VSNext

Notes:

  • Starting in R82, there are two modes:

    • "VSNext" (new).

      This configuration is described below.

    • "Traditional VSX" (in versions R81.20 and lower, called just "VSX").

      See other chapters in this Administration Guide.

  • You can enable the VSNext mode only in these:

    • ElasticXL Cluster.

    • Maestro Security Group.

    See the R82 Release Notes.

Introduction to VSNext

Introduced in the R82 version, VSNext is an enhanced VSX mode that allows simpler configuration, easier provisioning, and a similar experience to a physical Security Gateway.

The benefits of the VSNext mode are:

  • Unified management experience between Check Point physical Security Gateways and Virtual Gateways, including the capability to manage each Virtual Gateway from a different Management Server.

  • Improves VSX provisioning performance and provisioning experience - creating, modifying, and deleting Virtual Gateways and Virtual Switches in Gaia Portal, Gaia Clish, or with Gaia REST API.

  • Management feature and API parity between Virtual Gateways (VGW) and physical Security Gateways.

Important - Installation of CPUSE packages applies to the entire ElasticXL / Maestro Security Group.

Configuration Methods for VSNext

You can configure the required Virtual Gateways and Virtual Switches in one of these ways:

  • Gaia Portal:

  • Gaia Clish:

  • Gaia REST API:

    In the Check Point Gaia API Reference, or the local Gaia REST API Reference (https://<IP Address of Gaia Management Interface>/gaia_docs/#introduction), refer to the chapter "VSNext".

Procedure for Gaia Portal

  1. Perform a Clean Install of a supported platform and configure it as VSNext in the First Time Configuration Wizard.

    Warning - It is not supported to convert an existing platform to the VSNext mode.

    See the R82 Release Notes > Chapter "Supported Environments" > Section "VSNext and Traditional VSX".

  2. Connect to Gaia Portal on the ElasticXL Cluster / Maestro Security Group.

    You must connect to the same main IP address that you configured during the First Time Configuration Wizard.

  3. To configure IPv6 addresses on interfaces and IPv6 CoreXL settings, you must enable the IPv6 support in Gaia OS:

    1. In the left panel, click System Management > System Configuration.

    2. In the IPv6 Support section, select On.

    3. Click Apply.

    4. Click Yes to reboot now (recommended).

      Click No to reboot later. Configure Virtual Gateway objects only after you reboot.

  4. On the top toolbar, after the field Virtual System, if you see the padlock icon, then click the padlock icon, and click Yes to override the lock.

    The padlock icon must change to the pencil icon.

  5. In the left panel, click Virtual Systems.

    This page shows these default predefined objects:

    • The default Virtual Switch with ID 500 (with the assigned interface "magg1").

      This Virtual Switch is attached to the predefined bonding group "magg1" that contains the port "Mgmt".

    • The default Virtual Gateway object with ID 0 (with the assigned interface "wrp0").

      The default Virtual Gateway (the interface "wrp0") is connected to the default Virtual Switch.

    Important - Do not change these default predefined objects.

  6. Optional: Configure the default Virtual Gateway.

    Best Practice - Configure the default Virtual Gateway to ensure secure access to the Gaia Operating System on the ElasticXL Cluster.

    The purpose of this default Virtual Gateway is to protect the management context, to which you connect to configure other Virtual Gateways and their settings.

    The main IP address of this default Virtual Gateway is the IP address you assigned to the Management Interface in the First Time Configuration Wizard.

  7. Configure the required Virtual Gateways and Virtual Switches.

    Note - You can assign additional interfaces to a Virtual Gateway later.

    1. On the top toolbar, in the field Virtual System, select the default Virtual Gateway with ID 0.

    2. In the left panel, click the Virtual Systems page.

    3. Click the Virtual Gateway object.

    4. From the top toolbar, click Edit.

  8. On the ElasticXL Cluster / Maestro Security Group, in the context of each Virtual Gateway, configure additional applicable Gaia OS settings - Interfaces, DNS, Hosts, Static Routes, and Dynamic Routing.

    See the:

    Each Virtual Gateway behaves as a regular Security Gateway.

  9. In SmartConsole, configure the Security Gateway object for each Virtual Gateway.

  10. In SmartConsole, configure and install the applicable Security Policies for each Virtual Gateway.

  11. Add the additional required appliances to this ElasticXL Cluster / Maestro Security Group.

    The new Security Group Members automatically copy the required settings.

    See the R82 Scalable Platforms Administration Guide:

    • For an ElasticXL Cluster:

      Chapter "Working with ElasticXL Cluster".

    • For a Maestro Security Group.

      Chapter "Working with Quantum Maestro".