<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CloudGuard NGTX on VMWare ESXi in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NGTX-on-VMWare-ESXi/m-p/210663#M4708</link>
    <description>&lt;P&gt;Theoretically sure - How many users will this gateway be protecting?&lt;/P&gt;
&lt;P&gt;Note for NGTX license: NGTX cloud inspection quota is 10k files/vcore/month&lt;/P&gt;</description>
    <pubDate>Mon, 08 Apr 2024 13:37:34 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2024-04-08T13:37:34Z</dc:date>
    <item>
      <title>CloudGuard NGTX on VMWare ESXi</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NGTX-on-VMWare-ESXi/m-p/210658#M4707</link>
      <description>&lt;P&gt;HI All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;I haven't found a suitable post on the topic of Check Point Sandblast on VMWare ESXi, so here's the question.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;In the Gateway Performance Data Sheet of CloudGuard Network Security for VMWare ESXi I only find the performance data for the NGTP version.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Is it also possible to run NGTX with acceptable performance on an ESXi server?&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;For current inquiries we have an internet connection of 100Mbit available.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;If so, which ESX configuration (CPU, RAM, disk) would you recommend?&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Greetings Stefan&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2024 10:18:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NGTX-on-VMWare-ESXi/m-p/210658#M4707</guid>
      <dc:creator>smeny</dc:creator>
      <dc:date>2024-04-08T10:18:55Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NGTX on VMWare ESXi</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NGTX-on-VMWare-ESXi/m-p/210663#M4708</link>
      <description>&lt;P&gt;Theoretically sure - How many users will this gateway be protecting?&lt;/P&gt;
&lt;P&gt;Note for NGTX license: NGTX cloud inspection quota is 10k files/vcore/month&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2024 13:37:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NGTX-on-VMWare-ESXi/m-p/210663#M4708</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-04-08T13:37:34Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NGTX on VMWare ESXi</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NGTX-on-VMWare-ESXi/m-p/210747#M4711</link>
      <description>&lt;P&gt;Note that hypervisors are really, really bad at arbitrating I/O access, and ESXi isn't an exception. If you want to run a firewall in a VM, you should look into VT-d (a type of IOMMU) to pass a whole physical network card to the VM. I mostly deal with Hyper-V and bhyve lately, so I don't know exactly how this would be set up in ESXi. Specifically, this helps latency. If you can't give a whole network card to the firewall VM, stick with paravirtualized network interfaces (vmxnet3 on ESXi).&lt;/P&gt;
&lt;P&gt;For core count, it depends on the processors you use on your VM host. Ideally, you should go for fewer cores with a high turbo and high TDP, then pass some number of cores to the firewall VM. I'm not sure if there are VM-specific licenses, but for open server licenses, the license core count only controls how many cores can contribute to handling traffic. I would give it one or two more cores to ensure it has capacity to handle an interactive shell session or whatever even when fully loaded. Note that you should probably reserve a lot of capacity for this VM on the host to be sure a few other VMs going wild doesn't keep your firewall VM from getting compute time.&lt;/P&gt;
&lt;P&gt;RAM isn't restricted by license or anything. For a firewall, I would generally start at 4 GB per core plus 3 GB (so two cores would be 4+4+3 for 11 GB total). This should be fully-reserved, not whatever ESXi calls dynamic memory ballooning. You can always adjust it later after seeing the firewall under load (if 'free -h' shows swapping, add RAM; if you see lots in "Available" after a month up, you can reduce RAM).&lt;/P&gt;
&lt;P&gt;My physical firewalls mostly have 480 GB SSDs or 500 GB spinning drives. You can get away with 240 GB, you just won't have as much space for Gaia snapshots. Firewalls don't need a lot of storage performance. They only really hit their disks during boot and policy push. A set of SATA SSDs is fine, and NVMe would be wasted.&amp;nbsp;Note that ESXi snapshots are different from Gaia snapshots, and they slow storage access pretty dramatically. If you want to be able to use ESXi snapshots, you may need faster storage than you think (either a wider SATA array, or NVMe).&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2024 21:12:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NGTX-on-VMWare-ESXi/m-p/210747#M4711</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2024-04-08T21:12:55Z</dc:date>
    </item>
  </channel>
</rss>

