Check Point R75 Management Essentials - Part 1

Size: px
Start display at page:

Download "Check Point R75 Management Essentials - Part 1"

Transcription

1 Check Point R75 Management Essentials - Part 1 Training course materials Preparation for CCSA Certification Inspection Engine Suspicious Activity monitoring (SAM) Rules Anti-Spoofing Rules arp_table IKE_peers connections udp_services Expected packet or new entry added by rule match Accept Handle Packet by OS IP Stack Accept Update State Tables Action Reject Send Nack Drop UDP TCP Gus Bouser & Neil Mackie IPSec

2 Copyright Lezha Publications. All rights reserved. Lezha Publications acknowledge all registered trademarks. All references to trademarks are purely editorial. These training course materials have no affiliation with or endorsement from any company whose trademark may have been referenced. All rights reserved. This product and related documentation are protected by copyright and distribution under licensing restricting their use. No part of this work may be reproduced in any form or by any means graphic, electronic, or mechanical including but not limited to photocopying, recording, taping or storage in an information retrieval system, without the prior written permission of the copyright owner. The information in this book is distributed on an As Is basis, without warranty or liability. While every precaution has been taken in the preparation of this book, neither the printer, or copyright owner shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by information contained in this book or by the computer software or hardware products described herein. Printed and distributed under license from Lezha Publications by ITSec Solutions Ltd.

3 1 - Networks and Firewalls Objectives Know how packet filtering works Know how application proxies work Know how Stateful Inspection works Know how to apply basic filters in tcpdump Know how to create a pcap file for analysis by WireShark Approximate time for completing each section Section 1 Securing Networks 20 Minutes Section 2 Basic Network Packet Analysis 10 Minutes Total time 35 Minutes Prerequisites Basic understanding of TCP/IP Knowledge of MS-Windows Have VMWare Workstation or a Hypervisor Installed Have the Virtual Machines ready for use 1-CPMgmt1-NetworksAndFirewalls-R75 DN Lezha Publications 2012

4 Contents 1 Securing Networks All Firewalls are Not Equal Primary Organization Network Hosted Services Network Remote Office Networks Basic Protocols IP Protocol TCP Protocol UDP Protocol ICMP Protocol Protection Using Simple Packet Filters Packet Filter Protection Protection Using Application Proxies Application Proxy Protection Protection Using Hybrids Stateful Inpsection Stateful Inspection Protection Building State Tables Check Point Filtering Modules Check Point State Tables Basic Network Packet Analysis Sniffing Packets tcpdump Wireshark CPMgmt1-NetworksAndFirewalls-R75 2 Lezha Publications 2012

5 2 - Check Point Components Objectives Understand Check Point products Secure the Global network Understand the function of the SmartCenter Understand the function of the VPN-1 Power/UTM Module Understand the Interaction between GUI Clients, SmartCenter & Firewalls Understand the product options for NGX R75 and Blades Understand the Blade options using Containers Approximate time for completing each section Section 1 Check Point Components 20 Minutes Section 2 Product Combinations 10 Minutes Total time 30 Minutes Prerequisites Complete Module 1 The contents of this module should not be relied on when purchasing products. It is only meant as a simple overview. The product combinations and offers continually change and a qualified reseller with access to the latest information and datasheets should be consulted before any purchase decisions are made. Make sure you always get the latest product data sheets from 2-CPMgmt1-CheckPointComponents-R75 DN Lezha Publications 2012

6 Contents 1 Check Point Components Product Overview Securing the Global Organization Perimeter Remote Access Check Point VPN-1 UTM/Power Components Component Overview SmartCenter VPN-1 Power/UTM Modules/Blades GUI Clients Product Combinations Modules/blades Check Point Power Check Point UTM Check Point UTM-1 Edge Check Point Software Gateways Check Point Software SmartCenter & Gateway Bundles R70 onwards Products Blades Check Point Gateway Appliances Power Check Point Gateways IP Appliances Check Point Gateways UTM-1 Appliances Check Point Gateways UTM-1 Edge Check Point Software Security Gateways Bundles Check Point Gateways Security Management Bundles Check Point Gateways EndPoint Security Check Point Gateways Abra CPMgmt1-CheckPointComponents-R75 2 Lezha Publications 2012

7 3 - Installing the Firewall SecurePlatform Objectives Check the Virtual Machine template for the Firewall Install a SecurePlatform Firewall Configure the Firewall Interfaces Understand the difference between CPShell & Expert Shell/Mode Understand the use of fw unloadlocal Understand the InitialPolicy & Defaultfilter Security policies Understand the security risks of using cpstop & fwstop Understand debugging connectivity issues for a new firewall Approximate time for completing each section Section 1 Creating and configuring the Virtual Machine 20 Minutes Section 2 Installing the SecurePlatform Base Build 15 Minutes Section 3 Installing VPN-1 on SecurePlatform 30 Minutes Section 4 SecurePlatform with VPN-1 Installed - Basics 45 Minutes Total time 1Hr 50 Min Prerequisites VMWare Workstation or Server The virtual machine ClassRouter needs to be started, IP address The virtual machine Host1 needs to be started, IP address SecurePlatform ISO image available on the local disk 3-CPMgmt1-fwinstall-R75 DN Lezha Publications 2012

8 Contents 1 Check the Status the Virtual Machine for fw-site1 & mgmt-site Check the VM settings for fw-site Virtual Machine fw-site Machine mgmt-site Installing the SecurePlatform Base Build Install SecurePlatform (SPLAT) Set Keyboard Layout Set an Administration IP Address Set the Port for Web GUI Access Format the Hard Disk & Reboot Installing Firewall Blades on SecurePlatform Configure the Base OS Parameters & Check Point Products Initial Login Run sysconfig Set the Hostname Set the Domain Set Network parameters for Interface eth Set Network Parameters for Interface eth Set the Date and Time Import Check Point Products Configuration Check Point Product Install Select Installation Type Select Check Point Products Security Gateway Select Check Point Products Basic Configuration Set the Activation Key for SIC Gateway Reboot SecurePlatform with VPN-1 Installed - Basics SecurePlatform Access Level & Shells Initial Debugging fw unloadlocal CPShell Command List Setting the idle Timeout Expert Mode Understanding cpstop Security Risks Testing cpstop Basic tcpdump Packets on an Interface Using cpstop fwflag default Using cpstop fwflag proc Using fwstop Basic Network Scan Using Superscan Superscan - InitialPolicy Superscan - Defaultfilter Superscan fw unloadlocal No Policy installed Firewall installation Summary CPMgmt1-fwinstall-R75 2 Lezha Publications 2012

9 4 - Installing the Check Point SmartCenter Objectives Check the status of the Virtual Machine mgmt-site1 Install the SmartCenter Know the difference between a Primary and Secondary SmartCenter Install the SmartConsole clients Understand the importance of a rebuild strategy for the SmartCenter Know why the SmartCenter needs to be protected Know where log files are stored Know the use and limitation of the initial administrator Know the purpose of the remote GUI clients list Set the FQDN for the Certificate Authority Know the purpose and use of the SmartCenter fingerprint Approximate time for completing each section Section 1 Management Server Virtual Machine 10 Minutes Section 2 Installing the Check Point SmartCenter 45 Minutes Section 3 Installing the SmartConsole Clients 10 Minutes Total time 65 Minutes Prerequisites VMWare Workstation or Server The virtual machine mgmt-site1 base machine should exist with no OS installed Check Point SPLAT & Windows ISO available on the local disk 4-CPMgmt1-MgmtInstall-R75 DN Lezha Publications 2012

10 Contents 1 Management Server Virtual Machine Virtual Machine Setup mgmt-site Set the CDROM Boot Device Installing the Check Point SmartCenter and SmartConsole Install SecurePlatform (SPLAT) for the SmartCenter Set Keyboard Layout Set an Administration IP Address Set the Port for Web GUI Access Format the Hard Disk & Reboot Configure the Base OS & Check Point SmartCenter Initial Login Run sysconfig Set the Hostname Set the Domain Network Parameters Set the Date and Time Import Check Point Products Configuration Check Point Product Install Select Installation Type Select Check Point Products Security Gateway SmartCenter License SmartCenter Administrator SmartCenter GUI Clients SmartCenter CA & Fingerprint SmartCenter Reboot & Check Network Connectivity Set the expert Password cpconfig and sysconfig on the SmartCenter SmartConsole Clients Installing the SmartConsole Clients on Host Location and Clients to Install Getting the SmartConsole from SPLAT CPMgmt1-MgmtInstall-R75 2 Lezha Publications 2012

11 5 - Connecting to the SmartCenter Objectives Understand the options in cpconfig on a SmartCenter Know the main configuration file for storing the SmartCenter objects Objects_5_0.C Know what is required to connect to the SmartCenter Know why some objects are automatically created Understand the use of Logs Servers & Masters Know how to select products installed on a Check Point Object Understand the elements of a rule, SRC/DST/VPN/Service/Action/Track/Install On/Time/Comment Approximate time for completing each section Section 1 Check Point Configuration 10 Minutes Section 2 Basic SmartDashboard Connecting to the SmartCenter 15 Minutes Section 3 Basic Rule Parameters 15 Minutes Total time 40 Minutes Prerequisites Complete Module 4 Virtual Machine mgmt-site1 must be running Virtual Machine Host1 must be running 5-CPMgmt1-MgmtConnect-R75 DN Lezha Publications 2012

12 Contents 1 Check Point Configuration Check Point Configuration - cpconfig cpconfig on a SPLAT SmartCenter Adding Administrators Checking the GUI Client List Displaying the SmartCenter Fingerprint Moving the Fingerprint File to a Workstation Time, SmartCenter and Firewall Install NTP Server on Host Set Time Synchronization for SmartCenter and Firewall Basic SmartDashboard Connecting to the SmartCenter The SmartConsole Clients Initial Login to the SmartCenter The SmartCenter Fingerprint Check Point Software Blades The SmartDashboard Layout Turning Display Areas On/Off The Objects List SmartDashboard Security Policy Tabs Editing the SmartCenter Object Objects Tree Comment & Color Topology Log and Masters Basic Rule Parameters Introduction to Rules Adding a Rule Rule Elements Rule number and Name Setting Source/Destination Setting the VPN Column Setting the Service Setting the Type of Action Setting the Type of Logging Gateway Installation Install On Comment Field Starting the Other SmartConsole Clients CPMgmt1-MgmtConnect-R75 2 Lezha Publications 2012

13 6 - Creating Network Objects Objectives Understand the type of objects that can be used in a Security Policy Create the Firewall object and change some parameters Establish trust between the SmartCenter and Firewall Understand how to set Anti-spoofing Know how to set the maximum concurrent connections through the Firewall Know how to break and reset Secure Internal communications (SIC) between a SmartCenter and Firewall Create the basic objects required for the classroom environment Approximate time for completing each section Section 1 Object Types 15 Minutes Section 2 Creating the Firewall Object 15 Minutes Section 3 Breaking SmartCenter & Firewall SIC 15 Minutes Section 3 Creating General Network Objects 25 Minutes Total time 70 Minutes Prerequisites Complete Module 5 Virtual machines Host1, mgmt-site1 & fw-site1 must be running 6-CPMgmt1-CreateObj-R75 DN Lezha Publications 2012

14 Contents 1 Object Types Object Types Creating Objects Network Objects Check Point Nodes Network Groups Dynamic Security Zones Others VoIP Domains Services, Resources, OPSEC, Users & VPN Communities Services Resources Servers & OPSEC Applications Users and Administrators VPN Communities Creating the Firewall Object Check Point Gateway Object Create a New Check Point Gateway Set the Hostname and IP address Set the Color to Red Select Check Point Software Blades Set Secure Internal Communications Changes to the Firewall Tab Option List HTTPS Inspection SecurePlatform Setting Logs And Masters Capacity Optimization Breaking SmartCenter and Firewall Communications Breaking and Resetting SIC Reset SIC on the Firewall Test Trust for the Firewall Object in the SmartCenter Reset SIC in the Firewall Object Creating General Network Objects Creating the Network Type Objects Create the Internal Network Network Object Broadcast Address Create the DMZ Network Create the External Network Create the Remote Site2 Network Creating Node Type Objects Create the Internal Server adsrv Create the Internal Workstation host Create the DMZ SMTP Server Host Create the DMZ Web/FTP Server Host Create the Class Room Web Server Host Creating External FTP servers for ftp.hp.com Using nslookup Creating the FTP Servers Cloning Objects Creating a Group Object Create the Classroom Router Gateway Object Summary of Objects Created Dealing with Anti-spoofing Setting the Topology Get Interfaces Setting Topology Get Interfaces with Topology (Anti-spoofing) Making Topology Changes CPMgmt1-CreateObj-R75 2 Lezha Publications 2012

15 7 - Creating Rules and Installing the Security Policy Objectives Create a Policy Package Add Rules to a Security Policy Understand how rules interact with each other Know how to install security policies Understand how to check the policy currently installed on a firewall Understand the difference between Implicit and Explicit rules Understand the risk of using implied rules for allowing DNS Understand how to break and reset SIC trust between a SmartCenter and Firewall Understand that Security Policies can be pulled from the SmartCenter as well as being pushed to a firewall Be aware of the services Check Point products use Approximate time for completing each section Section 1 Dealing with Policy Packages 10 Minutes Section 2 Adding Rules 40 Minutes Section 3 Policy installs 20 Minutes Section 4 Explicit and Implicit Rules 30 Minutes Section 5 Saved Versus the Installed Policy 10 Minutes Total time 110 Minutes Prerequisites Complete Module 6 Virtual machines Host1, Mgmt-Site1 & fw-site1 must be running 7-CPMgmt1-CreateRules-R75 DN Lezha Publications 2012

16 Contents 1 Dealing With Policy Packages Policy Packages Simplified or Traditional Policy Creating a New Policy Package Adding rules Adding rules Stealth Rule Internal Network Out bound Rule Cleanup Rule Broadcast Junk Rule SMTP Inbound Rule SMTP Outbound Rule Web Inbound Rule Firewall Secure Shell Access Rule Negating Objects in a Rule Reviewing the rules Rule Review - Firewall at Risk from the SMTP Server Internal Network at Risk from the SMTP Server Adding Rule Section Titles Rule Summary Policy Installs Installing the Policy Verifying the Security Policy Correcting the Policy after Verification Failures Setting the Policy Targets Installing the Policy Checking the Firewall Status Testing the Rules Firewall Existing Connections - Behavior Explicit and Implicit Rules Implicit Rules Viewing Implied Rules Turning Implied Rules Off Configuring DNS as an Implied Rule (Don t) Accept ICMP requests Rule Base Filtering Order Breaking SmartCenter to Firewall Connectivity with Implied rules Break SmartCenter to Firewall Connectivity SmartCenter Connectivity Recovery - cpstop/cpstart SmartCenter Connectivity Recovery SIC Reset SmartCenter Connectivity Recovery fw unloadlocal SmartCenter Connectivity Recovery fw fetch mgmt (Use this) SmartCenter and Firewall Services Check Point FW Services Check Point CP Services SmartCenter to Firewall Explicit Rule (For Safety) Saved Versus the Installed Policy Saved Policy Installed Policy CPMgmt1-CreateRules-R75 2 Lezha Publications 2012

17 8 - SmartView Tracker Objectives Create log events using a scanner Know the different tabs in the SmartView Tracker, Log, Active, Management Use filters to display different log details Understand the events in the Active view Understand the events in the Management view Know how to rotate log files Know how to export log files to third party products Fetch log files from remote firewall modules Create simple filtered searches Know how to create custom commands in SmartView Tracker Approximate time for completing each section Section 1 Generate Traffic Using a Network Scanner 10 Minutes Section 2 SmartView Tracker 40 Minutes Total time 50 Minutes Prerequisites Complete Module 7 Virtual Machines mgmt-site1, fw-site1, host1 & ClassRouter must be running 8-CPMgmt1-SmartViewTracker-R75 DN Lezha Publications 2012

18 Contents 1 Generate Traffic Using a Network Scanner Scan Set the IP Address Range to Scan Check the Type and Ports to Scan Run the Scan Check Log Events Generated SmartView Tracker Log Tabs, Log, Active, Audit Network & Endpoint Active Management Predefined Filters Rotating, Archiving and Exporting Logs Rotating Log Files Archiving Log Files Exporting Log Files Fetching Log Files from the Firewall Searching and Custom Filters Filter Options Doing Simple Searches Custom Filters View Query Properties Custom Commands Adding a Secure Shell Custom Command Log Parameters in the SmartDashboard Log Type Firewall Object SmartCenter Policy Global Properties Logging to an Alternative Directory CPMgmt1-SmartViewTracker-R75 2 Lezha Publications 2012

19 9 - SmartView Monitor Objectives Know the type of information monitored Know how to set alert types for specific events Know the licensing requirement for SmartView Monitor Use SmartTracker Active Log to block connections User SmartView Monitor to view blocked connections Use SmartView Monitor to block connections Approximate time for completing each section Section 1 SmartView Monitor General Status 10 Minutes Section 2 SmartView Monitor Traffic Statistics 20 Minutes Section 3 Suspicious Activity Monitoring (SAM) 20 Minutes Total time 50 Minutes Prerequisites Complete Module 8 Virtual Machines mgmt-site1, fw-site1, Host1 & ClassRouter must be running 9-CPMgmt1-SmartViewMonitor-R75 DN Lezha Publications 2012

20 Contents 1 SmartView Monitor Gateway Status Filtered views Gateway Properties Other Objects SmartCenter Object System Information Licences Certificate Authority Status and Connected Clients Disconnecting SmartConsole Clients Firewall Object System Information Threshold Settings Global, None, Custom System Alert Daemon SmartView Monitor Traffic Statistics Traffic Statistics Enable SmartMonitor on the Firewall Generate Some Traffic Traffic & System Counters Suspicious Activity Monitoring (SAM) Suspicious Activity Monitoring and Filter Location Using SmartView Tracker Active Log Create a Suspicious Connection View Connection in the SmartView Tracker Active Tab Select Tools Block Intruder Kill Connection for three Minutes Test Connection Rejects and Alerts Clear all SAM Connections fw sam f All D Test Connections Work Using SmartView Monitor - Tools Create a Suspicious Connection View Connection in SmartView Tracker Active Tab Select Tools and Block Intruder View all SAM rules using SmartView Monitor Delete the SAM Rule Create a New SAM Rule Using SmartView Monitor Test the New SAM Rule CPMgmt1-SmartViewMonitor-R75 2 Lezha Publications 2012

21 10 - SmartUpdate Objectives Know how to access the Check Point User Center Know how to manage licenses Understand the purpose of the Contracts file Know how to attach and detach licenses Know the functions that a free in SmartUpdate Approximate time for completing each section Section 1 Check Point User Center 10 Minutes Section 2 SmartUpdate Managing Licenses 15 Minutes Total time 25 Minutes Prerequisites Complete Module 9 Virtual machines mgmt-site1, fw-site1, Host1 and ClassRouter should be running 10-CPMgmt1-SmartUpdate-R75 DN Lezha Publications 2012

22 Contents 1 Check Point User Center Logging into the User Center Viewing Account Information Viewing Product information Products and Licenses Contracts File Creating Licenses Central or Local licenses SmartCenter IP Address Changing Licensed IP Address Full Version Upgrades Require New Licenses R75 Blade licenses Management Blades Network Security Blades SmartUpdate Managing Licenses Using SmartUpdate Licenses and Contracts Product and Package Information Generating cpinfo data Adding Licenses & Contracts Attaching and Detaching Licenses CPMgmt1-SmartUpdate-R75 2 Lezha Publications 2012

23 11 - Working with the Security Policy Objectives Know how to use Revision Control. Use the features of the SmartDashboard to Disable, hide and search for objects in the rulebase. Understand pre-defined services and the timeouts associated with them. Understand how to create new services (ports) and the risks associated with them. Understand how to abuse and tunnel services over standard ports. Adjust the security policy to increase the security checking of the policy. Understand that even a simple addition to the security policy rules can require careful risk analysis. Approximate time for completing each section Section 1 Policy Revision Control 20 Minutes Section 2 Rule display 15 Minutes Section 3 Dealing with Services 30 Minutes Section 4 Adding More Rules 30 Minutes Section 5 Simple Systems Analysis for Rule Evaluation 10 Minutes Total time 105 Minutes Prerequisites Complete Module 10 Virtual machines mgmt-site1, fw-site1 Host1 & ClassRouter must be running 11-CPMgmt1-WorkingWiththePolicy-R75 DN Lezha Publications 2012

24 Contents 1 Policy Revision Control Database Revision Control Creating Revisions Where are Revisions Stored Viewing Revisions Rolling Back Revisions Rule Display Rule Display and Policy Interaction Hiding Rules Disabling Rules Rule Filters Object Location Where Used Finding Objects in Rules Dealing with Services Predefined Services and the Inspection Engine TCP UDP ICMP RPC DCE RPC Other Basic Filtering & IPS Interaction Creating Services Creating a TCP Service and Naming Convention Advanced Properties - Session Timeout and Filtering Two Service Objects Using the Same Port Number Applying the New Service to a Rule Abusing a Standard Service Tunneling over DNS (TCP) IPS Filtering for DNS TCP Default is Off Turn on DNS TCP in the Policy Global Properties Edit the Telnet Server Port on & host1.site1.com Test the Security Policy Oops Adding More Rules Current Rules check DNS rule Create the DNS Server Objects Type Host Add the DNS Rule Add the Internal DNS Servers Modify the DNS Rule Outgoing Rule for HP FTP Servers Add the FTP Outgoing Rule Restricting the Outgoing Rule Modify the Outgoing Rule Modify the FTP Outgoing Rule Delete the Disabled Outgoing Rule Current Security Policy Rules Check Verify and Install the policy Simple Systems Analysis for Rule Evaluation How to Evaluate From A to B allow FTP when B is your Server How to Solve the Problem of Abusing Ports CPMgmt1-WorkingWiththePolicy-R75 2 Lezha Publications 2012

25 12 - Setting up User Account Authentication Objectives Know how to add new SmartCenter administrator accounts Know the authentication schemes that Check Point can use, OS Password, Internal Password, RADIUS, TACACS, SecurID Create User Accounts, Groups and Templates Know the authentication database and Daemons used for Authentication Know how to export the user database Know the three types of authentication used, User, Session & Client Approximate time for completing each section Section 1 Creating Administrator Accounts 30 Minutes Section 2 Creating Firewall Rule Authentication Accounts 20 Minutes Section 3 Authentication Processes 20 Minutes Total time 70 Minutes Prerequisites Complete Module 11 Virtual Machines mgmt-site1, fw-site1, Host1 & ClassRouter must be running 12-CPMgmt1-SettingUpAuth-R75 DN Lezha Publications 2012

26 Contents 1 Creating Administrator Accounts Administrator Accounts cpconfig SmartDashboard Administrators Administrator Profile Admin - Groups Administrator Authentication Schemes Using Certificates Testing Administrator Account Using a RADIUS Server Create a RADIUS Server Object Create another administrator Use - RADIUS Authentication Creating Firewall Rule Authentication Accounts Users for Firewall Rule Authentication Supported Authentication Schemes Firewall - Enabled Authentication Schemes Access Role and Legacy Users Access Creating User Groups Creating User Templates Creating User Accounts Authentication Processes User Administration Database & Daemons fwauth.ndb fwauthd.conf Exporting & Importing the User Database External User Profiles Match all Users Match by Domain Authentication and Security Rules User Authentication Session Authentication Client Authentication CPMgmt1-SettingUpAuth-R75 2 Lezha Publications 2012

27 13 - Using User Authentication Objectives Know the Services that can be used with User Authentication Know the daemons associated with User Authentication Complete User Authentication using telnet Complete User Authentication using FTP Complete User authentication using HTTP Understand the problem with User Auth & Accept rule clashes Use tcpdump to sniff Usernames/Passwords Approximate time for completing each section Section 1 User Authentication 35 Minutes Section 2 Using Authentication from internal Networks Rule clashes 30 Minutes Section 3 User Login Details - tcpdump 15 Minutes Total time 80 Minutes Prerequisites Complete Module 12 Virtual machines mgmt-site1, fw-site1, Host1, asdrv01 & ClassRouter must be running 13-CPMgmt1-AuthUser-R75 DN Lezha Publications 2012

28 Contents 1 User Authentication User Authentication Daemons & Process Authentication Daemons and Supported Services User Authentication Policy Global Properties Welcome Message Authentication Using Telnet Add a telnet Authentication rule Check Rule Properties Intersect with User Database Installing the Policy and Testing Authentication Authentication Using http Add an http Authentication rule Check Rule Properties Allowed http Servers Adding predefined servers Installing the policy and Testing Authentication Authentication Using FTP Add an Authentication rule Format of User/Password for Authenticating Using FTP Installing the Policy and Testing Authentication Basic Authentication Summary Multiple Rules or a Single Rule Removing the Check Point Prompt Using Authentication from Internal Networks Rule clashes Authentication Behavior Source IP Address Changing the Behavior GuiDBedit Using http for Authentication from Internal Networks Adding the Internal Out http Authentication Rule Reason for Authentication Not Being Enforced Correctly Implementing the Authentication Rules User Login Details tcpdump Stealing User Login Information Packet trace using tcpdump Packet trace using tcpdump and Wireshark CPMgmt1-AuthUser-R75 2 Lezha Publications 2012

29 14 - Using Session Authentication Objectives Understand how Session Authentication works Install and use the Session Agent Understand the limitation of Session authentication Approximate time for completing each section Section 1 Session Authentication 35 Minutes Total time 35 Minutes Prerequisites Complete Module 13 Virtual machines mgmt-site1, fw-site1 Host1 & ClassRouter must be running 14-CPMgmt1-AuthSession-R75 DN Lezha Publications 2012

30 Contents 1 Session Authentication Session Authentication Daemon & Process Authentication Daemon & Supported Services Installing the Session Agent Agent Install Agent Behavior Every Connection or Per Session Problems with Agent Access Port Authentication Using FTP Add an Authentication rule Installing the Policy and Testing Authentication Session Agent Using SSL Encryption Using Every request Authentication CPMgmt1-AuthSession-R75 2 Lezha Publications 2012

31 15 - Using Client Authentication Objectives Know the daemons that Client Authentication uses Know the port numbers used by Client Authentication daemons Know the different sign-on methods for Client Authentication Use client authentication with FTP Approximate time for completing each section Section 1 Client Authentication 60 Minutes Section 2 External User Database - LDAP 40 Minutes Total time 100 Minutes Prerequisites Complete Module 14 Virtual machines mgmt-site1, fw-site1, Host1, adsrv01, & ClassRouter must be running 15-CPMgmt1-AuthClient-R75 DN Lezha Publications 2012

32 Contents 1 Client Authentication Client Authentication Daemons & Process Authentication Daemons & Supported Services Client Authentication Policy Global Properties Welcome Message Client Authentication and the Perimeter Router/Firewall Client Authentication Details Client Authentication aclientd, Port Client Authentication ahclientd, Port Controlling the Number of Sessions and Time Period Client Authentication Sign On Methods Authentication Using FTP Manual Authentication Add an Authentication rule Installing the Policy and Testing FTP Access Authentication Using Secure Shell Add an Authentication rule Installing the Policy and Testing Secure Shell Access Authentication Using a Different Port Number Edit the fwauthd.conf File Test the Authentication Using a Different Port Number Add a Rule to Allow Port 2590 Access to the Firewall Port 259 and 900 Versus a Different Port Client Authentication Using https Edit the fwauthd.conf File on the firewall External User Database LDAP LDAP Server Using Active Directory Check the Details of the AD Server Listing the DN for all Users Create an AD Account for Check Point Firewall Service Access Create an LDAP Account Unit Turn on SmartDirectory for Security Gateways Create an LDAP User Group Fetching the LDAP Account Unit Tree of Data Add a Client Authentication Rule for the LDAP Group Test the LDAP Authentication Check Point LDAP Account, Domain Admin or Not Change Privilege Level Remove Domain Admin Enable LDAP SSL Encryption CPMgmt1-AuthClient-R75 2 Lezha Publications 2012

33 16- Identity Awareness Objectives Understand how Identity Awareness works Understand the use of AD Query Understand the use of Captive Portal Understand the use of Identity Agents Approximate time for completing each section Section 1 Current Rules Check 5 Minutes Section 2 Current Objects Check 10 Minutes Section 3 Identity Awareness 45 Minutes Total time 60 Minutes Prerequisites Complete Module 15 Virtual machines mgmt-site1, fw-site1, Host1, adsrv01 & ClassRouter must be running. 16-CPMgmt1-IdentityAwareness-R75 DN Lezha Publications 2012

34 Contents 1 Current Rules Check Current Rules Disable the Legacy Authentication Rules Current Objects Check Current Objects Network Objects Services Servers and OPSEC Applications Users and Administrators Identity Awareness Identity Awareness User Databases AD Query Captive Portal Identity Agent Enabling Identity Awareness Blade License Check the AD User Account Enabling Identity Awareness on the Gateway Object Using Identity Awareness with AD Query Check the AD Server Users Security Rules using Active Directory Query Standalone Workstation Domain Member Workstation Using Identity Awareness with Captive Portal Configuring the Captive Portal Security Rule using Captive Portal Extending the Rule for Captive Portal Add Telnet and FTP to the Access Role Rule Using Identity Awareness with Identity Agents Type of Agents Deployment of Agents Security Rule using Identity Agent CPMgmt1-IdentityAwareness-R75 2 Lezha Publications 2012

35 17 - Network Address Translation Objectives Know the networks defined in RFC1918 Understand that NAT may cause Client/Server connection problems Understand the NAT setting in Global Properties Know how to use Hide/Dynamic NAT Know how to use Static NAT Know which NAT method to apply for a given situation Understand the important of ARPs in relation to Static NAT Use NAT in a Security Policy Approximate time for completing each section Section 1 Rules Check 10 Minutes Section 2 Network Address Translation 30 Minutes Section 3 Using Network Address Translation - Basic 35 Minutes Section 4 Using Network Address Translation - Advanced 30 Minutes Total time 1 Hr 45 Min Prerequisites Complete Module 16 Virtual machines mgmt-site1, fw-site1, ClassRouter & Host1 must be running 17-CPMgmt1-NAT-R75 DN Lezha Publications 2012

36 Contents 1 Rules Check Current Rules Create a New Policy using Save As Clean up the Current Rules Rule Summary before starting Network Address Translation Network Address Translation Basic Network Address Translation RFC Problems with NAT NAT Properties Policy Global Properties - NAT Client Side NAT Server Side NAT Objects and the NAT Tab Hide/Dynamic NAT Hide NAT - Automatic Rules Hide NAT - Manual Rules Static NAT Static NAT Automatic Rules Static NAT Manual Rules Problems with Static NAT Manual Rules Why does the Firewall need Proxy ARPs Creating Proxy ARPs Using Network Address Translation - Basic Testing a connection without NAT Create a Connection to Check the Source Address using netstat a on Implementing Hide/Dynamic NAT Hide NAT - Automatic Rules Hide NAT - Automatic Rule Testing Hide NAT - Manual Rules Hide NAT - Manual Rules Testing Implementing Static NAT Static NAT Automatic Rules State Table ARP Entries fw tab t arp_table or fw ctl arp Static NAT Automatic Rule Testing Static NAT Automatic Rules, Policy Rule Matching Static NAT Manual Rules Using Network Address Translation - Advanced Implementing Static NAT and Port Mapping Static NAT Automatic Rule Problem Using Different Ports Static NAT Manual Rules with Port Mapping Hiding a Server on the External Network from the Internet Taking advantage of ARPs Static NAT without Proxy ARPs, Routed Networks CPMgmt1-NAT-R75 2 Lezha Publications 2012

37 18 Intrusion Prevention System (IPS) Objectives Know how to create IPS Profiles Understand the typical network features IPS protects against Understand where Application Intelligence fits into the Security Policy Know how to use the features of Web Intelligence to protect web servers and http traffic Change settings in IPS, apply them a Security Policy and test the features Approximate time for completing each section Section 1 IPS and Firewalls 10 Minutes Section 2 IPS Features 40 Minutes Total time 50 Minutes Prerequisites Complete Module 17 Virtual machines mgmt-site1, fw-site1, ClassRouter & Host1 must be running 18-CPMgmt1-IPS-R75 DN Lezha Publications 2012

38 Contents 1 IPS and Firewalls Basic Intrusion Prevention System (IPS) IPS Blade Requires a License Profile Management Profile Assignment Protections IPS Blade Features Network Security Streaming Engine Settings Anti-Spoofing Configuration Status Denial of Service IP and ICMP TCP Fingerprint Scrambling DShield Storm Center Port Scan NTP Application Intelligence Mail FTP Microsoft Networks Peer to Peer Instant Messengers DNS VOIP VPN Protocols Remote Control Applications The Others Web Intelligence Malicious Code Application Layer Information Disclosure HTTP Protocol Inspection CPMgmt1-IPS-R75 2 Lezha Publications 2012

39 19 - Content Security Servers Objectives Understand how Content Security server work at the application level and not the kernel level Create Resources that can be used with the Content Security Servers Make use of the HTTP Content Security Server Make use of the FTP Content Security Server Understand how CVP Servers integrate with the Content Security Servers Understand how UFP Servers integrate with the Content Security Servers Approximate time for completing each section Section 1 Content Security Servers 10 Minutes Section 2 HTTP Content Security 30 Minutes Section 3 FTP content Security 35 Minutes Section 4 CVP and UFP Servers 30 Minutes Total time 1 Hr 45 Min Prerequisites Complete Module 18 Virtual machines mgmt-site1, fw-site1, Host1 & ClassRouter must be running 19-CPMgmt1-ContentSecurityServers-R75 DN Lezha Publications 2012

40 Contents 1 Security Policy Rules Check Create New Policy with Basic Rules Content Security Servers Content Security Servers Servers and Processes, HTTP, FTP, SMTP Resouces (filters) Example Rules HTTP Content Security Server HTTP Resources Creating an HTTP Resource Query Word Filter Creating an HTTP Resource Strip Java Creating an HTTP Resource Block an IP Address Using URI Resources in Rules Testing the Resources URI Match Example file FTP Content Security Server FTP Resources Creating an FTP Resource Filter Options Apply the Resources to a Rule Testing the Resource SMTP Content Security Server SMTP Resources Creating an SMTP Resource Apply the Resource to a Rule CVP and UFP Servers CVP Creating a CVP Server UFP Creating a UFP Server Using OPSEC Groups Creating a Group Load Balancing or Chaining CPMgmt1-ContentSecurityServers-R75 2 Lezha Publications 2012

41 20 - Managing Multiple Firewalls Objectives Create a second SecurePlatform firewall Establish trust and take control of the firewall Install a Basic Security Policy Understand the use of Single or Multiple Security Policies when managing multiple firewalls Create log data and filter traffic based on the Firewall Origin Approximate time for completing each section Section 1 Managing Multiple Firewalls 15 Minutes Section 2 Creating fw.site2.com 80 Minutes Total time 1Hr 35 Min Prerequisites Complete Module 19 Virtual machines mgmt-site1, fw-site1, Host1 & ClassRouter must be running Virtual machine fw-site2 20-CPMgmt1-ManagingMultipleFirewalls-R75 DN Lezha Publications 2012

42 Contents 1 Managing Multiple Firewalls Creating the Virtual Machine Virutal Machine Type Linux, Red Hat Installing SecurePlatform Installing SPLAT Managing Multiple Firewalls SmartCenter License Firewall Module License Creating fw.site2.com Creating fw.site2.com Turn on Logging for Implied Rules Creating the Firewall Object fw.site2.com Establishing Trust SIC Communication Topology Writing Rules Installing the Policy Testing the Policy & Generating Log Traffic Log Origin Managing Multiple Firewalls Single Policy or Multiple Polices Creating Multiple Policies CPMgmt1-ManagingMultipleFirewalls-R75 2 Lezha Publications 2012

43 21 - Backups and Recovery Procedures Objectives Understand how to use upgrade_export to backup a SmartCenter Understand how to use upgrade_import to clone a SmartCenter Understand how to migrate a SmartCenter from a Windows platform to Check Points SecurePlatform Know how to create backups of the Firewall Know how to restore from backups Know how to create snapshot images Know how to restore from a snapshot image Approximate time for completing each section Section 1 Backing up the SmartCenter 60 Minutes Section 2 Backing up the Firewall on SPLAT 45 Minutes Section 3 SPLAT Maintenance Mode 15 Minutes Total time 2 Hrs Prerequisites Complete Module 20 Virtual machines mgmt-site1, fw-site1, Host1 & ClassRouter must be running 21-CPMgmt1-BackupsAndRecovery-R75 DN Lezha Publications 2012

