?

Check Point NSX-T East/West Deployment Lab - Tech Point

Bookmark
1 person launched
Solution Overview
Data centers are adopting virtualized and cloud environments to gain operational flexibility and lower operational costs. These changes have led to a dramatic increase in network traffic going east-west, or laterally within the data center. However, when it comes to security, the focus has been on protecting the perimeter, and there are few controls to secure east-west traffic inside the data center. 

This presents a critical security risk where threats can traverse unimpeded once inside the data center. Furthermore, traditional security approaches to this problem are unable to keep pace with the dynamic network changes and rapid provisioning of applications in a virtualized environment.

After scheduling this demonstration, a link with login and password will be sent. The link will launch Check Point's Tech Point environment. Follow the CloudGuard for NSX-T Lab Guide to complete the lab exercises. A reference NSX Demo Guide is also available. Both PDFs are at the bottom of this page.

Goals & Objectives

The mission of this demonstration is to simulate in real time the capabilities and advantages on how to achieve the best security in the next-generation software-defined data center.

The demo will consist of four main scenarios (use cases):

  1. Feasible, scalable micro-segmentation
  2. Automated and agile security provisioning
  3. Advanced security seamlessly embedded into SDDC
  4. Protecting your environment from sophisticated attacks (VMware NSX firewall will not protect your environment)

Hardware & Software

The lab uses the Check Point Tech Point infrastructure. The following will be available:

  • The ESXi hosts already prepared to participate in NSX-T, and NSX-T kernel modules were installed on the ESXi hosts.
  • Two NSX groups were created (Cluster-1, Cluster-2).
  • NSX Switch (Servers-Zone) were already created; the two VMs (Kali and Srv2016) were already attached to the NSX switch.
  • All users names and passwords are on a text file on the desktop.
  • Shortcuts to management interfaces are on the Chrome browser.
  • Putty with login details are on the desktop.

Technologies