SlideShare a Scribd company logo
1 of 33
Check Point Virtual
Systems: Consolidation,
Virtualization, Security

Ayelet Shenderov
Cfear Kimhi
CPX 2013
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.
Agenda

1

Overview

2

Dive into Memory, CPU and Clustering

3

Performance and Scalability

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

2
Overview

[Protected] For public distribution
What’s New in Virtual Systems

Next Generation Virtual System:
Software Blades security now available with
Virtual Systems on Check Point Appliance
All Software Blades on
Every Virtual System

Simplify and
Consolidate

Boosting
Performance

VSLS
Check Point

Leveraging existing management solutions
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

4
Software Blades for Virtual Systems
Firewall

IPS

Identity
Application
Awareness
Control

URL
Filtering

Antivirus

Anti-Bot

Mobile
Access*

Software Blades on Virtual Systems

… and Open Servers

Virtual System on Any Platform

Software Blade Security on Every Virtual System
* SSL VPN available in later release
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

5
Performance Boost and Scalability

Check Point

High
Connection
Capacity

 8X concurrent connections with 64-bit
GAiA OS
 Advanced routing options with multiple
routing and multicasting protocols

 Check Point CoreXL technology
Multi-Core
 Enhanced deep packet inspection
Performance
throughput with security acceleration

Linear
Scalability

 Patented VSLS technology
 Scale up to 12 cluster members

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

6
61000 Virtual Systems Support

FW

IA

VPN

ADNC

MOB

IPS

APCL

URLF

AV

AB

Consolidate Gateways with Virtual Systems
Customized per-VS Software Blade Security

IPS

IPS

*DLP is not supported in VS mode
(only available in physical security GW mode)

VPN

AV

Anti-Bot

IA

APCL

URLF

[Protected] For public distribution

AV

©2013 Check Point Software Technologies Ltd.

7
New R76 Release
Unlimited number of IP addresses
(billion billion billion times more addresses)

Unique device
identity

Zero cost
addresses

Support billions
of new devices!

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

8
Memory
Consumption and Monitoring

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

9
Use Case – Before
IP 530 cluster

 0.2 Gbps throughput
 5K concurrent connections

IP 650 cluster

IP 380 cluster

 0.3 Gbps throughput
 10K concurrent connections

[Protected] For public distribution

 0.2 Gbps throughput
 5K concurrent connections

©2013 Check Point Software Technologies Ltd.

10
Use Case – With Virtual Systems
VS-1

 0.1 Gbps throughput
 5K concurrent connections
 IPS and VPN

VS-2

VS-3

 0.5 Gbps throughput
 10K concurrent connections
 IPS, Anti-Virus and Anti-Bot

 0.5 Gbps throughput
 5K concurrent connections
 IPS, AppControl and URLF

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

11
Use Case – with VS – Memory
VS-1

 IPS + VPN = 77MB
 5K Connection = 11MB

System
Memory

VSO
500

=

+

VS1
77+11

+

VS2
115+105

+

VS3
90+53

=

951MB

=
VS-2

VS-3

 IPS + AV + AB = 115MB
 10K connection = 105MB

[Protected] For public distribution

 IPS + APPI+URLF = 90MB
 5K Connection = 53MB

©2013 Check Point Software Technologies Ltd.

12
Monitoring Memory Resources
 “fw vsx mstat” command shows an overview of the memory that the system
and each Virtual System is using.
 Global memory resources shown:
– Memory Total – Total physical memory on the Gateway
– Memory Free – Available physical memory
– Swap Total – Total of swap memory
– Swap Free – Available swap memory
– Swap-in Rate – Total memory swaps per second
[Expert@gizamem1:0]# fw vsx mstat

Things to notice:
 Memory free is not enough for
the needed growth
 Swap-in rate higher than 0
over time

VSX Memory Status
=================
Memory Total: 1007.72 MB
Memory Free: 539.29 MB
Swap Total: 2047.34 MB
Swap Free: 2047.34 MB
Swap-in rate: 0.00 MB

VSID | Memory Consumption
======+====================
0 |
186.63 MB
1 |
31.48 MB
2 |
81.66 MB
3 |
48.40 MB

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

13
Memory Monitoring Demo
[Expert@gizamem1:0]# fw vsx
mstat

[Expert@gizamem1:0]# fw vsx
mstat

VSX Memory Status
=================
Memory Total: 2022.96 MB
Memory Free: 1527.84 MB
Swap Total: 2047.34 MB
Swap Free: 2047.34 MB
Swap-in rate: 0.00 MB

VSX Memory Status
=================
Memory Total: 2022.96 MB
Memory Free: 1496.03 MB
Swap Total: 2047.34 MB
Swap Free: 2047.34 MB
Swap-in rate: 0.00 MB

VSID | Memory Consumption
======+====================
0 |
213.73 MB
1 |
30.79 MB
2 |
60.69 MB
3 |
62.22 MB

VSID | Memory Consumption
======+====================
0 |
215.33 MB
1 |
30.79 MB
2 |
87.47 MB
3 |
62.65 MB

[Expert@gizamem1:0]#

[Expert@gizamem1:0]#

2 Virtual Systems – Firewall only

[Protected] For public distribution

2 Virtual Systems – 1 Firewall only
1 IPS recommended,
Application Control, URL Filtering
©2013 Check Point Software Technologies Ltd.

14
CPU
CoreXL, Affinity and Monitoring

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

15
CoreXL per VS
 CoreXL increases the performance
of the physical appliance with the ability to utilize multiple
cores. It creates multiple firewall instances and allows to
increase medium and slow path throughput.

 CoreXL configuration is set per VS
– If possible,
allocate separate
cores for the
SNDs and FWK

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

16
CPU Resources
 Monitoring
– Provides real-time information on the present and average
CPU consumption by the Virtual Systems using SNMP and cli
– The calculations were adapted to support multiple Virtual
Systems running on multiple cores

 Allocation
– New option in „fw ctl affinity‟ to support Virtual Systems
and/or single VS instances
– Have maximum flexibility with core allocation per
Virtual System or per specific process or thread
Note: CPU Resource Control enforcement is not supported yet
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

17
Demo of CoreXL and affinity
VS3 has 1 CoreXL instance and is configured with an out of box affinity
Fwk can run on either one of cores 1-3
[Expert@gizamem1:0]# fw ctl affinity -l -x -vsid 3 -flags tne
--------------------------------------------------------------------|PID
|VSID |
CPU
|SRC|V|KT |EXC|
--------------------------------------------------------------------|
5394 |
3 |
all |
| |
|
|
|
5397 |
3 |
all |
| |
|
|
|
5612 |
3 |
all |
| |
|
|
|
5630 |
3 |
all |
| |
|
|
|
5631 |
3 |
all |
| |
|
|
|
5399 |
3 |
all |
| |
|
|
|
5608 |
3 |
all |
| |
|
|
|
5609 |
3 |
all |
| |
|
|
|
5610 |
3 |
all |
| |
|
|
|
5611 |
3 |
all |
| |
|
|
|
5788 |
3 |
all |
| |
|
|
|
5406 |
3 |
1 2 3 | P | |
|
|
|
5437 |
3 |
1 2 3 | P | |
|
|
|
5438 |
3 |
1 2 3 | P | |
|
|
|
5431 |
3 |
all |
| |
|
|
|
6003 |
3 |
all |
| |
|
|
|
6012 |
3 |
all |
| |
|
|
|
6337 |
3 |
all |
| |
|
|
---------------------------------------------------------------------

[Protected] For public distribution

NAME
fwk_wd
cpd
|---cpd
|---cpd
|---cpd
fw
|---fw
|---fw
|---fw
|---fw
|---fw
fwk3_dev
|---fwk3_0
|---fwk3_hp
mpdaemon
cphamcset
|---cphamcset
routed

©2013 Check Point Software Technologies Ltd.

18
Demo of CoreXL and affinity
VS3 has 3 CoreXL instance and is configured with an out of box affinity
Fwk can run on either one of cores 1-3
[Expert@gizamem1:0]#
[Expert@gizamem1:0]# fw ctl affinity -l -x -vsid 3 -flags tne
--------------------------------------------------------------------|PID
|VSID |
CPU
|SRC|V|KT |EXC|
--------------------------------------------------------------------|
5127 |
3 |
all |
| |
|
|
|
5140 |
3 |
all |
| |
|
|
|
5263 |
3 |
1 2 3 | P | |
|
|
|
5269 |
3 |
1 2 3 | P | |
|
|
|
5270 |
3 |
1 2 3 | P | |
|
|
|
5271 |
3 |
1 2 3 | P | |
|
|
|
5272 |
3 |
1 2 3 | P | |
|
|
|
5363 |
3 |
all |
| |
|
|
|
5396 |
3 |
all |
| |
|
|
|
5399 |
3 |
all |
| |
|
|
|
5400 |
3 |
all |
| |
|
|
|
5386 |
3 |
all |
| |
|
|
|
5443 |
3 |
all |
| |
|
|
|
5444 |
3 |
all |
| |
|
|
|
5445 |
3 |
all |
| |
|
|
|
5448 |
3 |
all |
| |
|
|
|
6109 |
3 |
all |
| |
|
|
|
5549 |
3 |
all |
| |
|
|
|
5578 |
3 |
all |
| |
|
|
|
6337 |
3 |
all |
| |
|
|
---------------------------------------------------------------------

[Protected] For public distribution

NAME
fwk_wd
mpdaemon
fwk3_dev
|---fwk3_0
|---fwk3_1
|---fwk3_2
|---fwk3_hp
cpd
|---cpd
|---cpd
|---cpd
fw
|---fw
|---fw
|---fw
|---fw
|---fw
cphamcset
|---cphamcset
routed

©2013 Check Point Software Technologies Ltd.

19
Demo of CoreXL and affinity
VS3 has 3 CoreXL instance and is configured with static affinity set by
1. vsenv 3
2. fw ctl affinity -s -d -inst 1 -cpu 2
Fwk3 instance 1 can run on cpu 2 only
[Expert@gizamem1:3]# fw ctl affinity -l -x -vsid 3 -flags tne
--------------------------------------------------------------------|PID
|VSID |
CPU
|SRC|V|KT |EXC|
--------------------------------------------------------------------|
5127 |
3 |
all |
| |
|
|
|
5140 |
3 |
all |
| |
|
|
|
5263 |
3 |
1 2 3 | P | |
|
|
|
5269 |
3 |
1 2 3 | P | |
|
|
|
5270 |
3 |
2 | I | |
|
|
|
5271 |
3 |
1 2 3 | P | |
|
|
|
5272 |
3 |
1 2 3 | P | |
|
|
|
5363 |
3 |
all |
| |
|
|
|
5396 |
3 |
all |
| |
|
|
|
5399 |
3 |
all |
| |
|
|
|
5400 |
3 |
all |
| |
|
|
|
5386 |
3 |
all |
| |
|
|
|
5443 |
3 |
all |
| |
|
|
|
5444 |
3 |
all |
| |
|
|
|
5445 |
3 |
all |
| |
|
|
|
5448 |
3 |
all |
| |
|
|
|
6109 |
3 |
all |
| |
|
|
|
5549 |
3 |
all |
| |
|
|
|
5578 |
3 |
all |
| |
|
|
|
6337 |
3 |
all |
| |
|
|
|
8307 |
3 |
all |
| |
|
|
--------------------------------------------------------------------[Protected] For public distribution

NAME
fwk_wd
mpdaemon
fwk3_dev
|---fwk3_0
|---fwk3_1
|---fwk3_2
|---fwk3_hp
cpd
|---cpd
|---cpd
|---cpd
fw
|---fw
|---fw
|---fw
|---fw
|---fw
cphamcset
|---cphamcset
routed
fw

©2013 Check Point Software Technologies Ltd.

20
How to Optimize Your CPU Utilization
In addition to the usual optimizations there are several VS
specific optimizations:

1. If there is a lot of traffic going through the medium and the
slow path – consider adding more CoreXL instances
where required

2. Assign dedicated cores to this VS using „fw ctl affinity‟
3. Use VSLS and distribute the VSs better to suit traffic load
4. Add more members to the VSLS cluster

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

21
Clustering ‒ VSLS

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

22
Use Case – Merger
Allows gradual
consolidation and
reorganization

Add more
Virtual Systems
as required

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

23
Virtual System Load Sharing
 Distributes Virtual Systems
between different gateways

 Sync
– VS in Backup is not synced
– Sync only between Active &
Standby (unicast sync)

 VS distribution
– Performed automatically or
manually (vsx_util
redistribute_vsls)
– Depends on priorities and
weights
SYNC

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

24
VSLS
 The performance throughput parameters are increased
linearly with VSLS. Example:
Single 12600

VSLS 12600*2

30Gbps

54.0Gbps

IPS Throughput

5Gbps

9.8Gbps

VPN Throughput

7Gbps

12.5Gbps

Firewall
Throughput

 VSLS allows gradual growth
– Deploy 2 members now and add more later

 Support of up to 12 cluster members

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

25
Other Highlights
 Monitor MIBs per Virtual System, using SNMPv3
– Allows querying information per VS including networking MIB
– Two modes of SNMP monitoring
• Default mode – monitors VS0 only
• VS mode – supports SNMP monitoring per each VS

 SmartView Monitor
– Support per VS and system monitoring

 Multi-Queue
– Multi-queue lets you configure more than one traffic queue
for each network interface. This means more than one CPU
can be used for acceleration.

 Hit-Count
– Hit Count tracks the number of connections that each
rule matches
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

26
Performance and
Scalability

[Protected] For public distribution
Major Performance Aspects
Comparing to Comparing to R75.40VS
VSX R67
in Physical mode (SG)
Firewall Throughput

Better

Same

IPS DFS throughput

Better

Same

VPN throughput

Same

Same

Real world traffic
(IPS/AppControl/NAT/Logs)

Better

Same*

Concurrent connections

Better

Same**

Maximum number of
Virtual Systems

Lower

N/A

* Depends on the number of VS.
** Requires 2-4 VSs to reach the best number. Depends on the RAM size.

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

28
How to Calculate the SPU

VS1
SPU

VS0
SPU
VS2
SPU

 Aggregate all the SPUs
of each Virtual System

 Use the table of the
number of Virtual
Systems influence per
appliance

Required SPU without
virtualization influence
VS0 that is used for management only is 10 SPUs
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

29
Use Case – with VS – SPU
VS-1

 IPS, VPN
 0.1 Gbps throughput

Total
SPUs

VS0
10

=

+

VS1
68

+

VS2
661

+

VS3
185

=

Required
924

=
VS-2
VS-3
12600 (1861 SPUs) would be a good choice

 IPS, AV, AB
 0.5 Gbps throughput

 IPS, APPI, URLF
 0.2 Gbps throughput

4 Virtual Systems do not change this recommendation
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

30
Check Point Virtual Systems
Based on industry proven VSX solution
Allows Security Gateway Consolidation
Allows Gradual Growth
Provides Superior Performance and Stability

Simplifies Security with Virtualization

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

31
Questions?

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

32
Thank You

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

33

More Related Content

What's hot

Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 finalKwonSun Bae
 
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...Salem Trabelsi
 
The Basic Introduction of Open vSwitch
The Basic Introduction of Open vSwitchThe Basic Introduction of Open vSwitch
The Basic Introduction of Open vSwitchTe-Yen Liu
 
Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)NetProtocol Xpert
 
Loopback address
Loopback addressLoopback address
Loopback addressCEC Landran
 
OVN - Basics and deep dive
OVN - Basics and deep diveOVN - Basics and deep dive
OVN - Basics and deep diveTrinath Somanchi
 
CCNP Switching Chapter 4
CCNP Switching Chapter 4CCNP Switching Chapter 4
CCNP Switching Chapter 4Chaing Ravuth
 
[오픈소스컨설팅]오픈스택에 대하여
[오픈소스컨설팅]오픈스택에 대하여[오픈소스컨설팅]오픈스택에 대하여
[오픈소스컨설팅]오픈스택에 대하여Ji-Woong Choi
 
Interconnecting Neutron and Network Operators' BGP VPNs
Interconnecting Neutron and Network Operators' BGP VPNsInterconnecting Neutron and Network Operators' BGP VPNs
Interconnecting Neutron and Network Operators' BGP VPNsThomas Morin
 
Quantum computation: EPR Paradox and Bell's Inequality
Quantum computation: EPR Paradox and Bell's InequalityQuantum computation: EPR Paradox and Bell's Inequality
Quantum computation: EPR Paradox and Bell's InequalityStefano Franco
 
Hacking Lab con ProxMox e Metasploitable
Hacking Lab con ProxMox e MetasploitableHacking Lab con ProxMox e Metasploitable
Hacking Lab con ProxMox e MetasploitableAndrea Draghetti
 
Node localization
Node localizationNode localization
Node localizationad-hocnet
 
Quantum Computing and Quantum Supremacy at Google
Quantum Computing and Quantum Supremacy at GoogleQuantum Computing and Quantum Supremacy at Google
Quantum Computing and Quantum Supremacy at Googleinside-BigData.com
 

What's hot (20)

Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 final
 
Overlay networks
Overlay networksOverlay networks
Overlay networks
 
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
 
The Basic Introduction of Open vSwitch
The Basic Introduction of Open vSwitchThe Basic Introduction of Open vSwitch
The Basic Introduction of Open vSwitch
 
Research Issues on WSN
Research Issues on WSNResearch Issues on WSN
Research Issues on WSN
 
Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
 
Loopback address
Loopback addressLoopback address
Loopback address
 
OVN - Basics and deep dive
OVN - Basics and deep diveOVN - Basics and deep dive
OVN - Basics and deep dive
 
Meetup 23 - 02 - OVN - The future of networking in OpenStack
Meetup 23 - 02 - OVN - The future of networking in OpenStackMeetup 23 - 02 - OVN - The future of networking in OpenStack
Meetup 23 - 02 - OVN - The future of networking in OpenStack
 
EtherChannel Configuration
EtherChannel ConfigurationEtherChannel Configuration
EtherChannel Configuration
 
CCNP Switching Chapter 4
CCNP Switching Chapter 4CCNP Switching Chapter 4
CCNP Switching Chapter 4
 
Vlans
VlansVlans
Vlans
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
 
[오픈소스컨설팅]오픈스택에 대하여
[오픈소스컨설팅]오픈스택에 대하여[오픈소스컨설팅]오픈스택에 대하여
[오픈소스컨설팅]오픈스택에 대하여
 
Interconnecting Neutron and Network Operators' BGP VPNs
Interconnecting Neutron and Network Operators' BGP VPNsInterconnecting Neutron and Network Operators' BGP VPNs
Interconnecting Neutron and Network Operators' BGP VPNs
 
Quantum computation: EPR Paradox and Bell's Inequality
Quantum computation: EPR Paradox and Bell's InequalityQuantum computation: EPR Paradox and Bell's Inequality
Quantum computation: EPR Paradox and Bell's Inequality
 
Hacking Lab con ProxMox e Metasploitable
Hacking Lab con ProxMox e MetasploitableHacking Lab con ProxMox e Metasploitable
Hacking Lab con ProxMox e Metasploitable
 
Node localization
Node localizationNode localization
Node localization
 
Quantum Computing and Quantum Supremacy at Google
Quantum Computing and Quantum Supremacy at GoogleQuantum Computing and Quantum Supremacy at Google
Quantum Computing and Quantum Supremacy at Google
 
Managing and Optimizing RF Spectrum for Aruba WLANs
Managing and Optimizing RF Spectrum for Aruba WLANsManaging and Optimizing RF Spectrum for Aruba WLANs
Managing and Optimizing RF Spectrum for Aruba WLANs
 

Similar to Check Point Virtual Systems

Openstack Summit Vancouver 2018 - Multicloud Networking
Openstack Summit Vancouver 2018 - Multicloud NetworkingOpenstack Summit Vancouver 2018 - Multicloud Networking
Openstack Summit Vancouver 2018 - Multicloud NetworkingShannon McFarland
 
Server-based and Network-assisted Solutions for Adaptive Video Streaming
Server-based and Network-assisted Solutions for Adaptive Video StreamingServer-based and Network-assisted Solutions for Adaptive Video Streaming
Server-based and Network-assisted Solutions for Adaptive Video StreamingEswar Publications
 
Cisco Connect 2018 Thailand - Journey to the multi cloud strategic and operat...
Cisco Connect 2018 Thailand - Journey to the multi cloud strategic and operat...Cisco Connect 2018 Thailand - Journey to the multi cloud strategic and operat...
Cisco Connect 2018 Thailand - Journey to the multi cloud strategic and operat...NetworkCollaborators
 
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdf
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdfBRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdf
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdfaaajjj4
 
Cloud orchestration with ucs director
Cloud orchestration with ucs directorCloud orchestration with ucs director
Cloud orchestration with ucs directorsolarisyougood
 
Cloud networking workshop
Cloud networking workshopCloud networking workshop
Cloud networking workshopCisco Canada
 
Check Mates Maestro under the hood 2022.pptx
Check Mates Maestro under the hood 2022.pptxCheck Mates Maestro under the hood 2022.pptx
Check Mates Maestro under the hood 2022.pptxDzung Dang Chi
 
Brkaci 1002
Brkaci 1002Brkaci 1002
Brkaci 1002ccherel
 
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...Cloud Native Day Tel Aviv
 
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...WSO2
 
2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANL2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANLdgoodell
 
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASAОсновные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASACisco Russia
 
FlashSystem 7300 Midrange Enterprise for Hybrid Cloud L2 Sellers Presentation...
FlashSystem 7300 Midrange Enterprise for Hybrid Cloud L2 Sellers Presentation...FlashSystem 7300 Midrange Enterprise for Hybrid Cloud L2 Sellers Presentation...
FlashSystem 7300 Midrange Enterprise for Hybrid Cloud L2 Sellers Presentation...ssuserecfcc8
 
Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Canada
 
EC2 NoSQL Benchmarking
EC2 NoSQL BenchmarkingEC2 NoSQL Benchmarking
EC2 NoSQL BenchmarkingAltoros
 
Five Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud ArchitectureFive Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud ArchitectureAmazon Web Services
 
2014-09-15 cloud platform master class
2014-09-15 cloud platform master class2014-09-15 cloud platform master class
2014-09-15 cloud platform master classCitrix
 
Federal Webinar: Technical Update on the Best New Features of our Most Popula...
Federal Webinar: Technical Update on the Best New Features of our Most Popula...Federal Webinar: Technical Update on the Best New Features of our Most Popula...
Federal Webinar: Technical Update on the Best New Features of our Most Popula...SolarWinds
 

Similar to Check Point Virtual Systems (20)

Openstack Summit Vancouver 2018 - Multicloud Networking
Openstack Summit Vancouver 2018 - Multicloud NetworkingOpenstack Summit Vancouver 2018 - Multicloud Networking
Openstack Summit Vancouver 2018 - Multicloud Networking
 
Server-based and Network-assisted Solutions for Adaptive Video Streaming
Server-based and Network-assisted Solutions for Adaptive Video StreamingServer-based and Network-assisted Solutions for Adaptive Video Streaming
Server-based and Network-assisted Solutions for Adaptive Video Streaming
 
Cisco Connect 2018 Thailand - Journey to the multi cloud strategic and operat...
Cisco Connect 2018 Thailand - Journey to the multi cloud strategic and operat...Cisco Connect 2018 Thailand - Journey to the multi cloud strategic and operat...
Cisco Connect 2018 Thailand - Journey to the multi cloud strategic and operat...
 
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdf
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdfBRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdf
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdf
 
Lustre File System on ARM
Lustre File System on ARMLustre File System on ARM
Lustre File System on ARM
 
Cloud orchestration with ucs director
Cloud orchestration with ucs directorCloud orchestration with ucs director
Cloud orchestration with ucs director
 
Monitor everything
Monitor everythingMonitor everything
Monitor everything
 
Cloud networking workshop
Cloud networking workshopCloud networking workshop
Cloud networking workshop
 
Check Mates Maestro under the hood 2022.pptx
Check Mates Maestro under the hood 2022.pptxCheck Mates Maestro under the hood 2022.pptx
Check Mates Maestro under the hood 2022.pptx
 
Brkaci 1002
Brkaci 1002Brkaci 1002
Brkaci 1002
 
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
 
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...
 
2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANL2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANL
 
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASAОсновные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
 
FlashSystem 7300 Midrange Enterprise for Hybrid Cloud L2 Sellers Presentation...
FlashSystem 7300 Midrange Enterprise for Hybrid Cloud L2 Sellers Presentation...FlashSystem 7300 Midrange Enterprise for Hybrid Cloud L2 Sellers Presentation...
FlashSystem 7300 Midrange Enterprise for Hybrid Cloud L2 Sellers Presentation...
 
Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop
 
EC2 NoSQL Benchmarking
EC2 NoSQL BenchmarkingEC2 NoSQL Benchmarking
EC2 NoSQL Benchmarking
 
Five Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud ArchitectureFive Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud Architecture
 
2014-09-15 cloud platform master class
2014-09-15 cloud platform master class2014-09-15 cloud platform master class
2014-09-15 cloud platform master class
 
Federal Webinar: Technical Update on the Best New Features of our Most Popula...
Federal Webinar: Technical Update on the Best New Features of our Most Popula...Federal Webinar: Technical Update on the Best New Features of our Most Popula...
Federal Webinar: Technical Update on the Best New Features of our Most Popula...
 

More from Group of company MUK

Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportВзаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportGroup of company MUK
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botGroup of company MUK
 
Perfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security BlueprintPerfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security BlueprintGroup of company MUK
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Group of company MUK
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data CenterGroup of company MUK
 
Check Point appliances brochure 2012
Check Point appliances brochure 2012Check Point appliances brochure 2012
Check Point appliances brochure 2012Group of company MUK
 

More from Group of company MUK (20)

Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportВзаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical Support
 
Check Point Products RU
Check Point Products RUCheck Point Products RU
Check Point Products RU
 
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
 
Check Point SMB Proposition
Check Point SMB PropositionCheck Point SMB Proposition
Check Point SMB Proposition
 
Check Point Mobile Security
Check Point Mobile SecurityCheck Point Mobile Security
Check Point Mobile Security
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
Check Point: Compliance Blade
Check Point: Compliance BladeCheck Point: Compliance Blade
Check Point: Compliance Blade
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
 
Check Point Threat emulation 2013
Check Point Threat emulation 2013Check Point Threat emulation 2013
Check Point Threat emulation 2013
 
Perfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security BlueprintPerfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security Blueprint
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
 
Check Point Consolidation
Check Point ConsolidationCheck Point Consolidation
Check Point Consolidation
 
Check Point 2013
Check Point 2013Check Point 2013
Check Point 2013
 
Check Point appliances brochure 2012
Check Point appliances brochure 2012Check Point appliances brochure 2012
Check Point appliances brochure 2012
 
Check Point Report 2013 RU
Check Point Report 2013 RUCheck Point Report 2013 RU
Check Point Report 2013 RU
 
3D Security Report
3D Security Report3D Security Report
3D Security Report
 

Recently uploaded

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Check Point Virtual Systems

  • 1. Check Point Virtual Systems: Consolidation, Virtualization, Security Ayelet Shenderov Cfear Kimhi CPX 2013 [Protected] For public distribution ©2013 Check Point Software Technologies Ltd.
  • 2. Agenda 1 Overview 2 Dive into Memory, CPU and Clustering 3 Performance and Scalability [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 2
  • 4. What’s New in Virtual Systems Next Generation Virtual System: Software Blades security now available with Virtual Systems on Check Point Appliance All Software Blades on Every Virtual System Simplify and Consolidate Boosting Performance VSLS Check Point Leveraging existing management solutions [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 4
  • 5. Software Blades for Virtual Systems Firewall IPS Identity Application Awareness Control URL Filtering Antivirus Anti-Bot Mobile Access* Software Blades on Virtual Systems … and Open Servers Virtual System on Any Platform Software Blade Security on Every Virtual System * SSL VPN available in later release [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 5
  • 6. Performance Boost and Scalability Check Point High Connection Capacity  8X concurrent connections with 64-bit GAiA OS  Advanced routing options with multiple routing and multicasting protocols  Check Point CoreXL technology Multi-Core  Enhanced deep packet inspection Performance throughput with security acceleration Linear Scalability  Patented VSLS technology  Scale up to 12 cluster members [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 6
  • 7. 61000 Virtual Systems Support FW IA VPN ADNC MOB IPS APCL URLF AV AB Consolidate Gateways with Virtual Systems Customized per-VS Software Blade Security IPS IPS *DLP is not supported in VS mode (only available in physical security GW mode) VPN AV Anti-Bot IA APCL URLF [Protected] For public distribution AV ©2013 Check Point Software Technologies Ltd. 7
  • 8. New R76 Release Unlimited number of IP addresses (billion billion billion times more addresses) Unique device identity Zero cost addresses Support billions of new devices! [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 8
  • 9. Memory Consumption and Monitoring [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 9
  • 10. Use Case – Before IP 530 cluster  0.2 Gbps throughput  5K concurrent connections IP 650 cluster IP 380 cluster  0.3 Gbps throughput  10K concurrent connections [Protected] For public distribution  0.2 Gbps throughput  5K concurrent connections ©2013 Check Point Software Technologies Ltd. 10
  • 11. Use Case – With Virtual Systems VS-1  0.1 Gbps throughput  5K concurrent connections  IPS and VPN VS-2 VS-3  0.5 Gbps throughput  10K concurrent connections  IPS, Anti-Virus and Anti-Bot  0.5 Gbps throughput  5K concurrent connections  IPS, AppControl and URLF [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 11
  • 12. Use Case – with VS – Memory VS-1  IPS + VPN = 77MB  5K Connection = 11MB System Memory VSO 500 = + VS1 77+11 + VS2 115+105 + VS3 90+53 = 951MB = VS-2 VS-3  IPS + AV + AB = 115MB  10K connection = 105MB [Protected] For public distribution  IPS + APPI+URLF = 90MB  5K Connection = 53MB ©2013 Check Point Software Technologies Ltd. 12
  • 13. Monitoring Memory Resources  “fw vsx mstat” command shows an overview of the memory that the system and each Virtual System is using.  Global memory resources shown: – Memory Total – Total physical memory on the Gateway – Memory Free – Available physical memory – Swap Total – Total of swap memory – Swap Free – Available swap memory – Swap-in Rate – Total memory swaps per second [Expert@gizamem1:0]# fw vsx mstat Things to notice:  Memory free is not enough for the needed growth  Swap-in rate higher than 0 over time VSX Memory Status ================= Memory Total: 1007.72 MB Memory Free: 539.29 MB Swap Total: 2047.34 MB Swap Free: 2047.34 MB Swap-in rate: 0.00 MB VSID | Memory Consumption ======+==================== 0 | 186.63 MB 1 | 31.48 MB 2 | 81.66 MB 3 | 48.40 MB [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 13
  • 14. Memory Monitoring Demo [Expert@gizamem1:0]# fw vsx mstat [Expert@gizamem1:0]# fw vsx mstat VSX Memory Status ================= Memory Total: 2022.96 MB Memory Free: 1527.84 MB Swap Total: 2047.34 MB Swap Free: 2047.34 MB Swap-in rate: 0.00 MB VSX Memory Status ================= Memory Total: 2022.96 MB Memory Free: 1496.03 MB Swap Total: 2047.34 MB Swap Free: 2047.34 MB Swap-in rate: 0.00 MB VSID | Memory Consumption ======+==================== 0 | 213.73 MB 1 | 30.79 MB 2 | 60.69 MB 3 | 62.22 MB VSID | Memory Consumption ======+==================== 0 | 215.33 MB 1 | 30.79 MB 2 | 87.47 MB 3 | 62.65 MB [Expert@gizamem1:0]# [Expert@gizamem1:0]# 2 Virtual Systems – Firewall only [Protected] For public distribution 2 Virtual Systems – 1 Firewall only 1 IPS recommended, Application Control, URL Filtering ©2013 Check Point Software Technologies Ltd. 14
  • 15. CPU CoreXL, Affinity and Monitoring [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 15
  • 16. CoreXL per VS  CoreXL increases the performance of the physical appliance with the ability to utilize multiple cores. It creates multiple firewall instances and allows to increase medium and slow path throughput.  CoreXL configuration is set per VS – If possible, allocate separate cores for the SNDs and FWK [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 16
  • 17. CPU Resources  Monitoring – Provides real-time information on the present and average CPU consumption by the Virtual Systems using SNMP and cli – The calculations were adapted to support multiple Virtual Systems running on multiple cores  Allocation – New option in „fw ctl affinity‟ to support Virtual Systems and/or single VS instances – Have maximum flexibility with core allocation per Virtual System or per specific process or thread Note: CPU Resource Control enforcement is not supported yet [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 17
  • 18. Demo of CoreXL and affinity VS3 has 1 CoreXL instance and is configured with an out of box affinity Fwk can run on either one of cores 1-3 [Expert@gizamem1:0]# fw ctl affinity -l -x -vsid 3 -flags tne --------------------------------------------------------------------|PID |VSID | CPU |SRC|V|KT |EXC| --------------------------------------------------------------------| 5394 | 3 | all | | | | | | 5397 | 3 | all | | | | | | 5612 | 3 | all | | | | | | 5630 | 3 | all | | | | | | 5631 | 3 | all | | | | | | 5399 | 3 | all | | | | | | 5608 | 3 | all | | | | | | 5609 | 3 | all | | | | | | 5610 | 3 | all | | | | | | 5611 | 3 | all | | | | | | 5788 | 3 | all | | | | | | 5406 | 3 | 1 2 3 | P | | | | | 5437 | 3 | 1 2 3 | P | | | | | 5438 | 3 | 1 2 3 | P | | | | | 5431 | 3 | all | | | | | | 6003 | 3 | all | | | | | | 6012 | 3 | all | | | | | | 6337 | 3 | all | | | | | --------------------------------------------------------------------- [Protected] For public distribution NAME fwk_wd cpd |---cpd |---cpd |---cpd fw |---fw |---fw |---fw |---fw |---fw fwk3_dev |---fwk3_0 |---fwk3_hp mpdaemon cphamcset |---cphamcset routed ©2013 Check Point Software Technologies Ltd. 18
  • 19. Demo of CoreXL and affinity VS3 has 3 CoreXL instance and is configured with an out of box affinity Fwk can run on either one of cores 1-3 [Expert@gizamem1:0]# [Expert@gizamem1:0]# fw ctl affinity -l -x -vsid 3 -flags tne --------------------------------------------------------------------|PID |VSID | CPU |SRC|V|KT |EXC| --------------------------------------------------------------------| 5127 | 3 | all | | | | | | 5140 | 3 | all | | | | | | 5263 | 3 | 1 2 3 | P | | | | | 5269 | 3 | 1 2 3 | P | | | | | 5270 | 3 | 1 2 3 | P | | | | | 5271 | 3 | 1 2 3 | P | | | | | 5272 | 3 | 1 2 3 | P | | | | | 5363 | 3 | all | | | | | | 5396 | 3 | all | | | | | | 5399 | 3 | all | | | | | | 5400 | 3 | all | | | | | | 5386 | 3 | all | | | | | | 5443 | 3 | all | | | | | | 5444 | 3 | all | | | | | | 5445 | 3 | all | | | | | | 5448 | 3 | all | | | | | | 6109 | 3 | all | | | | | | 5549 | 3 | all | | | | | | 5578 | 3 | all | | | | | | 6337 | 3 | all | | | | | --------------------------------------------------------------------- [Protected] For public distribution NAME fwk_wd mpdaemon fwk3_dev |---fwk3_0 |---fwk3_1 |---fwk3_2 |---fwk3_hp cpd |---cpd |---cpd |---cpd fw |---fw |---fw |---fw |---fw |---fw cphamcset |---cphamcset routed ©2013 Check Point Software Technologies Ltd. 19
  • 20. Demo of CoreXL and affinity VS3 has 3 CoreXL instance and is configured with static affinity set by 1. vsenv 3 2. fw ctl affinity -s -d -inst 1 -cpu 2 Fwk3 instance 1 can run on cpu 2 only [Expert@gizamem1:3]# fw ctl affinity -l -x -vsid 3 -flags tne --------------------------------------------------------------------|PID |VSID | CPU |SRC|V|KT |EXC| --------------------------------------------------------------------| 5127 | 3 | all | | | | | | 5140 | 3 | all | | | | | | 5263 | 3 | 1 2 3 | P | | | | | 5269 | 3 | 1 2 3 | P | | | | | 5270 | 3 | 2 | I | | | | | 5271 | 3 | 1 2 3 | P | | | | | 5272 | 3 | 1 2 3 | P | | | | | 5363 | 3 | all | | | | | | 5396 | 3 | all | | | | | | 5399 | 3 | all | | | | | | 5400 | 3 | all | | | | | | 5386 | 3 | all | | | | | | 5443 | 3 | all | | | | | | 5444 | 3 | all | | | | | | 5445 | 3 | all | | | | | | 5448 | 3 | all | | | | | | 6109 | 3 | all | | | | | | 5549 | 3 | all | | | | | | 5578 | 3 | all | | | | | | 6337 | 3 | all | | | | | | 8307 | 3 | all | | | | | --------------------------------------------------------------------[Protected] For public distribution NAME fwk_wd mpdaemon fwk3_dev |---fwk3_0 |---fwk3_1 |---fwk3_2 |---fwk3_hp cpd |---cpd |---cpd |---cpd fw |---fw |---fw |---fw |---fw |---fw cphamcset |---cphamcset routed fw ©2013 Check Point Software Technologies Ltd. 20
  • 21. How to Optimize Your CPU Utilization In addition to the usual optimizations there are several VS specific optimizations: 1. If there is a lot of traffic going through the medium and the slow path – consider adding more CoreXL instances where required 2. Assign dedicated cores to this VS using „fw ctl affinity‟ 3. Use VSLS and distribute the VSs better to suit traffic load 4. Add more members to the VSLS cluster [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 21
  • 22. Clustering ‒ VSLS [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 22
  • 23. Use Case – Merger Allows gradual consolidation and reorganization Add more Virtual Systems as required [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 23
  • 24. Virtual System Load Sharing  Distributes Virtual Systems between different gateways  Sync – VS in Backup is not synced – Sync only between Active & Standby (unicast sync)  VS distribution – Performed automatically or manually (vsx_util redistribute_vsls) – Depends on priorities and weights SYNC [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 24
  • 25. VSLS  The performance throughput parameters are increased linearly with VSLS. Example: Single 12600 VSLS 12600*2 30Gbps 54.0Gbps IPS Throughput 5Gbps 9.8Gbps VPN Throughput 7Gbps 12.5Gbps Firewall Throughput  VSLS allows gradual growth – Deploy 2 members now and add more later  Support of up to 12 cluster members [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 25
  • 26. Other Highlights  Monitor MIBs per Virtual System, using SNMPv3 – Allows querying information per VS including networking MIB – Two modes of SNMP monitoring • Default mode – monitors VS0 only • VS mode – supports SNMP monitoring per each VS  SmartView Monitor – Support per VS and system monitoring  Multi-Queue – Multi-queue lets you configure more than one traffic queue for each network interface. This means more than one CPU can be used for acceleration.  Hit-Count – Hit Count tracks the number of connections that each rule matches [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 26
  • 28. Major Performance Aspects Comparing to Comparing to R75.40VS VSX R67 in Physical mode (SG) Firewall Throughput Better Same IPS DFS throughput Better Same VPN throughput Same Same Real world traffic (IPS/AppControl/NAT/Logs) Better Same* Concurrent connections Better Same** Maximum number of Virtual Systems Lower N/A * Depends on the number of VS. ** Requires 2-4 VSs to reach the best number. Depends on the RAM size. [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 28
  • 29. How to Calculate the SPU VS1 SPU VS0 SPU VS2 SPU  Aggregate all the SPUs of each Virtual System  Use the table of the number of Virtual Systems influence per appliance Required SPU without virtualization influence VS0 that is used for management only is 10 SPUs [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 29
  • 30. Use Case – with VS – SPU VS-1  IPS, VPN  0.1 Gbps throughput Total SPUs VS0 10 = + VS1 68 + VS2 661 + VS3 185 = Required 924 = VS-2 VS-3 12600 (1861 SPUs) would be a good choice  IPS, AV, AB  0.5 Gbps throughput  IPS, APPI, URLF  0.2 Gbps throughput 4 Virtual Systems do not change this recommendation [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 30
  • 31. Check Point Virtual Systems Based on industry proven VSX solution Allows Security Gateway Consolidation Allows Gradual Growth Provides Superior Performance and Stability Simplifies Security with Virtualization [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 31
  • 32. Questions? [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 32
  • 33. Thank You [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 33

Editor's Notes

  1. 2 most important things that you need to rememberThis is the evolution of the VSX product. We have been doing virtualization for more than 10 year. We are good at it and this is the best version ever There is no more VSX releases. From now on Virtualization is a part of all Main Train release. Each Check Point main train can run in 2 modes. Either Virtual or physical.Software Blade Architecture are now supported on VS – customized protection with different Software Blades on each Virtual System Lower TCO by consolidating multiple physical gateways into a virtualized environment, and simplify the security management and provisioning at the same time More connection capacity and security throughput with 64-bit GAiA OS, higher throughput performance with multi-core (CoreXL) technology, linear scalability with VSLS
  2. Performance and scalability increased dramatically.
  3. Now with IPv6 we can easily meet the challenge
  4. Enterprise is refreshing its Perimeter and Datacenter security gatewaysToday enterprise perimeter securityUsing Cluster of IP appliances securing the internet accessUsing VPN solution for remote accessUsing Websense for URL filtering With VSs, Customer can use One VS for Perimeter Security, One VS for VPN remote access and One VS for URL Filtering and Application Control
  5. VS0 – 500MBVS1 – IPS, VPNVS2 – IPS, AV, ABVS3 – IPS, APPI, URLF
  6. This is how you calculate the overall memory consumption of the system. When choosing an appliance you should be aware of thisVS0 – 500MBVS1 – IPS, VPNVS2 – IPS, AV, ABVS3 – IPS, APPI, URLF
  7. Lets have a short demo that talked about memory in our systemHere we see a system where a Virtual Switch is configured and 2 Virtual Systems.As you can see Virtual switch also has memory consumptionFirst lets start by Firewall only configuration on both Virtual SystemsNow lets activate some blades on Virtual System with VSID 2As you can see the impact is seen on this Virtual System onlys
  8. Lets talk about CoreXL. CoreXL allows you to use multiple cores for handling of medium and slow path traffic.More CoreXL instances will not improve fast path performance.In our case, you can configure coreXL per Virtual System. You can have a different number of CoreXL instances in each Virtual SystemIt is configured in the SDBEach instance that you create uses additional system memory. A Virtual System with five instances would use approximately the same amount of memory as five separate Virtual Systems.
  9. Additional important tool for health monitoring is CPU resource control. At this point we only support monitoring of CPU resources and not control of these resources
  10. This is a demo of CoreXL and Fwctl affinity utilityThis is the same configuration as before.We are looking on Virtual System 3 that has 1 CoreXL instance and has and out of box affinityWe can see here all the processes that belong to this Virtual SystemFwk is the process that runs the firewall inspection code. FWK has 2 threads that are always present
  11. We now configured 3 CoreXL instances to VS3 and we now see 2 new threads _1 and _2.The default affinity is still – run on all CPUs
  12. Now using the affinity command we can nail specific instance of a VS or the entire VS to a specific core
  13. Per VS failover…
  14. Add explanations to MQ and Hit count
  15. VS0 – 500MBVS1 – IPS, VPNVS2 – IPS, AV, ABVS3 – IPS, APPI, URLF