Configuring Threat Prevention Settings on VSX Gateways
This section contains the instructions to enable Threat Prevention Software Blades on VSX Virtual System Extension. Check Point virtual networking solution, hosted on a computer or cluster with virtual abstractions of Check Point Security Gateways and other network devices. These Virtual Devices provide the same functionality as their physical counterparts. Virtual Systems.
For more information, see sk106496 and sk79700.

|
Important:
|
Step |
Instructions |
---|---|
1 |
If applicable, configure proxy settings for the VSX Gateway or VSX Cluster (VS0) or the Virtual Systems (or both) in SmartConsole
|
2 |
Enable the Software Blade
|
3 |
Enable the Software Blade on the applicable Virtual Systems:
|
4 |
Configure the Threat Prevention policies for:
|
5 |
Install the default VSX policy on the VSX Gateway or VSX Cluster. This policy is called:
|
6 |
Install the Threat Prevention policy:
|

|
Important:
|
Step |
Instructions |
---|---|
1 |
If applicable, configure proxy settings for the VSX Gateway or VSX Cluster (VS0), or the Virtual Systems (or both) in SmartConsole:
|
2 |
Enable Threat Emulation on the applicable Virtual Systems:
|
3 |
Configure the Threat Prevention policies for the applicable Virtual Systems. |
4 |
Install the Threat Prevention policy on the applicable Virtual Systems (and Access Control Policy, if needed). |

|
Important:
|
Step |
Instructions |
---|---|
1 |
If applicable, configure proxy settings for the VSX Gateway or VSX Cluster (VS0) or the Virtual Systems (or both) in SmartConsole:
|
2 |
Enable Threat Extraction on the applicable Virtual Systems:
|
3 |
Enable Threat Extraction support for web traffic over the HTTP and HTTPS protocols:
|
4 |
Configure the Threat Prevention policies for:
|
5 |
Install the default VSX policy on the VSX Gateway or VSX Cluster. This policy is called:
|
6 |
Install the Threat Prevention policy:
|