<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: In which cases would you use VSX? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25194#M5097</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alex,&lt;/P&gt;&lt;P&gt;We are an MSP, in this environment we run 4 clusters for shared environments, 1 in Hong Kong, 3 stretched in different DC's in NL.&lt;/P&gt;&lt;P&gt;they are all connected to different MPLS clouds and 1 to a Machine to Machine cloud, they all run a vs per customer and are all setup as VSLS.&lt;/P&gt;&lt;P&gt;Hardware for these are Open server, 12200 and 4600.&lt;/P&gt;&lt;P&gt;In Dedicated customer setups we have from a single 4200 with 1 VS; a 12200 with 4 VS's; 1 cluster of 12200 running 6 VS's in VSLS mode; 2 clusters of 12600's with a growing number of VS's, VSLS and at least 3 VS's running OSPF on each cluster; a pair of 13500's running 5 VS's in VSLS mode.&lt;/P&gt;&lt;P&gt;We use any combination of bonding (load-share and active/backup mode), VLAN trunking, direct interfaces and Virtual switches.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 29 Mar 2018 08:54:26 GMT</pubDate>
    <dc:creator>Maarten_Sjouw</dc:creator>
    <dc:date>2018-03-29T08:54:26Z</dc:date>
    <item>
      <title>In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25168#M5071</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="text-align: justify;"&gt;Hello everyone.&lt;BR /&gt;I would like to hear your opinion and thoughts on the following topic.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;STRONG&gt;Under which conditions the use of VSX on a cluster would really improve things? When would you prefer to use VSX over a usual setup? In other words, where is the line after which you decide "ok, this must be a VSX setup"?&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;The reason why I am thinking about this is that I cannot really see a lot of options for myself to use a VSX. I believe that in many usual cases adding VSX would just complicate things. VSX has some limitations, there are some additional things to be taken care of during operations like upgrades or migration, it should require additional hardware resources, as well as additional training of administrators.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;Of course, VSX can bring several positive effects, which could weight out everything else (cost saving, flexibility, ease of adding new firewalls). But in my opinion this would work for only very few specific cases.&amp;nbsp;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;BR /&gt;I can see two options when most probably I would use VSX:&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;/P&gt;&lt;P style="padding-left: 30px; text-align: justify;"&gt;&lt;STRONG&gt;1.&lt;/STRONG&gt; One of the cases when VSX could be preferable is when your company is a service provider and needs to support similar services for many customers. It would mean the you need to have many similar firewalls in the same data center, but they also must be separated from each other - own policies and objects, administrators, logs, etc.&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;&lt;P style="padding-left: 60px;"&gt;&lt;IMG __jive_id="62544" alt="" class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62544_vsx_1.png" style="width: 467px; height: 356px;" /&gt;&lt;/P&gt;&lt;P style="padding-left: 30px; text-align: justify;"&gt;So, many similar firewalls for different customers, separated from each other. It will help to minimize cost and time for adding a new customer to the environment.&lt;/P&gt;&lt;P style="padding-left: 30px; text-align: justify;"&gt;&lt;/P&gt;&lt;P style="padding-left: 30px; text-align: justify;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="padding-left: 30px; text-align: justify;"&gt;&lt;STRONG&gt;2.&lt;/STRONG&gt; The second case is when you are working in a quite big company which has multiple appliances for different purposes - external/perimeter firewall, VPN and mobile access appliance, internal firewall, separate firewall for server networks, etc.&lt;/P&gt;&lt;P style="padding-left: 60px;"&gt;&lt;IMG __jive_id="62543" alt="" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62543_vsx_2.png" style="max-width: 620px; height: auto;" /&gt;&lt;/P&gt;&lt;P style="padding-left: 30px; text-align: justify;"&gt;One company with multiple firewalls for different purposes. It most probably would save quite a lot of money on appliances and their support contracts and would add possibilities to create VS for new purposes without big changes.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;But would it be better to use VSX for a new VPN-only gateway for example? Or when you have only external and internal firewalls in your network? What about&amp;nbsp;when you replace your old almost end-of-life internal firewall to a new cluster and besides of that there is only a separate VPN gateway?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 16:28:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25168#M5071</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-01-24T16:28:26Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25169#M5072</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One case where I would consider using VSX is where your Perimeter Firewall (Virtual System) is configured in Bridge Mode and has no IPs on its External and Internal interfaces and your Internal Firewall is addressable.&lt;/P&gt;&lt;P&gt;Deploying systems in this configuration allows you to drop a lot of junk before it reaches system that needs to process viable traffic.&lt;/P&gt;&lt;P&gt;Additionally, you have the ability to split IPS policies between different OSes (more applicable to r77.XX), as well as dynamically adjust number of cores (instances) dedicated to protecting particular segments of your network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With R80.XX concurrent administration, the case for VSX becoming less prevalent than before, but it is still a compelling option when you protecting different entities of parent organization that sharing same hardware.&lt;/P&gt;&lt;P&gt;I would not recommend using VSX on anything smaller than 15000 series appliances where core count is sufficient to warrant it.&lt;/P&gt;&lt;P&gt;The administration overhead is definitely noticeable as are the limitations and the elevated risk of SNAFUs affecting multiple gateway instances.&lt;/P&gt;&lt;P&gt;Option of utilizing Open Platform VMs (with pre-allocated CPUs, RAM, Storage and dedicated NICs) should be weighted against that of VSX when choosing solution suitable for your organization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vladimir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 16:47:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25169#M5072</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-01-24T16:47:06Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25170#M5073</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's been love and hate relationship with VSX for over 12 years now.. Stated on Nokia IP appliances, went though Crossbeam X series, then more modern days of CP high end appliances and finishing with 40k chassis. Two fairly&amp;nbsp; sized but completely different enterprise networks - so it's case 2 so to say.&lt;/P&gt;&lt;P&gt;Upgrades used to be a big hassle. Especially in early days. But last two releases been noticeable improvement. Especially 77.30 to 80.10. Yes you're absolutely correct, planning upgrades is tougher as it may affect the whole datacenter if not all business. But in last 5 years I cannot recall a single upgrade that would have caused a major disturbance because of VSX. So in some ways it has been a "risky" win situation as you only had to upgrade one or two platforms instead of multiple clusters.&lt;/P&gt;&lt;P&gt;What's really good about VSX is ability to deploy new firewalls literally in the blink of an eye. We actually went through a fairly big network update and this part helped us heaps to save time, effort and $$$.&lt;/P&gt;&lt;P&gt;Downside is always going to be certain limitations - not all bells and whistles that are available on the latest regular gateway will be able fully available on VSX.&amp;nbsp; But then again it is getting better and better with every release.&lt;/P&gt;&lt;P&gt;Yes, you will need powerful HW to run VSX. Lots of CPU cores and memory.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Administration overhead.. I don't notice it that much after 12 years &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have only two firewalls/clusters I would probably stay away from VSX as you would not get return for your money.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 21:39:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25170#M5073</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-01-24T21:39:42Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25171#M5074</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As an MSP, we run several different setups with VSX, most are perimeter VS'es per customer. Next to that we have a few customer that run different VS'es for different functions, like Dev/test, acceptance and a Guest network. Another customer is a holding with 3 companies that use the same perimeter hardware but with a VS per company.&lt;/P&gt;&lt;P&gt;So you can really say we run all kinds of setups with VSX.&lt;/P&gt;&lt;P&gt;The biggest hassle is how you have a mix and match on the management side, when you need to move to a different version or another management server, all connected CMA's need to be moved in one go. You also need to be very aware of what you are doing here as there is a lot of different parameters that need to be adjusted during the move.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards, Maarten.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Jan 2018 08:06:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25171#M5074</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-01-26T08:06:27Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25172#M5075</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I used to work in a company that (like Maarten) hosted VSes per customer in a Datacenter. In another case, I deployed a VSX with 2 VSes because the customer had 2 separate environments (company network vs iot)&lt;/P&gt;&lt;P&gt;Another customer was hosting his own (electronics retail) website and once got DDOS'ed, which not only took down the website but the whole firewall and thus the company. He was considering migrating to VSX to be able to separate his&amp;nbsp;website&amp;nbsp;networks from the other company networks, so in case of another attack only the website's VS would go down. Never implemented due to 'other important projects' though.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Jan 2018 08:28:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25172#M5075</guid>
      <dc:creator>Philip_W1</dc:creator>
      <dc:date>2018-01-26T08:28:15Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25173#M5076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's an interesting idea - DDoS resiliency. Would it really work in that way though? Have you maybe tested it somehow?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would expect that a DDoS attack still affects performance of the whole device. In theory, if you have an appliance with 2 VSX, it could be that only cores and interfaces assigned to only one VS are fully loaded with this garbage traffic and other ones function normally. Not sure how it would affect RAM and HDD. Looks quite plausible, but I still have doubts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Jan 2018 22:46:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25173#M5076</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-01-26T22:46:55Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25174#M5077</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It would work as long as you set up CoreXL correctly and separate cores for each VS. By default in R77 all VSes would share all available cores. So it can be tricky depending on number of cores you have. Memory is not such a big issue in R80 as VSes run 64bit kernel each in own RAM space. So as long as you have enough RAM for all tenants on the box it should be ok. We've seen it in practice - not because we were ddosed but some other "unexpected" internal traffic &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Jan 2018 07:34:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25174#M5077</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-01-27T07:34:23Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25175#M5078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For me VSX seems to be very useful when implementing microsegmentation. You gain flexibility in building new firewalls regarding "provisioning", "installation" and "network cabeling". Such, you are able to build new firewalls for different segments or security&amp;nbsp;domains with little effort and on short notice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can stay with one hardware platform for all&amp;nbsp;different performance requirements for the gateways and balance the load via VSLS.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jan 2018 10:07:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25175#M5078</guid>
      <dc:creator>Oliver_Fink</dc:creator>
      <dc:date>2018-01-29T10:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25176#M5079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How "micro" is your microsegmentation? &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;Could you elaborate a little bit more on what segments could be in your case? Something like I mentioned in the second case for my initial message or like in this&amp;nbsp;&lt;A _jive_internal="true" class="link-titled" href="https://community.checkpoint.com/thread/6709-in-which-cases-you-would-use-vsx#comment-13301" title="https://community.checkpoint.com/thread/6709-in-which-cases-you-would-use-vsx#comment-13301"&gt;comment&lt;/A&gt;? I try to understand when you decide that one firewall could be connected to 10 networks with different purposes (users, servers, printing, VoIP, etc.) and when it must be two separate VS, for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What series of appliances you are using for VSX? Some very powerful ones, or 5000 series too?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jan 2018 13:23:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25176#M5079</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-01-29T13:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25177#M5080</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is a first step from a flat firewall infrastructure with one gateway towards micro segmentation. We did it at a customer of us, a media company. One challenge was that endpoints – mainly this of journalists – have to be considered insecure for the future – even more if the access via wlan. Such we decided to build on "external" firewall to control outgoing traffic and to be a first "wave-breaker" for incoming connections. Behind that we built 3 main firewall gateways: one data center firewall to protect the crown jewels of the customer, one dmz firewall with several zones with different kinds of services of services and one client firewall to separate different security levels of client endpoints, to host the terminal servers and to connect branch offices. Furthermore we implemented a&amp;nbsp;vpn and remote access firewall inside one of the dmzs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as I know the customer implemented one more virtual system after the end of the implementation project I was involved in. That was the plan: to gain the flexibility to do that if the need for an additional firewall gateway rises. But at the moment, I do not know what this special firewall gateway is used for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On network level we tried to suppress any routing between any network segments behind the firewalls, so we are leading all traffic through the firewalls. Traffic from the client networks has normally to pass 2 firewalls&amp;nbsp;concentrating on different key aspects, first the client firewall and after that the dc, dmz or external firewall. This enables clean policy structures for the different purposes and such reduces errors on osi layer 8.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The customer insisted&amp;nbsp;upon using open server. So we used 3 IBM/Lenovo x3650 with 16&amp;nbsp;processors&amp;nbsp;and 32 GB of RAM and several 10 GE interfaces.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2018 12:33:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25177#M5080</guid>
      <dc:creator>Oliver_Fink</dc:creator>
      <dc:date>2018-01-30T12:33:09Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25178#M5081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks for such detailed and clear response.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2018 13:16:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25178#M5081</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-01-30T13:16:22Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25179#M5082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you elaborate more on your statement : "If you have only two firewalls/clusters I would probably stay away from VSX as you would not get return for your money"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Mar 2018 02:40:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25179#M5082</guid>
      <dc:creator>Alex_Rozhko</dc:creator>
      <dc:date>2018-03-10T02:40:49Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25180#M5083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;VSX very cool term, what is the difference between VSX and built in micro-segmentation using sub-interfaces?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Mar 2018 02:46:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25180#M5083</guid>
      <dc:creator>Alex_Rozhko</dc:creator>
      <dc:date>2018-03-10T02:46:11Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25181#M5084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I meant to say if for example you had regular external and internal firewall clusters, then converting that to VSX and not adding more&amp;nbsp; virtual gateways would be wasted money and also loosing some functionality as not every feature that's available in regular gateway works in VSX. The only compelling reason I can see physical limitations of datacenter, when you cannot have 4 appliances but 2 still fit in the rackspace...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Mar 2018 06:56:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25181#M5084</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-03-10T06:56:45Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25182#M5085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;VSX allows to to have logical segregation of the Virtual Gateways. Each one of the VS' can have its own policy package administered by different people,serving different group of users and protecting different networks. Multi tenant environments are the simplest example of such utilization.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Mar 2018 14:08:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25182#M5085</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-03-10T14:08:42Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25183#M5086</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I understand, but isn't same can be accomplished with sub-interfaces?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Mar 2018 01:15:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25183#M5086</guid>
      <dc:creator>Alex_Rozhko</dc:creator>
      <dc:date>2018-03-11T01:15:15Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25184#M5087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You cannot have different policies for different sub/interfaces of single gateway or cluster. Only one policy package could be enforced on non-VSX appliance or cluster.&lt;/P&gt;&lt;P&gt;This policy package will have same administrators and thus is not suitable for multi tenant implementation or segregation by security domains.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vladimir Yakovlev &lt;/P&gt;&lt;P&gt;973.558.2738&lt;/P&gt;&lt;P&gt;vlad@eversecgroup.com&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Mar 2018 02:51:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25184#M5087</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-03-11T02:51:50Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25185#M5088</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Even if you define each sub-interface as zone? With its own spoofing, rules, etc..?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Mar 2018 04:03:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25185#M5088</guid>
      <dc:creator>Alex_Rozhko</dc:creator>
      <dc:date>2018-03-11T04:03:14Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25186#M5089</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Zones are not necessary in Check Point policies. You have different spoofing group for each interface without VSX. But you cannot install two policy packages on one logical gateway. You cannot connect one logical gateway to several domain management servers to have totally separate management databases (rules, objects, admins) for each &lt;SPAN&gt;customers/zones&lt;/SPAN&gt;. You cannot have different blades enabled/disabled for different customers/zones. You cannot have different routing tables.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is why we need VSX - we can have several logical systems on one physical device. So, you could have one VS in bridge mode with firewall doing some Geo Policies and checking traffic by IPS. You could have another VS with very strict firewall rules for one part of network, with enabled Anti-Virus, Anti-Bot, Application control blades. You can have another VS for Mobile Access blade. One VS for Customer-1 and one VS for Customer-2 separated from each other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VSX is needed&amp;nbsp;not for segmentation of just network, but for segmentation of bigger entities - functions, customers, zones (as in production traffic zone, test &lt;SPAN&gt;traffic&amp;nbsp;&lt;/SPAN&gt;zone, etc.).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Mar 2018 12:26:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25186#M5089</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-03-11T12:26:33Z</dc:date>
    </item>
    <item>
      <title>Re: In which cases would you use VSX?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25187#M5090</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would use VSX on R77.30 to use more VPN cores. Used this often on 23K or 61K systems. With R80.10 this doesn't matter any more, because it is MultiCore capable.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2018 18:16:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/In-which-cases-would-you-use-VSX/m-p/25187#M5090</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-03-12T18:16:38Z</dc:date>
    </item>
  </channel>
</rss>

