- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello, Mates.
In VSX environments, the recommendation regarding enabling Threat Prevention Blades on all the VS's you have, is always going to depend on how ‘robust’ your main VSX box is?
Does enabling Threat Prevention “force” you to also enable HTTPS Inspection on your VS's or is this always optional?
Thanks for your recommendations.
Hey bro,
I always tell people to follow this mentality "When in doubt, always leave default settings". If then, you notice any issues, you can tailor it as needed.
Andy
You only enable IPS on VS0 for updates not to protect VS0. VS0 is for mgmt purpose
Should I enable IPS Software Blade on the VSX Gateway?
You must enable and configure the IPS Software Blade in these objects:
VSX Gateway or VSX Cluster (because VS0 handles contract validation for all Virtual Systems).
Applicable Virtual Systems.
To enable Anti-Bot, Anti-Virus, or IPS on Virtual Systems
Important:
Make sure the routing, DNS, and proxy settings for the VSX GatewayClosed or VSX ClusterClosed Members (VS0) are configured correctly.
You must enable and configure the Software Blades in these objects:
VSX Gateway or VSX Cluster (because VS0 handles contract validation for all Virtual Systems).
Applicable Virtual Systems.
Make sure the VSX Gateway or VSX Cluster and the applicable Virtual Systems can connect to the Internet.
Virtual Systems get updates through the VSX Gateway or VSX Cluster (VS0).
If the VSX Gateway or VSX Cluster fails to connect, each Virtual SystemClosed uses its proxy settings to get the updates from the Internet.
Regarding HTTPS inspection. Now you can run IPS without but you don't get the full inspection. The firewall cannot inspect traffic that is encrypted. Most traffic now is encrypted so it is quite important.
To enable IPS/AB/AV blades, there are 2 ways?
Because I know people who enable these blades ‘Instance by Instance’ (VS x VS), but according to your explanation, I understand that I can enable the blades from the box as such (VS0) and this should ‘Replicate’ on all my VS's?
Is that the logic?
If you want to use IPS on a VS you always enable it on VS0 and any other VS that you want to run IPS.
For example
VS0: IPS
VS1:No ips because internal fw
VS2: IPS enabled
You can attach a IPS profile on each VS, also VS0
Does the IPS recommendation also apply to other blades, such as AB and AV?
Or AV/AB can be enabled on the VS's one needs, without the need to enable it also on VS0?
Yes, AB/AV should only be enabled on VSes where it is required.
Traffic is checked via ThreatCloud, so the VS needs Internet access.
In general terms, does Threat Prevention make sense to be used in FW or VS's that have Internet access?
Because these blades, enabling them in FW that do not have Internet access, would not make sense, right?
Personally bro, at least in my logical opinion, it makes total sense to use those blades on VS with Internet access and NOT use them on ones that dont have it. Its literally same method for regular quantum fws and truth be told, pretty much applies to any fw vendor out there.
Andy
Yes also needed on VS0
Yes.
Because contracts validation and initialization of default updates parameters are performed from the VSX Gateway itself (context of VS0).
HTTPS is not mandatory for TP but what the blades can see is limited to clear traffic without it same as any gateway.
IPS and TEX are the two blades I believe must be enabled also on VSO if to be used on other VS.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
15 | |
12 | |
8 | |
6 | |
6 | |
6 | |
5 | |
5 | |
4 | |
3 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY