- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello, Mates.
In VSX environments, the recommendation regarding enabling Threat Prevention Blades on all the VS's you have, is always going to depend on how ‘robust’ your main VSX box is?
Does enabling Threat Prevention “force” you to also enable HTTPS Inspection on your VS's or is this always optional?
Thanks for your recommendations.
Hey bro,
I always tell people to follow this mentality "When in doubt, always leave default settings". If then, you notice any issues, you can tailor it as needed.
Andy
You only enable IPS on VS0 for updates not to protect VS0. VS0 is for mgmt purpose
Should I enable IPS Software Blade on the VSX Gateway?
You must enable and configure the IPS Software Blade in these objects:
VSX Gateway or VSX Cluster (because VS0 handles contract validation for all Virtual Systems).
Applicable Virtual Systems.
To enable Anti-Bot, Anti-Virus, or IPS on Virtual Systems
Important:
Make sure the routing, DNS, and proxy settings for the VSX GatewayClosed or VSX ClusterClosed Members (VS0) are configured correctly.
You must enable and configure the Software Blades in these objects:
VSX Gateway or VSX Cluster (because VS0 handles contract validation for all Virtual Systems).
Applicable Virtual Systems.
Make sure the VSX Gateway or VSX Cluster and the applicable Virtual Systems can connect to the Internet.
Virtual Systems get updates through the VSX Gateway or VSX Cluster (VS0).
If the VSX Gateway or VSX Cluster fails to connect, each Virtual SystemClosed uses its proxy settings to get the updates from the Internet.
Regarding HTTPS inspection. Now you can run IPS without but you don't get the full inspection. The firewall cannot inspect traffic that is encrypted. Most traffic now is encrypted so it is quite important.
To enable IPS/AB/AV blades, there are 2 ways?
Because I know people who enable these blades ‘Instance by Instance’ (VS x VS), but according to your explanation, I understand that I can enable the blades from the box as such (VS0) and this should ‘Replicate’ on all my VS's?
Is that the logic?
If you want to use IPS on a VS you always enable it on VS0 and any other VS that you want to run IPS.
For example
VS0: IPS
VS1:No ips because internal fw
VS2: IPS enabled
You can attach a IPS profile on each VS, also VS0
Does the IPS recommendation also apply to other blades, such as AB and AV?
Or AV/AB can be enabled on the VS's one needs, without the need to enable it also on VS0?
Yes, AB/AV should only be enabled on VSes where it is required.
Traffic is checked via ThreatCloud, so the VS needs Internet access.
In general terms, does Threat Prevention make sense to be used in FW or VS's that have Internet access?
Because these blades, enabling them in FW that do not have Internet access, would not make sense, right?
Personally bro, at least in my logical opinion, it makes total sense to use those blades on VS with Internet access and NOT use them on ones that dont have it. Its literally same method for regular quantum fws and truth be told, pretty much applies to any fw vendor out there.
Andy
Yes also needed on VS0
Yes.
Because contracts validation and initialization of default updates parameters are performed from the VSX Gateway itself (context of VS0).
HTTPS is not mandatory for TP but what the blades can see is limited to clear traffic without it same as any gateway.
IPS and TEX are the two blades I believe must be enabled also on VSO if to be used on other VS.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 26 | |
| 17 | |
| 13 | |
| 12 | |
| 7 | |
| 6 | |
| 6 | |
| 5 | |
| 4 | |
| 4 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY