Checkpoint VSX

DOI : 10.17577/IJERTCONV5IS03022

Download Full-Text PDF Cite this Publication

Text Only Version

Checkpoint VSX

Amit Yadav1,

1M.Tech Scholar, Department of C.F.I.S, G.I.T.A.M,

Kablana, Jhajjar, MDU, Rohtak, Haryana

Abstract: Server virtualization continues at a staggering pace and with it the need to address security. Virtual environment facing problem of physical one along with the problems of it own. Virtualization creates problems of visibility, where a single host is supporting multiple VMs. Also new VMs also needed to be protected as they are brought online, as do they are being migrated from one host to another. Checkpoint security gateway virtual system is providing a solution to that problem, with its advance security and protection system.

Keywords:- VSX, Virtual device, Virtual system.

  1. INTRODUCTION

    VSX (Virtual System Extension) is a security and VPN solution for large-scale environments based on the proven security of Check Point Security Gateway. VSX provides comprehensive protection for multiple networks or VLANs within complex infrastructures. It securely connects them to shared resources such as the Internet and/or a DMZ, and allows them to safely interact with each other. VSX is supported by IPS Services, which provide up-to-date pre- emptive security.

    VSX incorporates the same patented Stateful Inspection and Software Blades technology used in the Check Point Security Gateway product line. Administrators manage VSX using a Security Management Server or a Multi-Domain Server, delivering a unified management architecture that

    supports enterprises and service providers.

    A VSX Gateway contains a complete set of virtual devices that function as physical network components, such as Security Gateway, routers, switches, interfaces, and even network cables. Centrally managed, and incorporating key network resources internally, VSX lets businesses deploy comprehensive firewall and VPN functionality, while reducing hardware investment and improving efficiency.

  2. VSX OVERVIEW

    VSX (Virtual System Extension) is a security and VPN solution for large-scale environments based on the proven security of Check Point Security Gateway. VSX provides comprehensive protection for multiple networks or VLANs within complex infrastructures. It securely connects them to shared resources such as the Internet and/or a DMZ, and allows them to safely interact with each other. VSX is supported by IPS Services, which provide up-to-date pre- emptive security.

    VSX incorporates the same patented Stateful Inspection and Software Blades technology used in the Check Point Security Gateway product line. Administrators manage VSX using a Security Management Server or a Multi-Domain Server, delivering a unified management architecture that supports enterprises and service providers.

    A VSX Gateway contains a complete set of virtual devices that function as physical network components, such as Security Gateway, routers, switches, interfaces, and even network cables. Centrally managed, and incorporating key network resources internally, VSX lets businesses deploy comprehensive firewall and VPN functionality, while reducing hardware investment and improving efficiency.

  3. VSX GLOSSARY

    VSX :-Virtual System Extension – Check Point virtual networking solution, hosted on a single computer or cluster containing virtual abstractions of Check Point Security Gateways and other network devices. These virtual devices provide the same functionality as their physical counterparts.

    VSX Gateway:-Physical server that hosts VSX virtual networks, including all virtual devices that provide the functionality of physical network devices.

    Management Server:-The Security Management Server or a Multi-Domain Security Management used by administrators to manage the VSX virtual network and its security policies.

    Virtual device:-Generic term for any VSX virtual network component.

    Virtual System:-A virtual device that provides the functionality of a physical Security Gateway with all supported Software Blades.

    Virtual System in the Bridge Mode:-A Virtual System that implements native layer-2 bridging instead of IP routing, thereby enabling deployment of Virtual Systems in an existing topology without reconfiguring the IP routing scheme.

    Virtual Switch:-A virtual device that provides the functionality of a physical switch in a VSX deployment.

    Virtual Router:-A virtual device that provides the functionality of a physical router in a VSX deployment.

    Warp Link (wrp):-A virtual interface that is created automatically in a VSX topology.

  4. HOW VSX WORKS

    Each Virtual System works as a Security Gateway, typically protecting a specified network. When packets arrive at the VSX Gateway, it sends traffic to the Virtual System protecting the destination network. The Virtual System inspects all traffic and allows or rejects it according to rules defined in the security policy.

    In order to better understand how virtual networks work, it is important to compare physical network environments with their virtual (VSX) counterparts. While physical networks consist of many hardware components, VSX virtual networks reside on a single configurable VSX Gateway or cluster that defines and protects multiple independent networks, together with their virtual components.

    1. Physical Network Topology

      The figure below shows a typical deployment with four physical Security Gateways, each protecting a separate network. Each Security Gateway is a separate, physical machine that is hard-wired to the perimeter router and its corresponding network.

    2. VSX Virtual Network Topology

    The example shows how a single VSX Gateway with four Virtual Systems protects all four networks.

    Each Virtual System in a VSX environment works as an individual Security Gateway, providing the same security and networking functionality as a physical gateway. This example also shows:

    Four Virtual Systems, each handling packet traffic to and from discrete networks.

    One Virtual Switch providing connectivity for all the Virtual Systems to the Internet router.

    "Virtual" interfaces and network cables (known as Warp Links) providing point-to-point connections between the Virtual Systems and the Virtual Switch. [1]

  5. VSX ARCHITECTURE AND CONCEPTS

A VSX Gateway is a physical machine that hosts virtual "networks", consisting of virtual devices that provide the functionality of their physical network counterparts such as: Security Gateways, routers and switches.

A VSX Gateway performs the following tasks:

  • Communicates with the management server to handle provisioning and configuration for all virtual devices

  • Manages state synchronization for High Availability and for Load Sharing in cluster deployments.

  1. The VSX Gateway

    A VSX Gateway is a physical machine that hosts virtual "networks", consisting of virtual devices that provide the functionality of their physical network counterparts such as: Security Gateways, routers and switches.

    A VSX Gateway performs the following tasks:

    • Communicates with the management server to handle provisioning and configuration for all virtual devices

    • Manages state synchronization for High Availability and for Load Sharing in cluster deployments.

    1. Management Server Connections

      A management server (Security Management Server or Multi- Domain Server) connects to the VSX Gateway and provides provisioning and configuration services for virtual devices located on the VSXGateway. You can connect the management server to the VSX Gateway using one of the following scenarios.

      • Local Connection: The management server connects directly to the VSX Gateway using a dedicated management interface.

      • Remote Connection: The management server connects remotely from an external or internal network by means of a router connected to a management interface. This method ensures segregation of management traffic from all other traffic.

        Local Management Connection

        When using a local management server (Security Management Server or Multi-Domain Security Management), all management traffic is handled by a dedicated management interface (DMI) that connects the management server with the VSX Gateway. The dedicated management interface IP address can be either private or public.

        a) Remote Management Connection

        When using a remote management server (Security Management Server or Multi-Domain Security Management), management traffic travels via an internal or external network to a VSX Gateway to the management interface. This architecture segregates management traffic from all other traffic passing through the VSX Gateway.

        Check Point recommends that remote management connections use a dedicated management interface (DMI) that connects directly to a router or switch that leads to the external network or the Internet.

        You can choose to use a non-dedicated management interface by connecting a Virtual Router or Virtual Switch to the management interface.

        When management traffic passes through a Virtual Router or Virtual Switch, you must ensure that the associated Warp

        Link IP address originates from the remote network. Furthermore, if the remote management connection arrives via the Internet, you must assign a routable, public IP address.

    2. Management Interface

    A VSX deployment can be managed using one of the following interface schemes:

    • Dedicated Management Interface (DMI): Uses a separate interface that is restricted to management traffic, such as provisioning, logging and monitoring

    • Non-Dedicated Management Interface: Uses a shared internal or external interface that also carries routine user traffic

      1. Dedicated Management Interface (DMI)

        Check Point recommends that you use a DMI for management to segregate management traffic from routine "production" traffic enhanced performance, especially for end users.

      2. Non-Dedicated Management Interface

      When configuring a non-DMI deployment, you can define remote management connections only via a Virtual Switch or Virtual Router. Remote management connects via a Virtual System are not supported.

      When using non-DMI for the following reasons:

      • Provisioning and logging may degrade user performance.

      • Non-DMI is irreversible – you cannot change a non- DMI gateway to DMI.

        o

  2. Virtual Devices

    This section describes virtual network components and their characteristics.

    1. Virtual System

      A Virtual System is a virtual security and routing domain that provides the functionality of a Security Gateway with full Firewall and VPN facilities. Multiple Virtual Systems can run concurrently on a single VSX Gateway.

      a) Virtual System Autonomy

      Each Virtual System functions as an independent entity, much in the same way as each Security Gateway is independent from other Gateways. Each Virtual System maintains its own Software Blades, interfaces, IP addresses, routing table, ARP table and dynamic routing configuration. In addition, each Virtual System maintains its own:

      • Software Blades: You can configure different Software Blades for each Virtual System to give the applicable protection to the networks.

      • State Tables: Each Virtual System contains its own kernel tables containing configuration and runtime data, such as, active connections, IPSec tunnel information, and so on.

      • Security and VPN policies: Each Virtual System enforces its own security and VPN Policies (including INSPECT code). Policies are retrieved from the management server and stored separately on the local disk and in the kernel. In a Multi-Domain Security Management

        environment, each Domain database is maintained separately on the management server as well as on the VSX Gateway.

      • Configuration Parameters: Each Virtual System maintains its own configuration, such as IPS settings, TCP/UDP time-outs, and so on. Different Virtual Systems can run in layer-2 or layer-3 mode and co-exist on the same VSX Gateway.

      • Logging Configuration: Each Virtual System maintains its own logs and performs logging according to its own rules and configuration.

    2. Virtual System in Bridge Mode

      A Virtual System in bridge mode implements native layer-2 bridging instead of IP routing. This lets you easily and transparently deploy a Virtual System in an existing network topology without reconfiguring the existing IP routing scheme.

      A typical bridge mode scenario incorporates an 802.1q compatible VLAN switch on either side of the VSX Gateway. The Virtual System interfaces do not require IP addresses and it remains transparent to the existing IP network.

      A Virtual System in the bridge mode:

      • Has the same security capabilities as a Virtual System, except for VPN and NAT

      • Simplifies virtual network management

      • Does not segment an existing virtual network

      • Requires manual topology configuration in order to enforce Anti-Spoofing

    3. Virtual Routers

      A Virtual Router is an independent routing domain within a VSX Gateway that performs the functionality of physical routers. Virtual Routers are useful for connecting multiple Virtual Systems to a shared interface, such as the interface leading to the Internet, and for routing traffic from one Virtual System to another. Virtual Routers support dynamic routing. Virtual Routers perform the following routing functions:

      • Packets arriving at the VSX Gateway through a shared interface to the designated Virtual System based on the source or destination IP address.

      • Traffic arriving from Virtual Systems directed to a shared interface or to other Virtual Systems.

      • Traffic to and from shared network resources such as a DMZ.

        As with physical routers, each Virtual Router maintains a routing table with a list of route entries describing known networks and directions on how to reach them. Depending on the deployment requirements, multiple Virtual Routers can be configured.

        To protect themselves, Virtual Routers inspect all traffic destined to, or emanating from themselves (for example, an ICMP ping to the Virtual Router IP address) based on the security policy. Traffic that is not sent to, or coming from the Virtual Router is not inspected by the Virtual Router policy and is sent to its destination.

    4. Virtual Switches

      By providing layer-2 connectivity, a Virtual Switch connects Virtual Systems and facilitates sharing a common physical interface without segmenting the existing IP network. As with

      a physical switch, each Virtual Switch maintains a forwarding table with a list of MAC addresses and their associated ports. In contrast to a Virtual Router, when sharing a physical interface via a Virtual Switch there is no need:

      • To allocate an additional subnet for IP addresses of Virtual Systems connected to the switch.

      • To manually configure the routing on the routers adjacent to the shared interface.

        You can create multiple Virtual Switches in a virtual network topology.

    5. Interfaces

    This section describes the various types of interfaces and how they are used in a VSX configuration. The principal interface types are:

    • Physical Interface

    • p>VLAN interface

    • Warp Link (including unnumbered interfaces)

      The following figure presents a simple example that illustrates how the various interface types are used in a VSX environment.

      Notes:

      • Warp Links connect the Virtual Switch to each Virtual System.

      • A Physical Interface connects the Virtual Switch to an external router leading to the Internet.

      • VLAN Interfaces connect the Virtual Systems to the VLAN Switch, via A VLAN trunk.

      • The VLAN switch connects to the protected networks.

        1. Physical Interfaces

          Physical interfaces connect a VSX Gateway to internal and external networks, as well as to the management server. There are different types of physical interfaces (four types for a VSX Cluster) used in a VSX Gateway:

      • Dedicated Management Interface: Connects the VSX Gateway to the management server when it is locally managed. If the VSX Gateway is remotely managed, then the management connection arrives via the external or internal interface.

      • External interface: Connects the VSX Gateway to the Internet or other untrusted networks.

      • Internal Interface: Connects the VSX Gateway to a protected network.

      • Synchronization Interface: Connects one VSX Gateway member to other members for state synchronization in a VSX clustering deployment.

        Additional physical interfaces can be installed and attached to any virtual device as required. A VSX Gateway can theoretically contain as many physical interfaces as permitted by gateway hardware and memory constraints.

        1. VLAN Interfaces

          Virtual Systems typically connect to protected VLAN networks using IEEE 802.1q compliant VLAN Interfaces. The networks are connected to ports on an 802.1q-compliant switch that trunks all traffic via a single physical interface to the VSX Gateway.

          VSX uses VLAN tags to direct the Ethernet frames to the specific Virtual System handling each network. VSX assigns

          a virtual VLAN interface to each VLAN tag on a specific physical interface. For Example: VLAN tag 100 on etp will be assigned a virtual interface named etp.100.

        2. Warp Links

          A Warp Link is a virtual point-to-point connection between a Virtual System and a Virtual Router or Virtual Switch. Each side of a Warp Link represents is a virtual interface with the appropriate virtual device.

          R76 VSX automatically assigns a name to each virtual interface when administrators create the link. Warp Interfaces on the Virtual System side are assigned the prefix wrp and those on the Virtual Router / Virtual Switch side are assigned the prefix wrpj. In both cases, VSX appends a unique number to the prefix to form the interface name.

          When connected to a Virtual Switch, VSX also assigns a unique MAC address to each Warp Link.

        3. Unnumbered Interfaces

          VSX lets you reduce the number of IP addresses required for a VSX network deployment when using one or more Virtual Routers. A Warp Link connected to a Virtual Router can "borrow" an existing IP address from another interface, instead of assigning a dedicated address to the interface leading to a Virtual Router. This capability is known as an Unnumbered Interface.

          The previous figure illustrates a topology using unnumbered interfaces. In this example, the external interfaces for each Virtual System are unnumbered and borrow the IP address of the internal interfaces. Unnumbered interfaces act as the next hop from the Virtual Router.

          1. Unnumbered Interface Limitations The following limitations apply to Unnumbered Interfaces:

        • Unnumbered interfaces must connect to a Virtual Router.

        • You can only "borrow" an individual interface IP address once.

        • In order to use VPN or Hide NAT, the borrowed address must be routable.

  3. VSX Management Overview

    VSX supports two Check Point management models: Security Management Server and Multi-Domain Security Management. Both models provide central configuration, management and monitoring for multiple VSX Gateways and Virtual Systems. The choice of management model depends on several factors, including:

      • The scale of the current deployment and anticipated expansion

      • Administrative requirements

      • Physical and operational requirements

      • Licensing restrictions

    You can use either management model to manage a "physical" Security Gateway together with a VSX Gateway and Virtual Systems. You can also manage VPN communities and remote connections with either model.

    Note – According to the Check Point EULA (End User License Agreement), a Security Gateway can only manage security policies for Virtual Systems belonging to a single

    legal entity. In order to manage Virtual Systems belonging to multiple legal entities, you need to deploy a Multi-Domain Security Management solution with a separate Domain Management Server for each legal entity. For more information regarding Licensing, refer to your Check Point Reseller.

    1. Security Management Server Model

      The Security Management Server model is appropriate for enterprise deployments containing many Virtual Systems. In this model, SmartDashboard connects to the VSX Gateway, which contains the Virtual Systems, and directly manages each Virtual System.

      There is a single management domain with one object database to manage virtual devices as well as other physical devices. Only one administrator at a time can use SmartDashboard to provision Virtual Switches, and configure security policies.

    2. Multi-Domain Security Management Model

      Using the Multi-Domain Security Management model, administrators centrally manage multiple independent networks, typically belonging to different Domains, divisions or branches. The Multi-Domain Server is the central management node that controls the network and security policy databases for each of these networks.

      Each Domain network is managed by a Domain Management Server, which provides the full functionality of a Security Management Server and can host multiple Virtual Systems, virtual and physical devices. The server that manages the VSX Gateway is the MainDomain Management Server. A VSX Gateway can host Virtual Systems that are managed by different Domain Management Servers.

      Using the SmartDomain Manager, you provision and configure Domains and Domain Management Servers. Each Domain Management Server uses its own SmartDashboard instance to provision and configure its Virtual Systems, virtual devices, and security policies.

    3. Management Model Comparison

      The following table summarizes the capabilities and differences between the two management models. The capacity figures shown for Multi-Domain Security Management represent estimated, practical limits that will sustain acceptable performance levels under normal conditions. Actual performance is dependent on many factors, including deployed hardware, network topology, traffic load and security requirements.

    4. Management Server Communication – SIC

    All communication between the management server and the VSX Gateway is accomplished by means of Secure Internal Communication (SIC), a certificate based channel that authenticates communication between Check Point components. The management server uses SIC for provisioning virtual devices, policy installation, logging, and status monitoring.

    SIC trust is initially established using a one-time password during configuration of the VSX Gateway or VSX cluster members. For Multi-Domain Security Management

    deployments, SIC trust is established between the Domain Management Server associated with the VSX Gateway or VSX cluster (Main Domain Management Server).

    The virtual devices establish trust in a different manner than their physical counterparts. When creating a virtual device, VSX automatically establishes SIC trust using the secure communication channel defined between the management server and the VSX Gateway. The VSX Gateway uses its management interface for Secure Internal Communication between the management server and all virtual devices.

  4. VSX Traffic Flow

    1. Overview

      A VSX Gateway processes traffic according to the following steps:

      • Context determination

      • Security enforcement

      • Forwarding to destination

    2. Context Determination

      VSX incorporates VRF (Virtual Routing and Forwarding) technology that allows creation of multiple, independent routing domains on a single VSX Gateway or VSX cluster. The independence of these routing domains makes possible the use of virtual devices with overlapping IP addresses. Each routing domain is known as a context.

      When traffic arrives at a VSX Gateway, a process known as Context Determination directs traffic to the appropriate Virtual System, Virtual Router or Virtual Switch. The context determination process depends on the virtual network topology and the connectivity of the virtual devices.

      The basic Virtual System connection scenarios are:

      • Virtual System directly connected to a physical or VLAN interface

      • Virtual System connected via a Virtual Switch

      • Virtual System connected via a Virtual Router

      1. Direct Connection to a Physical Interface

        When traffic arrives at an interface (either physical or VLAN) that directly connects to a Virtual System, the connection itself determines the context and traffic passes directly to the appropriate Virtual System via that interface. This diagram shows traffic from a physical VLAN switch that is sent to an interface on the VSX Gateway.

        VSX automatically directs traffic arriving via VLAN Interface etp.200 to Virtual System 2 according to the context defined by the VLAN ID.

      2. Connection via a Virtual Switch

        Traffic arriving via a Virtual Switch passes to the appropriate Virtual System based on the destination MAC address, as defined in the Virtual Switch forwarding table. Traffic arrives at the Virtual System via the Warp Link associated with the designated MAC address.

        If the destination MAC address does not exist in the Virtual Switch forwarding table, the traffic is broadcast over all defined Warp Links. The Virtual Switch scenario is common for inbound traffic from external networks or the Internet.

      3. Connection via a Virtual Router

      Traffic arriving via a Virtual Router passes to the appropriate Virtual System based on entries in the Virtual Router routing table. Routing may be destination-based, source-based or both. Traffic arrives to the designated Virtual System via its Warp Link.

    3. Security Enforcement

      Since each Virtual System functions as an independent Security Gateway, it maintains its own, unique security policy to protect the network behind it. The designated Virtual System inspects all traffic and allows or blocks it based on the rules contained in the security policy.

    4. Forwarding to Destination

      Each Virtual System maintains its own unique configuration and rules for processing and forwarding traffic to its final destination. This configuration also includes definitions and rules for NAT, VPN, and other advanced features.

  5. VSX Routing Concepts

    1. Routing Overview

      The traffic routing features in VSX network topologies are analogous to those available for physical networks. This section discusses several routing features and strategies as they apply to a VSX environment.

    2. Routing Between Virtual Systems

      Virtual Routers and Virtual Switches can be used to send traffic between networks located behind Virtual Systems, much in the same way as their physical counterparts.

      The figure below shows an example of how Virtual Systems, connected to a Virtual Switch and a physical VLAN switch, communicate with each other. In this example, a host in VLAN 100 sends data to a server located in VLAN 200.

      1. Traffic from the VLAN 100 host arrives at the VLAN switch, which inserts a VLAN tag and sends it to the VSX Gateway by way of a VLAN trunk.

      2. Based on its VLAN tag, the VSX Gateway assigns the traffic to the Virtual System named VS1.

      3. VS1 inspects the traffic according to its security policy and sends the traffic on to the Virtual Switch. VS1 "knows" to send the traffic to VS2 by way of the Virtual Switch, based on its routing configuration.

      4. VS2 inspects the traffic according to its security policy, inserts a VLAN tag, and sends it to back the VLAN switch.

      5. The VLAN switch sends the traffic to the server located on VLAN 200.

      1. Route Propagation

        When a Virtual System is connected to a Virtual Router or to a Virtual Switch, you can choose to propagate its routing information to adjacent virtual devices. This feature enables network nodes located behind neighboring Virtual Systems to communicate without the need for manual configuration.

        Route propagation works by automatically updating virtual device routing tables with routes leading to the appropriate Virtual Systems.

        1. Route Propagation using a Virtual Router When Virtual Systems are connected to a Virtual Router, VSX propagates routes by automatically adding entries to the routing table contained in the Virtual Router. Each entry contains a route pointing to the destination subnet using the Virtual System router-side Warp Interface (wrpj) as the next hop.

        2. Route Propagation using a Virtual Switch When Virtual Systems are connected to a Virtual Switch, VSX propagates routes by automatically adding entries to the routing table in each Virtual System. Each entry contains a route pointing to the destination subnet using the Virtual System Warp Interface (wrp) IP address.

      2. Overlapping IP Address Space

        VSX facilitates connectivity when multiple network segments share the same IP address range (IP address space). This scenario occurs when a single VSX Gateway protects several independent networks that assign IP addresses to endpoints from the same pool of IP addresses. Thus, it is feasible that more than one endpoint in a VSX environment will have the identical IP address, provided that each is located behind different Virtual System.

        Overlapping IP address space in VSX environments is possible because each Virtual System maintains its own unique state and routing tables. These tables can contain identical entries, but within different, segregated contexts. Virtual Systems use NAT to facilitate mapping internal IP addresses to one or more external IP addresses.

        The below figure demonstrates how traffic passes from the Internet to an internal network with overlapping IP address ranges, using NAT at each Virtual System.

        In this case, Network 1, Network 2, Network 3, and Network 4 all share the same network address pool, which might result in identical overlapping IP addresses. However, packets originating from or targeted to these networks are processed by their respective Virtual System using NAT to translate the original/overlapping addresses to unique routable addresses.

      3. Additional Considerations for Virtual Switch Route Propagation

      To update the topology map for each Virtual System, you still need to edit and save each Virtual System object that is connected to the Virtual Switch after enabling route propagation. You do not, however, need to manually define the topology, as this is done automatically.

      Following the topology update, you must then re-install the security policy for the affected Virtual Systems. This procedure is necessary in order to ensure that the Anti- Spoofing and VPN features work properly.

    3. Source-Based Routing

      Source-based routing allows you to create routing definitions that take precedence over ordinary, destination-based, routing decisions. This lets you route packets according to their source IP address or a combination of their source IP address and destination IP address.

      Source-based routing is useful in deployments where a single physical interface without VLAN tagging connects several protected Domain networks. All Virtual Systems are

      connected to an internal Virtual Router. The Virtual Router sends traffic to the applicable Virtual System based on the source IP address, as defined in source-based routing rules.

      1. Limitations

        • Source-based routing does not support overlapping IP addresses.

        • Anti-Spoofing protection is not effective for packets that originate from a shared internal interface, because there is no physical or logical segregation of traffic. In this case, it is recommended that you configure Anti-Spoofing protection on the router itself.

    4. NAT

      Virtual Systems support Network Address Translation (NAT), much in the same manner as a physical firewall. When a Virtual System, using either Static or Hide NAT, connects to a Virtual Router, you must propagate the affected routes to the Virtual Router. To do so, you need to first define NAT addresses for Virtual Systems connected to a Virtual Router. The NAT configuration section presents the configuration procedure for NAT on Virtual Machines.

    5. Dynamic Routing

      The virtual devices can communicate and distribute routes using dynamic routing. Each virtual device has its own routing daemon.

      Virtual Systems support:

      • OSPF

      • RIP

      • BGP

      • PIM

        Virtual Routers support:

      • OSPF

  6. VSX Clusters

A VSX cluster consists of two or more identical, interconnected VSX Gateways that ensure continuous data synchronization and transparent failover. Furthermore, Virtual System Load Sharing (VSLS) enhances throughput by distributing Virtual Systems, together with their traffic load, amongst multiple, redundant machines.

VSX supports the following cluster environments:

  • Check Point ClusterXL

  • Crossbeam X-Series Chassis

    VSX supports the following Bridge Mode solutions for ClusterXL deployments:

  • STP Bridge Mode: Provides path redundancy while preventing undesirable loops between redundant switches.

  • Active/Standby Bridge Mode: Provides full path redundancy and loop prevention, while offering seamless support for Virtual System Load Sharing and overcomes many STP limitations.

The VSX Clusters chapter provides detailed conceptual information, while the Cluster Management chapter provides detailed configuration procedures, including instructions for enabling and using all VSX clustering features. For more

about Check Point ClusterXL features and functionality see the R76 ClusterXL Administration Guide.

  1. High Availability

    VSX provides High Availability and transparent failover for VSX Gateways and/or for Virtual Systems. If the active VSX Gateway member fails, all sessions continue to run, securely and without interruption, on a standby cluster member. If an individual Virtual System fails, you can configure that Virtual System to fail over to a standby member while all other Virtual Systems continue to function on the active VSX Gateway member.

    Users need not reconnect and re-authenticate, nor do they notice that an alternate machine has taken over. The Selective Sync feature allows you to selectively activate, delay or disable cluster member synchronization.

  2. Virtual System Load Sharing (VSLS)

Load Sharing offers significant performance advantages while providing failover for individual Virtual Systems. Using multiple Gateways instead of a single gateway significantly increases performance for CPU intensive applications such as VPNs, Security servers, Policy servers, and Active Directory (LDAP).

By distributing Virtual System instances between different cluster members, the performance load is efficiently spread amongst the members. For example, active Virtual System 1 runs on member A, while active Virtual System 2 runs on member B. Standby and backup Virtual System instances are likewise distributed amongst members to maximize throughput, even in a failover scenario.

VSLS provides an excellent scalability solution, allowing administrators to add additional physical members to an existing VSLS cluster as traffic loads and performance requirements increase.

VSLS is available only in a Check Point ClusterXL environment. [2]

REFERENCES

  1. https://sc1.checkpoint.com/documents/R77/CP_R77_VSX_We bAdminGuide/html_frameset.htm?topic=documents/R77/CP_R 77_VSX_WebAdminGuide/index.

  2. https://sc1.checkpoint.com/documents/R76/CP_R76_VSX_Ad minGuide/html_frameset.htm

Leave a Reply