- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi @Thanux89
This few lines can generate pages as answer.
Narrow down it a little bit.
Akos
I
My ideoa: One
Please refer to my answers
What I think is I need to configure policies for the management connectivity as the current VS do not have policies for management.
VSX cluster is in different CMA and management policies are in that CMA not the CMA where the VS exists.
Ahh see. Yes you need to configure the basic rules on the top of the ruleset (MGMT access, SNMP, DNS, NTP, etc) but it depebdsz on the "GlobalSeettings", what is set there. The impled rules are allowed etc.
It can be a long story, and hard to summarize in one post 🙂
Akos
Yes, VS is referring to bond interface and having bunch of VLANs and they are /29 so the plan is using the VS IP as the cluster IP and use two new IP addresses for each device. What I’m not sure is will the CMA allow the same IP to be in two different gateways (VS and the new cluster)
If this is possible can do a parallel build by only having the management UP.
Hi Thaunux89,
Q: "What I’m not sure is will the CMA allow the same IP to be in two different gateways (VS and the new cluster)"
This is really a good question. unfortunately I dont have experience suck kind of scenario. You need to test it with one IF 🙂
Have you thought about to create a new CMA for the simple cluster, migrate here the policy, and build it here?
Akos
Yes, that’s the last option, where it involves some work as I need to export policies and objects to the new CMA and build everything fresh on the new CMA where no impact at all.
If i were you, I would choose this way.
There are tools for moiving packages beteen CMAs.
Akos
It's worth noting the process of moving between a VS and a regular gateway is a LOT easier in R82 with VSnext since it is easily available in Gaia OS (the "gateway" side of the configuration).
Even the VS object is now just a regular gateway object with VSnext.
Meanwhile, even with legacy VSX, the existing security policy (except for the VS objects themselves) can be used.
If you need to move it to a different domain, you can use a tool like: https://community.checkpoint.com/t5/API-CLI-Discussion/Python-tool-for-exporting-importing-a-policy-...
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 22 | |
| 21 | |
| 8 | |
| 7 | |
| 5 | |
| 5 | |
| 4 | |
| 3 | |
| 2 | |
| 2 |
Thu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasFri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY