- Products
- Learn
- Local User Groups
- Partners
-
More
Celebrate the New Year
With CheckMates!
Value of Security
Vendor Self-Awareness
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
Mobile Security
Buyer's Guide Out Now
Important! R80 and R80.10
End Of Support around the corner (May 2021)
Hi,
With vSEC NSX do you have the possibility to select what sort of security groups etc should be visible in each CMA when running it with MDS?
When am checking all "design documents" for NSX it looks like everyone running some sort of physical gateway like an vSEC VE or an VSX. is there a reason why the NSX "gw" it self cant be used as peremeter fw?
In specific case it would be a client VRF that would be connecting to the NSX network and not Internet to say.
Regards,
Magnus
Hello Magnus, I was checking also some designs as far as I know Vsec NSX only works with east to west traffic because it is using Network Introspection, to connect to external network or other devices you need to use the Edge router of NSX o Vsec VE, the DLR can be used as Designated Instance.
Some good sites
https://blah.cloud/networks/implementing-multi-tenant-networking-platform-nsx/
http://chansblog.com/6-nsx-distributed-logical-router/
http://virtualelephant.com/2016/11/22/nsx-dlr-designated-instance/
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY