Starting from TKU August 2020 discovery of the Checkpoint VSX Virtual Systems is supported.
Checkpoint VSX Virtual Systems discovery is only supported starting from BMC Discovery 11.3 version.
Pattern supports VSX running both GAIA R7x and R80.x OS versions, but with restrictions for R7x (see below).
Pattern triggers on Network Device node with 'GAIA' os_type and type 'Firewall'. It then runs SNMP query to get information about the configured VSX Virtual Systems from the vsxStatusTable (OID 220.127.116.11.4.1.2618.104.22.168.1).
For each Virtual System found, pattern creates Virtual Machine node with additional "VSX-related"attributes:
Then pattern checks what GAIA version VSX is running. If it's R80.x, pattern tries to find corresponding virtual Network Device representing VSX Virtual System (by checking if vendor is Check Point, device is virtual and its name is VS name).
As it was mentioned before, the only way to directly discover VS via it's own IP (and hence have virtual Network Device discovered) is to enable VS Direct Access Mode on VSX.
Example of the discovered VSX Network Device with Virtual Machines (each one represents VSX Virtual System) running on it.
Example of the Virtual Machine representing VSX Virtual System. Please notice link to the virtual Network Device ("Contained Virtual Network Device"), as well as to the VSX ("Network Device").
In the example given below you can see directly discovered virtual Network Device representing VSX Virtual System. Please notice link ("Containing VM") to the Virtual Machine node.
As it was mentioned, VSX SNMP VS Direct Access Mode has to be configured on VSX device in order to directly discover Virtual Systems and hence create appropriate relationships.
Without it, some information like IP addresses or Interfaces of the Virtual Systems will be missing.