44 Contents 1 Backing up the SmartCenter SmartCenter Configuration - upgrade_export & upgrade_import Using upgrade_export upgrade_export and Policy Revisions Rebuilding a SmartCenter upgrade_import Building a Virtual Machine for the SecurePlatform SmartCenter Creating a base Install Copying the upgrade_export file cpexport.tgz to the SecurePlatform Completing the Install Run sysconfig Testing the Install Reset the Environment back to using the Original SmartCenter Backing up the Firewall on SecurePlatform Creating Backups backup Create a backup of the Firewall backup is just an alias Setting Automated Backups using the WebGUI Local backup Directory Recovering a Backup file using restore Using Restore to recover a Firewall Snapshot Images snapshot Creating a snapshot The snapshot Directory Restoring snapshot Images revert Restore a snapshot Using revert SPLAT Maintenance Mode Maintenance Mode Single User Mode Boot into Maintenance Mode Single User CPMgmt1-BackupsAndRecovery-R75 2 Lezha Publications 2012

Q&As Check Point Certified Security Administrator

Q&As Check Point Certified Security Administrator CertBus.com 156-215.77 Q&As Check Point Certified Security Administrator Pass CheckPoint 156-215.77 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee

More information

CheckPoint q. Exam Code: Exam Name: Check Point Security Administration Featuring GAiA R77

CheckPoint q. Exam Code: Exam Name: Check Point Security Administration Featuring GAiA R77 CheckPoint.156-215.77.350q Number: 156-215.77 Passing Score: 800 Time Limit: 120 min File Version: 12.5 Exam Code: 156-215.77 Exam Name: Check Point Security Administration Featuring GAiA R77 Exam A QUESTION

More information

Course Modules for CCSE R77 (Check Point Certified Security Expert) Training Online

Course Modules for CCSE R77 (Check Point Certified Security Expert) Training Online Course Modules for CCSE R77 (Check Point Certified Security Expert) Training Online 1 Introduction to Check Point Technology A) Check Point Security Management Architecture(SMART) Smart Console Security

More information

exam.250q

exam.250q 156-215.77.exam.250q Number: 156-215.77 Passing Score: 800 Time Limit: 120 min File Version: 1 Checkpoint 156-215.77 Check Point Certified Security Administrator Sections 1. Volume A 2. Volume B 3. Volume

More information

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

PrepAwayExam.   High-efficient Exam Materials are the best high pass-rate Exam Dumps PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 156-215.75 Title : Check Point Certified Security Administrator Vendor : CheckPoint

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 156-210 Title : Check Point CCSA NG Vendors : CheckPoint Version : DEMO

More information

Exam : Title : Accelerated CCSE NGX ( )... Version : Demo

Exam : Title : Accelerated CCSE NGX ( )... Version : Demo Exam : 156-915 Title : Accelerated CCSE NGX (156-915.1)... Version : Demo 1.You have two Nokia Appliances one IP530 and one IP380. Both Appliances have IPSO 39 and VPN-1 Pro NGX installed in a distributed

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 156-915 Title : Accelerated CCSE NGX (156-915.1)... Vendors : CheckPoint

More information

Exam Code:

Exam Code: Exam Code: 156-215.13 Number: 156-215.13 Passing Score: 800 Time Limit: 120 min File Version: 15.2 http://www.gratisexam.com/ Exam Code: 156-215.13 Exam Name: Check Point Certified Security Administrator

More information

What is the main purpose for the Security managementserver?

What is the main purpose for the Security managementserver? Question 1: What is Checkpoint Firewall Architecture? Check Point has developed a Unified Security Architecture that is implemented throughout all of its security products. This Unified Security Architecture

More information

Exam Questions

Exam Questions Exam Questions 156-215.77 Check Point Certified Security Administrator GAiA https://www.2passeasy.com/dumps/156-215.77/ 1. What is the officially accepted diagnostic tool for IP Appliance Support? A. ipsoinfo

More information

Number: Passing Score: 800 Time Limit: 120 min File Version:

Number: Passing Score: 800 Time Limit: 120 min File Version: 156-215.77 Number: 156-215.77 Passing Score: 800 Time Limit: 120 min File Version: 7.0 156-215.77 Check Point Certified Security Administrator Version 7.0 Sections 1. Volume A 2. Volume B 3. Volume C 4.

More information

Security Management Server. Administration Guide Version R70

Security Management Server. Administration Guide Version R70 Security Management Server Administration Guide Version R70 701676 March 8, 2009 2003-2009 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

Checkpoint Exam Check Point Certified Security Administrator GAiA Version: 6.2 [ Total Questions: 358 ]

Checkpoint Exam Check Point Certified Security Administrator GAiA Version: 6.2 [ Total Questions: 358 ] s@lm@n Checkpoint Exam 156-215.13 Check Point Certified Security Administrator GAiA Version: 6.2 [ Total Questions: 358 ] Topic break down Topic No. of Questions Topic 1: Volume A 100 Topic 2: Volume B

More information

Checkpoint Check Point NG with Application Intelligence - Management I. Practice Test. Version 1.2

Checkpoint Check Point NG with Application Intelligence - Management I. Practice Test. Version 1.2 Checkpoint 156-210 156-210.4 Check Point NG with Application Intelligence - Management I Practice Test Version 1.2 QUESTION NO: 1 Checkpoint 156-210: Practice Exam Once you have installed Secure Internal

More information

CheckPoint VPN-1/FireWall-1 Management I NG.

CheckPoint VPN-1/FireWall-1 Management I NG. CheckPoint 156-210 VPN-1/FireWall-1 Management I NG http://killexams.com/exam-detail/156-210 QUESTION: 228 In Log Viewer GUI what option do you select to delete all entries in the log file, regardless

More information

Vendor: Check Point. Exam Code: Exam Name: Check Point Certified Security Administrator. Version: Demo

Vendor: Check Point. Exam Code: Exam Name: Check Point Certified Security Administrator. Version: Demo Vendor: Check Point Exam Code: 156-215.77 Exam Name: Check Point Certified Security Administrator Version: Demo QUESTION 1 You manage a global network extending from your base in Chicago to Tokyo, Calcutta

More information

SmartCenter. Version NGX R61

SmartCenter. Version NGX R61 SmartCenter Version NGX R61 701676 March 2006 2003-2006 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under

More information

Security Gateway Virtual Edition

Security Gateway Virtual Edition Security Gateway Virtual Edition R75.20 Administration Guide 4 March 2012 Classification: [Restricted] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation

More information

Firewall. Administration Guide Version R70

Firewall. Administration Guide Version R70 Firewall Administration Guide Version R70 March 5, 2009 2003-2009 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed

More information

BraindumpsQA. IT Exam Study materials / Braindumps

BraindumpsQA.  IT Exam Study materials / Braindumps BraindumpsQA http://www.braindumpsqa.com IT Exam Study materials / Braindumps Exam : 156-315.71 Title : Check Point Certified Security Expert R71 Vendors : CheckPoint Version : DEMO Get Latest & Valid

More information

HySecure Quick Start Guide. HySecure 5.0

HySecure Quick Start Guide. HySecure 5.0 HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current

More information

Checkpoint Exam Check Point NG with Application Intelligence - Management I Version: 3.2 [ Total Questions: 241 ]

Checkpoint Exam Check Point NG with Application Intelligence - Management I Version: 3.2 [ Total Questions: 241 ] s@lm@n Checkpoint Exam 156-210 Check Point NG with Application Intelligence - Management I Version: 3.2 [ Total Questions: 241 ] Question No : 1 Once you have installed Secure Internal Communcations (SIC)

More information

Security Gateway Virtual Edition

Security Gateway Virtual Edition Security Gateway Virtual Edition R71 Release Notes 9 February 2012 Classification: [Restricted] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are

More information

Stonesoft Management Center. Release Notes for Version 5.6.1

Stonesoft Management Center. Release Notes for Version 5.6.1 Stonesoft Management Center Release Notes for Version 5.6.1 Updated: January 9, 2014 Table of Contents What s New... 3 Fixes... 3 System Requirements... 6 Basic Management System Hardware Requirements...

More information

VPN-1 Power/UTM. Administration guide Version NGX R

VPN-1 Power/UTM. Administration guide Version NGX R VPN-1 Power/UTM Administration guide Version NGX R65.2.100 January 15, 2009 2003-2009 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by

More information

High Availability Synchronization PAN-OS 5.0.3

High Availability Synchronization PAN-OS 5.0.3 High Availability Synchronization PAN-OS 5.0.3 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Device Configuration... 4 Network Configuration... 9 Objects Configuration...

More information

Check Point for Nokia IPSO Getting Started Guide. Check Point NGX R62 Nokia IPSO 3.9, 4.1 and 4.2

Check Point for Nokia IPSO Getting Started Guide. Check Point NGX R62 Nokia IPSO 3.9, 4.1 and 4.2 Check Point for Nokia IPSO Getting Started Guide Check Point NGX R62 Nokia IPSO 3.9, 4.1 and 4.2 Part No. N450000362 Rev 001 Published January 2007 COPYRIGHT 2007 Nokia. All rights reserved. Rights reserved

More information

SmartDashboard Terms you ll need to understand: Concepts you ll need to master:

SmartDashboard Terms you ll need to understand: Concepts you ll need to master: 3 SmartDashboard............................................... Terms you ll need to understand: Network object Cleanup rule Stealth rule Anti-spoofing Concepts you ll need to master: Creating an object

More information

Check Point R75 Management Essentials Part 2. Check Point Training Course. Section Heading Index. Module 1 Encryption... 3

Check Point R75 Management Essentials Part 2. Check Point Training Course. Section Heading Index. Module 1 Encryption... 3 www.elearncheckpoint.com Check Point R75 Management Essentials Part 2 Check Point R75 Management Essentials Part 2 Check Point Training Course Section Heading Index Module 1 - Encryption... 3 Module 2

More information

Data Loss Prevention. R75.40 Hotfix. Getting Started Guide. 3 May Classification: [Protected]

Data Loss Prevention. R75.40 Hotfix. Getting Started Guide. 3 May Classification: [Protected] Data Loss Prevention R75.40 Hotfix Getting Started Guide 3 May 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are

More information

Fundamentals of Network Security v1.1 Scope and Sequence

Fundamentals of Network Security v1.1 Scope and Sequence Fundamentals of Network Security v1.1 Scope and Sequence Last Updated: September 9, 2003 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document

More information

Check Point Certified Security Expert NGX R65.

Check Point Certified Security Expert NGX R65. CheckPoint 156-315.65 Check Point Certified Security Expert NGX R65 TYPE: DEMO http://www.examskey.com/156-315.65.html Examskey CheckPoint 156-315.65 exam demo product is here for you to test the quality

More information

Inspection of Router-Generated Traffic

Inspection of Router-Generated Traffic Inspection of Router-Generated Traffic The Inspection of Router-Generated Traffic feature allows Context-Based Access Control (CBAC) to inspect traffic that is originated by or destined to the router on

More information

Exam : Title : Check Point Certified Expert NGX R65. Version : DEMO

Exam : Title : Check Point Certified Expert NGX R65. Version : DEMO Exam : 156-315.65 Title : Check Point Certified Expert NGX R65 Version : DEMO 1. What action can be run from SmartUpdate NGX R65? A. remote_uninstall_verifier B. upgrade_export C. mds_backup D. cpinfo

More information

AccessEnforcer Version 4.0 Features List

AccessEnforcer Version 4.0 Features List AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect

More information

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with Check Point Security Gateway

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with Check Point Security Gateway SafeNet Authentication Manager Integration Guide SAM using RADIUS Protocol with Check Point Security Gateway Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013

More information

Check Point VPN-1 Pro NGX IPv6Pack for Nokia Getting Started Guide. Check Point VPN-1 Pro NGX IPv6Pack Nokia IPSO 3.9 or 4.0

Check Point VPN-1 Pro NGX IPv6Pack for Nokia Getting Started Guide. Check Point VPN-1 Pro NGX IPv6Pack Nokia IPSO 3.9 or 4.0 Check Point VPN-1 Pro NGX IPv6Pack for Nokia Getting Started Guide Check Point VPN-1 Pro NGX IPv6Pack Nokia IPSO 3.9 or 4.0 Part No. N450000141 Rev 001 Published March 2006 COPYRIGHT 2006 Nokia. All rights

More information

Checkpoint Exam Check Point Certified Security Administrator GAiA Version: 7.1 [ Total Questions: 358 ]

Checkpoint Exam Check Point Certified Security Administrator GAiA Version: 7.1 [ Total Questions: 358 ] s@lm@n Checkpoint Exam 156-215.76 Check Point Certified Security Administrator GAiA Version: 7.1 [ Total Questions: 358 ] Topic break down Topic No. of Questions Topic 1: Volume A 100 Topic 2: Volume B

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

CheckPoint Accelerated CCSE 1.1 NGX. Download Full Version :

CheckPoint Accelerated CCSE 1.1 NGX. Download Full Version : CheckPoint 156-915-1 Accelerated CCSE 1.1 NGX Download Full Version : https://killexams.com/pass4sure/exam-detail/156-915-1 A. Do nothing. Old logs are deleted, until free space is restored. B. Do nothing.

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

Installation and Upgrade Guide

Installation and Upgrade Guide Installation and Upgrade Guide R76 4 April 2013 Classification: [Protected] 2013 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

Software Blades R7x. CC Evaluated Configuration Administration Guide

Software Blades R7x. CC Evaluated Configuration Administration Guide Software Blades R7x CC Evaluated Configuration Administration Guide March 2012 2003-2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Check Point 1100 Appliances Frequently Asked Questions

Check Point 1100 Appliances Frequently Asked Questions CHECK POINT SOFTWARE TECHNOLOGIES Check Point 1100 Appliances Frequently Asked Questions Table of Contents Overview:... 2 Ordering Information:... 3 Technology:... 4 Hardware:... 6 Performance:... 6 Updated

More information

Remote Access Clients for Windows 32-bit/64-bit

Remote Access Clients for Windows 32-bit/64-bit Remote Access Clients for Windows 32-bit/64-bit R75 HFA1 EA Release Notes 31 January 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

R Release Notes. 6 March Classification: [Protected] [Restricted] ONLY for designated groups and individuals

R Release Notes. 6 March Classification: [Protected] [Restricted] ONLY for designated groups and individuals R75.46 Release Notes 6 March 2013 Classification: [Protected] 2013 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed

More information

High Availability Deployment

High Availability Deployment April 18, 2005 Overview Introduction This addendum provides connectivity and configuration task overviews for connecting two M appliances as a high availability (HA) cluster pair. For detailed configuration

More information

WatchGuard System Manager Fireware Configuration Guide. WatchGuard Fireware Pro v8.1

WatchGuard System Manager Fireware Configuration Guide. WatchGuard Fireware Pro v8.1 WatchGuard System Manager Fireware Configuration Guide WatchGuard Fireware Pro v8.1 Notice to Users Information in this guide is subject to change without notice. Companies, names, and data used in examples

More information

CheckPoint Exam Questions & Answers

CheckPoint Exam Questions & Answers CheckPoint 156-215.75 Exam Questions & Answers Number: 156-215.75 Passing Score: 800 Time Limit: 120 min File Version: 22.5 http://www.gratisexam.com/ CheckPoint 156-215.75 Exam Questions & Answers Exam

