- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
Hello All,
I am trying to understand the reason for using Checkpoint's VSX technology. If you already have employed concepts such as, Multi-Domain management and have gateways installed on some Open Server. Do you really need VSX service or license? Will you not get the same functionality of VSX by implementing Multi-Domain and Virtual gateways on an open server?
See below extract from included link in checkpoint's community:
Extract:
Virtual System eXtension product runs several virtual firewalls on the same hardware. Each Virtual System works as a Security Gateway
In a nutshell:
Multi-domain is management virtualisation. Each domain is independent of the other so you can manage clients from the same multi-domain management server without mixing their data, each one has their own domain.
VSX is gateway virtualisation: you can use a dedicated appliance or server to run virtual firewalls which have their own IP space and each can use a different set of blades. Unlike virtual machines, the OS and patches are common since they run at the appliance/server level. So a single cluster could run for example 10 VS which do each their own routing and have their own policy.
You can use VSX with a multi-domain manager or an SMS. With an MDS, you could have each VS or multiple VS in a dedicated domain and some others in other ones. Without MDS, with SMS, you have one base domain and all VS share all objects but still have their own IP/blades configuration.
Please note this is really a basic explanation, the CCVS course for instance goes into much details of what VSX is.
Personally, I would not bother with VSX in that case. I had seem customers run way more than 12 gateways on single mgmt server and there was never an issue. Just make sure management is powerful enough (as far as memory, cpu, space). I would say if its VM, I always reocmmend SSH hdd, at least 12 or 16 GB of ram and 8 cores, but you can always scale it.
Just my honest opinion.
Andy
I think below explains it real well.
Andy
Thanks for replying Rock. I think I need some more clarity though.
In a nutshell:
Multi-domain is management virtualisation. Each domain is independent of the other so you can manage clients from the same multi-domain management server without mixing their data, each one has their own domain.
VSX is gateway virtualisation: you can use a dedicated appliance or server to run virtual firewalls which have their own IP space and each can use a different set of blades. Unlike virtual machines, the OS and patches are common since they run at the appliance/server level. So a single cluster could run for example 10 VS which do each their own routing and have their own policy.
You can use VSX with a multi-domain manager or an SMS. With an MDS, you could have each VS or multiple VS in a dedicated domain and some others in other ones. Without MDS, with SMS, you have one base domain and all VS share all objects but still have their own IP/blades configuration.
Please note this is really a basic explanation, the CCVS course for instance goes into much details of what VSX is.
Much thanks for this. I believe i understand better now. Multi-domain is for management and VSX is for gateways. I guess where I am at now is, If I have a server and want to install several gateways on that server. Do I need to use VSX technology to accomplish this?
Also,
Thanks for the suggested training. I will add that to my list of training to complete after I sit the CCSE.
https://training-certifications.checkpoint.com/#/courses/VSX%20Specialist%20R81.1%20(CCVS)
Personally, I would say no. If you are dealing with several gateways, regular mgmt is 100% fine. P-1 (MDS) and VSX are way more relevant for large-scale deployments where you wish to separate policies/objects. Its sort of like VDOMs with Fortinet, if you are familiar with that.
Essentially, every virtual "entity" would have their own policy as @Alex- indicated.
Andy
Lets start with basics...how many locations? Gateways? Users? Approximate numbers would help.
Andy
Personally, I would not bother with VSX in that case. I had seem customers run way more than 12 gateways on single mgmt server and there was never an issue. Just make sure management is powerful enough (as far as memory, cpu, space). I would say if its VM, I always reocmmend SSH hdd, at least 12 or 16 GB of ram and 8 cores, but you can always scale it.
Just my honest opinion.
Andy
Much thanks for this. Well appreciated.
Any time. Again, thats just my honest feedback, but you are certainly welcome to verify via an official TAC case or through your local Sales person.
Best regards and happy holidays
Andy
✌️
I personally think "virtualization" is a deeply misleading term to use in marketing for VSX. It has nothing to do with VMs as most people think of them.
It's exactly like OpenBSD rdomains, Linux network namespaces (in fact, this is the exact technology which backs VSX), Arista/Cisco/Extreme/Juniper VRFs, Fortinet vdom, Palo Alto vsys, and so on. It gives you the ability to run multiple routing tables on a single physical firewall or cluster. As @Alex- mentioned, all VSs have the same view of the same OS and the same hardware. You can't patch or upgrade one VS at a time. Logs from all VSs go to the same volume on the drive.
There are four fundamental types of VS:
Switches do not consume a license slot. The other three types all consume license slots.
All firewall licenses come with the ability to run one VS. This is so you can separate to-traffic routing (i.e, traffic to the firewall to manage it) from through-traffic routing (i.e, routing for traffic the firewall handles but doesn't terminate).
All excellent and valid points @Bob_Zimmerman 👍
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 25 | |
| 21 | |
| 11 | |
| 9 | |
| 9 | |
| 8 | |
| 7 | |
| 7 | |
| 6 | |
| 5 |
Wed 05 Nov 2025 @ 11:00 AM (EST)
TechTalk: Access Control and Threat Prevention Best PracticesThu 06 Nov 2025 @ 10:00 AM (CET)
CheckMates Live BeLux: Get to Know Veriti – What It Is, What It Does, and Why It MattersTue 11 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERTue 11 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY