- Products
- Learn
- Local User Groups
- Partners
- More
Call For Papers
Your Expertise, Our Stage
Ink Dragon: A Major Nation-State Campaign
Watch HereAI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
The Great Exposure Reset
AI Security Masters E4:
Introducing Cyata, Securing the Agentic AI Era
CheckMates Go:
CheckMates Fest
Hello Checkmates,
In our DC we have a VSX cluster with 95 VS running on it, we also deployed an on-prem Cloudguard that should filter the ACI traffic
At the moment 19 gateways enforce the Datacenter Objects when running the command "cpstat vsec"
vSEC Controller Status: on
Number of disconnected Data Centers: 0
Number of Data Centers: 2
Number of imported Data Center objects: 461
Number of gateways enforcing Data Center objects: 19
Also, in the " CloudGuard Controller Service Manager Menu" (vsec_controller_cli) there are only 85 VS gateways out of 95 listed
We are using Datacenter Object for all the tenants and i don't know how i can enforce the datacenter objects on more VS or what is the issue that the Datacenter Objects are enforced on only 19 GW.
The 2nd topic would be, how can I add all 95 or more gateways to the " CloudGuard Controller Service Manager Menu" list
I have opened a TAC case for this issue but there is no real progress with it, only trial-and-error solutions.
Thank you for your support
Updating the thread that we did remote session, found the root cause to be wrong configuration of the mgmt interface on the VSX, fixed it and now the issue is solved.
Thank you @Daniel_Ionut_Ba for the remote session.
What we did:
Followup on cpm.elg during policy installation and understand that /etc/fw/tmp/getVsData.sh script invocation on the vsx failed.
So we ssh the vsx gw and run it manually with bash debug:
bash -x /etc/fw/tmp/getVsData.sh
and saw that the script fails to get the mgmt interface.
That made us realize that the mgmt interface was incorrect.
Customer fixed it using clish APIs.
Once the mgmt interface on the vsx was correct, an install-policy fixed the CloudGuard Controller side.
Are you using the datacenter object in a rule on the relevant gateway/VS?
What version/JHF is the management and gateways?
As @PhoneBoy mentioned, CloudGuard Controller only propagates identities/data center object to gateways which enforce security policy rules that contains data center objects.
So the most obvious reason for the behavior you are describing is that the security policy rules that contain data center objects are not related to those gateways.
If you can share the SR number, we might be able to provide more specific answers.
Hi @avivs
Yes, I agree with you, but in this case what you describe does not apply.
I have as an usecase a VS, we are using the datacenter object in the policy, in the datcenert object some EPGs are imported but still this VS is not listed in the gateways enforcing Data Center objects list (cpsta vsec) neither in CloudGuard Controller Service Manager Menu (vsec_controller_cli)
the SR is
SR#6-0003792393
Thank you for your support
Daniel
Hi @PhoneBoy
We are using the datacenter object in all the policies for all the VSX VS (for all our clients)
The output of the command vsec_controler_cli shows 87 objects but the output of cpstat vsec shows that only 19 GW enforcing Data Center objects.
vSEC Controller Status: on
Number of disconnected Data Centers: 0
Number of Data Centers: 2
Number of imported Data Center objects: 462
Number of gateways enforcing Data Center objects: 19
on the SMS we are running R81.10 Take110
On the VSX GW R80.30 Take236
Thank you for your support
Hi @Daniel_Ionut_Ba please share with me the file $FWDIR/conf/vsec_controller_targets_data.set from your mgmt server.
Hi @Gil_Sudai, Could you please send me a private message where I can replay and send the file?
Thanks,
Daniel
Updating the thread that we did remote session, found the root cause to be wrong configuration of the mgmt interface on the VSX, fixed it and now the issue is solved.
Thank you @Daniel_Ionut_Ba for the remote session.
@Gil_Sudai thank you for your fast response and support, you guys are the best!
One small request, could you please add to this post the script for verifying the management interface and a small description, unfortunately, i have closed the ssh connection and forgot to save it? Maybe someone else might have the same issue and this can save a lot of time
Again, many tanks for your help!
Cheers!
What we did:
Followup on cpm.elg during policy installation and understand that /etc/fw/tmp/getVsData.sh script invocation on the vsx failed.
So we ssh the vsx gw and run it manually with bash debug:
bash -x /etc/fw/tmp/getVsData.sh
and saw that the script fails to get the mgmt interface.
That made us realize that the mgmt interface was incorrect.
Customer fixed it using clish APIs.
Once the mgmt interface on the vsx was correct, an install-policy fixed the CloudGuard Controller side.
Tue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesThu 19 Mar 2026 @ 11:00 AM (EDT)
Tips and Tricks 2026 #2: AI Security Challenges and SolutionsTue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesThu 19 Mar 2026 @ 11:00 AM (EDT)
Tips and Tricks 2026 #2: AI Security Challenges and SolutionsTue 24 Mar 2026 @ 04:00 PM (CET)
Maestro Masters EMEA: Hyperscale Firewall Architectures and OptimizationTue 24 Mar 2026 @ 06:00 PM (COT)
San Pedro Sula: Spark Firewall y AI-Powered Security ManagementThu 26 Mar 2026 @ 06:00 PM (COT)
Tegucigalpa: Spark Firewall y AI-Powered Security ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY