Technical data

Check Point VSX Administration Guide NGX R67 | 150
Chapter 9
Optimizing VSX
In This Chapter
VSX Resource Control 150
QoS Enforcement 153
VSX Resource Control
Overview
VSX Resource Control allows administrators to ensure that critical traffic receives a greater share of the
available VSX gateway or cluster member processing power by assigning priorities to each Virtual System.
Since individual networks protected by Virtual Systems have differing traffic loads, user demand, and
criticality, allocating available CPU resources to individual Virtual Systems according to predetermined
priorities is an important consideration in any VSX deployment.
By using VSX Resource Control, administrators can allocate CPU resources to individual Virtual Systems
according to specific requirements. Virtual Systems protecting mission critical networks or resource
intensive applications are assigned higher priorities and are ensured a greater share of CPU resources.
Virtual Systems with lower priorities are guaranteed a lesser CPU share.
In addition, VSX Resource Control performs the following actions:
Ensures that each Virtual System receives a minimum CPU allocation and that no Virtual System can
deny another Virtual System access to the CPU
Makes CPU resources not required by Virtual Systems to which they are allocated available for use by
other Virtual Systems, until they are needed
VSX Resource Control can only manage available CPU resources, meaning those CPU resources that are
not required by other processes running on the VSX gateway. If the operating system, Check Point products
and other application processes consume 40% of CPU resources, VSX Resource Control can only manage
the remaining 60%.
Resource Control System Components
Resource Control has two principal components:
The Resource Control Monitor keeps track of the CPU consumption of each Virtual System. It also
provides real-time information on the present and average CPU consumption by the Virtual Systems on
the VSX machine.
The Resource Control Enforcer implements the Resource Policy. The Resource Control Enforcer
utilizes the data collected by the Resource Control Monitor to implement the Resource Policy.
Note - You must enable the Resource Control Monitor in order to use
the Resource Control Enforcer. You can, however, activate the
monitor without the enforcer if only wish to monitor CPU utilization.