.

n The VS IDmust be specified in the SNMP query.

Note - Default mode query functionality is not decreased when you enable SNMPVSmode.

Item Description Item Description

1 Query Host 4 VS 0

2 eth0 5 SNMPDaemon

3 VSXGateway 6 UDS

Page 200: VSX R80.40 Administration Guide - InfoSec

SNMP Monitoring

VSX R80.40 Administration Guide      |      200

SNMP VS in the "vs-direct-access" Moden SNMPVS in the vs-direct-accessmode is available only when the SNMPVSmode is enabled.

n Enables SNMP queries on the IP address of a Virtual System (not only VS0), or Virtual Router.

Notes:l For cluster deployments, you can query only Virtual IP addresses.l Only Virtual Devices with an IP address can be queried, not VirtualSwitches or Virtual Bridges.

Item Description Item Description

1 Query Host 4 VS 0

2 eth0 5 SNMPDaemon

3 VSXGateway 6 UDS

Page 201: VSX R80.40 Administration Guide - InfoSec

SNMP Monitoring

VSX R80.40 Administration Guide      |      201

Configuring SNMP ModesEach Virtual System must meet these requirements:

SNMP USM user

n To use SNMP v3 queries, an SNMPUSM user must be defined.

For more on USM user creation commands, see the R80.40Gaia Administration Guide.

n To use SNMP v3 queries on VSX, the USM user must be configured with the allowed Virtual Devices:

set snmp usm user <User_Name> vsid <VSID>

n By default, a USM user in VSX has no allowed Virtual Devices.

Allowed interfaces

If you enable the vs-direct-accessmode, the Virtual System accepts SNMP queries on all the interfaces.

To prevent SNMP queries for a specified interface, add a new rule to the policy that blocks SNMP traffic onthat interface.

Query source

In the vsmode and the vs-direct-accessmode, there is no specification for query source.

All sources allowed in the Security Policy are valid.

Running SNMP Queries

When you query a Virtual System Load Sharing cluster with the VSXCluster Member (VS 0) Virtual IPaddress, the Virtual System on the Active VSXCluster Member (VS 0) replies to the query.

An Active Virtual System on a Standby VSXCluster Member does not reply to the query.

If you want to query the Active Virtual System on a Standby VSXCluster Member, use the real IP addressof the VSXCluster Member.

SNMP Configuration

See the R80.40Gaia Administration Guide and sk90860: How to configure SNMP onGaia OS.

To Configure Run

SNMPDefault 1. set snmp agent on2. set snmp mode default

SNMPmode VS 1. set snmp agent on2. set snmp mode vs

SNMP direct-vs-access 1. set snmp agent on2. set snmp mode vs3. set snmp vs-direct-

access on

Page 202: VSX R80.40 Administration Guide - InfoSec

SNMP Monitoring

VSX R80.40 Administration Guide      |      202

Example SNMP queries for Virtual SystemsThis section shows example SNMP queries.

To run an SNMP v3 query using the VSX (VS 0) IP address

In Gaia Clish:

1. Enable the SNMP agent for context VS:

set snmp agent on

2. Add an SNMP user with permissions for VSs 2,15:

add snmp usm user admin security-level authNoPriv auth-pass-phrase abcd1234set snmp usm user admin vsid 2,15

3. Set SNMPVSmode:

set snmp mode vs

4. Send the remote queries, where:

n vsidN is the SNMP context name required by SNMP v3.

n The IP address is the management IP address of the VSXGateway or VSXCluster.

For example (in the Expert mode):

snmpwalk -n vsid2 -v 3 -l authNoPriv -u admin -A abcd1234192.0.2.5 ifDescsnmpwalk -n vsid15 -v 3 -l authNoPriv -u admin -A abcd1234192.0.2.5 sysName

192.0.2.5 is the IP address of the Management Server.

To run an SNMP v1/v2c query using the VSX (VS 0) IP Address

In Gaia Clish:

1. Enable the SNMP agent for context VS 0:

set snmp agent on

2. Enable SNMP v1/v2:

set snmp agent-version any

3. Set the SNMP community:

set snmp community public read-onlyset snmp community private read-write

4. Set the SNMPmode to VS:

Page 203: VSX R80.40 Administration Guide - InfoSec

SNMP Monitoring

VSX R80.40 Administration Guide      |      203

set snmp mode vs

5. Send remote queries, where:

n The community has the VSID or Virtual System name as a suffix.

n The IP address is the Management IP address of the VSXGateway or VSXCluster.

For example, to query a Virtual System with the name "MY_VS" or has VSID "2", run

In the Expert mode, run:

snmpwalk -v 1 -c public_2 192.0.2.5 ifDescrsnmpwalk -v 1 -c private_MY_VS 192.0.2.5 ifDescr

Communities with suffixes are created automatically.

Community name collisions might occur in special cases, for example if we use these communities:

n Read-only community = private

n Read-write community = private_1

The communities' private_1 and private_1_1 are automatically created for VSID 1.

Private_1 is not a unique community. The community is ambiguous and using it results inunexpected behavior.

To run an SNMP query using the Virtual Device's IP address

1. Enable the SNMP agent for context VS0:

set snmp agent on

2. Add an SNMP user:

add snmp usm user admin security-level authNoPriv auth-pass-phrase abcd1234

3. Specify USM user permissions for Virtual Devices:

set snmp usm user admin vsid 0-10

4. Set the SNMP community:

set snmp community public read-onlyset snmp community private read-write

5. Set SNMPVSmode:

set snmp mode vs

6. Enable SNMP queries over Virtual Device's interfaces:

set snmp vs-direct-access on

7. Send remote queries, where the IP address is the Virtual IP address of the Virtual Device.

Page 204: VSX R80.40 Administration Guide - InfoSec

SNMP Monitoring

VSX R80.40 Administration Guide      |      204

In the Expert mode, run:

snmpwalk -v 1 -c public 192.0.2.81 ifDescrsnmpwalk -v 2c -c public 192.0.2.81 ifDescrsnmpwalk -v 1 -c private 192.0.2.82 ifDescrsnmpwalk -v 2c -c private 192.0.2.82 ifDescrsnmpwalk -v 3 -l authNoPriv -u admin -A abcd1234 192.0.2.83ifDescr

Notes:

n The SNMP community used in the queries is the same community that you configuredearlier.

n Only the active Virtual Device is queried.

Important - SNMP traps are available only for VS 0

Page 205: VSX R80.40 Administration Guide - InfoSec

SNMP Monitoring

VSX R80.40 Administration Guide      |      205

The VSX SNMP TreeTo get information from a Virtual Device (Virtual System, Virtual Switch, or Virtual Router), you must loadthe Check Point MIB file into your SNMPBrowser.

n The MIB file on the VSXGateway (context of VS 0) is: $CPDIR/lib/snmp/chkpnt.mib

n The VSXOID is: .1.3.6.1.4.1.2620.1.16

Example commands in the Expert mode:

n To run an SNMP v2c query for VSX status table, run:

snmpwalk -m $CPDIR/lib/snmp/chkpnt.mib -c public -v 2c 192.0.2.83vsxStatusTable

n To run an SNMP v3 query for the VSXmemory usage table, run:

snmpwalk -m $CPDIR/lib/snmp/chkpnt.mib -v 3 -l authNoPriv -u admin-A abcd1234 192.0.2.83 vsxStatusMemoryUsageTable

The vsxCountersTable refresh time:

The vsxCountersTable refresh time is configured in this file:

$FWDIR/conf/amon_vsx_refresh_interval

The default value is 30 (seconds).

Page 206: VSX R80.40 Administration Guide - InfoSec

Configuring Jumbo Frames

VSX R80.40 Administration Guide      |      206

Configuring Jumbo FramesVSX supports Jumbo Frames and lets you configure up to the maximum MTU of the NIC driver.

Jumbo Frames on a Virtual SwitchConfigure the MTU of a Virtual Switch to enable Jumbo Frames on the Virtual Systems that are connectedto the Virtual Switch. When you configure the MTU of the Virtual Switch, all the related Warp Links andinterfaces are automatically changed to the new value.

You cannot configure the MTU of a Warp Link from the Virtual System.

To configure Jumbo Frames on a Virtual Switch:

1. Connect with SmartConsole to the Security Management Server or Target Domain ManagementServer used to manage the Virtual Switch.

2. From the left navigation panel, clickGateways & Servers.

3. Double-click the Virtual Switch object.

4. From the left tree, click Topology.

5. In the Interfaces section, select the applicable interface and click Edit.

6. On theGeneral tab, configure theMTU.

7. ClickOK.

8. Publish the SmartConsole session

Jumbo Frames on a Virtual RouterConfigure the MTU of a Virtual Router to enable Jumbo Frames on the interfaces. To change the MTU ofWarp Links, configure the settings of the Virtual System.

To configure Jumbo Frames on a Virtual Router:

1. Connect with SmartConsole to the Security Management Server or Target Domain ManagementServer used to manage the Virtual Router.

2. From the left navigation panel, clickGateways & Servers.

3. Double-click the Virtual Router object.

4. From the left tree, click Topology.

5. In the Interfaces section, select the applicable interface and click Edit.

6. On theGeneral tab, configure theMTU.

7. ClickOK.

8. Publish the SmartConsole session

9. Install the applicable Access Control policy on the Virtual Router object.

Page 207: VSX R80.40 Administration Guide - InfoSec

Configuring Jumbo Frames

VSX R80.40 Administration Guide      |      207

Jumbo Frames on a Virtual System in Bridge ModeConfigure the MTU of a Virtual System in Bridge Mode to enable Jumbo Frames on the interfaces.

To configure Jumbo Frames on a Virtual System in Bridge Mode:

1. Connect with SmartConsole to the Security Management Server or Target Domain ManagementServer used to manage the Virtual System.

2. From the left navigation panel, clickGateways & Servers.

3. Double-click the Virtual System object.

4. From the left tree, click Topology.

5. In the Interfaces section, select the applicable interface and click Edit.

6. On theGeneral tab, configure theMTU.

7. ClickOK.

8. Publish the SmartConsole session

9. Install the applicable Access Control policy on the Virtual System object.

Page 208: VSX R80.40 Administration Guide - InfoSec

Bridge Mode

VSX R80.40 Administration Guide      |      208

Bridge ModeBy implementing native Layer 2 bridging instead of IP routing, you can add Virtual Systems withoutadversely affecting the existing IP structure.

When in the Bridge mode, Virtual System interfaces do not require IP addresses.

You can optionally assign an IP address to the Virtual System itself (not the interfaces) to enable Layer 3monitoring, which provides network fault detection functionality.

VSX supports these Bridge mode models:

n Active/Active Bridge Mode: Provides redundancy while preventing undesirable loops betweenredundant switches.

n Active/Standby Bridge Mode: Provides path redundancy and loop prevention, while offeringseamless support for Virtual System Load Sharing and overcoming many of the limitations of STP.

Active/Active Bridge Mode (Spanning TreeProtocol)The Spanning Tree Protocol is an industry standard technology to prevent loops in high-speed switchednetworks.

To use the STPBridge mode, you must have STP deployed and properly configured on your network.

These STP Layer 2 protocols are supported:

n 802.1d

n 802.1q

n 802.1s

n 802.1w

n PVST+

See your vendor documentation to learn how to deploy and configure STP on your network hardware.

Page 209: VSX R80.40 Administration Guide - InfoSec

Bridge Mode

VSX R80.40 Administration Guide      |      209

Active/Standby Bridge ModeThe Active/Standby Bridge Mode enhances both:

n High Availability (for significant improvements).

n Virtual System Load Sharing (VSLS) in VSXCluster environments (for throughput distributedamong Virtual Systems).

Active/Standby Bridge Mode has these advantages:

n Instantaneous failover.

n Enhanced administrator control over bridge failover.

n VSLS support.

n VLAN translation.

The principal limitation of the Active/Standby Bridge Mode is that it breaks the STP tree structure.

Note - When configuring a Virtual System in the Active/Standby Bridge Mode, youshould remove Virtual System VLANs from the STP database in the switches. Thisaction prevents delays due to trunk interface failback.

Three Layer Hierarchical Model

A three-layer hierarchical model is used in large, high-traffic network environments.

1. A core network, with high-speed backbone switches that direct traffic to and from the Internet andother external networks.

2. A distribution layer, with routers, for connectivity between the core and the access layer.

3. An access layer, with redundant LAN switches, that forward traffic to and from internal networks.

VSX in Active/Standby Bridge Mode is incorporated in the distributionlayer, enforcing the security policy.

The routers direct external traffic to the appropriate Virtual System through a segregated VLAN. Inspectedtraffic exits the Virtual System through a separate segregated VLAN, to the routers and then to internaldestinations.

VLAN Shared Interface DeploymentIn this deployment, which cannot function using a standard STPBridge mode configuration, each VSXCluster Member connects to pair of redundant switches through a VLAN Trunk.

All Virtual Systems in a given VSXCluster Member share the same VLAN Trunk.

Page 210: VSX R80.40 Administration Guide - InfoSec

Bridge Mode

VSX R80.40 Administration Guide      |      210

Item Description Item Description

1 Internet 9 Virtual System 3 is Backup

2 Redundant switches (external) 10 Redundant switches (internal)

3 VSXCluster 11 VLAN Switch

4 VSXCluster Member 1 12 Internal Networks

5 VSXCluster Member 2 Sync Network

6 Virtual Systems in Bridge Mode Physical Interface

7 Virtual System 1 is Active VLAN Trunk

8 Virtual System 2 is Standby

With Active/Standby Bridge Mode in High Availability mode, VSXCluster directs traffic to VSXClusterMembers according to administrator-defined priorities and status.

In Virtual System Load Sharing deployments, the system distributes the traffic load amongst VSXClusterMembers according to the Virtual System Load Sharing configuration.

Page 211: VSX R80.40 Administration Guide - InfoSec

Virtual System in Bridge Mode

VSX R80.40 Administration Guide      |      211

Virtual System in Bridge ModeIn This Section:

Core Network Security 211

Configuring Virtual Systems for Active/Standby Bridge Mode 212

Custom Configuration or Override in Bridge Mode 213

Separate Interfaces in Bridge Mode 213

Multi Bridges 214

Core Network SecurityMany Enterprise environments are based on core networks. Situated adjacent to core network backboneswitches, VSX protects the internal network by providing security at Layer 2, Layer 3 or both. VSXcommunicates with the core network using the existing infrastructure. With Virtual Systems in the BridgeMode, VSX can protect departmental networks, while simultaneously preventing network segmentation. Inthis case, switches are located at the entrance to each department's network.

Item Description Item Description

1 Internet 8 LAN Switches

Page 212: VSX R80.40 Administration Guide - InfoSec

Virtual System in Bridge Mode

VSX R80.40 Administration Guide      |      212

Item Description Item Description

2 Core Network Backbone switch 9 Sales

3 VSXCluster 10 Finance

4 Router Sync Network

5 VLAN Physical Interface

6 Member 1 VLAN Trunk

7 Member 2

VSX ensures connectivity between the core network and the Internet or external networks, while providingperimeter security.

Security can be configured on a per VLAN basis.

Configuring Virtual Systems for Active/Standby Bridge ModeTo configure a Virtual System in Bridge Mode, define it as such when you first create the Virtual Systemobject.

You cannot reconfigure a non-Bridge mode Virtual System to use Bridge Mode later.

To configure a Virtual System for the Active/Standby Bridge Mode:

1. In the Virtual System General Properties page of the new Virtual System object, select BridgeMode.

2. ClickNext.

The Virtual System Network Configurationwindow opens.

3. Configure the external and internal interfaces for the Virtual System.

4. Optional: Select Enable Layer 3 Bridge Interface Monitoring.

The IP address must be unique and on the same subnet as the protected network.

5. ClickNext.

6. Click Finish.

Page 213: VSX R80.40 Administration Guide - InfoSec

Virtual System in Bridge Mode

VSX R80.40 Administration Guide      |      213

Custom Configuration or Override in Bridge ModeIf you used the Custom Configuration template to create the VSXGateway, or if you selected theOverride Creation Template option for a Virtual System in Bridge Mode, then manually define the networkinterfaces.

To configure the external and internal interfaces, define interfaces and links to devices in the Interfacestable.

You can add, change, and remove interfaces.

1. To add an interface, click Add.

The Interface Properties window opens.

2. Select an interface from the list and define is properties.

3. ClickOK.

Separate Interfaces in Bridge Mode

To configure the external and internal interfaces:

1. Select the applicable interfaces for the internal and external networks from the appropriate list.

If the selected Interface is a VLAN interface, enter the same VLAN tag in both the external andinternalVLAN Tag fields. This field is not available for non-VLAN interfaces.

2. Define the topology for the internal interface:

n SelectNot Defined if you do not wish to define an IP address.

n Select Specific and then select an IP address definition from the list. IP address definitionscan be based on object groups or predefined networks that define the topology.

3. To create a new IP address definition:

a. Select Specific, and clickNew.

b. SelectGroup to define an object group, or Network to define network properties.

4. Enable Layer 3 bridge interface monitoring to enable Layer 3 network fault detection for this VirtualSystem.

Enter an IP address and subnet mask, which continuously monitors the specified network for faultsor connectivity issues. The IP address/Subnet Mask define the network, on which the Virtual Systemresides.

5. Complete the definition process.

Page 214: VSX R80.40 Administration Guide - InfoSec

Virtual System in Bridge Mode

VSX R80.40 Administration Guide      |      214

Multi BridgesThis feature is supported only in R77.30 and higher, for VSXGateways, and VSXClusters in Active/ActiveBridge mode.

Multi Bridge allows traffic from many different VLANs to move through one Virtual System in Bridge mode.

In a Virtual System in Bridge mode, you can add physical and VLAN interfaces.

When you add more than two VLAN interfaces, Multi Bridge is automatically enabled.

Configure the same VLAN tag on each set of two interfaces to make them bridged.

Requirements for Multi Bridge interfaces:

n All interfaces must be VLANs.

n You can make multiple bridges only between two VLAN Trunks.

n You can add up to 64 pairs of VLAN interfaces for one Multi Bridge.

n Those two VLAN Trunks must be used together, and not with other VLAN Trunks, in other VirtualSystems in Bridge mode or Multi Bridges.

For example, you define eth1.10, eth2.10, eth1.20, eth2.20.

Now the VLAN Trunks, eth1 and eth2, cannot be used with other VLAN Trunks on other VirtualSystems in Bridge mode: eth1.30 cannot bridge with eth3.30.

Item Description

1 Virtual System in Bridge Mode with two bridges on VLAN interfaces with tags 81 and 82.

Page 215: VSX R80.40 Administration Guide - InfoSec

Virtual System in Bridge Mode

VSX R80.40 Administration Guide      |      215

Item Description

2 Virtual System in Bridge Mode with three bridges on VLAN interfaces with tags 40, 50, and 60.

3and4

VLAN Trunks.Each must be paired with the other in all bridges, or used without bridging.They cannot be paired with a different VLAN Trunk.

To define a newMulti Bridge:

1. Connect with SmartConsole to the Security Management Server or Target Domain ManagementServer used to manage the new Virtual System.

2. From the left navigation panel, clickGateways & Servers.

3. Create a new Virtual System object in one of these ways:

n From the top toolbar, click theNew ( ) > VSX > New Virtual System.

n In the top left corner, clickObjects menu > More object types > Network Object >Gateways and Servers > VSX > New Virtual System.

n In the top right corner, clickObjects Pane > New > More > Network Object > Gatewaysand Servers > VSX > Virtual System.

4. In the Name field, enter the name for the new Virtual System.

5. In the VSX Gateway / Cluster field, select the applicable VSXGateway or VSXCluster.

6. Select Bridge Mode.

7. ClickNext.

8. In the Interfaces section, click Add to add the first VLAN interface for the bridge.

9. In the Interfaces section, click Add again to add the second VLAN interface for the bridge.

10. In the Interfaces section, add more VLAN interface pairs to the Multi Bridge in the same way.

Make sure the interfaces in each pair have the same VLAN tag, from different interfaces.

For example:

eth2.50, eth2.51

eth3.50, eth3.51

Make sure to use the same two VLAN Trunks.

11. ClickNext.

12. Click Finish.

13. Install the Access Control Policy on the new Virtual System object.

Page 216: VSX R80.40 Administration Guide - InfoSec

Virtual System in Bridge Mode

VSX R80.40 Administration Guide      |      216

To convert a Bridge to a Multi Bridge:

1. Connect with SmartConsole to the Security Management Server or Target Domain ManagementServer used to manage the Virtual System in the Bridge mode.

2. From the left navigation panel, clickGateways & Servers.

3. Double-click the Virtual System object.

4. From the left tree, click Bridge Configuration > Topology.

5. In the Interfaces section, if there are physical interfaces in the Interfaces list, remove them.

6. In the Interfaces section, add more VLAN interface pairs to the Multi Bridge.

7. ClickOK.

8. Install the Access Control Policy on the Virtual System object.

Page 217: VSX R80.40 Administration Guide - InfoSec

VSX Cluster in Bridge Mode

VSX R80.40 Administration Guide      |      217

VSX Cluster in Bridge ModeFor more information, see the R80.40 Installation and UpgradeGuide.

Enabling Active/Standby Bridge Mode on a New VSXCluster

1. During the Gaia First Time Configuration Wizard of each VSXCluster Member, on the Productspage, selectClusterXL.

2. After the First Time Configuration Wizard is complete and reboot, connect to the command line oneach VSXCluster Member.

Run: cpconfig

n If you enabled the Per Virtual System State feature (required for VSLS), the Active/StandbyBridge Mode is enabled automatically.

n If you chose not to enable the Virtual System Load Sharing earlier, then select the option toenable Active/Standby Bridge Mode and enter y and continue the configuration.

3. Connect with SmartConsole to the Security Management Server or Main Domain ManagementServer that manages this VSXCluster.

4. From the left navigation panel, clickGateways & Servers.

5. Double-click the VSXCluster object.

The VSX Cluster Properties window opens.

6. From the left tree, clickOther >VSX Bridge Configuration.

7. SelectCheck Point ClusterXL.

The Active/Standby Bridge Mode loop detection algorithms in ClusterXL are enabled.

8. ClickOK.

9. Install the VSXPolicy on the VSXCluster object.

The name of this policy is:

<Name of VSX Cluster Object>_VSX

Page 218: VSX R80.40 Administration Guide - InfoSec

VSX Cluster in Bridge Mode

VSX R80.40 Administration Guide      |      218

Enabling Active/Standby Bridge Mode on an Existing VSXCluster

1. Connect to the command line on each VSXCluster Member.

2. Log in to the Expert mode.

3. Run:

cpconfig

4. Select Enable ClusterXL membership for this member.

5. SelectDisable ClusterXL for Bridge Active/Standby.

6. Reboot each VSXCluster Member.

Enabling Active/Active Bridge Mode on an Existing VSXCluster

1. Connect with SmartConsole to the Security Management Server or Main Domain ManagementServer used to manage the VSXCluster.

2. From the left navigation panel, clickGateways & Servers.

3. Double-click the VSXCluster object.

The VSX Cluster Properties window opens.

4. From the left tree, clickOther >VSX Bridge Configuration.

5. Select Standard Layer 2 Loop Detection Protocols.

6. ClickOK.

7. Install the VSXPolicy on the VSXCluster object.

The name of this policy is:

<Name of VSX Cluster Object>_VSX

Page 219: VSX R80.40 Administration Guide - InfoSec

VSX Diagnostics and Troubleshooting

VSX R80.40 Administration Guide      |      219

VSX Diagnostics andTroubleshootingThis chapter presents basic diagnostic and troubleshooting procedures that should be followed in theevent you encountering a problem while working with VSX. This diagnostic routine will assist you indetermining the source of the problem. This chapter presents several known issues and their solutions.

Most problems are caused by configuration errors occurring during the process of defining VSXGateway,clusters and/or Virtual Devices. Another common source of problems involves networking and connectivityissues affecting VSX behavior. These problems are listed according to the order in which you will likelyencounter them. Before reading and following a certain workaround, make sure you've read all theprevious workarounds, and that those steps in the configuration were successful.

In some of the cases, one initial problem can cause problems in later stages of the configuration. For thatreason, it is important to find the root of the problem when you are trying to understand what went wrong.

Page 220: VSX R80.40 Administration Guide - InfoSec

General Troubleshooting Steps

VSX R80.40 Administration Guide      |      220

General Troubleshooting StepsIf you suspect that there is a problem with your VSX configuration, there are several diagnostic proceduresthat you can follow to determine the source. These procedures utilize various commands documented inthe Command Line section.

1. Perform a basic configuration check for each gateway or VSXCluster Member by running the "vsxstat -v" command. The output will allow you to:

a. Account for all Virtual Systems and make sure that none are missing from the configuration.

b. Make sure all Virtual Devices are Active

c. Make sure the correct Security Policy is installed for each Virtual System

d. Make sure the SIC trust is established with the Management Server

2. Run the "cplic print" command on each VSXGateway, VSXCluster Member andManagement Server to make sure the appropriate licenses are installed.

3. Run the cphaprob stat command on each VSXCluster Member to verify its status. If a memberis listed with a status other than Active, Standby, or Backup, refer to the "Troubleshooting" chapterin the R80.40 ClusterXL Administration Guide for additional troubleshooting assistance.

4. If you suspect that a Virtual System is experiencing connectivity problems, perform the followingsteps:

a. Run the "vsenv <VSID>" command to set the context to the appropriate Virtual System.

b. Run the "fw getifs" command to display the interface list for the Virtual System.

c. Examine connectivity status using standard operating system commands and tools such as:ping, traceroute, tcpdump, ip route, ftp, and so on. Some of these run accordingto context (i.e. routing, source and destination IP addresses). .

You can also execute the "ip route" and "ip link" commands.

If these tests indicate that all interfaces and routers have connectivity, and appear to be functioningcorrectly, you should monitor the passage of packets through the system.

5. Execute the "fw monitor -v <VSID>" commands to capture details of packets at multiplepoints. This may return multiple reports on the same packet as it passes various capture points. Thiscommand does not report on Virtual Routers, except for packets destined to an external VirtualRouter.

6. Execute the "tcpdump" command to display transmitted or received packets for specific interfaces,including Warp interfaces. This often provides valuable clues for resolving connectivity issues.

Page 221: VSX R80.40 Administration Guide - InfoSec

Troubleshooting Specific Problems

VSX R80.40 Administration Guide      |      221

Troubleshooting Specific ProblemsCannot Establish SIC Trust for VSX Gateway or VSX Cluster Member

When creating a VSXGateway or VSXCluster Member, you cannot establish SIC trust. SmartConsoleshows an error message:

Certificate cannot be pushed. Connection error with wait agent.

Possible Causes How to Resolve

Check that you have networkconnectivity between thegateway and the SecurityGateway or DomainManagement Server by pingingfrom the VSX system (a ping fromthe Management Server to theVSXGateway will not workbecause of the default securitypolicy installed on the VSXGateway / VSXCluster Member).Make sure the context is vrf0 first.

On all relevant machines, re-check the cables, routes, IPaddresses and any intermediate networking devices (routers,switches, hubs, and so on) between the Management Serverand the VSXGateway.

Check that all the Check Pointprocesses on the VSXGateway(s) are up and running by runningcpwd_admin list andmaking sure each line has a non-zero value in the PID field.

If the VSXGateway just rebooted, the Check Point processesmight still be coming up.

Check that the CPD process islistening to the trustestablishment port.

Run the "netstat -an | grep 18211" command on theVSXGateway, and make sure that output looks like this:tcp 0 0 0.0.0.0:18211 0.0.0.0:* LISTEN

Page 222: VSX R80.40 Administration Guide - InfoSec

Troubleshooting Specific Problems

VSX R80.40 Administration Guide      |      222

SIC Trust Problems with New Virtual Devices

When creating a new Virtual System, Virtual Router or Virtual Switch, you cannot establish SIC trust.

Possible Causes How to Resolve

Time or time zone mismatch between theManagement Server and the VSXGateway.For proper SIC operation, the time, date andtime zone must be synchronized betweenthe Management Server and Gateways/VSXCluster Members.Execute the "/bin/date -u" commandon all machines, to obtain the correctUTC/GMT time. The machines can be indifferent time zones, as long as theirUTC/GMT times match.

Change the time, date and time zone on themanagement and/or the gateway so that theirUTC/GMT times match. Refer to your operatingsystem documentation for the exact commandsneeded to accomplish this.

Install Policy Error Using VSX Creation Wizard

After completing the VSX creation wizard, a failure occurs and the following message appears in theOperation Reportwindow:

Error: Default policy installation failed on VSX. Install policymanually using SmartConsole.

Possible Causes How to Resolve

Missing or invalid license on the ManagementServer.Execute cplic check on the Management Serverto make sure that you have the required licenses.

Obtain and install the appropriate licenses.

Missing or invalid VSXGateway / VSXClusterlicenses.Run the "vsx stat" command on the VSXGateway, and make sure that the number is greaterthan 0 (zero) in the output:Number of Virtual Systems allowed bylicense:

Obtain a VSX and install a valid license foreach VSXGateway / VSXCluster Members.

Time or time zone mismatch between theManagement Server and the VSX Gateway.For proper SIC operation, the time, date and timezone must be synchronized between theManagement Server and the VSXGateway / VSXCluster Members.Execute the /bin/date -u command on allmachines, to obtain the correct UTC/GMT time. Themachines can be in different time zones, as long astheir UTC/GMT offsets match.

Change the time, date and time zone on theManagement Server and/or the VSXGateway / VSXCluster Members, so thattheir UTC/GMT offsets match.Refer to your operating systemdocumentation for the exact commandsneeded to accomplish this.

Page 223: VSX R80.40 Administration Guide - InfoSec

Troubleshooting Specific Problems

VSX R80.40 Administration Guide      |      223

Internal Host Cannot Ping Virtual System

After defining a Virtual System with an internal VLAN interface, an internal host on that VLAN cannotping the Virtual System internal or external IP address.

Possible Causes How to Resolve

A policy allowing thecommunication was not installed onthe Virtual System. Note that aftercreating a Virtual System, it has aDefault Policy that blocks all traffic.

Install a policy on the Virtual System that enables the traffic.In SmartConsole Logs & Monitor view, analyze the logs tomake sure that the Virtual System allows the traffic.

There is the VLAN configurationproblem on a switch, or physicalcable problem.

Check the switch configuration. Make sure that VLAN tagconfigured on the switch is the same as used for the VirtualSystem VLAN interface.Check the cables, and make sure that you have plugged thecable from the switch to the correct port on the VSXGateway/ VSXCluster Members.

Incorrect routing on adjacentrouters or hosts.

Check the routing tables on intermediate routers and hosts.You can use the tcpdump command on the relevant VLANinterface on the VSXGateway / VSXCluster Members tomake sure that the traffic arrives to and leaves the VSXGateway / VSXCluster Members.

Incorrect IP address or net maskdefined on the Virtual System VLANinterface.

Check the IP address and the net mask assigned to theVirtual System internal VLAN interface.

Page 224: VSX R80.40 Administration Guide - InfoSec

Troubleshooting Specific Problems

VSX R80.40 Administration Guide      |      224

Re-establishing SIC Trust with Virtual Devices

In the event you encounter connectivity problems due to the loss of SIC Trust for a specific VirtualDevice (Virtual System or Virtual Router), you can use the procedure below to manually re-establish theSIC trust.

To manually re-establish SIC Trust with a Virtual Device:

Follow the instructions in the sk34098.

1. On the VSXGateway or each VSXCluster Member:

a. Connect to the command line the VSXGateway or each VSXCluster Member.

b. Log in to the Expert mode.

c. Examine the VSX configuration to determine the ID of the Virtual Device:

vsx stat -v

d. Reset the SIC with the specified Virtual Device:

vsx sic reset <VSID>

2. On the Management Server:

a. Connect to the command line the Management Server.

b. Log in to the Expert mode.

c. On the Multi-Domain Server, change the context to the applicable Target DomainManagement Server used to manage the Virtual Device:

mdsenv <IP Address or Name of Domain Management Server>

d. Determine the SIC name of the Virtual Device:

cpca_client lscert -stat valid -kind SIC | grep -i -A 2<Name of Virtual Device Object>

e. Revoke the SIC certificate of the Virtual Device:

cpca_client revoke_cert -n <CN=...,O=...,>

3. Connect with SmartConsole to the Security Management Server or Main Domain ManagementServer used to manage the VSXCluster.

4. From theGateways & Servers view orObject Explorer, double-click the Virtual Device object.

5. ClickOK.

This action creates a new SIC certificate for the Virtual Device and saves it on the VSXGatewayor each VSXCluster Member.

Page 225: VSX R80.40 Administration Guide - InfoSec

Command Line Reference

VSX R80.40 Administration Guide      |      225

Command Line ReferenceSee the R80.40 CLI ReferenceGuide.

Below is a limited list of applicable commands.

Page 226: VSX R80.40 Administration Guide - InfoSec

Syntax Legend

VSX R80.40 Administration Guide      |      226

Syntax LegendWhenever possible, this guide lists commands, parameters and options in the alphabetical order.

This guide uses this convention in the Command Line Interface (CLI) syntax:

Character Description

TAB Shows the available nested subcommands:

main command→ nested subcommand 1→ → nested subsubcommand 1-1→ → nested subsubcommand 1-2→ nested subcommand 2

Example:

cpwd_admin config -a <options> -d <options> -p -r del <options>

Meaning, you can run only one of these commands:

n This command:

cpwd_admin config -a <options>

n Or this command:

cpwd_admin config -d <options>

n Or this command:

cpwd_admin config -p

n Or this command:

cpwd_admin config -r

n Or this command:

cpwd_admin del <options>

Curly brackets or braces{ }

Enclose a list of available commands or parameters, separated by thevertical bar |.User can enter only one of the available commands or parameters.

Angle brackets< >

Enclose a variable.User must explicitly specify a supported value.

Square brackets orbrackets[ ]

Enclose an optional command or parameter, which user can also enter.

Page 227: VSX R80.40 Administration Guide - InfoSec

cpconfig

VSX R80.40 Administration Guide      |      227

cpconfig

Description

This command starts the Check Point Configuration Tool.

This tool lets you configure specific settings for the installed Check Point products.

Important - In Cluster, you must configure all the Cluster Members in the same way.

Syntax

cpconfig

Menu Options

Note - The options shown depend on the configuration and installed products.

Menu Option Description

Licenses and contracts Manages Check Point licenses and contracts on this SecurityGateway or Cluster Member.

SNMP Extension Obsolete. Do not use this option anymore.To configure SNMP, see the R80.40Gaia Administration Guide -Chapter SystemManagement - Section SNMP.

PKCS#11 Token Register a cryptographic token, for use by Gaia OperatingSystem.See details of the token, and test its functionality.

Random Pool Configures the RSA keys, to be used by Gaia Operating System.

Secure Internal Communication Manages SIC on the Security Gateway or Cluster Member.This change requires a restart of Check Point services on theSecurity Gateway or Cluster Member.For more information, see:

n The R80.40 SecurityManagement Administration Guide.n sk65764: How to reset SIC.

Page 228: VSX R80.40 Administration Guide - InfoSec

cpconfig

VSX R80.40 Administration Guide      |      228

Menu Option Description

Enable cluster membership forthis gateway

Enables the cluster membership on the Security Gateway.This change requires a reboot of the Security Gateway.For more information, see the:

n R80.40 Installation and UpgradeGuide.n R80.40 ClusterXL Administration Guide.

Disable cluster membership forthis gateway

Disables the cluster membership on the Security Gateway.This change requires a reboot of the Security Gateway.For more information, see the:

n R80.40 Installation and UpgradeGuide.n R80.40 ClusterXL Administration Guide.

Enable Check Point Per VirtualSystem State

Enables Virtual System Load Sharing on the VSXClusterMember.For more information, see "Virtual System Load Sharing (VSLS)"on page 131.

Disable Check Point Per VirtualSystem State

Disables Virtual System Load Sharing on the VSXClusterMember.For more information, see "Virtual System Load Sharing (VSLS)"on page 131.

Enable Check Point ClusterXLfor Bridge Active/Standby

Enables Check Point ClusterXL for Bridge mode.This change requires a reboot of the Cluster Member.For more information, see the:

n R80.40 Installation and UpgradeGuide.n R80.40 ClusterXL Administration Guide.

Disable Check Point ClusterXLfor Bridge Active/Standby

Disables Check Point ClusterXL for Bridge mode.This change requires a reboot of the Cluster Member.For more information, see the:

n R80.40 Installation and UpgradeGuide.n R80.40 ClusterXL Administration Guide.

Check Point CoreXL Manages CoreXL on the Security Gateway or Cluster Member.After all changes in CoreXL configuration, you must reboot theSecurity Gateway or Cluster Member.For more information, see the R80.40 Performance TuningAdministration Guide.

Automatic start of Check PointProducts

Shows and controls which of the installed Check Point productsstart automatically during boot.

Exit Exits from the Check Point Configuration Tool.

Page 229: VSX R80.40 Administration Guide - InfoSec

cpconfig

VSX R80.40 Administration Guide      |      229

Example 1 - Menu on a single Security Gateway

[Expert@MySingleGW:0]# cpconfigThis program will let you re-configureyour Check Point products configuration.

Configuration Options:----------------------(1) Licenses and contracts(2) SNMP Extension(3) PKCS#11 Token(4) Random Pool(5) Secure Internal Communication(6) Enable cluster membership for this gateway(7) Check Point CoreXL(8) Automatic start of Check Point Products

(9) Exit

Enter your choice (1-9) :

Example 2 - Menu on a Cluster Member

[Expert@MyClusterMember:0]# cpconfigThis program will let you re-configureyour Check Point products configuration.

Configuration Options:----------------------(1) Licenses and contracts(2) SNMP Extension(3) PKCS#11 Token(4) Random Pool(5) Secure Internal Communication(6) Disable cluster membership for this gateway(7) Enable Check Point Per Virtual System State(8) Enable Check Point ClusterXL for Bridge Active/Standby(9) Check Point CoreXL(10) Automatic start of Check Point Products

(11) Exit

Enter your choice (1-11) :

Page 230: VSX R80.40 Administration Guide - InfoSec

vsenv

VSX R80.40 Administration Guide      |      230

vsenv

Description

Changes the shell's current context to the specified Virtual Device.

Syntax

vsenv [{<VSID> | <Name of Virtual Device>}]

Parameters

Parameter Description

No Parameters Changes the context to the default Virtual Device 0.

<VSID> Specifies the Virtual Device by its ID.

<Name of Virtual Device> Specifies the Virtual Device by its Name.

Note - To see the configured Virtual Devices, run the "vsx stat -v" command.

Example 1 - Changing the context to the default Virtual Device 0

[Expert@MyVsxGW:0]# vsenvContext is set to Virtual Device VSX2_192.168.3.242 (ID 0).[Expert@MyVsxGW:0]#

Example 2 - Changing the context to the specific Virtual Device

[Expert@MyVsxGW:0]# vsenv 2Context is set to Virtual Device VS2 (ID 2).[Expert@MyVsxGW:2]#

Page 231: VSX R80.40 Administration Guide - InfoSec

vsx

VSX R80.40 Administration Guide      |      231

vsx

Description

n Shows VSX configuration.

n Fetches VSX configuration.

n Shows and configures CPU Resource Control.

n Shows and configures Memory Resource Control.

Syntax

vsx fetch <options> fetch_all_cluster_policies fetchvs <options> get initmsg <options> mstat <options> resctrl <options> showncs <options> sicreset stat <options> unloadall vspurge

Note - The fw6 vsx commands are not supported.

Parameters

Parameter Description

fetch <options> Fetches configuration for VSXGateway.See "vsx fetch" on page 233.

fetch_all_cluster_policies

Fetches security policy for all Virtual Systems and Virtual Routersfrom cluster peers.See "vsx fetch_all_cluster_policies" on page 235.

fetchvs <options> Fetches configuration for a Virtual System.See "vsx fetchvs" on page 236.

get Shows the information about the current VSX context.See "vsx get" on page 237.

Page 232: VSX R80.40 Administration Guide - InfoSec

vsx

VSX R80.40 Administration Guide      |      232

Parameter Description

initmsg <options> Sends VSX initialization message.See "vsx initmsg" on page 238.

mstat <options> Shows and configures Memory Resource Control.See "vsxmstat" on page 239.

resctrl <options> Shows and configures CPU Resource Control.See "vsx resctrl" on page 243.

showncs <options> Shows Check Point Network Configuration Script (NCS) for VirtualDevice.See "vsx showncs" on page 245.

sicreset Resets SIC for Virtual System or Virtual Router in the current VSXcontext.See "vsx sicreset" on page 246.

stat <options> Shows status information for VSXGateway.See "vsx stat" on page 247.

unloadall Unloads security policy for all Virtual Systems and Virtual Routers.See "vsx unloadall" on page 249.

vspurge Cleans unused entries for Virtual Devices.Fetches configuration file for Virtual Devices.See "vsx vspurge" on page 250.

Page 233: VSX R80.40 Administration Guide - InfoSec

vsx fetch

VSX R80.40 Administration Guide      |      233

vsx fetch

Description

Fetches the most current configuration files from the Security Management Server or Main DomainManagement Server, and applies it to the VSXGateway.

Syntax

vsx fetch [-v] [-q] [-s] local

vsx fetch [-v | -q | -s] [-f <Configuration File>]

vsx fetch [-v | -q] -C "NCS Command"

vsx fetch [-v | -q | -c | -n | -s] [<Management Server>]

Parameters

Parameter Description

-c Specifies that this is a VSXCluster.

-n Specifies not to apply the local.vsall, if VSX configuration, as fetched fromManagement Server, is up-to-date.

-q Specifies to run in quiet mode - shows only summary information.

-s Specifies to fetch concurrently for multi-processor environment.

-v Specifies to run in verbose mode - shows detailed information.

local Reads the configuration file $FWDIR/state/local/VSX/local.vsalland executes the Network Configuration Script (NCS).

-f<ConfigurationFile>

Fetches the specified configuration with NCS commands file instead of thedefault local.vsall file.

-C"NCS Command"

Executes the specified NCS command.

<ManagementServer>

Fetches the local.vsall from the specified Management Server (byresolvable hostname, or IP address), replaces and runs it.

Note - If you do not specify the Management Server explicitly, thecommand takes it from the $FWDIR/conf/masters file on the VSXGateway.

Page 234: VSX R80.40 Administration Guide - InfoSec

vsx fetch

VSX R80.40 Administration Guide      |      234

Return Values

n 0 (zero) indicates that the command executed successfully.

n Any other value indicates an error.

Example

[Expert@MyVsxGW:0]# vsx fetchFetching VSX Configuration From: 192.168.30.40

Local VSX Configuration is Up-To-Date.Cleaning un-used Virtual Systems entries (local.vskeep).

Purge operation succeeded.Fetching Virtual Systems configuration file (local.vsall).

SecureXL device has been enabled for vsid 1SecureXL device has been enabled for vsid 2SecureXL device has been enabled for vsid 3Virtual Systems configuration file installed successfully[Expert@MyVsxGW:0]#

Page 235: VSX R80.40 Administration Guide - InfoSec

vsx fetch_all_cluster_policies

VSX R80.40 Administration Guide      |      235

vsx fetch_all_cluster_policies

Description

Fetches security policy for all Virtual Systems and Virtual Routers from cluster peers.

Syntax

vsx fetch_all_cluster_policies [-v]

Parameters

Parameter Description

-v Specifies to run in verbose mode - shows detailed information.

Return Values

n 0 (zero) indicates that the command executed successfully.

n Any other value indicates an error.

Page 236: VSX R80.40 Administration Guide - InfoSec

vsx fetchvs

VSX R80.40 Administration Guide      |      236

vsx fetchvs

Description

Fetches configuration file for the specified Virtual Device based on information stored locally on the VSXGateway.

Syntax

vsx fetchvs [-v | -q] [{<VSID> | <Name of Virtual Device>}]

Parameters

Parameter Description

-q Specifies to run in quiet mode - shows only summary information.

-v Specifies to run in verbose mode - shows detailed information.

<Name of Virtual Device> Specifies the name of the Virtual Device.

<VSID> Specifies the ID of the Virtual Device.

Return Values

n 0 (zero) indicates that the command executed successfully.

n Any other value indicates an error.

Example

[Expert@MyVsxGW:0]# vsx fetchvs 2

Page 237: VSX R80.40 Administration Guide - InfoSec

vsx get

VSX R80.40 Administration Guide      |      237

vsx get

Description

Shows the information about the current VSX context.

Syntax

vsx get

Return Values

n 0 (zero) indicates that the command executed successfully.

n Any other value indicates an error.

Example

[Expert@MyVsxGW:0]# vsx getCurrent context is VSX Gateway MyVsxGW (ID 2).[Expert@MyVsxGW:0]#

Page 238: VSX R80.40 Administration Guide - InfoSec

vsx initmsg

VSX R80.40 Administration Guide      |      238

vsx initmsg

Description

Sends VSX initialization message - to initialize the CPDmessaging in Virtual Systems.

Syntax

vsx initmsg [-q | -v]

Parameters

Parameter Description

-q Specifies to run in quiet mode - shows only summary information.

-v Specifies to run in verbose mode - shows detailed information.

Return Values

n 0 (zero) indicates that the command executed successfully.

n Any other value indicates an error.

Example

[Expert@MyVsxGW:2]# vsx initmsg -vSending VSX initialization message.VSX initialization operation succeeded.[Expert@MyVsxGW:2]#

Page 239: VSX R80.40 Administration Guide - InfoSec

vsx mstat

VSX R80.40 Administration Guide      |      239

vsx mstat

Description

Shows and configures Memory Resource Control.

Output shows these global memory resources:

Resource Description

Memory Total Total physical memory on the VSXGateway.

Memory Free Available physical memory.

Swap Total Total of swap memory.

Swap Free Available swap memory.

Swap-in rate Total memory swaps per second.

Syntax

vsx mstat help

vsx mstat[-vs <VSID>] [unit <Unit>] [sort {<Number> | all}]

debug disable enable status swap <Minutes>

Parameters

Parameter Description

help Shows the built-in usage.

No Parameters Shows the total memory consumption for each Virtual System.

Page 240: VSX R80.40 Administration Guide - InfoSec

vsx mstat

VSX R80.40 Administration Guide      |      240

Parameter Description

-vs <VSID> Specifies the Virtual Systems by their IDs.You can specify:

n One Virtual System.Example: -vs 1

n Many individual Virtual Systems (separate their IDs with spaces).Example: -vs 2 3

n A range of Virtual Systems.Example: -vs 4-6

Note - You can combine all the available options (separate them withspaces). Example: -vs 1 4-6

unit <Unit> Specifies the memory measurement unit shown in the command output:

n B - bytesn K - kilobytesn M - megabytes (default)n G - gigabytes

sort{<Number> |all}

Sorts the Virtual Systems in the output by their memory size.Specifies the number of Virtual Systems shown in the command output.Use all to show all Virtual Systems.If you do not specify this flag, the Virtual Systems in the output are sorted by theirVSID.

debug Shows memory consumption debug information for each Virtual System by fields,which are defined in the configuration file.

disable Disables the Memory Resource Control.

Note - This change applies immediately and does not require a reboot.

enable Enables the Memory Resource Control.

Note - This change requires a reboot.

status Shows the current Memory Resource Control status.

Page 241: VSX R80.40 Administration Guide - InfoSec

vsx mstat

VSX R80.40 Administration Guide      |      241

Parameter Description

swap<Minutes>

Specifies the swap-in sample rate in minutes.Enter the number of minutes that the system measures memory swaps todetermine the swap-in rate.Only integers are valid values.The default swap-in sample rate is 10.

Notes:

n Swap-in sample rate is a system-wide Linux setting.When you change the value for memory monitoring, all theswap-in rates are calculated according to the new value.

n When you enable the monitoring memory resources feature, theswap-in rate setting is saved.When you disable the feature, the system restores the savedsetting.

Return Values

n 0 (zero) indicates that the command executed successfully.

n Any other value indicates an error.

Example 1

[Expert@MyVsxGW:0]# vsx mstat unit M sort all

VSX Memory Status=================Memory Total: 7753.95 MBMemory Free: 7168.71 MBSwap Total: 3992.71 MBSwap Free: 3992.71 MBSwap-in rate: 8796093022208.00 MB

VSID | Memory Consumption======+====================

0 | 260.79 MB1 | 0.00 MB

[Expert@MyVsxGW:0]#

Page 242: VSX R80.40 Administration Guide - InfoSec

vsx mstat

VSX R80.40 Administration Guide      |      242

Example 2

[Expert@MyVsxGW:0]# vsx mstat -vs 0 unit G

VSX Memory Status=================Memory Total: 7.572 GBMemory Free: 7.001 GBSwap Total: 3.899 GBSwap Free: 3.899 GBSwap-in rate: 8589934592.000 GB

VSID | Memory Consumption======+====================

0 | 0.255 GB

[Expert@MyVsxGW:0]#

Example 3

[Expert@MyVsxGW:0]# vsx mstat debug

VSX Memory Status=================Memory Total: 7940048.00 KBMemory Free: 7339864.00 KBSwap Total: 4088532.00 KBSwap Free: 4088532.00 KBSwap-in rate: 9007199254740992.00 KB

VSID | Private_Clean | Private_Dirty | DispatcherGConn | DispatcherHTab | SecureXL | DispatcherGConn6 |DispatcherHTab6 | SecureXL6

======+===============+===============+=================+================+=============+==================+=================+===========

0 | 34456.00 KB | 182104.00 KB | 6.09 KB | 0.00 KB | 51071.91 KB | 0.00 KB |0.00 KB | 0.00 KB

1 | 0.00 KB | 0.00 KB | 0.00 KB | 0.00 KB | 0.00 KB | 0.00 KB |0.00 KB | 0.00 KB

Note: To add a field to memory table please uncomment the required field (delete the leading '#')To remove a field from memory table please comment out the required field (add a leading '#')Configuration is done in the file /opt/CPsuite-R80.30/fw1/conf/memoryinfo.conf

[Expert@MyVsxGW:0]#

Page 243: VSX R80.40 Administration Guide - InfoSec

vsx resctrl

VSX R80.40 Administration Guide      |      243

vsx resctrl

Description

Shows and configures the CPUResource Control.

Note - You must enable VSXResource Control Monitoring (vsx resctrlmonitor enable) to see data about CPU usage for each Virtual System overSNMP.

Syntax

vsx resctrl --help

vsx resctrl -d stat -d -q stat -u stat load_configuration monitor <options> reset stop

Parameters

Parameter Description

--help Shows the built-in usage.

-d stat Shows CPU consumption for each Virtual Device - raw information including CPUticks (but only after 24 hours of active monitoring)

-d -q stat Shows CPU consumption for each Virtual Device - raw information without headerline (but only after 24 hours of active monitoring).

-u stat Shows CPU consumption for each Virtual Device - for each CPU core.

load_configuration

Initializes Resource Control from the $FWDIR/conf/resctrl file.

monitor<options>

Manages the Resource Control Monitor.The available options are:

n disable - Disables the Resource Control Monitor.n enable - Enables the Resource Control Monitor.n show - Shows the current Resource Control Monitor status.

reset Resets the Resource Control Monitor statistics.

stop Stops the Resource Control Monitor.

Page 244: VSX R80.40 Administration Guide - InfoSec

vsx resctrl

VSX R80.40 Administration Guide      |      244

Return Values

n 0 (zero) indicates that the command executed successfully.

n Any other value indicates an error.

Notes

n For systems with more than one CPU, time is an average for all CPUs.

To see the usage for each Virtual Device per CPU, run the "vsx resctrl -u" stat command.

n Total Virtual System CPUUsage includes the total for all Virtual Devices: Virtual Routers, VirtualSwitches, Virtual Systems, and the VSXGateway.

Example 1

[Expert@MyVsxGW:0]# vsx resctrl -d statThis option will be active only after 24 hours of monitoringMonitoring active time: 2 minutes 11 seconds[Expert@MyVsxGW:0]#

Example 2

[Expert@MyVsxGW:0]# vsx resctrl -u stat

Virtual Systems CPU Usage Statistics [%]========================================

Number of CPUs: 4Monitoring active time: 2m 32s

ID Name | CPU | 1sec 10sec 1min 1hr* 24hr*=============================+======+==========================0 VSX1 | 0 | 4.90 1.82 1.43 0.00 0.00

| 1 | 0.00 0.19 1.44 0.00 0.00| 2 | 0.00 0.06 0.13 0.00 0.00| 3 | 4.50 0.74 0.55 0.00 0.00| Avg. | 2.35 0.70 0.89 0.00 0.00

-----------------------------+------+--------------------------1 VS1 | 0 | 0.00 0.02 0.01 0.00 0.00

| 1 | 0.00 0.14 0.08 0.00 0.00| 2 | 0.00 0.03 0.10 0.00 0.00| 3 | 0.00 0.01 0.03 0.00 0.00| Avg. | 0.00 0.05 0.06 0.00 0.00

=============================+======+==========================Total Virtual Devices CPU Use| 0 | 4.90 1.84 1.44 0.00 0.00

| 1 | 0.00 0.33 1.52 0.00 0.00| 2 | 0.00 0.09 0.23 0.00 0.00| 3 | 4.50 0.75 0.58 0.00 0.00| Avg. | 2.35 0.75 0.94 0.00 0.00

=============================+======+==========================

Notes: - Monitoring has been active for less than 1 hour.Statistics are calculated only for monitoring active time.

[Expert@MyVsxGW:0]#

Page 245: VSX R80.40 Administration Guide - InfoSec

vsx showncs

VSX R80.40 Administration Guide      |      245

vsx showncs

Description

Shows Check Point Network Configuration Script (NCS) for a Virtual Device.

Syntax

vsx showncs {<VSID> | <Name of Virtual Device>}

Parameters

Parameter Description

<Name of Virtual Device> Specifies the name of the Virtual Device.

<VSID> Specifies the ID of the Virtual Device.

Return Values

n 0 (zero) indicates that the command executed successfully.

n Any other value indicates an error.

Page 246: VSX R80.40 Administration Guide - InfoSec

vsx sicreset

VSX R80.40 Administration Guide      |      246

vsx sicreset

Description

Resets SIC for Virtual System or Virtual Router in the current VSX context.

Notes:

n This operation is not supported for the context of VSXGateway itself (VS0).n On the Management Server, run the "cpca_client revoke_cert"

command to cancel the old certificate.n In SmartConsole, open the Virtual System object and immediately clickOK.

This action creates a new certificate, and transfers the certificate to the VSXGateway.

Syntax

vsenv {<VSID> | <Name of Virtual Device>}vsx sicreset {<VSID> | <Name of Virtual Device>}

Parameters

Parameter Description

<Name of Virtual Device> Specifies the name of the Virtual Device.

<VSID> Specifies the ID of the Virtual Device.

Return Values

n 0 (zero) indicates that the command executed successfully.

n Any other value indicates an error.

Page 247: VSX R80.40 Administration Guide - InfoSec

vsx stat

VSX R80.40 Administration Guide      |      247

vsx stat

Description

Shows status information for VSXGateway.

Syntax

vsx stat [-l] [-v] [<VSID>]

Parameters

Parameter Description

-l Shows a list of all Virtual Devices and their applicable information.

-v Shows a summary table with all Virtual Devices.

<VSID> Specifies a Virtual Device by its ID.

Return Values

n 0 (zero) indicates that the command executed successfully.

n Any other value indicates an error.

Example 1 - Show a summary table with all Virtual Devices.

[Expert@MyVsxGW:2]# vsx stat -vVSX Gateway Status==================Name: VSX1_192.168.3.241Access Control Policy: VSX_Cluster_VSXInstalled at: 20Sep2019 22:06:33Threat Prevention Policy: <No Policy>SIC Status: Trust

Number of Virtual Systems allowed by license: 25Virtual Systems [active / configured]: 2 / 2Virtual Routers and Switches [active / configured]: 0 / 0Total connections [current / limit]: 5 / 44700

Virtual Devices Status======================

ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy | SIC Stat-----+-------------+-----------------------+-----------------+--------------------------+---------

1 | S VS1 | VS_Policy | 20Sep2019 22:07 | <No Policy> | Trust2 | S VS2 | VS_Policy | 20Sep2019 22:07 | <No Policy> | Trust

Type: S - Virtual System, B - Virtual System in Bridge mode,R - Virtual Router, W - Virtual Switch.

[Expert@MyVsxGW:2]#

Page 248: VSX R80.40 Administration Guide - InfoSec

vsx stat

VSX R80.40 Administration Guide      |      248

Example 2 - Show a list of all Virtual Devices and their applicable information.

[Expert@MyVsxGW:2]# vsx stat -l

VSID: 0VRID: 0Type: VSX GatewayName: VSX1_192.168.3.241Security Policy: VSX_Cluster_VSXInstalled at: 20Sep2019 22:06:33SIC Status: TrustConnections number: 5Connections peak: 43Connections limit: 14900

VSID: 1VRID: 1Type: Virtual SystemName: VS1Security Policy: VS_PolicyInstalled at: 20Sep2019 22:07:03SIC Status: TrustConnections number: 0Connections peak: 3Connections limit: 14900

VSID: 2VRID: 2Type: Virtual SystemName: VS2Security Policy: VS_PolicyInstalled at: 20Sep2019 22:07:01SIC Status: TrustConnections number: 0Connections peak: 2Connections limit: 14900[Expert@MyVsxGW:2]#

Example 3 - Shows the information for the specified Virtual Device

[Expert@MyVsxGW:2]# vsx stat 2

VSID: 2VRID: 2Type: Virtual SystemName: VS2Security Policy: VS_PolicyInstalled at: 20Sep2019 22:07:01SIC Status: TrustConnections number: 0Connections peak: 2Connections limit: 14900[Expert@MyVsxGW:2]#

Page 249: VSX R80.40 Administration Guide - InfoSec

vsx unloadall

VSX R80.40 Administration Guide      |      249

vsx unloadall

Description

Unloads security policy for all Virtual Systems and Virtual Routers.

See sk33065: Unloading policy from a VSX Security Gateway.

Syntax

vsx unloadall

Return Values

n 0 (zero) indicates that the command executed successfully.

n Any other value indicates an error.

Page 250: VSX R80.40 Administration Guide - InfoSec

vsx vspurge

VSX R80.40 Administration Guide      |      250

vsx vspurge

Description

Removes Virtual Devices that are no longer defined in the management database, but were not removedfrom the VSXGateway, because the VSXGateway was down or disconnected when the managementserver pushed the updated VSX configuration.

This command cleans all unused Virtual Devices entries (from the NCS local.vskeep) and fetches theVSX configuration file (NCS local.vskeep) again.

Syntax

vsx vspurge [-q | -v] [-f <purge_file>]

Parameters

Parameter Description

-q Specifies to run in quiet mode - shows only summary information.

-v Specifies to run in verbose mode - shows detailed information.

-f <purge_file>

Specifies the path and the name of the file, in which the command saves thepurged information.

Return Values

n 0 (zero) indicates that the command executed successfully.

n Any other value indicates an error.

Page 251: VSX R80.40 Administration Guide - InfoSec

vsx_util

VSX R80.40 Administration Guide      |      251

vsx_util

Description

Performs various VSXmaintenance tasks.

You run this command from the Expert mode on the Management Server (Security Management Server,or aMainDomain Management Server on Multi-Domain Server).

Important - Before you run the vsx_util commands:

n Back up the VSX environment. See sk100395: How to backup and restore VSXgateway.

n You must close all SmartConsole clients. Failure to do so may result in a databaselock error.

Syntax

vsx_util -h

vsx_util <Command> [-s <Mgmt Server>] [-u <UserName>] [-c <Name of VSXObject>] [-m <Name of VSX Cluster Member>]

Parameters

Parameter Description

-h Shows the built-in usage.

<Command> Specifies the vsx_util sub-command. See the table below.

-s <Mgmt Server> Specifies the IP address or resolvable hostname of the SecurityManagement Server, or Main Domain Management Server.

-u <UserName> Specifies the administrator username.

-c <Name of VSXObject>

Specifies the name of the VSXGateway or VSXCluster object.

-m <Name of VSXCluster Member>

Specifies the name of the VSXGateway or VSXCluster Member object.

Important - The vsx_util command requires you to enter this information:

n IP address or Hostname of the Security Management Server, orMainDomainManagement Server.

n Management Server Administrator user name and password.n The applicable VSX object, on which the command operates.n Most of the vsx_util sub-commands are interactive and require additional

user input.

Page 252: VSX R80.40 Administration Guide - InfoSec

vsx_util

VSX R80.40 Administration Guide      |      252

The 'vsx_util' sub-commands

Sub-command Description

vsx_util add_member

Adds a new Cluster Member to a VSXCluster and pushes the VSXClusterconfiguration to the new VSXCluster Member.See "vsx_util add_member" on page 254.

vsx_utilchange_interfaces

Automatically replaces designated existing interfaces with new interfaces onall Virtual Devices, to which the existing interfaces connect.See "vsx_util change_interfaces" on page 256.

vsx_utilchange_mgmt_ip

Changes the VSXManagement IP address (within the same subnet) of a VSXGateway or VSXCluster Member.See "vsx_util change_mgmt_ip" on page 259.

vsx_utilchange_mgmt_subnet

Changes (or adds) the VSXManagement IP address of a VSXGateway orVSXCluster Member to a new subnet.See "vsx_util change_mgmt_subnet" on page 260.

vsx_utilchange_private_net

Changes the IP address of the Internal Communication Network in a VSXCluster.See "vsx_util change_private_net" on page 261.

vsx_utilconvert_cluster

Converts the VSXCluster mode between High Availability (default) and VirtualSystem Load Sharing.See "vsx_util convert_cluster" on page 262.

vsx_utilreconfigure

Restores VSX configuration on a VSXGateway or VSXCluster Member.See "vsx_util reconfigure" on page 263.

vsx_utilremove_member

Removes a Cluster Member from a VSXCluster.See "vsx_util remove_member" on page 267.

vsx_util show_interfaces

Shows configuration of selected interfaces - interface types, connections toVirtual Devices, and IP addresses.See "vsx_util show_interfaces" on page 268.

vsx_utilupgrade

Upgrades the version of a VSXGateway or VSXCluster in the managementdatabase.See "vsx_util upgrade" on page 270.

vsx_util view_vs_conf

Shows configuration of a Virtual Device on the Management Server versus theVSXGateway or VSXCluster.See "vsx_util view_vs_conf" on page 271.

vsx_util vsls Shows the configuration menu for Virtual System Load Sharing - see status,redistribute, export and import configuration.See "vsx_util vsls" on page 274.

Page 253: VSX R80.40 Administration Guide - InfoSec

vsx_util

VSX R80.40 Administration Guide      |      253

Notes

n This command writes its messages to the vsx_util_YYYYMMDD_HH_MM.log file on theManagement Server:

l On a Security Management Server:

$FWDIR/log/vsx_util_YYYYMMDD_HH_MM.log

l On a Multi-Domain Server - if executed the command in the MDS context:

/opt/CPsuite-R80.40/fw1/log/vsx_util_YYYYMMDD_HH_MM.log

l On a Multi-Domain Server - if executed the command in the context of a DomainManagement Server:

/opt/CPmds-R80.40/customers/<Name of Domain ManagementServer>/CPsuite-R80.40/fw1/log/vsx_util_YYYYMMDD_HH_MM.log

n If you need to exit from the vsx_util command's menu, press the CTRL C keys.

Important - Do not press these keys, it this command already started to performa change. If you press these keys during the operation, the command does notsave its log file.

Page 254: VSX R80.40 Administration Guide - InfoSec

vsx_util add_member

VSX R80.40 Administration Guide      |      254

vsx_util add_member

Description

Adds a new Cluster Member to a VSXCluster and pushes the VSXCluster configuration to the new VSXCluster Member.

Syntax

vsx_util add_member

Required Input

n The applicable VSXCluster object.

n Name of the new VSXCluster Member.

n IP address for the management interface.

n IP address for the synchronization interface.

n The one-time Activation Key (SIC activation key)

Page 255: VSX R80.40 Administration Guide - InfoSec

vsx_util add_member

VSX R80.40 Administration Guide      |      255

Comments

n Execute the command and follow the instructions on the screen.

n After the command adds a new Cluster Member to the management database, the commandprompts you to reconfigure the new VSXCluster Member (to push the VSXCluster configuration toit).

l If you enter "y" to reconfigure the new VSXCluster Member at this time, then the "vsx_utilreconfigure" on page 263 operation starts automatically on the new VSXCluster Member.

Important - You must reboot the new VSXCluster Member after thereconfigure operation finishes.

l If you enter "n" to cancel the reconfigure operation on the new VSXCluster Member at thistime, then later you must manually run the "vsx_util reconfigure" on page 263 command forthe new VSXCluster Member.

Page 256: VSX R80.40 Administration Guide - InfoSec

vsx_util change_interfaces

VSX R80.40 Administration Guide      |      256

vsx_util change_interfaces

Description

Automatically replaces designated existing interfaces with new interfaces on all Virtual Devices, to whichthe existing interfaces connect.

This command is useful when converting a deployment to use Link Aggregation, especially where VLANsconnect to many Virtual Devices.

Syntax

vsx_util change_interfaces

Required Input

n The applicable VSXGateway or VSXCluster object.

n Where to apply the change (Management Server only, or Management Server and VSXGateway /VSXCluster Members).

n Name of the interface to be replaced.

n Name of the new (replacement) interface.

Comments

n Execute the command and follow the instructions on the screen.

n This command supports the resume feature.

n You can use this command to migrate a VSX deployment from an Open Server to a Check Pointappliance by using theManagement Only mode.

n Refer to the Notes section below for additional information.

Procedure

Step Description

1 Close all SmartConsole clients that are connected to the Security Management Server orDomain Management Servers.

2 Connect to the command line on the Management Server.

3 Log in to the Expert mode.

4 On Multi-Domain Server, go to the context of theMainDomain Management Server thatmanages the applicable VSXGateway (VSXCluster) object:

mdsenv <IP address or Name of Domain Management Server>

Page 257: VSX R80.40 Administration Guide - InfoSec

vsx_util change_interfaces

VSX R80.40 Administration Guide      |      257

Step Description

5 Run:

vsx_util change_interfaces

6 Enter the IP address of the Security Management Server or Main Domain Management Server.

7 Enter the Management Server administrator username and password.

8 Select the VSXGateway (VSXCluster) object.

9 When prompted, select one of the following options:

n Apply changes to the management database and to the VSX Gateway/Clustermembers immediatelyChanges the interface on the Management Server and on the VSXGateway (each VSXCluster Member).

n Apply changes to the management database onlyChanges the interface on the Management Server only.You must run the "vsx_util reconfigure" on page 263 command to push the updated VSXconfiguration to VSXGateways (each VSXCluster Member).

10 Select the interface to be replaced.

11 Select the new (replacement) interface.

a. You can optionally add a new interface, if you select the A new interface name option.This interface must physically exist on the VSXGateway (all VSXCluster Members).Otherwise, the operation fails.

b. At the prompt, enter the new interface name.If the new interface is a Bond interface, the interface name must match the name of theconfigured Bond interface exactly.

12 The command prompts you:

Would you like to change another interface? (y|n) [n]:

n To replace additional interfaces, enter y.n To complete the process, enter n.

13 If you selected the option Apply changes to the management database only, you can removethe old (replaced) interfaces from the management database.When prompted, enter y:

Would you like to remove the old interfaces from the database?(y|n) [n]: y

14 Reboot the VSXGateway (all VSXCluster Members).

Page 258: VSX R80.40 Administration Guide - InfoSec

vsx_util change_interfaces

VSX R80.40 Administration Guide      |      258

Notes

n The option "Apply changes to the management database and to the VSX Gateway/Clustermembers immediately" verifies connectivity between the Management Server and the VSXGateway or VSXCluster Members. In the event of a connectivity failure one of the following actionsoccur:

1. If all of the newly changed interfaces fail to establish connectivity, the process terminatesunsuccessfully.

2. If one or more interfaces successfully establish connectivity, while one or more otherinterfaces fail, you may optionally continue the process.

In this case, those interfaces for which connectivity was established successfully will bechanged.

For those interfaces that failed, you must then resolve the issue and then run the "vsx_utilreconfigure" on page 263 command to complete the process.

n If you select the option "Apply changes to the management database only", you can select one ofthese:

l Another interface from list (if any are available).

l Option to add a new interface.

Page 259: VSX R80.40 Administration Guide - InfoSec

vsx_util change_mgmt_ip

VSX R80.40 Administration Guide      |      259

vsx_util change_mgmt_ip

Description

Changes the VSXManagement IP address of a VSXGateway or VSXCluster Member.

This command changes the Management IP address within the same subnet.

For more information, see sk92425.

Syntax

vsx_util change_mgmt_ip

Required Input

n The applicable VSXCluster object.

n The applicable VSXCluster Member object.

n Newmanagement IP address.

Comments

n Execute the command and follow the instructions on the screen.

Page 260: VSX R80.40 Administration Guide - InfoSec

vsx_util change_mgmt_subnet

VSX R80.40 Administration Guide      |      260

vsx_util change_mgmt_subnet

Description

Changes the VSXManagement IP address of a VSXGateway or VSXCluster Member.

This command changes the Management IP address from the current subnet to a different subnet.

For more information, see sk92425.

Syntax

vsx_util change_mgmt_subnet

Required Input

n The applicable VSXGateway or VSXCluster object.

n Newmanagement IPv4 address.

n Newmanagement IPv4 netmask.

n Newmanagement IPv6 address.

n Newmanagement IPv6 prefix.

n New IPv4 default gateway.

n New IPv6 default gateway.

Comments

n Execute the command and follow the instructions on the screen.

n This command updated only routes that were automatically generate.

You must remove and/or change all manually created routes that use the previous managementsubnet.

n You must reboot the VSXGateway (all VSXCluster Members) after the command finishes.

Page 261: VSX R80.40 Administration Guide - InfoSec

vsx_util change_private_net

VSX R80.40 Administration Guide      |      261

vsx_util change_private_net

Description

Changes the IP address of the Internal Communication Network in a VSXCluster (cluster private network).

Syntax

vsx_util change_private_net

Required Input

n The applicable VSXCluster object.

n New IPv4 address for the cluster private network.

n New IPv4 netmask for the cluster private network.

n New IPv6 address and prefix for the cluster private network.

Comments

n Run the command and follow the instructions on the screen.

n The IP address of the Internal Communication Network must be unique.

This IP address must not be used anywhere in your environment, including the Virtual Devices onthis VSXCluster.

n The illegal IPv4 addresses are: 0.0.0.0, 127.0.0.0, and 255.255.255.255

n For IPv4 address, the network mask must be one of these:

l 255.255.224.0, or /20

l 255.255.240.0, or /21

l 255.255.252.0, or /22 (this is the default)

n For IPv6 address, the new prefix must be /80.

Page 262: VSX R80.40 Administration Guide - InfoSec

vsx_util convert_cluster

VSX R80.40 Administration Guide      |      262

vsx_util convert_cluster

Description

Converts the VSXCluster mode between High Availability (default) and Virtual System Load Sharing.

Syntax

vsx_util convert_cluster

Required Input

n The applicable VSXCluster object.

n The ClusterXL mode (case sensitive).

Comments

n Execute the command and follow the instructions on the screen.

n When you convert from Virtual System Load Sharing to High Availability:

l All Virtual Systems are Active on the same VSXCluster Member by default.

l Peer Virtual Systems are Standby on other VSXCluster Members.

n When you convert from High Availability to Virtual System Load Sharing:

l All VSXCluster Members must be in the Check Point Per Virtual System State:

a. Run the "cpconfig" on page 227 command.

b. Select the option Enable Check Point Per Virtual System State.

Page 263: VSX R80.40 Administration Guide - InfoSec

vsx_util reconfigure

VSX R80.40 Administration Guide      |      263

vsx_util reconfigure

Description

Restores VSX configuration on a VSXGateway or VSXCluster Member (for example, after you performclean install after a system failure).

Syntax

vsx_util reconfigure

Important - Before you run this command on the Management Server, you mustconfigure specific settings on the cleanly installed VSXGateway or VSXClusterMember as they were:

n IP address of Gaia management interfacen Enable IPv6 support in Gaian Configure the applicable interfaces (Bond, VLAN, and so on)n Configure kernel parameters and their values:

l $FWDIR/boot/modules/fwkern.confl $FWDIR/boot/modules/vpnkern.confl $PPKDIR/conf/simkern.conf

n Configure CoreXL:l Number of CoreXL Firewall instances (for IPv4 and IPv6) in the context ofVS0 (run the cpconfig command and select the option Check PointCoreXL)

l $FWDIR/conf/fwaffinity.conf

Required Input

n The applicable VSXGateway or VSXCluster object.

n The one-time Activation Key (SIC activation key).

Comments

n Execute the command and follow the instructions on the screen.

n The new VSXGateway or VSXCluster Member:

l Must be a new installation.

You cannot use a VSXGateway or VSXCluster Member with a previous VSX configuration.

l Must have the same hardware specifications as the original.

Most importantly, it must have at least the same number of interfaces.

l Must have the same Gaia OS configuration as the original.

Most importantly, it must have the same VSXManagement IP address.

Page 264: VSX R80.40 Administration Guide - InfoSec

vsx_util reconfigure

VSX R80.40 Administration Guide      |      264

Limitations

The reconfigure process does not restore the local configuration that was performed on VSXGateway orVSX cluster member itself (because this configuration is not stored on the Management Server).

Important - After the reconfigure process is complete and you rebooted VSXGatewayor VSX cluster member, you must manually configure these settings from scratch orfrom backed up files.

These settings and files are not restored during the reconfigure process and you must manually configurethem again:

n Any OS configuration (for example, DNS, NTP, DHCP, Dynamic Routing, DHCPRelay, and so on).

n Backup files and Gaia snapshots saved in the past on the VSXGateway or VSX cluster member.

n Any settings manually defined in various configuration files on the VSXGateway or VSX clustermember.

n Any Check Point configuration files.

Note - Some of these files do not exist by default. Some files are configured oneach VSXGateway and VSX cluster member, and some files are configured foreach Virtual System.

List of the most important files

Note - Some of these files do not exist by default. Some files are configuredon each VSXGateway and VSXCluster Member, and some files areconfigured for each Virtual System.

l $FWDIR/boot/modules/fwkern.conf

l $FWDIR/boot/modules/vpnkern.conf

l $FWDIR/conf/fwaffinity.conf

l $FWDIR/conf/fwauthd.conf

l $FWDIR/conf/local.arp

l $FWDIR/conf/discntd.if

l $FWDIR/conf/cpha_bond_ls_config.conf

l $FWDIR/conf/resctrl

l $FWDIR/conf/vsaffinity_exception.conf

l $FWDIR/database/qos_policy.C

l simkern.conf:

o In R80.20 and higher: $PPKDIR/conf/simkern.conf

o In R80.10 and lower: $PPKDIR/boot/modules/simkern.conf

Page 265: VSX R80.40 Administration Guide - InfoSec

vsx_util reconfigure

VSX R80.40 Administration Guide      |      265

l sim_aff.conf:

o In R80.20 and higher: $PPKDIR/conf/sim_aff.conf

o In R80.10 and lower: $PPKDIR/boot/modules/sim_aff.conf

l /var/ace/sdconf.rec

l /var/ace/sdopts.rec

l /var/ace/sdstatus.12

l /var/ace/securid

Page 266: VSX R80.40 Administration Guide - InfoSec

vsx_util reconfigure

VSX R80.40 Administration Guide      |      266

Example

This example shows how the VSX configuration is restored on a VSXCluster Member.

[Expert@MDS:0]# vsx_util reconfigure

******************************************************************************************* Note: the operation you are about to perform changes the information in the management ** database. Back up the database before continuing. *******************************************************************************************

Enter Security Management Server/main Domain Management Server IP address (Hit 'ENTER' for 'localhost'):192.168.3.240Enter Administrator Name: ******Enter Administrator Password: ******Select VSX gateway/cluster object name:1) VSX_Cluster

Select: 1

Select VSX member name to reconfigure:1) VSX1_192.168.3.2412) VSX2_192.168.3.242

Select: 1You are about to perform reconfigure on VSX gateway/cluster, please read sk97552.Are you sure you want to continue [y/n]? yEnter Activation Key:Retype Activation Key:

1/10 : Certificate Revocation [#######################################] 100% 00:00:012/10 : Certificate Replacement [#######################################] 100% 00:00:063/10 : Connectivity Check [#######################################] 100% 00:00:054/10 : Fetching Configuration [#######################################] 100% 00:00:025/10 : Verifying Configuration [#######################################] 100% 00:00:006/10 : Installing policy on: VSX_Cluster [#######################################] 100% 00:00:217/10 : Converting Gateway to VSX [#######################################] 100% 00:02:138/10 : Generating Activation Keys [#######################################] 100% 00:00:009/10 : Reconfiguring [#######################################] 100% 00:00:0310/10 : Pushing Configuration [#######################################] 100% 00:00:44

Database saved successfully.

===================== SUMMARY =====================---- Reconfigure gateway operation completed successfully

************************************************************IMPORTANT:

When you are managing a VSX cluster,make sure that the new reconfigured member has the same number ofIPv4, and IPv6 firewall instances as the other VSX cluster members.Run cpconfig command to show and edit CoreXL settings.

NOTE:In case of adding a new cluster member to a VSX Cluster,while using 'ClusterXL Virtual System Load Sharing'make sure to run 'vsx_util vsls' after rebooting thegateway in order for the Virtual Systems to become activeon the newly added VSX cluster member.

IMPORTANT: Please reboot the gateway

************************************************************

Logging details are available at /opt/CPmds-R80.40/customers/MyDomain_Server/CPsuite-R80.40/fw1/log/vsx_util_20190917_13_16.log

[Expert@MDS:0]#

Page 267: VSX R80.40 Administration Guide - InfoSec

vsx_util remove_member

VSX R80.40 Administration Guide      |      267

vsx_util remove_member

Description

Removes a Cluster Member from a VSXCluster.

Syntax

vsx_util remove_member

Required Input

n The applicable VSXCluster object.

n The applicable VSXCluster Member object.

Comments

n Before you run this command:

l Make sure to remove (detach) the license from the VSXCluster Member.

l Make sure to run the "cphastop" command to avoid unexpected failover from the VSXCluster Member.

l Make sure to disconnect the VSXCluster Member from all networks, except from theManagement Server.

n Execute the command and follow the instructions on the screen.

Page 268: VSX R80.40 Administration Guide - InfoSec

vsx_util show_interfaces

VSX R80.40 Administration Guide      |      268

vsx_util show_interfaces

Description

Shows configuration of selected interfaces - interface types, connections to Virtual Devices, and IPaddresses.

The command shows the information on the screen and also saves it to the interfacesconfig.csvfile in the current working directory.

Syntax

vsx_util show_interfaces

Required Input

n The applicable VSXGateway or VSXCluster object.

n Which interfaces to show:

Menu Option Description

1) All Interfaces Shows all interfaces (Physical and Warp).

2) All Physical Interfaces Shows only Physical interfaces.

3) All Warp Interfaces Shows only Warp interfaces.

4) A Specific Interface Prompts you to enter the name of the specific interface to show.Note - You cannot specify a VLAN tag as aparameter. You can, however, specify an interfaceused as a VLAN (without the tag) to see all VLAN tagsassociated with that interface. See the examplebelow.

Page 269: VSX R80.40 Administration Guide - InfoSec

vsx_util show_interfaces

VSX R80.40 Administration Guide      |      269

Example

[Expert@MGMT:0]# vsx_util show_interfacesEnter Security Management Server/main Domain Management Server IP address (Hit 'ENTER' for 'localhost'):172.16.16.240Enter Administrator Name: adminEnter Administrator Password:

Select VSX gateway/cluster object name:1) VSX_Cluster_12) VSX_Cluster_23) VSX_GW_14) VSX_GW_2

Select: 1

Which interface would you like to display?1) All Interfaces2) All Physical Interfaces3) All Warp Interfaces4) A Specific Interface

Enter your choice: 1

+-------------------+---------------------+----+-----------------------------------------------------+| Type & Interface | Virtual Device Name |VSID| IP / Mask length |+-------------------+---------------------+----+-----------------------------------------------------+|M eth0 |VSX_Cluster_1 |0 |v4 172.16.16.98/24 v6 2001:0DB8::98/64 |+-------------------+---------------------+----+-----------------------------------------------------+|S eth1 |VSX_Cluster_1 |0 |v4 10.0.0.0/24 |+-------------------+---------------------+----+-----------------------------------------------------+|U eth2 |VS1 |1 |v4 192.0.2.2/24 v6 2001:0DB8:c::1/64 |+-------------------+---------------------+----+-----------------------------------------------------+|U eth3 |VS1 |1 |v4 192.168.3.3/24 v6 2001:0DB8:b::1/64 |+-------------------+---------------------+----+-----------------------------------------------------+|A eth4 | | | |+-------------------+---------------------+----+-----------------------------------------------------+|U eth5 |VS2 |2 |v4 10.10.10.10/24 v6 2001:0DB8:a::1/64 |+-------------------+---------------------+----+-----------------------------------------------------+|A eth6 | | | |+-------------------+---------------------+----+-----------------------------------------------------+

#Type: M - Management Interface S - Synchronization Interface# V - VLAN Interface W - Warp Interface# U - Used Interface A - Available Interface# X - Unknown Interface E - Error in Interface Properties

Logging details are available at /opt/CPsuite-R80.40/fw1/log/vsx_util_20191025_17_45.log

[Expert@MGMT:0]#[Expert@MGMT:0]# cat interfacesconfig.csvInterface Name , Type ,Virtual Device Name , VSID , IPv4 Address , IPv4 mask length, IPv6 Address, IPv6mask lengtheth0,M,VSX_Cluster_1,0,172.16.16.98,24,2001:0DB8::98,64eth1,S,VSX_Cluster_1,0,10.0.0.0,24,,eth2,U,VS1,192.0.2.2,24,2001:0DB8:c::1,64eth3,U,VS1,192.168.3.3,24,2001:0DB8:b::1,64eth4,Aeth5,U,VS2,10.10.10.10,24,2001:0DB8:a::1,64eth6,A

#Type: M - Management Interface S - Synchronization Interface# V - VLAN Interface W - Warp Interface# U - Used Interface A - Available Interface# X - Unknown Interface E - Error in Interface Properties

[Expert@MGMT:0]#

Page 270: VSX R80.40 Administration Guide - InfoSec

vsx_util upgrade

VSX R80.40 Administration Guide      |      270

vsx_util upgrade

Description

Upgrades the version of a VSXGateway or VSXCluster in the management database.

Syntax

vsx_util upgrade

Required Input

n The applicable VSXGateway or VSXCluster object.

n The applicable Check Point version.

Comments

n Execute the command and follow the instructions on the screen.

n After the command finishes, you must run the "vsx_util reconfigure" on page 263 command.

Page 271: VSX R80.40 Administration Guide - InfoSec

vsx_util view_vs_conf

VSX R80.40 Administration Guide      |      271

vsx_util view_vs_conf

Description

Compares the configuration of all Virtual Devices on the Management Server and the actual configurationon the VSXGateway or VSXCluster Members.

Syntax

vsx_util view_vs_conf

Required Input

n The applicable VSXGateway or VSXCluster object.

n The applicable Virtual Device object.

Page 272: VSX R80.40 Administration Guide - InfoSec

vsx_util view_vs_conf

VSX R80.40 Administration Guide      |      272

Example

[Expert@MGMT:0]# vsx_util show_interfacesEnter Security Management Server/main Domain Management Server IP address (Hit 'ENTER' for 'localhost'):172.16.16.240Enter Administrator Name: adminEnter Administrator Password:

Select VSX gateway/cluster object name:1) VSX_Cluster_12) VSX_Cluster_23) VSX_GW4) VSX_GW_2

Select: 1

Select Virtual Device object name:1) VS12) VS23) VS34) VSX_Cluster

Select: 1

Type: Virtual System

Interfaces configuration table:

+---------------------------------------------------+-----+-------------------+|Interfaces |Mgmt |VSX GW(s) |+----------+----------------------------------------+-----+---------+---------+|Name |IP / Mask length | |mem 1 |mem2 |+----------+----------------------------------------+-----+---------+---------+|eth2 |v4 10.0.0.0/24 v6 2001:db8::abc::1/64 | V | V | V ||eth3 |v4 10.10.10.10/24 v6 2001:db8::3121/64 | V | V | V |+----------+----------------------------------------+-----+---------+---------+

Interfaces Table Legend:

V - Interface exists on the gateway and matches management information (if defined on the management).- - Interface does not exist on the gateway.N/A - Fetching Virtual Device configuration from the gateway failed.!IP - Interface exists on the gateway, but there is an IP address mismatch.!MASK - Interface exists on the gateway, but there is a Net Mask mismatch.

Routing table:

+----------------------------------------------------------+-----+-------------+|Ipv4 Routes |Mgmt |VSX GW(s) |+--------------------------+--------------------+----------+-----+------+------+|Destination / Mask Length |Gateway |Interface | |mem1 |mem2 |+--------------------------+--------------------+----------+-----+------+------+|2.2.2.0/24 | |eth2 | V | V | V ||3.3.3.0/24 | |eth3 | V | V | V |+--------------------------+--------------------+----------+-----+------+------++--------------------------+--------------------+----------+-----+------+------+

+----------------------------------------------------------+-----+-------------+|Ipv6 Routes |Mgmt |VSX GW(s) |+--------------------------+--------------------+----------+-----+------+------+|Destination / Mask Length |Gateway |Interface | |mem1 |mem2 |+--------------------------+--------------------+----------+-----+------+------+|2001:db8::abc::/64 | |eth2 | V | !NH | !NH ||2001:db8:0a::/64 | |eth3 | V | !NH | !NH |

Page 273: VSX R80.40 Administration Guide - InfoSec

vsx_util view_vs_conf

VSX R80.40 Administration Guide      |      273

+--------------------------+--------------------+----------+-----+------+------+|2001:db8::1ffe:0:0:0/112 | |eth2 | - | V | V ||2001:db8::fd9a:0:1:0/112 | |eth3 | - | V | V |+--------------------------+--------------------+----------+-----+------+------+

Routing Table Legend:

V - Route exists on the gateway and matches management information (if defined on the management).- - Route does not exist on the gateway.N/A - Fetching Virtual Device configuration from the gateway failed.!NH - Route exists on the gateway, but there is a Next Hop mismatch.

Note: Routes can be created automatically on the gateways by the Operating System.Therefore, routes that appear on all gateways, but are not defined on the management,do not necessarily indicate a problem.

Logging details are available at /opt/CPsuite-R80.40/fw1/log/vsx_util_20191025_18_11.log

[Expert@MGMT:0]#

Page 274: VSX R80.40 Administration Guide - InfoSec

vsx_util vsls

VSX R80.40 Administration Guide      |      274

vsx_util vsls

Description

Shows the configuration menu for Virtual System Load Sharing - status, redistribute, export, and import ofconfiguration.

Syntax

vsx_util vsls

Required Input

n The applicable VSXCluster object.

n The applicable redistribution option.

Comments

n Execute the command and follow the instructions on the screen.

n If the command output shows "Operation not allowed. Object is not a VirtualSystem Load Sharing cluster.", then run the "vsx_util convert_cluster" on page 262command.

Example

Expert@MGMT:0]# vsx_util show_interfacesEnter Security Management Server/main Domain Management Server IP address (Hit 'ENTER' for 'localhost'):172.16.16.240Enter Administrator Name: adminEnter Administrator Password:

Select VSX gateway/cluster object name:1) VSX_Cluster_12) VSX_Cluster_23) VSX_GW_14) VSX_GW_2

Select: 1

VS Load Sharing - Menu________________________________1. Display current VS Load sharing configuration2. Distribute all Virtual Systems so that each cluster member is equally loaded3. Set all VSes active on one member4. Manually set priority and weight5. Import configuration from a file6. Export configuration to a file7. Exit

Enter redistribution option (1-7) [1]:

Page 275: VSX R80.40 Administration Guide - InfoSec

vsx_provisioning_tool

VSX R80.40 Administration Guide      |      275

vsx_provisioning_toolThis section describes the VSX Provisioning Tool (the vsx_provisioning_tool command).

Description

This tool allows the VSX administrator to add and remove Virtual Devices (Virtual Systems, Virtual Routers,Virtual Switches), interfaces and routes from the command line of a Security Management Server orDomain Management Server.

This allows the automation of the required VSXProvisioning operations in the environment.

Syntax

vsx_provisioning_tool -h

vsx_provisioning_tool [-s <Mgmt Server>] {-u <Username> | -c<Certificate>} -p <Password> -o <Commands> [-a] -L -f <Input File> [-l <Line>] [-a] -L

Parameters

Parameter Description

-h Shows the built-in usage.

-s <MgmtServer>

Specifies the Security Management Server or the applicable Domain ManagementServer.Enter the IPv4 or IPv6 address, or the resolvable hostname name.This parameter is mandatory when you run the utility:

n From a SmartConsole computern On a Multi-Domain Server.

-u<Username>

Specifies the Management Server administrator's user name.

-c <Certificate>

Specifies the path and the name for the Management Server administrator'scertificate file.

-p<Password>

Specifies the password of the:

n Management Server administratorn Certificate file

-o<Commands>

Executes the commands you enter on the command line.

Page 276: VSX R80.40 Administration Guide - InfoSec

vsx_provisioning_tool

VSX R80.40 Administration Guide      |      276

Parameter Description

-f <InputFile>

Specifies the path and the name for the file with the commands to execute.The utility treats all text begins with a hash sign (#) as a comment and ignores it.This lets you add comments on separate lines, or in-line.

-l <Line> Specifies the line number in <Input File>, from which to start to execute thecommands.You can use this "-l" parameter only together with the "-f" parameter.

-a Specifies that before the utility executes the specified commands, it must make sureit can connect to all VSXGateways.

Note - This does not guarantee that a VSXGateway can successfullyapply all the specified commands.

-L Specifies local authentication mode.

Exit Codes

ExitCode Description

0 The utility successfully applied all changes, on all VSXCluster Members.

1 The utility successfully applied all changes to the management database, but not to all VSXCluster Members.

2 The utility successfully applied all changes, but SIC communication failed to establish with atleast one VSXCluster Member.

3 Connectivity test failed with at least one VSXCluster Member (if you used the "-a"parameter).The utility did not apply changes to the management database, or to the VSXClusterMember.

4 The utility failed to apply changes (due to internal error, syntax error, or another reason).

Note - If commands are executed from a file with multiple transactions, the exit coderefers to the last transaction processed.

Example 1

Run the utility on the Security Management Server.

Execute the commands from the text /var/log/vsx.txt file.

vsx_provisioning_tool -s localhost -u admin -p mypassword -f /var/log/vsx.txt

Page 277: VSX R80.40 Administration Guide - InfoSec

vsx_provisioning_tool

VSX R80.40 Administration Guide      |      277

Example 2

Run the utility on the Multi-Domain Server in the context of the Domain Management Server calledMyDomain.

Create a new Virtual System object called VS1 on the VSXCluster object called VSXCluster1

In the new Virtual System object, on the interface eth4, add a VLAN interface with VLAN ID 100 and IPv4address 1.1.1.1/24.

mdsenv MyDomainvsx_provisioning_tool -s localhost -u admin -p mypassword -o add vd name VS1 vsx VSXCluster1, add interface name eth4.100 ip1.1.1.1/24

Page 278: VSX R80.40 Administration Guide - InfoSec

Transactions

VSX R80.40 Administration Guide      |      278

TransactionsNotes:

n A transaction is a set of operations performed on one Virtual Device.n The utility commits all operations to the management database together when

the transaction ends.If the transaction fails, the utility discards all its commands.

n You must specify the name of the Virtual Device with a parameter in the firstcommand.You do not need to specify this name again in other commands of the sametransaction.

n You cannot send operations to different Virtual Devices in one transaction.n You cannot start a new transaction until you exit the one before.n When you send commands with the "-o" parameter, you can enter multiple

commands (for example: add a Virtual System and then add interfaces androutes to it).Separate the commands with a comma ( , ).All the commands are one transaction.The "-o" parameter does not support explicit transaction commands.

n When you send commands with the "-f" parameter, you can use explicittransaction commands (see "vsx_provisioning_tool Commands" on page 279).

n Commands from a file can be one or more transactions:l If not inside a transaction, the current line is one transaction, which theutility automatically commits.You can write multiple commands in one line (as one transaction),separated with a comma ( , ).

l If currently inside a transaction, the utility processes the lines, but doesnot take action until the transaction ends.

Page 279: VSX R80.40 Administration Guide - InfoSec

vsx_provisioning_tool Commands

VSX R80.40 Administration Guide      |      279

vsx_provisioning_tool CommandsAll vsx_provisioning_tool commands are pairs of a key and a value.

The first two words in each command must appear in the correct order.

Other pairs can be written in any order.

Page 280: VSX R80.40 Administration Guide - InfoSec

Explicit Transaction Commands

VSX R80.40 Administration Guide      |      280

Explicit Transaction Commands

Operation Command Syntax

Begin a new transaction transaction begin

End a transaction transaction end

Cancel a transaction transaction cancel

Note - SIC with the Virtual System is established automatically. If it fails, operationscontinue, and the transaction returns error code 2.

Page 281: VSX R80.40 Administration Guide - InfoSec

Adding a VSX Gateway

VSX R80.40 Administration Guide      |      281

Adding a VSX Gateway

Description

This command lets you add a new VSXGateway object.

Syntax

add vsx type gateway name <Object Name> version <Version> main_ip<Main IPv4 Address> main_ip6 <Main IPv6 Address> sic_otp <ActivationKey> [rule_snmp {enable|disable}] [rule_ssh {enable|disable}] [rule_ping {enable|disable} [rule_ping6 {enable|disable}] [rule_https{enable|disable}] [rule_drop {enable|disable}]

Note - In this transaction, you can only add the set physical interface command.

Parameters

type gateway You must use the value "gateway" to add a new VSXGateway object.

name <ObjectName>

Object name Specifies the name of the VSXGateway object.You cannot use spaces of Check Point reserved words.

version<Version>

Check Pointversion

Specifies the Check Point version of the VSXGatewayobject.You must enter the exact version as appears inSmartConsole (case-sensitive).

main_ip <MainIPv4 Address>

IPv4 Address Specifies the main IPv4 Address of the VSXGatewayobject.

main_ip6 <MainIPv6 Address>

IPv6 Address Specifies the main IPv6 Address of the VSXGatewayobject.

sic_otp<ActivationKey>

SIC password You must enter the same Activation Key you enteredduring the First Time Configuration Wizard of the VSXGateway.

rule_snmp{enable |disable}

n enablen disable

Controls how to process all SNMP packets sent to the VSXGateway:

n enable - Allows all SNMP packetsn disable - Drops all SNMP packets (default)

rule_ssh{enable |disable}

n enablen disable

Controls how to process all SSH packets sent to the VSXGateway:

n enable - Allows all SSH packetsn disable - Drops all SSH packets (default)

Page 282: VSX R80.40 Administration Guide - InfoSec

Adding a VSX Gateway

VSX R80.40 Administration Guide      |      282

rule_ping{enable |disable}

n enablen disable

Controls how to process all ICMPEcho Request (ping)packets sent to the VSXGateway:

n enable - Allows all IPv4 ping packetsn disable - Drops all IPv4 ping packets (default)

rule_ping6{enable |disable}

n enablen disable

Controls how to process all ICMPv6 Echo Request (ping)packets sent to the VSXGateway:

n enable - Allows all IPv6 ping packetsn disable - Drops all IPv6 ping packets (default)

rule_https{enable |disable}

n enablen disable

Controls how to process all HTTPS packets sent to theVSXGateway:

n enable - Allows all HTTPS packetsn disable - Drops all HTTPS packets (default)

rule_drop{enable |disable}

n enablen disable

Controls how to process all packets (other than SNMP,SSH, ICMP, ICMPv6, HTTPS) sent to the VSXGateway:

n enable - Drops all other packets (default)n disable - Allows all other packets

Example

vsx_provisioning_tool -s localhost -u admin -p mypassword -o add vsx name VSX_GW1 type gateway main_ip 192.168.20.1 versionR80.40 sic_otp ABCDEFG rule_ssh enable rule_ping enable

Page 283: VSX R80.40 Administration Guide - InfoSec

Adding a VSX Cluster

VSX R80.40 Administration Guide      |      283

Adding a VSX Cluster

Description

This command lets you add a new VSXCluster object.

Syntax

add vsx type cluster name <Object Name> version <Version> main_ip<Main Virtual IPv4 Address> main_ip6 <Main Virtual IPv6 Address>cluster_type {vsls|ha|crbm} sync_if_name <Sync Interface Name> sync_netmask <Sync Interface Netmask> [rule_snmp {enable|disable}] [rule_snmp {enable|disable}] [rule_ssh {enable|disable}] [rule_ping{enable|disable} [rule_ping6 {enable|disable}] [rule_http{enable|disable}] [rule_drop {enable|disable}]

Important - You must run the "add vsx_member" command for each VSXClusterMember in the same transaction as the "add vsx" command.

Parameters

Parameter Value Notes

type cluster You must use the value "cluster" to add a newcluster object.

name <ObjectName>

Object name Specifies the name of the VSXCluster object.You cannot use spaces of Check Point reservedwords.

version <Version> Check Pointversion

Specifies the Check Point version of the VSXClusterobject.You must enter the exact version as appears inSmartConsole (case-sensitive).

main_ip <MainVirtual IPv4Address>

IPv4 Address Specifies the main IPv4 Virtual Address of the VSXCluster object.

main_ip6 <MainVirtual IPv6Address>

IPv6 Address Specifies the main IPv6 Virtual Address of the VSXCluster object.

cluster_type{vsls | ha |crbm}

Cluster type Specifies the cluster type.Enter one of these:

n vsls - Virtual System Load Sharing moden ha - High Availability moden crbm - X-Series appliances (former BlueCoat /

Crossbeam)

Page 284: VSX R80.40 Administration Guide - InfoSec

Adding a VSX Cluster

VSX R80.40 Administration Guide      |      284

Parameter Value Notes

sync_if_name<Sync InterfaceName>

Sync interfacename

Specifies the name of the Cluster Synchronizationinterface.

sync_netmask<Sync InterfaceNetmask>

IPv4 Networkmask

Specifies an IPv4 Netmask for the ClusterSynchronization interface (in a dot-quad formatX.X.X.X).

rule_snmp {enable| disable}

n enablen disable

Controls how to process all SNMP packets sent to theVSXCluster Members:

n enable - Allows all SNMP packetsn disable - Drops all SNMP packets (default)

rule_ssh {enable| disable}

n enablen disable

Controls how to process all SSH packets sent to theVSXCluster Members:

n enable - Allows all SSH packetsn disable - Drops all SSH packets (default)

rule_ping {enable| disable}

n enablen disable

Controls how to process all ICMPEcho Request (ping)packets sent to the VSXCluster Members:

n enable - Allows all IPv4 ping packetsn disable - Drops all IPv4 ping packets (default)

rule_ping6{enable |disable}

n enablen disable

Controls how to process all ICMPv6 Echo Request(ping) packets sent to the VSXCluster Members:

n enable - Allows all IPv6 ping packetsn disable - Drops all IPv6 ping packets (default)

rule_https{enable |disable}

n enablen disable

Controls how to process all HTTPS packets sent to theVSXCluster Members:

n enable - Allows all HTTPS packetsn disable - Drops all HTTPS packets (default)

rule_drop {enable| disable}

n enablen disable

Controls how to process all packets (other than SNMP,SSH, ICMP, ICMPv6, HTTPS) sent to the VSXClusterMembers:

n enable - Drops all other packets (default)n disable - Allows all other packets

Example

vsx_provisioning_tool -s localhost -u admin -p mypassword -o add vsx name VSX1 type cluster cluster_type vsls main_ip 192.168.1.1version R80.40 sync_if_name eth3 sync_netmask 255.255.255.0 rule_ssh enable rule_ping enable

Page 285: VSX R80.40 Administration Guide - InfoSec

Adding a Virtual Device

VSX R80.40 Administration Guide      |      285

Adding a Virtual Device

Description

This command lets you add a new Virtual Device object:

n Virtual System

n Virtual System in Bridge Mode

n Virtual Switch

n Virtual Router

Syntax

add vd name <Device Object Name> vsx <VSX GW or Cluster Object Name>[type {vs|vsbm|vsw|vr}] [vs_mtu <MTU>] [instances <Number of IPv4CoreXL Firewall instances>] [instances6 <Number of IPv6 CoreXLFirewall instances>] [main_ip <Main IPv4 Address>] [main_ip6 <MainIPv6 Address>] [calc_topo_auto {true | false}]

Parameters

Parameter Value Notes

name <Device ObjectName>

Object name Specifies the name of the Virtual Device object.Mandatory parameter, if this is the firstcommand in a transaction.

vsx <VSX GW or ClusterObject Name>

Parent objectname

Specifies the name of the applicable VSXGateway or VSXCluster object, in which youcreate this Virtual Device.You cannot use spaces or Check Point reservedwords.Mandatory parameter.

type {vs | vsbm | vsw |vr}

Type ofVirtualDevice

Specifies the type of the Virtual Device:

n vs - Virtual System (default)n vsbm - Virtual System in Bridge Moden vsw - Virtual Switchn vr - Virtual Router

Page 286: VSX R80.40 Administration Guide - InfoSec

Adding a Virtual Device

VSX R80.40 Administration Guide      |      286

Parameter Value Notes

vs_mtu <MTU> Integer Specifies the Global MTU value for all interfaces.This parameter is applicable only for a:

n Virtual System in Bridge Mode (typevsbm)

n Virtual Switch (type vsw)

Default is 1500 bytes.Note - For a Virtual Switch, if you donot add a VLAN or physical interface inthe same transaction, the utilityignores this value.

instances <Number ofIPv4 CoreXL Firewallinstances>

Integer Specifies the number of IPv4 CoreXL Firewallinstances.This parameter is applicable only for a:

n Virtual System (type vs)n Virtual System in Bridge Mode (type

vsbm)

Default is 1.For more information about CoreXL, see R80.40Performance Tuning Administration Guide.

instances6 <Number ofIPv6 CoreXL Firewallinstances>

Integer Specifies the number of IPv6 CoreXL Firewallinstances.This parameter is applicable only for a:

n Virtual System (type vs)n Virtual System in Bridge Mode (type

vsbm)

Default is 1.For more information about CoreXL, see R80.40Performance Tuning Administration Guide.

main_ip <Main IPv4Address>

IPv4 Address Specifies the main IPv4 Address of the VirtualDevice object.This parameter is applicable only for a:

n Virtual System (type vs)n Virtual Router (type vr)

Note - If you do not specify this valueexplicitly, the utility uses the IPv4address of the first interface added tothe new device.

