Scalable Virtual Environment
VSX delivers scalability while dramatically reducing hardware investment, space requirements, and maintenance costs
With VSX, deployed as VSX Software or VSX-1 turnkey appliances, administrators can create virtualized implementations of conventional physical topologies and designs such as central and remote DMZs. The VSX platform can create and manage up to 250 fully independent security systems on a single or clustered hardware platform. This delivers scalability while dramatically reducing hardware investment, space requirements, and maintenance costs.
Flexible Virtual Connectivity
Virtual routers and switches can be used to forward traffic between networks located behind virtual systems, much in the same manner as their physical counterparts
Virtual routers and switches can be used to forward traffic between networks located behind virtual systems, much in the same manner as their physical counterparts. VSX supports a wide range of routing scenarios, enabling flexible network connectivity.
- Virtual System in Bridge Mode
VSX has the ability to host virtual systems running in either router or bridge mode. The ability to deploy virtual systems in bridge mode allows administrators to implement native layer-2 bridging instead of IP routing, and transparently add a virtual system to the network without reconfiguring network settings and topologies.
- Route propagation
When a virtual system is connected to a virtual router or to a virtual switch, an administrator can choose to propagate its routing information to adjacent virtual devices. This feature enables network nodes located behind neighboring virtual systems to communicate without the need for manual configuration.
- Overlapping IP address space
VSX facilitates connectivity when multiple network segments share the same IP address range. This scenario occurs when a single VSX gateway protects several independent networks that assign IP addresses to endpoints from the same pool of IP addresses. Thus, more than one endpoint in a VSX environment may share the same IP address, provided that each is located behind different virtual systems. Overlapping IP address space in VSX environments is possible because each virtual system maintains its own unique state and routing tables. These tables can contain identical entries, but within different, segregated contexts.
- Source-based routing
Source-based routing allows an administrator to define routing definitions that take precedence over ordinary, destination-based, routing decisions. This allows the administrator to route packets according to their source IP address or a combination of their source IP address and destination IP address. Source-based routing is useful in deployments where a single physical interface without VLAN tagging connects several protected customer networks. Each virtual system is connected to an internal virtual router. The virtual router routes traffic to the appropriate virtual system based on the source IP address, as defined in source-based routing tables.
- Dynamic Routing
Virtual devices can communicate and distribute routes amongst themselves using dynamic routing. VSX provides full layer-3 dynamic routing for virtual systems and virtual routers. The following unicast and multicast dynamic routing protocols are supported: OSPF, RIP-v1/2, BGP-v4, IGMP, PIM-SM, PIM-DM.
High Performance Security
VSX can be deployed on multiple carrier-class platforms using Check Point's high performance technology, ensuring secure, resilient, multi-gigabit throughput
High bandwidth networks require high-performance gateways in order to support thousands of users and applications. VSX employs Check Point-patented SecureXL™ security acceleration, enabling maximum performance from open servers and appliances. To provide security at wire speed, VSX can be deployed on multiple carrier-class platforms using Check Point's high performance technology, ensuring secure, resilient, multi-gigabit throughput. And to maximize performance, capacity and system scalability, VSX provides the following features and Technologies:
- Virtual System Load Sharing (VSLS) provides the ability to distribute virtual systems across cluster members, effectively distributing traffic load within a cluster.
- VSX Resource Control allows administrators to manage the processing load by guaranteeing that each virtual system will receive its minimum CPU allocation. Resources not needed by one virtual system are automatically made available to other virtual systems. Administrators can also limit the CPU time available to a lower-priority virtual system and assign more capacity to mission-critical virtual systems.
- VSX QoS Enforcement provides the ability to control network quality of service in the VSX network environment by supporting the Differentiated Services (DiffServ) protocol and assigning different transmission characteristics to different classes of service. This helps prioritize the order in which traffic will be processed when resources are under heavy load.
- ClusterXL provides high availability and load sharing to keep businesses running. It distributes traffic between clusters of redundant gateways so that the computing capacity of multiple machines may be combined to increase total throughput. If an individual gateway becomes unreachable, all connections are redirected to a designated backup without interruption.
- Link Aggregation, also known as Interface Bonding, is a powerful feature that provides support for bonding interfaces either in a high availability or load sharing mode. This networking technology binds multiple physical interfaces together in parallel to increase throughput beyond the limits of a single interface, and/or to provide redundancy.
Comprehensive Security Services
VSX provides comprehensive protection to multiple networks or VLANs within complex infrastructures, securely connecting them to shared resources like the Internet and DMZs
Based on FireWall-1® and SmartDefense™ intrusion prevention technologies, VSX provides comprehensive protection to multiple networks or VLANs within complex infrastructures, securely connecting them to shared resources like the Internet and DMZs. VSX gateways are based on Check Point-patented Stateful Inspection, the de facto standard for Internet security. VSX examines more than 150 predefined applications, services, and protocols out-of-the-box, ensuring that the vast majority of applications used by businesses are free of threats when entering the network. Examples include:
- URL Filtering - protects users or restrict access from an array of continually updated pre-profiled content
- Voice over IP-with many companies rushing to adopt VoIP applications to lower telecommunications costs, VSX offers comprehensive VoIP protocol support to secure critical business communications. VoIP protocols supported include H.323, SIP, MGCP and Skinny (SCCP).
- Instant messaging and P2P applications—these are common attack vectors for worms, viruses, and spyware. VSX provides security for these applications by inspecting their content or preventing them from entering the corporate network
VSX is supported by SmartDefense Services, which maintain the most current preemptive security for the Check Point security infrastructure. VSX also provides flexibility in secure remote access, supporting the most complete range of client access options (IPSec, SSL VPN, mobile access).
Proven, mature security management architecture
VSX is managed with Check Point's SmartCenter™ and Multi-Domain Security Management solutions, which provide powerful tools for centrally configuring, managing, and monitoring multiple VSX security operations platforms, virtual systems, and physical VPN-1 gateways
VSX is managed with Check Point's SmartCenter™ and Multi-Domain Security Management solutions. Both provide powerful tools for centrally configuring, managing, and monitoring multiple VSX security operations platforms, virtual systems, and physical VPN-1 gateways. VSX-1 appliances feature hardware health monitoring capabilities over SNMP.
Based on Check Point's Security Management Architecture (SMART), these solutions deliver the flexibility of choosing the appropriate management solution based on your network requirements. Check Point's One-Click VPN technology also enables virtual systems to be added seamlessly to a VPN community. The new virtual system automatically inherits the appropriate properties and can immediately establish secure sessions with all other VPN community members within the enterprise network. Additional tools such as virtual system creation wizards and templates assist in enforcing server image standardization and further streamline the process of deploying and configuring VSX.
Used in conjunction with Multi-Domain Security Management, an enterprise can use VSX to segment different business groups or customers, and classify the network either by function or by network segment. Therefore, administrators can maintain separate policies for different network segments and can delegate or divide large rule-bases into several smaller rule-bases for ease of management and better control of network security.
Service Provider Enablement
VSX delivers security service provisioning at the click of a button, enabling service providers to monetize virtual security service offerings at the lowest possible cost
VSX delivers security service provisioning at the click of a button, enabling service providers to monetize virtual security service offerings at the lowest possible cost. Capabilities now include new URL filtering capability which protects users or restrict access from an array of profiled content. This adds to the best-in-class security services already available.
- 14 ports of 10/100/1000Base-T
- 1 Management & 1 Sync ports
- Console port
- Dual hot swappable AC power (for load-sharing and redundancy)
- Dual front facing hot swappable HDDs
- 2 x 250GB Hard Drive
- 2 front-facing cooper / fiber expansion slots
- Virtualized Firewall, VPN and SmartDefense IPS
- Starting with 10 virtual systems, upgradeable to up to 150 virtual systems
- Unique and comprehensive virtualized security solution with firewall, VPN, IPS, and URL filtering
- Consolidate hundreds of security gateways to a single device, increasing device hardware utilization and reducing power, space, and cooling
- Linear scaling of performance up to 50 Gbps on the highest VSX-1 model
- Flexible deployment options including software and a full line of turnkey appliances
- Single proven security management architecture
VSX-1 Appliances Pricing Notes:
- The VSX-1 appliance Models 11060, 11070, 11080, 11260, 11270 and 11280 can run up to 250 VSs.
- The VSX-1 appliance Models 9070, 9090 can run up to 150 VSs.
- The VSX-1 appliance Model 3070 can run up to 10 VSs.
- Can be managed by either SmartCenter UTM/Power or Provider-1.
- VSX-1 appliance includes 1 year hardware warranty
- Discounts do not applied on the price for the additional VSX-1 appliances
- The NIC module, LOM card and spare parts kit are only suitable for the VSX-1 9070, 9090, 11060, 11070, 11080, 11260, 11270 and 11280.
- License is additive for increasing numbers of Virtual Systems.
- Smart Defense contract is per the amount of Virtual Systems.
- Current Release: VSX NGX R67.
- The NIC module, LOM card and spare parts kit are only suitable for the VSX-1 9070, 9090, 1160, 11070, 11080, 11260, 11270 and 11280.