

This lab is an example for a typical VSX Deployment scenario – one shared external Interface to Internet and separate Internal interfaces for each VSX virtual firewall.
This lab also is second part of earlier post :
Creating Checkpoint VSX and Virtual System – Part 1
In that previous post, it already shows how to create a new VSX gateway through SmartConsole. This lab will show the steps how to create two VSX virtual firewalls and how to set up a virtual router. Two internal interfaces will be used to test the traffics from two different networks.
Topologies:
Basically, in this lab, there is one physical VSX gateway with two logical VSX virtual firewalls. Each virtual VSX virtual firewall has two interfaces , External and Internal.
Steps:
1. Follow the previous post “Creating Checkpoint VSX and Virtual System – Part 1” to add a new VSX gateway into Smart Dashboard.
The new VSX Gateway has four physical interfaces as shown in the following:
- Eth0 Mgmt:192.168.2.41
- Eth1 EXT: for 172.17.3.x External Network
- Eth2 LAN1: for 192.168.99.x – VSX1 Internal Network
- Eth3 LAN2: for 10.9.200.x – VSX2 Internal Network
After new VSX Gateway (CP-VSX) added into Smart Dashboard, the webUI in browser will show:
Web UI is not supported in VSX mode. Please use Clish for OS configuration.
本文介绍了一个典型的VSX部署场景,通过一个共享的外部接口连接互联网,并为每个VSX虚拟防火墙设置独立的内部接口。文中详细描述了如何创建两个虚拟防火墙及配置虚拟路由器的过程。








被折叠的 条评论
为什么被折叠?