Page 287: VSX R80.40 Administration Guide - InfoSec

Adding a Virtual Device

VSX R80.40 Administration Guide      |      287

Parameter Value Notes

main_ip6 <Main IPv6Address>

IPv6 Address Specifies the main IPv6 Address of the VirtualDevice object.This parameter is applicable only for a:

n Virtual System (type vs)n Virtual Router (type vr)

Note - If you do not specify this valueexplicitly, the utility uses the IPv6address of the first interface added tothe new device.

calc_topo_auto {true |false}

n truen false

Specifies how to calculate topology based onroutes:

n true - Automatically calculate topologybased on routes (default)

n false - Does not calculate topologybased on routes

This parameter is applicable only for a:

n Virtual System (type vs)n Virtual Router (type vr)

Example

vsx_provisioning_tool -s localhost -u admin -p mypassword -o add vd name VirtSwitch1 vsx VSX_GW1 type vsw

Page 288: VSX R80.40 Administration Guide - InfoSec

Deleting a Virtual Device

VSX R80.40 Administration Guide      |      288

Deleting a Virtual Device

Description

This command lets you delete a Virtual Device object:

n Virtual System

n Virtual System in Bridge Mode

n Virtual Switch

n Virtual Router

You cannot delete a Virtual Device if:

n It is referenced by a policy rule.

n It is referenced by other objects.

n It is enabled for global use in a Multi-Domain Security Management environment.

Important - After you delete a Virtual Device, you cannot have more commands in thesame transaction.

Syntax

remove vd name <Device Object Name>

Parameters

Parameter Value Notes

name <Device ObjectName>

Objectname

Specifies the name of the Virtual Device object.Mandatory parameter, if this is the first command in atransaction.

Example

vsx_provisioning_tool -s localhost -u admin -p mypassword -o remove vd name VirtSwitch1

Page 289: VSX R80.40 Administration Guide - InfoSec

Modifying Settings of a Virtual Device

VSX R80.40 Administration Guide      |      289

Modifying Settings of a Virtual Device

Description

This command lets you modify settings of an existing Virtual Device object:

n Virtual System

n Virtual System in Bridge Mode

n Virtual Switch

n Virtual Router

Syntax

set vd name <Device Object Name> [vs_mtu <MTU>] [instances <Number ofIPv4 CoreXL Firewall instances>] [instances6 <Number of IPv6 CoreXLFirewall instances>] [main_ip <Main IPv4 Address>] [main_ip6 <MainIPv6 Address>] [calc_topo_auto {true | false}]

Parameters

Parameter Value Notes

name <Device Object Name> Object name Specifies the name of the Virtual Deviceobject.Mandatory parameter, if this is the firstcommand in a transaction.

vs_mtu <MTU> Integer Specifies the Global MTU value for allinterfaces.This parameter is applicable only for a:

n Virtual System in Bridge Moden Virtual Switch

Default is 1500 bytes.

instances <Number of IPv4CoreXL Firewall instances>

Integer Specifies the number of IPv4 CoreXLFirewall instances.This parameter is applicable only for a:

n Virtual Systemn Virtual System in Bridge Mode

Default is 1.For more information about CoreXL, seeR80.40 Performance Tuning AdministrationGuide.

Page 290: VSX R80.40 Administration Guide - InfoSec

Modifying Settings of a Virtual Device

VSX R80.40 Administration Guide      |      290

Parameter Value Notes

instances6 <Number of IPv6CoreXL Firewall instances>

Integer Specifies the number of IPv6 CoreXLFirewall instances.This parameter is applicable only for a:

n Virtual Systemn Virtual System in Bridge Mode

Default is 1.For more information about CoreXL, seeR80.40 Performance Tuning AdministrationGuide.

main_ip <Main IPv4 Address> IPv4 Address Specifies the main IPv4 Address of theVirtual Device object.This parameter is applicable only for a:

n Virtual Systemn Virtual Router

Note - To remove the current IPv4address, set the value to"empty". For example: set vdname VS1 main_ip empty

main_ip6 <Main IPv6Address>

IPv6 Address Specifies the main IPv6 Address of theVirtual Device object.This parameter is applicable only for a:

n Virtual Systemn Virtual Router

Note - To remove the current IPv6address, set the value to empty.For example: set vd nameVS1 main_ip6 empty

calc_topo_auto {true |false}

n truen false

Specifies how to calculate topology basedon routes:

n true - Automatically calculatetopology based on routes (default)

n false - Does not calculate topologybased on routes

This parameter is applicable only for a:

n Virtual Systemn Virtual Router

Example

vsx_provisioning_tool -s localhost -u admin -p mypassword -o set vd name VS1 instances 8 main_ip 192.0.2.6 calc_topo_auto false

Page 291: VSX R80.40 Administration Guide - InfoSec

Adding an Interface to a Virtual Device

VSX R80.40 Administration Guide      |      291

Adding an Interface to a Virtual Device

Description

This command lets you add an interface to an existing Virtual Device object:

n Virtual System

n Virtual System in Bridge Mode

n Virtual Switch

n Virtual Router

Syntax

add interface vd <Device Object Name> {name <Interface> | leads_to<VSW or VR Object Name>} ip <IPv4 Address>{/<IPv4 Prefix Length> |netmask <IPv4 Netmask> | prefix <IPv4 Prefix>} ip6 <IPv6 Address>{/<IPv6 Prefix Length> | netmask6 <IPv6 Netmask> | prefix6 <IPv6Prefix>} [propagate {true | false}] [propagate6 {true | false}][topology {external | internal_undefined | internal_this_network |internal_specific [specific_group <Network Group Object Name>}] [mtu<MTU>]

Parameters

Parameter Value Notes

vd <DeviceObject Name>

Object name Specifies the name of the Virtual Device object.Mandatory parameter, if this is the first command in atransaction.

name<Interface>

Interface name Specifies the name of the physical or VLAN interface.

Note - You must use the "name" or "leads_to" parameter, but not both.

leads_to <VSWor VR ObjectName>

Object name Specifies the name of the Virtual Switch or Virtual Routerobject, to which this interface connects.This parameter is applicable only for a Virtual System.

Note - You must use the "name" or "leads_to" parameter, but not both.

Page 292: VSX R80.40 Administration Guide - InfoSec

Adding an Interface to a Virtual Device

VSX R80.40 Administration Guide      |      292

Parameter Value Notes

ip <IPv4Address>{/<IPv4Prefix> |netmask <IPv4Netmask> |prefix <IPv4Prefix>}

IPv4 configuration Specifies the IPv4 settings:

n <IPv4 Address> - IPv4 addressn <IPv4 Prefix> - Integer between 1 and 32n <IPv4 Netmask> - Number in a format X.X.X.X

This parameter is applicable only for a:

n Virtual Systemn Virtual Router

For interfaces on a Virtual System that connect to aVirtual Router, you must use the possible maximum forthe IPv4 address family:

n Netmask 255.255.255.255n Prefix 32

ip6 <IPv6Address>{/<IPv6Prefix> |netmask6 <IPv6Netmask> |prefix6 <IPv6Prefix>}

IPv6 configuration Specifies the IPv6 settings:

n <IPv6 Address> - IPv6 addressn <IPv6 Prefix> - Integer between 64 and 128n <IPv6 Netmask> - Number in a format

XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX

This parameter is applicable only for a:

n Virtual Systemn Virtual Router

For interfaces on a Virtual System that connect to aVirtual Router, you must use the possible maximum forthe IPv6 address family:

n NetmaskFFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF

n Prefix 128

propagate{true | false}

n truen false

Controls how to propagate the IPv4 routes to adjacentVirtual Devices:

n true - Propagate the IPv4 routesn false - Do not propagate the IPv4 routes

(default)

Note - This parameter is applicable only for aVirtual System with VLAN or physicalinterfaces.

Page 293: VSX R80.40 Administration Guide - InfoSec

Adding an Interface to a Virtual Device

VSX R80.40 Administration Guide      |      293

Parameter Value Notes

propagate6{true | false}

n truen false

Controls how to propagate the IPv6 routes to adjacentVirtual Devices:

n true - Propagate the IPv6 routesn false - Do not propagate the IPv6 routes

(default)

Note - This parameter is applicable only for aVirtual System with VLAN or physicalinterfaces.

topology{external |internal_undefined |internal_this_network |internal_specific }

n externaln internal_

undefinedn internal_

this_network

n internal_specific

Specifies the Topology configuration of the interface:

n external - External interface.n internal_undefined - Internal interface with

undefined topology. This is the default for a VirtualSystem in Bridge Mode.

n internal_this_network - Internal interface.This is the default for a Virtual System and VirtualRouter. Virtual System in Bridge Mode does notsupport this topology.

n internal_specific - Internal interface withtopology defined by the specified Network Groupobject.

This parameter is applicable only for a:

n Virtual Systemn Virtual System in Bridge Moden Virtual Router

specific_group<Network GroupObject Name>

Name of NetworkGroup Object

If you specified the "topology internal_specific" parameter, then specify the name of theNetwork Group object that contains the applicableNetwork objects.This parameter is applicable only if you disable theautomatic topology calculation.

mtu <MTU> Integer Specifies the MTU value for this interface.Default is 1500 bytes.This parameter is applicable only for a:

n Virtual Systemn Virtual Router

Example - Add VLAN interface eth4.100 with IPv4 1.1.1.1/24 to the Virtual System 'VirtSystem1'

vsx_provisioning_tool-s localhost -u admin -p mypassword -o add interface vd VirtSystem1 name eth4.100 ip 1.1.1.1/24

Page 294: VSX R80.40 Administration Guide - InfoSec

Removing an Interface from a Virtual Device

VSX R80.40 Administration Guide      |      294

Removing an Interface from a Virtual Device

Description

This command lets you remove an interface from an existing Virtual Device object:

n Virtual System

n Virtual System in Bridge Mode

n Virtual Switch

n Virtual Router

Important - If the interface you remove leads to a Virtual Router, all routes through thatinterface are removed automatically.

Note - If there are routes that have a next-hop IP address, which would becomeinaccessible without this interface, the transaction fails.

Syntax

remove interface vd <Device Object Name> {name <Interface> | leads_to<VSW or VR Object Name>}

Parameters

Parameter Value Notes

vd <Device ObjectName>

Objectname

Specifies the name of the Virtual Device object.Mandatory parameter, if this is the first command in atransaction.

name <Interface> Interfacename

Specifies the name of the physical or VLAN interface.

Note - You must use the "name" or "leads_to"parameter, but not both.

leads_to <VSW or VRObject Name>

Objectname

Specifies the name of the Virtual Switch or Virtual Routerobject, to which this interface connects.This parameter is applicable only for a Virtual System.

Note - You must use the "name" or "leads_to"parameter, but not both.

Example

vsx_provisioning_tool -s localhost -u admin -p mypassword -o remove interface vd VS1 name eth4.100

Page 295: VSX R80.40 Administration Guide - InfoSec

Modifying Settings of an Interface

VSX R80.40 Administration Guide      |      295

Modifying Settings of an Interface

Description

This command lets you modify the settings of an interface that belongs to an existing Virtual Device object:

n Virtual System

n Virtual System in Bridge Mode

n Virtual Switch

n Virtual Router

Note - You cannot change or remove the IP address or netmask of an existinginterface with this command. You can remove the interface and add a new interfacewith a different IP address, but not all the previous interface settings are kept.

Syntax

set interface vd <Device Object Name> {name <Interface> [new_name<Interface>] | leads_to <VSW or VR Object Name> [new_leads_to <VSW orVR Object Name>]} [propagate {true|false}] [propagate6 {true|false}][topology {external | internal_undefined | internal_this_network |internal_specific [specific_group <Network Group Object Name>>]}] [mtu<MTU>]

Parameters

Parameter Value Notes

vd <Device Object Name> Object name Specifies the name of the Virtual Deviceobject.Mandatory parameter, if this is the firstcommand in a transaction.

name <Interface> Interface name Specifies the name of the physical or VLANinterface.

Note - You must use the "name"or "leads_to" parameter, butnot both.

new_name <Interface> Interface name You can change the name, but not the typeof interface.

Note - You can change a VLANor physical interface only to aVLAN or physical interface.

Page 296: VSX R80.40 Administration Guide - InfoSec

Modifying Settings of an Interface

VSX R80.40 Administration Guide      |      296

Parameter Value Notes

leads_to <VSW or VRObject Name>

Object name Specifies the name of the Virtual Switch orVirtual Router object, to which thisinterface connects.This parameter is applicable only for aVirtual System.

Note - You must use the "name"or "leads_to" parameter, butnot both.

new_leads_to <VSW or VRObject Name>

Object name You can where the interface leads:

n You can change an interface thatleads to a Virtual Switch only to leadto a different Virtual Switch.

n You can change an interface thatleads to a Virtual Router only to leadto a different Virtual Router.

propagate {true | false} n truen false

Controls how to propagate the IPv4 routesto adjacent Virtual Devices:

n true - Propagate the IPv4 routesn false - Do not propagate the IPv4

routes (default)

Note - This parameter isapplicable only for a VirtualSystem with VLAN or physicalinterfaces.

propagate6 {true |false}

n truen false

Controls how to propagate the IPv6 routesto adjacent Virtual Devices:

n true - Propagate the IPv6 routesn false - Do not propagate the IPv6

routes (default)

Note - This parameter isapplicable only for a VirtualSystem with VLAN or physicalinterfaces.

Page 297: VSX R80.40 Administration Guide - InfoSec

Modifying Settings of an Interface

VSX R80.40 Administration Guide      |      297

Parameter Value Notes

topology {external |internal_undefined |internal_this_network |internal_specific }

n externaln internal_

undefinedn internal_

this_network

n internal_specific

Specifies the Topology configuration of theinterface:

n external - External interface.n internal_undefined - Internal

interface with undefined topology.This is the default for Virtual Systemin Bridge Mode.

n internal_this_network -Internal interface. This is the defaultfor Virtual System and VirtualRouter. Virtual System in BridgeMode does not support thistopology.

n internal_specific - Internalinterface with topology defined bythe specified Network Group object.

This parameter is applicable only for a:

n Virtual Systemn Virtual System in Bridge Moden Virtual Router

specific_group <NetworkGroup Object Name>

Name of NetworkGroup Object

If you specified the "topologyinternal_specific" parameter, thenspecify the name of the Network Groupobject that contains the applicable NetworkobjectsThis parameter is applicable only if youdisable the automatic topology calculation.

mtu <MTU> Integer Specifies the MTU value for this interface.Default is 1500 bytes.This parameter is applicable only for:

n Virtual Systemn Virtual Router

Example - On a Virtual System VS1, change the VLAN interface eth4.10 to the physical interface eth5

vsx_provisioning_tool -s localhost -u admin -p mypassword -o set interface vd VS1 name eth4.100 new_name eth5 propagate truetopology internal_specific specific_group NYGWs

Page 298: VSX R80.40 Administration Guide - InfoSec

Adding a Route

VSX R80.40 Administration Guide      |      298

Adding a Route

Description

This command lets you add an IPv4 or IPv6 route to an existing Virtual System or Virtual Router object.

Note - This command detects IPv4 and IPv6 automatically.

Syntax

add route vd <Device Object Name> destination {<IP Address>[/<IPPrefix>] | default | default6} [{netmask <IP Netmask> | prefix <IPPrefix>}] {next_hop <Next Hop IP Address> | leads_to <VS or VR ObjectName>} [propagate {true | false}]

Parameters

Parameter Value Notes

vd <Device ObjectName>

Object name Specifies the name of the Virtual System or Virtual Routerobject.Mandatory parameter, if this is the first command in atransaction.

destination {<IPAddress>[/<IPPrefix>] | default| default6}

See theNotescolumn onthe right

Specifies the route destination settings:

n <IP Address> - IPv4 or IPv6 addressn <IP Prefix> -

l For IPv4 - Integer between 1 and 32l For IPv6 - Integer between 64 and 128

n default - Use the default IPv4 routen default6 - Use the default IPv6 route

netmask <IPNetmask>

Number Specifies an IP Netmask:

n For IPv4 - Number in a format X.X.X.Xn For IPv6 - Number in a format

XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX

prefix <IP Prefix> Integer Specifies the IP address prefix length:

n For IPv4 - Integer between 1 and 32n For IPv6 - Integer between 64 and 128

Page 299: VSX R80.40 Administration Guide - InfoSec

Adding a Route

VSX R80.40 Administration Guide      |      299

Parameter Value Notes

next_hop <Next HopIP Address>

IP Address Specifies the IP address of the next hop of the route.Notes:

n This IP address must be on a subnet ofan existing interface.

n You must use the "next_hop" or"leads_to" parameter, but not both.

leads_to <VS or VRObject Name>

Object name Specifies the name of the Virtual System or Virtual Routerobject, which is the next hop for the configured route.

Note - You must use the "next_hop" or"leads_to" parameter, but not both.

propagate {true |false}

n truen false

Controls how to propagate the IP routes to adjacentVirtual Devices:

n true - Propagate the IP routesn false - Do not propagate the IP routes (default)

Note - The "propagate" parameter isapplicable only if you specified the "next_hop" parameter.

Example - Add route on a Virtual System VS1 that uses the default IPv4 route as a destination and VirtualRouter VR3 as a next hop

vsx_provisioning_tool -s localhost -u admin -p mypassword -o add route vd VS1 destination default leads_to VR3

Page 300: VSX R80.40 Administration Guide - InfoSec

Removing a Route

VSX R80.40 Administration Guide      |      300

Removing a Route

Description

This command lets you remove an IPv4 or IPv6 route from an existing Virtual System or Virtual Routerobject.

Note - This command detects IPv4 and IPv6 automatically.

Syntax

remove route vd <Device Object Name> destination {<IP Address>[/<IPPrefix>] | default | default6} [{netmask <IP Netmask> | prefix <IPPrefix>]

Parameters

Parameter Value Notes

vd <Device ObjectName>

Objectname

Specifies the name of the Virtual System or Virtual Routerobject.Mandatory parameter, if this is the first command in atransaction.

destination {<IPAddress>[/<IPPrefix>] | default| default6}

See theNotescolumn onthe right

Specifies the route destination settings:

n <IP Address> - IPv4 or IPv6 addressn <IP Prefix> -

l For IPv4 - Integer between 1 and 32l For IPv6 - Integer between 64 and 128

n default - Use the default IPv4 routen default6 - Use the default IPv6 route

netmask <IPNetmask>

Number Specifies an IP Netmask:

n For IPv4 - Number in a format X.X.X.Xn For IPv6 - Number in a format

XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX

prefix <IP Prefix> Integer Specifies the IP address prefix length:

n For IPv4 - Integer between 1 and 32n For IPv6 - Integer between 64 and 128

Example - Remove a route from a Virtual System VS1 that uses the default IPv6 route as a destination

vsx_provisioning_tool -s localhost -u admin -p mypassword -o remove route vd VS1 destination default6

Page 301: VSX R80.40 Administration Guide - InfoSec

Showing Virtual Device Data

VSX R80.40 Administration Guide      |      301

Showing Virtual Device Data

Description

This command lets you show the information about an existing Virtual Device object.

Syntax

show vd <Device Object Name>

Parameters

Parameter Value Notes

vd <Device ObjectName>

Name of the VirtualDevice

Specifies the name of the Virtual Deviceobject.Mandatory parameter.

Comments

n The command shows only non-automatic routes.

n The command does not show routes that are created automatically with route propagation.

n For a Virtual Router and Virtual Switch: The command does not show the wrpj interfaces (createdautomatically) that connect to Virtual Systems.

Page 302: VSX R80.40 Administration Guide - InfoSec

Script Examples

VSX R80.40 Administration Guide      |      302

Script Examples

Note - Line numbers in the left column are written only to make it easier to read thescript examples.

Example 1

Create a Virtual System connected to a Virtual Router.

Add a default route on the Virtual System that routes the traffic to the Virtual Router.

Add applicable routes on the Virtual Router to route the traffic to the Virtual System.

Line Command

1 transaction begin

2 add vd name VR1 vsx VSX1 type vr

3 add interface name eth3.100 ip 10.0.0.1/24

4 transaction end

5 transaction begin

6 add vd name VR2 vsx VSX2 type vr

7 add interface name eth3.200 ip 20.0.0.1/24

8 transaction end

9 transaction begin

10 add vd name VS1 vsx VSX1

11 add interface leads_to VR1 ip 192.168.1.1/32

12 add interface name eth4.20 ip 192.168.20.1/24 propagate true

13 add route destination default leads_to VR1

14 add route destination 192.168.40.0/25 next_hop 192.168.20.254

15 transaction end

Page 303: VSX R80.40 Administration Guide - InfoSec

Script Examples

VSX R80.40 Administration Guide      |      303

Example 2

Create a Virtual System connected to a Virtual Switch, with manual topology.

Line Command

1 transaction begin

2 add vd name VSW1 vsx VSX1 type vsw vs_mtu 1400

3 add interface name eth3.100

4 transaction end

5 transaction begin

6 add vd name VS1 vsx VSX1 calc_topo_auto false

7 add interface leads_to VSW1 ip 10.0.0.1/24 ip6 2001::1/64 topologyexternal

8 add interface name eth4.20 ip 192.168.20.1/25 ip6 2020::1/64topology internal_this_network

9 add route destination default next_hop 10.0.0.254

10 add route destination default6 next_hop 2001::254

11 transaction end

Example 3

Add CoreXL Firewall instances to the Virtual System made in the last example.

Turn on automatic calculation of topology.

Change the name of the internal interface, and decrease its MTU.

Line Command

1 transaction begin

2 set vd name VS1 instances 4 instances6 2 calc_topo_auto true

3 set interface name eth4.20 new_name eth4.21 mtu 1400

4 transaction end

Page 304: VSX R80.40 Administration Guide - InfoSec

Configuration Examples

VSX R80.40 Administration Guide      |      304

Configuration ExamplesThis section provides examples of VSX configuration.

Page 305: VSX R80.40 Administration Guide - InfoSec

Example 1: VSX Gateway managed by Security Management Server

VSX R80.40 Administration Guide      |      305

Example 1: VSX Gateway managed by SecurityManagement Server

This example shows:

n One VSXGateway with DMI management connection

n Two Virtual Systems:

l Each Virtual System connects directly to available physical interfaces on the VSXGateway

l One Virtual System is configured with the IPsec VPN Software Blade

l One Virtual System is configured with the Mobile Access Software Blade

n One Security Management Server manages both the VSXGateway and the two Virtual Systems.

Related documentation:

n R80.40 Installation and UpgradeGuide

n R80.40Gaia Administration Guide

n R80.40 SecurityManagement Administration Guide

Topology

Page 306: VSX R80.40 Administration Guide - InfoSec

Example 1: VSX Gateway managed by Security Management Server

VSX R80.40 Administration Guide      |      306

Action Plan1. Install the Security Management Server

See the R80.40 Installation and UpgradeGuide.

Step Description

1 Install a Check Point appliance or Open Server.

2 Install Gaia OS.

3 Run the Gaia First Time Configuration Wizard.These settings are specific to the Security Management Server:

a. On theManagement Connection page, select the applicable interface andconfigure the applicable IPv4 address.In our example: eth0, 10.20.30.1/24

b. On the Installation Type page, select Security Gateway and/or SecurityManagement.

c. On the Products page, select Security Management.

4 Install the applicable licenses.

5 Configure the Security Management Server:a. Connect with SmartConsole to the Security Management Server.b. Configure the applicable Management Software Blades and settings.c. Publish the SmartConsole session.

2. Install the VSX Gateway

See the R80.40 Installation and UpgradeGuide.

Step Description

1 Install a Check Point appliance or Open Server.

2 Install Gaia OS.

3 Run the Gaia First Time Configuration Wizard.These settings are specific to the VSXGateway:

a. On theManagement Connection page, select the interface for the DMImanagement connection and configure the applicable IPv4 address.In our example: eth0, 10.20.30.2/24

b. On the Internet Connection page, do not configure IP addresses on physicalinterfaces, to which your Virtual Systems connect directly.

c. On the Installation Type page, select Security Gateway and/or SecurityManagement.

d. On the Products page, select Security Gateway.e. On the Dynamically Assigned IP page, selectNo.

Page 307: VSX R80.40 Administration Guide - InfoSec

Example 1: VSX Gateway managed by Security Management Server

VSX R80.40 Administration Guide      |      307

Step Description

4 Make sure to enable the applicable physical interfaces:To enable a physical interface in Gaia Portal

a. Connect to the Gaia Portal in your web browser.In our example: https://10.20.30.2

b. ClickNetwork Management > Network Interfaces.c. In the upper left corner, click the lock icon to obtain the configuration lock.d. Select the applicable physical interface > click Edit.e. Select Enable.f. ClickOK.

To enable a physical interface in Gaia Clish, run:a. set interface <Name of Physical Interface> state onb. save config

5 Install the applicable licenses.

3. Create the VSX Gateway object in SmartConsole

See "Configuring VSX Gateways" on page 74.

Step Description

1 At the top, clickObjects > More object types > Network Object > Gateways andServers > VSX > New Gateway.

2 On the VSX Gateway General Properties (Specify the object's basic settings)page:

a. In the Enter the VSX Gateway Name field, enter the applicable name for thisobject.In our example: MyVsxGw

b. In the Enter the VSX Gateway IPv4 field, enter the same IPv4 address youconfigured during the First Time Configuration Wizard of the VSXGateway ontheManagement Connection page.In our example: 10.20.30.1/24

c. In the Enter the VSX Gateway IPv6 field, enter the same IPv6 address youconfigured during the First Time Configuration Wizard of the VSXGateway ontheManagement Connection page.

d. In the Select the VSX Gateway Version field, select the Check Point version.In our example: R80.20

e. ClickNext.

3 On the Virtual Systems Creation Templates (Select the Creation Template mostsuitable for your VSX deployment) page:

a. Select the applicable template.b. ClickNext.

Page 308: VSX R80.40 Administration Guide - InfoSec

Example 1: VSX Gateway managed by Security Management Server

VSX R80.40 Administration Guide      |      308

Step Description

4 On the VSX Gateway General Properties (Secure Internal Communication) page:a. In the Activation Key field, enter the same Activation Key you entered during

the First Time Configuration Wizard of the VSXGateway.b. In the Confirm Activation Key field, enter the same Activation Key again.c. Click Initialize.d. ClickNext.

If the Trust State field does not show Trust established, perform these steps:a. Connect to the command line on the VSXGateway.b. Make sure there is a physical connectivity between the VSXGateway and the

Management Server (for example, pings can pass).c. Run: cpconfigd. Enter the number of this option: Secure Internal Communicatione. Follow the instructions on the screen to change the Activation Key.f. On the VSX Gateway General Properties page, clickReset.g. Enter the same Activation Key you entered in the cpconfigmenu.h. Click Initialize.

5 On the VSX Gateway Interfaces (Physical Interfaces Usage) page:a. Examine the list of the interfaces - it must show all the physical interfaces on the

VSXGateway.b. If you plan to connect more than one Virtual System directly to same physical

interface, you must select VLAN Trunk for that physical interface.c. ClickNext.

6 On the Virtual Network Device Configuration (Specify the object's basic settings)page:

a. You can selectCreate a Virtual Network Device and configure the firstapplicable Virtual Network Device at this time (we recommend to do this later) -Virtual Switch or Virtual Router.

b. ClickNext.

7 On the VSX Gateway Management (Specify the management access rules) page:a. Examine the default access rules.b. Select the applicable default access rules.c. Configure the applicable source objects, if needed.d. ClickNext.

Important - These access rules apply only to the VSXGateway (context of VS0), whichis not intended to pass any "production" traffic.

8 On the VSX Gateway Creation Finalization page:a. Click Finish and wait for the operation to finish.b. Click View Report for more information.c. ClickClose.

Page 309: VSX R80.40 Administration Guide - InfoSec

Example 1: VSX Gateway managed by Security Management Server

VSX R80.40 Administration Guide      |      309

Step Description

9 Examine the VSX configuration:a. Connect to the command line on the VSXGateway.b. Log in to Gaia Clish, or Expert mode.c. Run: vsx stat -v

4. Configure the VSX Gateway object in SmartConsole

See "Working with VSX Gateways" on page 79.

Step Description

1 From the left navigation toolbar, clickGateways & Servers.

2 Open the VSXGateway object.In our example: MyVsxGw

3 Enable the applicable Software Blades.Refer to:

n sk79700 - VSX supported features on R75.40VS and aboven sk106496 - Software Blades updates on VSX R75.40VS and above

- FAQn Applicable Administration Guides on the R80.40 HomePage.

4 Configure other applicable settings.

5 ClickOK to push the updated VSXConfiguration.Click View Report for more information.

6 Install policy on the VSXGateway object:a. Click Install Policy.

The Install Policy window opens.b. In the Policy field, select the default policy for this VSXGateway

object.This policy is called: <Name of VSX Gateway object>_VSX.In our example: MyVsxGw_VSX

c. Click Install.

7 Examine the VSX configuration:a. Connect to the command line on the VSXGateway.b. Log in to Gaia Clish, or Expert mode.c. Run: vsx stat -v

5. Create the first Virtual System object in SmartConsole

See "Working with Virtual Systems" on page 84.

Page 310: VSX R80.40 Administration Guide - InfoSec

Example 1: VSX Gateway managed by Security Management Server

VSX R80.40 Administration Guide      |      310

Step Description

1 At the top, clickObjects > More object types > Network Object > Gateways andServers > VSX > New Virtual System.

2 On the VSX System General Properties (Define the object name and the hostingVSX) page:

a. In the Name field, enter the applicable name for this object.In our example: MyVs1

b. In the VSX Gateway / Cluster field, select the applicable VSXGateway object.In our example: MyVsxGw

c. You can selectOverride Creation Template (Create Custom VS), if you needto override the creation template that was used for the initial configuration of theVSXGateway.

d. ClickNext.

3 On the Virtual System Network Configuration (Define Virtual System Interfacesand Routes) page:In our example, this Virtual System connects directly to two physical interfaces on theVSXGateway.In the Interfaces section, add the "external" interface:

a. Click Add > Regular.b. In the Interface field, select the applicable physical interface.

In our example: eth1c. In the IPv4 Configuration section, enter the applicable IP Address and Net

Mask.In our example: 192.168.10.1/24You can select Propagate route to adjacent Virtual Devices (IPv4) to"advertise" this Virtual System to neighboring Virtual Devices. This enables IPv4connectivity between neighboring Virtual Devices.

d. In the IPv6 Configuration section, enter the applicable IPv6 Address andPrefix.You can select Propagate route to adjacent Virtual Devices (IPv6) to"advertise" this Virtual System to neighboring Virtual Devices. This enables IPv6connectivity between the neighboring Virtual Devices.

e. ClickOK.

Page 311: VSX R80.40 Administration Guide - InfoSec

Example 1: VSX Gateway managed by Security Management Server

VSX R80.40 Administration Guide      |      311

Step Description

In the Interfaces section, add the "internal" interface:a. Click Add > Regular.b. In the Interface field, select the applicable physical interface - this is the

"internal" interface.In our example: eth2

c. In the IPv4 Configuration section, enter the applicable IP Address and NetMask.In our example: 172.30.10.1/24You can select Propagate route to adjacent Virtual Devices (IPv4) to"advertise" this Virtual System to neighboring Virtual Devices. This enables IPv4connectivity between the neighboring Virtual Devices.

d. In the IPv6 Configuration section, enter the applicable IPv6 Address andPrefix.You can select Propagate route to adjacent Virtual Devices (IPv6) to"advertise" this Virtual System to neighboring Virtual Devices. This enables IPv6connectivity between the neighboring Virtual Devices.

e. ClickOK.In the Routes section, click Add to configure the applicable static routes and theDefault Route.ClickNext.

4 On the VSX System Creation Finalization page:a. Click Finish and wait for the operation to finish.b. Click View Report for more information.c. ClickClose.

5 Examine the VSX configuration:a. Connect to the command line on the VSXGateway.b. Log in to Gaia Clish, or Expert mode.c. Run: vsx stat -v

6. Configure the first Virtual System object in SmartConsole

See "Working with Virtual Systems" on page 84.

Step Description

1 From the left navigation toolbar, clickGateways & Servers.

2 Open the first Virtual System object.In our example: MyVs1

Page 312: VSX R80.40 Administration Guide - InfoSec

Example 1: VSX Gateway managed by Security Management Server

VSX R80.40 Administration Guide      |      312

Step Description

3 Enable the applicable Software Blades.In our example: IPsec VPN bladeRefer to:

n sk79700 - VSX supported features on R75.40VS and aboven sk106496 - Software Blades updates on VSX R75.40VS and above

- FAQn Applicable Administration Guides on the R80.40 HomePage.

4 Configure other applicable settings.

5 ClickOK to push the updated VSXConfiguration.

6 Configure and install the applicable policy on the first Virtual System object.

7 Examine the VSX configuration:a. Connect to the command line on the VSXGateway.b. Log in to Gaia Clish, or Expert mode.c. Run: vsx stat -v

7. Create the second Virtual System object in SmartConsole

See "Working with Virtual Systems" on page 84.

Step Description

1 At the top, clickObjects > More object types > Network Object > Gateways andServers > VSX > New Virtual System.

2 On the VSX System General Properties (Define the object name and the hostingVSX) page:

a. In the Name field, enter the applicable name for this object.In our example: MyVs2

b. In the VSX Gateway / Cluster field, select the applicable VSXGateway object.In our example: MyVsxGw

c. You can selectOverride Creation Template (Create Custom VS), if you needto override the creation template that was used for the initial configuration of theVSXGateway.

d. ClickNext.

Page 313: VSX R80.40 Administration Guide - InfoSec

Example 1: VSX Gateway managed by Security Management Server

VSX R80.40 Administration Guide      |      313

Step Description

3 On the Virtual System Network Configuration (Define Virtual System Interfacesand Routes) page:In our example, this Virtual System connects directly to two physical interfaces on theVSXGateway.In the Interfaces section, add the "external" interface:

a. Click Add > Regular.b. In the Interface field, select the applicable physical interface.

In our example: eth1c. In the IPv4 Configuration section, enter the applicable IP Address and Net

Mask.In our example: 192.168.20.1/24You can select Propagate route to adjacent Virtual Devices (IPv4) to"advertise" this Virtual System to neighboring Virtual Devices. This enables IPv4connectivity between Virtual Devices.

d. In the IPv6 Configuration section, enter the applicable IPv6 Address andPrefix.You can select Propagate route to adjacent Virtual Devices (IPv6) to"advertise" this Virtual System to neighboring Virtual Devices. This enables IPv6connectivity between Virtual Devices.

e. ClickOK.

In the Interfaces section, add the "internal" interface:a. Click Add > Regular.b. In the Interface field, select the applicable physical interface - this is the

"internal" interface.In our example: eth2

c. In the IPv4 Configuration section, enter the applicable IP Address and NetMask.In our example: 172.30.20.1/24You can select Propagate route to adjacent Virtual Devices (IPv4) to"advertise" this Virtual System to neighboring Virtual Devices. This enables IPv4connectivity between the neighboring Virtual Devices.

d. In the IPv6 Configuration section, enter the applicable IPv6 Address andPrefix.You can select Propagate route to adjacent Virtual Devices (IPv6) to"advertise" this Virtual System to neighboring Virtual Devices. This enables IPv6connectivity between the neighboring Virtual Devices.

e. ClickOK.In the Routes section, click Add to configure the applicable static routes and theDefault Route.ClickNext.

4 On the VSX System Creation Finalization page:a. Click Finish and wait for the operation to finish.b. Click View Report for more information.c. ClickClose.

Page 314: VSX R80.40 Administration Guide - InfoSec

Example 1: VSX Gateway managed by Security Management Server

VSX R80.40 Administration Guide      |      314

Step Description

5 Examine the VSX configuration:a. Connect to the command line on the VSXGateway.b. Log in to Gaia Clish, or Expert mode.c. Run: vsx stat -v

8. Configure the second Virtual System object in SmartConsole

See "Working with Virtual Systems" on page 84.

Step Description

1 From the left navigation toolbar, clickGateways & Servers.

2 Open the second Virtual System object.In our example: MyVs2

3 Enable the applicable Software Blades.In our example: Mobile Access bladeRefer to:

n sk79700 - VSX supported features on R75.40VS and aboven sk106496 - Software Blades updates on VSX R75.40VS and above -

FAQn Applicable Administration Guide on the R80.40 HomePage.

4 Configure other applicable settings.

5 ClickOK to push the updated VSXConfiguration.

6 Configure and install the applicable policy on the second Virtual System object.

7 Examine the VSX configuration:a. Connect to the command line on the VSXGateway.b. Log in to Gaia Clish, or Expert mode.c. Run: vsx stat -v

Page 315: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      315

Example 2: VSX Cluster managed by Multi-Domain Server

This example shows:

n One VSXCluster in High Availability

n Two VSXCluster Members with DMI management connection

n One external Virtual Switch

n Two Virtual Systems:

l External interface on each Virtual System connects directly to the Virtual Switch

l Internal interface on each Virtual System connects to the VLAN Trunk interface

l One Virtual System is configured with the IPsec VPN Software Blade

l One Virtual System is configured with the Mobile Access Software Blade

n One Multi-Domain Server:

l One Main Domain Management Server manages the objects of the VSXCluster and VirtualSwitch

l One Target Domain Management Server manages the object of the first Virtual System

l One Target Domain Management Server manages the object of the second Virtual System

Related documentation:

n R80.40 Installation and UpgradeGuide

n R80.40Gaia Administration Guide

n R80.40 SecurityManagement Administration Guide

n R80.40Multi-Domain SecurityManagement Administration Guide

Page 316: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      316

TopologyTopology of the VSX Cluster

Topology of the Virtual Systems in the cluster

Page 317: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      317

Multi-Domain Server and managed objects

Interfaces and IP addresses

Computer Interface IP Address / NetMask Description

VSXMember1

eth0 10.20.30.1/24Main Cluster VIP10.20.30.100/24

Dedicated Management Interface (DMI)

eth1 none External physical interface

wrpX 192.168.10.1/24Cluster VIP192.168.10.100/24

External warp interface on Virtual System 1Note - Interface name is generated automatically

wrpY 192.168.20.1/24VIP192.168.20.100/24

External warp interface on Virtual System 2Note - Interface name is generated automatically

eth2 none Internal physical interface - VLAN Trunk

eth2.11 172.30.10.1/24Cluster VIP172.30.10.100/24

Internal VLAN interface on Virtual System 1

eth2.22 172.30.20.1/24Cluster VIP172.30.10.100/24

Internal VLAN interface on Virtual System 2

eth3 192.168.200.1/24 Cluster Sync physical interface

Page 318: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      318

Computer Interface IP Address / NetMask Description

VSXMember2

eth0 10.20.30.2/24Cluster VIP10.20.30.100/24

Dedicated Management Interface (DMI)

eth1 none External physical interface

wrpX 192.168.10.2/24Cluster VIP192.168.10.100/24

External warp interface on Virtual System 1Note - Interface name is generated automatically

wrpY 192.168.20.2/24Cluster VIP192.168.20.100/24

External warp interface on Virtual System 2Note - Interface name is generated automatically

eth2 none Internal physical interface - VLAN Trunk

eth2.11 172.30.10.2/24Cluster VIP172.30.10.100/24

Internal VLAN interface on Virtual System 1

eth2.22 172.30.10.2/24Cluster VIP172.30.10.100/24

Internal VLAN interface on Virtual System 2

eth3 192.168.200.2/24 Cluster Sync physical interface

Multi-DomainServer

eth0 10.20.30.200/24 Leading Interface that belongs to the Multi-DomainServer

eth0:1 10.20.30.210/24 Virtual interface that belongs to the Main DomainManagement Server (DMS 1), which manages theVSXCluster and Virtual Switch

eth0:2 10.20.30.211/24 Virtual interface that belongs to the Target DomainManagement Server (DMS 2), which manages theVirtual System 1

eth0:3 10.20.30.212/24 Virtual interface that belongs to the Target DomainManagement Server (DMS 3), which manages theVirtual System 2

Action Plan

1. Install the Multi-Domain Server

See the R80.40 Installation and UpgradeGuide.

Page 319: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      319

Step Description

1 Install a Check Point appliance or Open Server.

2 Install Gaia OS.

3 Run the Gaia First Time Configuration Wizard.These settings are specific to the Multi-Domain Server:

a. On theManagement Connection page, select the applicable interface andconfigure the applicable IPv4 address.In our example: eth0, 10.20.30.200/24

b. On the first Installation Type page, selectMulti-Domain Server.c. On the second Installation Type page, select Primary Multi-Domain Server.d. On the Leading VIP Interfaces Configuration page, select the applicable

interface.In our example: eth0

4 Install the applicable licenses.

5 Configure the applicable settings:a. Connect with SmartConsole to the Multi-Domain Server.b. Configure the applicable settings.c. Publish the SmartConsole session.

2. Create the Main Domain Management Server in SmartConsole to manage the VSXCluster and Virtual Switch

Step Description

1 Connect with SmartConsole to the Multi-Domain Server.

2 Create a new Domain and Domain Server.In our example:

n Name: DMS1n IPv4: 10.20.30.210/24

3 From the left navigation panel, clickGateways & Servers.

4 Configure the Main Domain Management Server:a. Connect with SmartConsole to the Main Domain Management Server

(DMS1).b. Configure the applicable Management Software Blades and settings.c. Publish the SmartConsole session.

3. Create the Target Domain Management Server in SmartConsole to manage theVirtual System 1

Step Description

1 Connect with SmartConsole to the Multi-Domain Server.

Page 320: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      320

Step Description

2 Create a new Domain and Domain Server.In our example:

n Name: DMS2n IPv4: 10.20.30.211/24

3 From the left navigation panel, clickGateways & Servers.

4 Configure the Target Domain Management Server:a. Connect with SmartConsole to the Target Domain Management Server

(DMS2).b. Configure the applicable Management Software Blades and settings.c. Publish the SmartConsole session.

4. Create the Target Domain Management Server in SmartConsole to manage theVirtual System 2

Step Description

1 Connect with SmartConsole to the Multi-Domain Server.

2 Create a new Domain and Domain Server.In our example:

n Name: DMS3n IPv4: 10.20.30.212/24

3 From the left navigation panel, clickGateways & Servers.

4 Configure the Target Domain Management Server:a. Connect with SmartConsole to the Target Domain Management Server

(DMS3).b. Configure the applicable Management Software Blades and settings.c. Publish the SmartConsole session.

5. Install the VSX Cluster Member 1

See the R80.40 Installation and UpgradeGuide.

Step Description

1 Install a Check Point appliance or Open Server.

2 Make sure you have enough physical interfaces for your VSX topology.

3 Install Gaia OS.

Page 321: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      321

Step Description

4 Run the Gaia First Time Configuration Wizard.These settings are specific to the VSXCluster Member 1:

a. On theManagement Connection page, select the interface for the DMImanagement connection and configure the applicable IPv4 address.In our example: eth0, 10.20.30.1/24

b. On the Internet Connection page, do not configure IP addresses on physicalinterfaces, to which your Virtual Systems connect directly.

c. On the Installation Type page, select Security Gateway and/or SecurityManagement.

d. On the Products page, select Security Gateway.e. On the Dynamically Assigned IP page, selectNo.

5 Make sure to enable the applicable physical interfaces:To enable a physical interface in Gaia Portal

a. Connect to the Gaia Portal in your web browser.In our example: https://10.20.30.1

b. ClickNetwork Management > Network Interfaces.c. In the upper left corner, click the lock icon to obtain the configuration lock.d. Select the applicable physical interface > click Edit.e. Select Enable.f. ClickOK.

To enable a physical interface in Gaia Clish, run:a. set interface <Name of Physical Interface> state onb. save config

6 Install the applicable licenses.

6. Install the VSX Cluster Member 2

See the R80.40 Installation and UpgradeGuide.

Step Description

1 Install a Check Point appliance or Open Server.

2 Make sure you have enough physical interfaces for your VSX topology.

3 Install Gaia OS.

Page 322: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      322

Step Description

4 Run the Gaia First Time Configuration Wizard.These settings are specific to the VSXCluster Member 1:

a. On theManagement Connection page, select the interface for the DMImanagement connection and configure the applicable IPv4 address.In our example: eth0, 10.20.30.2/24

b. On the Internet Connection page, do not configure IP addresses on physicalinterfaces, to which your Virtual Systems connect directly.

c. On the Installation Type page, select Security Gateway and/or SecurityManagement.

d. On the Products page, select Security Gateway.e. On the Dynamically Assigned IP page, selectNo.

5 Make sure to enable the applicable physical interfaces:To enable a physical interface in Gaia Portal

a. Connect to the Gaia Portal in your web browser.In our example: https://10.20.30.2

b. ClickNetwork Management > Network Interfaces.c. In the upper left corner, click the lock icon to obtain the configuration lock.d. Select the applicable physical interface > click Edit.e. Select Enable.f. ClickOK.

To enable a physical interface in Gaia Clish, run:a. set interface <Name of Physical Interface> state onb. save config

6 Install the applicable licenses.

7. Create the VSX Cluster object with VSX Cluster Members in SmartConsole

See "Introduction to VSX Clusters" on page 125 and "Working with VSX Clusters" on page 140.

Step Description

1 Connect with SmartConsole to the Main Domain Management Server that managesthe objects of the VSXCluster and Virtual Switch.In our example: DMS1

2 At the top, clickObjects > More object types > Network Object > Gateways andServers > VSX > New Cluster.

Page 323: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      323

Step Description

3 On the VSX Cluster General Properties (Specify the object's basic settings) page:a. In the Enter the VSX Cluster Name field, enter the applicable name for this

object.In our example: MyVsxCluster

b. In the Enter the VSX Cluster IPv4 field, enter the Cluster Virtual IPv4 addressthat is configured on the Dedicated Management Interfaces (DMI).In our example: 10.20.30.100

c. In the Enter the VSX Cluster IPv6 field, enter the Cluster Virtual IPv6 addressthat is configured on the Dedicated Management Interfaces (DMI).

d. In the Select the VSX Cluster Version field, select the applicable Check Pointversion.In our example: R80.20

e. In the Select the VSX Cluster Platform field, select the applicable VSXClustermode:

n ClusterXL - see "VSX High Availability" on page 130n ClusterXL Virtual System Load Sharing - see "Virtual System Load

Sharing (VSLS)" on page 131In our example: ClusterXL

f. ClickNext.

4 On the Virtual Systems Creation Templates (Select the Creation Template mostsuitable for your VSX deployment) page:

a. Select the applicable template.b. ClickNext.

5 On the VSX Cluster Members (Define the members of this VSX Cluster) page:Add the first VSXCluster Member:

a. Click Add.b. In the Cluster Member Name field, enter the applicable name for this object.

In our example: MyVsxMember1c. In the Cluster Member IPv4 Address field, enter the IPv4 address of the

Dedicated Management Interface (DMI).In our example: eth0, 10.20.30.1

d. In the Enter the VSX Gateway IPv6 field, enter the applicable IPv6 address.e. In the Activation Key field, enter the same Activation Key you entered during

the First Time Configuration Wizard of this VSXCluster Member.f. In the Confirm Activation Key field, enter the same Activation Key again.g. Click Initialize.h. ClickOK.i. e Activation Key you entered in the cpconfigmenu.j. Click Initialize.

Page 324: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      324

Step Description

If the Trust State field does not show Trust established, perform these steps:a. Connect to the command line on the VSXCluster Member.b. Make sure there is a physical connectivity between the VSXCluster Member

and the Management Server (for example, pings can pass).c. Run: cpconfigd. Enter the number of this option: Secure Internal Communicatione. Follow the instructions on the screen to change the Activation Key.f. On the VSX Cluster General Properties page, clickReset.g. Enter the same Activation Key you entered in the cpconfigmenu.h. Click Initialize.

6 On the VSX Cluster Members (Define the members of this VSX Cluster) page:Add the second VSXCluster Member:

a. Click Add.b. In the Cluster Member Name field, enter the applicable name for this object.

In our example: MyVsxMember2c. In the Cluster Member IPv4 Address field, enter the IPv4 address of the

Dedicated Management Interface (DMI).In our example: eth0, 10.20.30.2

d. In the Enter the VSX Gateway IPv6 field, enter the applicable IPv6 address.e. In the Activation Key field, enter the same Activation Key you entered during

the First Time Configuration Wizard of this VSXCluster Member.f. In the Confirm Activation Key field, enter the same Activation Key again.g. Click Initialize.h. ClickOK.i. ClickNext.

If the Trust State field does not show Trust established, perform these steps:a. Connect to the command line on the VSXCluster Member.b. Make sure there is a physical connectivity between the VSXCluster Member

and the Management Server (for example, pings can pass).c. Run: cpconfigd. Enter the number of this option: Secure Internal Communicatione. Follow the instructions on the screen to change the Activation Key.f. On the VSX Cluster General Properties page, clickReset.g. Enter the same Activation Key you entered in the cpconfigmenu.h. Click Initialize.

7 On the VSX Cluster Interfaces (Physical Interfaces Usage) page:a. Examine the list of the interfaces - it must show all the physical interfaces on the

VSXGateway.b. If you plan to connect more than one Virtual System directly to same physical

interface, you must select VLAN Trunk for that physical interface.In our example: eth2

c. ClickNext.

Page 325: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      325

Step Description

8 On the VSX Cluster members (Synchronization Network) page:a. Select the interface that will be used for state synchronization.

In our example: eth3b. Configure the IPv4 addresses for the Sync interfaces on each VSXCluster

Member.In our example:MyVsxMember1 - 192.168.200.1 / 255.255.255.0MyVsxMember2 - 192.168.200.2 / 255.255.255.0

c. ClickNext.

9 On the Virtual Network Device Configuration (Specify the object's basic settings)page:

a. You can selectCreate a Virtual Network Device and configure the firstapplicable Virtual Network Device at this time (we recommend to do this later) -Virtual Switch or Virtual Router.

b. ClickNext.

10 On the VSX Gateway Management (Specify the management access rules) page:a. Examine the default access rules.b. Select the applicable default access rules.c. Configure the applicable source objects, if needed.d. ClickNext.

Important - These access rules apply only to the VSXGateway (context of VS0), whichis not intended to pass any "production" traffic.

11 On the VSX Gateway Creation Finalization page:a. Click Finish and wait for the operation to finish.b. Click View Report for more information.c. ClickClose.

12 Examine the VSX configuration:a. Connect to the command line on each VSXCluster Member.b. Log in to Gaia Clish, or Expert mode.c. Run: vsx stat -v

8. Configure the VSX Cluster object in SmartConsole

See "Working with VSX Clusters" on page 140.

Step Description

1 From the left navigation toolbar, clickGateways & Servers.

2 Open the VSXCluster object.In our example: MyVsxCluster

Page 326: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      326

Step Description

3 Enable the applicable Software Blades.Refer to:

n sk79700 - VSX supported features on R75.40VS and aboven sk106496 - Software Blades updates on VSX R75.40VS and above

- FAQn Applicable Administration Guides on the R80.40 HomePage.

4 Configure other applicable settings.

5 ClickOK to push the updated VSXConfiguration.Click View Report for more information.

6 Install policy on the VSXCluster object:a. Click Install Policy.b. In the Policy field, select the default policy for this VSXCluster

object.This policy is called: <Name of VSX Cluster object>_VSX.In our example: MyVsxCluster_VSX

c. Click Install.

7 Examine the VSX configuration:a. Connect to the command line on each VSXCluster Member.b. Log in to Gaia Clish, or Expert mode.c. Run: vsx stat -v

9. Create the Virtual Switch object in SmartConsole

Step Description

1 Connect with SmartConsole to the Main Domain Management Server that managesthe objects of the VSXCluster and Virtual Switch.In our example: DMS1

2 Create the Virtual Switch object:At the top, clickObjects > More object types > Network Object > Gateways andServers > VSX > New Virtual Switch.

3 On the VSX Switch General Properties (Define the object name and the hostingVSX) page:

a. In the Name field, enter the applicable name for this object.In our example: MyVsw

b. In the VSX Gateway / Cluster field, select the applicable VSXGateway or VSXCluster object.In our example: MyVsxCluster

c. ClickNext.

Page 327: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      327

Step Description

4 On the VSX Switch Network Configuration (Define Virtual Switch Interfaces)page:

a. Click Add.b. In the Interface field, select the applicable physical interface.

In our example: eth2c. ClickOK.d. ClickNext.

5 On the VSX Switch Cluster Creation Finalization page:a. Click Finish and wait for the operation to finish.b. Click View Report for more information.c. ClickClose.

6 Examine the VSX configuration:a. Connect to the command line on each VSXCluster Member.b. Log in to Gaia Clish, or Expert mode.c. Run: vsx stat -v

10. Create the first Virtual System object in SmartConsole

Step Description

1 Connect with SmartConsole to the Target Domain Management Server that managesthe object of the first Virtual System.In our example: DMS2

2 In SmartConsole, create the first Virtual System object:See"Working with Virtual Systems" on page 84.At the top, clickObjects > More object types > Network Object > Gateways andServers > VSX > New Virtual System.

3 On the VSX System General Properties (Define the object name and the hostingVSX) page:

a. In the Name field, enter the applicable name for this object.In our example: MyVs1

b. In the VSX Gateway / Cluster field, select the applicable VSXGateway or VSXCluster object.In our example: MyVsxCluster

c. You can selectOverride Creation Template (Create Custom VS), if you needto override the creation template that was used for the initial configuration of theVSXCluster object.

d. ClickNext.

Page 328: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      328

Step Description

4 On the Virtual System Network Configuration (Define Virtual System Interfacesand Routes) page:In our example, this Virtual System connects to the Virtual Switch ("external") and tothe physical VLAN Trunk interface ("internal") on the VSXCluster Members.In the Interfaces section, add the "external" interface:

a. Click Add > Leads to Virtual Switch.Add Interfacewindow opens.

b. In the Leads to field, select the Virtual Switch your created earlier.In our example: MyVsxVsw

c. In the IPv4 Configuration section, enter the applicable IP Address and NetMask.In our example: 192.168.10.1/24

d. In the IPv6 Configuration section, enter the applicable IPv6 Address andPrefix.

e. ClickOK.

In the Interfaces section, add the "internal" interface:a. Click Add > Regular.b. In the Interface field, select the applicable physical interface - this is the

"internal" interface.In our example: eth2 (that is marked as VLAN Trunk)

c. In the VLAN tag field, enter the applicable number between 2 and 4094.In our example: 11 (to configure eth2.11)

d. In the IPv4 Configuration section, enter the applicable IP Address and NetMask.In our example: 172.30.10.1/24You can select Propagate route to adjacent Virtual Devices (IPv4) to"advertise" this Virtual System to neighboring Virtual Devices. This enables IPv4connectivity between the neighboring Virtual Devices.

e. In the IPv6 Configuration section, enter the applicable IPv6 Address andPrefix.You can select Propagate route to adjacent Virtual Devices (IPv6) to"advertise" this Virtual System to neighboring Virtual Devices. This enables IPv6connectivity between the neighboring Virtual Devices.

f. ClickOK.In the Routes section, click Add to configure the applicable static routes and theDefault Route.ClickNext.

5 On the Virtual System Cluster Creation Finalization page:a. Click Finish and wait for the operation to finish.b. Click View Report for more information.c. ClickClose.

6 Examine the VSX configuration:a. Connect to the command line on each VSXCluster Member.b. Log in to Gaia Clish, or Expert mode.c. Run: vsx stat -v

Page 329: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      329

11. Configure the first Virtual System object in SmartConsole

See"Working with Virtual Systems" on page 84.

Step Description

1 From the left navigation toolbar, clickGateways & Servers.

2 Open the first Virtual System object.In our example: MyVs1

3 Enable the applicable Software Blades.In our example: IPsec VPN bladeRefer to:

n sk79700 - VSX supported features on R75.40VS and aboven sk106496 - Software Blades updates on VSX R75.40VS and above

- FAQn Applicable Administration Guides on the R80.40 HomePage.

4 Configure other applicable settings.

5 ClickOK to push the updated VSXConfiguration.

6 Configure and install the applicable policy on the first Virtual System object.

7 Examine the VSX configuration:a. Connect to the command line on each VSXCluster Member.b. Log in to Gaia Clish, or Expert mode.c. Run: vsx stat -v

12. Create the second Virtual System object in SmartConsole

Step Description

1 Connect with SmartConsole to the Target Domain Management Server that managesthe object of the first Virtual System.In our example: DMS3

2 In SmartConsole, create the first Virtual System object:See"Working with Virtual Systems" on page 84.At the top, clickObjects > More object types > Network Object > Gateways andServers > VSX > New Virtual System.

Page 330: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      330

Step Description

3 On the VSX System General Properties (Define the object name and the hostingVSX) page:

a. In the Name field, enter the applicable name for this object.In our example: MyVs2

b. In the VSX Gateway / Cluster field, select the applicable VSXGateway or VSXCluster object.In our example: MyVsxCluster

c. You can selectOverride Creation Template (Create Custom VS), if you needto override the creation template that was used for the initial configuration of theVSXCluster object.

d. ClickNext.

4 On the Virtual System Network Configuration (Define Virtual System Interfacesand Routes) page:In our example, this Virtual System connects to the Virtual Switch ("external") and tothe physical VLAN Trunk interface ("internal") on the VSXCluster Members.In the Interfaces section, add the "external" interface:

a. Click Add > Leads to Virtual Switch.b. In the Leads to field, select the Virtual Switch your created earlier.

In our example: MyVsxVswc. In the IPv4 Configuration section, enter the applicable IP Address and Net

Mask.In our example: 192.168.20.1/24

d. In the IPv6 Configuration section, enter the applicable IPv6 Address andPrefix.

e. ClickOK.

Page 331: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      331

Step Description

In the Interfaces section, add the "internal" interface:a. Click Add > Regular.b. In the Interface field, select the applicable physical interface - this is the

"internal" interface.In our example: eth2 (that is marked as VLAN Trunk)

c. In the VLAN tag field, enter the applicable number between 2 and 4094.In our example: 22 (to configure eth2.22)

d. In the IPv4 Configuration section, enter the applicable IP Address and NetMask.In our example: 172.30.20.1/24You can select Propagate route to adjacent Virtual Devices (IPv4) to"advertise" this Virtual System to neighboring Virtual Devices. This enables IPv4connectivity between the neighboring Virtual Devices.

e. In the IPv6 Configuration section, enter the applicable IPv6 Address andPrefix.You can select Propagate route to adjacent Virtual Devices (IPv6) to"advertise" this Virtual System to neighboring Virtual Devices. This enables IPv6connectivity between the neighboring Virtual Devices.

f. ClickOK.In the Routes section, click Add to configure the applicable static routes and theDefault Route.ClickNext.

5 On the Virtual System Cluster Creation Finalization page:a. Click Finish and wait for the operation to finish.b. Click View Report for more information.c. ClickClose.

6 Examine the VSX configuration:a. Connect to the command line on each VSXCluster Member.b. Log in to Gaia Clish, or Expert mode.c. Run: vsx stat -v

13. Configure the second Virtual System object in SmartConsole

See"Working with Virtual Systems" on page 84.

Step Description

1 From the left navigation toolbar, clickGateways & Servers.

2 Open the second Virtual System object.In our example: MyVs2

Page 332: VSX R80.40 Administration Guide - InfoSec

Example 2: VSX Cluster managed by Multi-Domain Server

VSX R80.40 Administration Guide      |      332

Step Description

3 Enable the applicable Software Blades.In our example: Mobile Access bladeRefer to:

n sk79700 - VSX supported features on R75.40VS and aboven sk106496 - Software Blades updates on VSX R75.40VS and above -

FAQn Applicable Administration Guides on the R80.40 HomePage.

4 Configure other applicable settings.

5 ClickOK to push the updated VSXConfiguration.

6 Configure and install the applicable policy on the second Virtual System object.

7 Examine the VSX configuration:a. Connect to the command line on each VSXCluster Member.b. Log in to Gaia Clish, or Expert mode.c. Run: vsx stat -v

Page 333: VSX R80.40 Administration Guide - InfoSec

Working with Kernel Parameters on Security Gateway

VSX R80.40 Administration Guide      |      333

Working with Kernel Parameters onSecurity GatewaySee the R80.40 Next Generation Security GatewayGuide.

Page 334: VSX R80.40 Administration Guide - InfoSec

Kernel Debug on Security Gateway

VSX R80.40 Administration Guide      |      334

Kernel Debug on Security GatewaySee the R80.40 Next Generation Security GatewayGuide.