More information

Firewall R75. Administration Guide

Firewall R75. Administration Guide Firewall R75 Administration Guide 15 December 2010 2010 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under

More information

Check Point VPN-1 Pro NGX IPv6Pack Release Notes May 10, 2006

Check Point VPN-1 Pro NGX IPv6Pack Release Notes May 10, 2006 Check Point VPN-1 Pro NGX IPv6Pack Release Notes May 10, 2006 IMPORTANT Check Point recommends that customers stay up-to-date with the latest service packs and versions of security products, as they contain

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

Port Mirroring in CounterACT. CounterACT Technical Note

Port Mirroring in CounterACT. CounterACT Technical Note Table of Contents About Port Mirroring and the Packet Engine... 3 Information Based on Specific Protocols... 4 ARP... 4 DHCP... 5 HTTP... 6 NetBIOS... 7 TCP/UDP... 7 Endpoint Lifecycle... 8 Active Endpoint

More information

How to Configure ClusterXL for L2 Link Aggregation

How to Configure ClusterXL for L2 Link Aggregation How to Configure ClusterXL for L2 Link Aggregation User Guide 15 January 2013 Classification: [Protected] 2013 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation

More information

Virtual Appliance User s Guide

Virtual Appliance User s Guide Cast Iron Integration Appliance Virtual Appliance User s Guide Version 4.5 July 2009 Cast Iron Virtual Appliance User s Guide Version 4.5 July 2009 Copyright 2009 Cast Iron Systems. All rights reserved.

More information

Remote Access Clients for Windows 32/64-bit

Remote Access Clients for Windows 32/64-bit Remote Access Clients for Windows 32/64-bit E80.41 Release Notes 16 January 2013 Classification: [Protected] 2013 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation

More information

ClusterXL. Administration Guide Version R70

ClusterXL. Administration Guide Version R70 ClusterXL Administration Guide Version R70 703326 April 23, 2009 2003-2009 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

User Manual. SSV Remote Access Gateway. Web ConfigTool

User Manual. SSV Remote Access Gateway. Web ConfigTool SSV Remote Access Gateway Web ConfigTool User Manual SSV Software Systems GmbH Dünenweg 5 D-30419 Hannover Phone: +49 (0)511/40 000-0 Fax: +49 (0)511/40 000-40 E-mail: sales@ssv-embedded.de Document Revision:

More information

Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide

Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide 28 May 2009 3Com VCX Connect Solution SIP Trunking Table of Contents 1 3COM VCX CONNECT AND INGATE... 1 1.1 SIP TRUNKING SUPPORT...

More information

DIGIPASS Authentication for Check Point VPN-1

DIGIPASS Authentication for Check Point VPN-1 DIGIPASS Authentication for Check Point VPN-1 With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 36 Disclaimer Disclaimer of Warranties and Limitations

More information

Page 1 of 6 WWW.CHECKPOINT.COM WELCOME: MATTHEW WARREN SIGN OUT TRY OUR PRODUCTS QUOTING TOOLS ASSETS / INFO SUPPORT / SERVICES Solution ID: sk87560 How to configure R77.30 Security Gateway on Gaia OS

More information

Checkpoint Check Point VPN-1 VSX NGX. Practice Test. Version 2.0

Checkpoint Check Point VPN-1 VSX NGX. Practice Test. Version 2.0 Checkpoint 156-816 156-816 Check Point VPN-1 VSX NGX Practice Test Version 2.0 QUESTION NO: 1 VSX clusters are defined at two levels: A. VSX cluster and physical device B. VSX cluster and virtual device

More information

RSA Ready Implementation Guide for. Checkpoint Mobile VPN for ios v1.458

RSA Ready Implementation Guide for. Checkpoint Mobile VPN for ios v1.458 RSA Ready Implementation Guide for v1.458 FAL, RSA Partner Engineering Last Modified: 7/22/16 Solution Summary The Check Point software solution is a comprehensive VPN

More information

checkpoint

checkpoint 156-215.80.checkpoint Number: 156-215.80 Passing Score: 800 Time Limit: 120 min File Version: 1.0 CHECKPOINT 156-215.80 Check Point Certified Security Administrator R80 Version 1.0 Exam A QUESTION 1 What

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

The Bomgar Appliance in the Network

The Bomgar Appliance in the Network The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.

More information

BraindumpsVCE. Best vce braindumps-exam vce pdf free download

BraindumpsVCE.   Best vce braindumps-exam vce pdf free download BraindumpsVCE http://www.braindumpsvce.com Best vce braindumps-exam vce pdf free download Exam : 156-215.1 Title : Check Point Certified Security Administrator NGX Vendors : CheckPoint Version : DEMO Get

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

DIGIPASS Authentication for Check Point VPN-1

DIGIPASS Authentication for Check Point VPN-1 DIGIPASS Authentication for Check Point VPN-1 With Vasco VACMAN Middleware 3.0 2007 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 51 Disclaimer Disclaimer of Warranties and

More information

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2 Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Security Assessment Checklist

Security Assessment Checklist Security Assessment Checklist Westcon Security Checklist - Instructions The first step to protecting your business includes a careful and complete assessment of your security posture. Our Security Assessment

More information

Endpoint Security Management Server

Endpoint Security Management Server Endpoint Security Management Server E80.40 Administration Guide 27 February 2013 Classification: [Protected] 2013 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation

More information

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Endpoint Security Release Notes

Endpoint Security Release Notes Endpoint Security Release Notes E80.40 27 February 2013 Classification: [Protected] 2013 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

How To Troubleshoot VPN Issues in Site to Site

How To Troubleshoot VPN Issues in Site to Site How To Troubleshoot VPN Issues in Site to Site 29 December 2010 2010 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed

More information

HP ArcSight Port and Protocol Information

HP ArcSight Port and Protocol Information Important Notice HP ArcSight Port and Protocol Information The information (data) contained on all sheets of this document constitutes confidential information of Hewlett- Packard Company or its affiliates

More information

HikCentral V1.3 for Windows Hardening Guide

HikCentral V1.3 for Windows Hardening Guide HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote

More information

NGX R65 with Messaging Security

NGX R65 with Messaging Security NGX R65 with Messaging Security In This Document Introduction page 1 What s New page 2 Installing NGX R65 with Messaging Security page 3 Upgrading to NGX R65 with Messaging Security page 6 Messaging Security

More information

REMOTE ACCESS IPSEC. Course /14/2014 Global Technology Associates, Inc.

REMOTE ACCESS IPSEC. Course /14/2014 Global Technology Associates, Inc. REMOTE ACCESS IPSEC Course 4002 1 Remote Access Features! Granular Network Access and Authorization based on groups and policies.! Windows, Linux, and MAC client support. Windows ShrewSoft Client MAC IPSecuritas

More information

McAfee Next Generation Firewall 5.9.1

McAfee Next Generation Firewall 5.9.1 Release Notes Revision A McAfee Next Generation Firewall 5.9.1 Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Find product documentation About

More information

VMware vcenter AppSpeed Installation and Upgrade Guide AppSpeed 1.2

VMware vcenter AppSpeed Installation and Upgrade Guide AppSpeed 1.2 VMware vcenter AppSpeed Installation and Upgrade Guide AppSpeed 1.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network Always Remember Chapter #1: Network Device Configuration There is no 100 percent secure system, and there is nothing that is foolproof! 2 Outline Learn about the Security+ exam Learn basic terminology

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

User Identity Sources

User Identity Sources The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, on page 1 The

More information

VG422R. User s Manual. Rev , 5

VG422R. User s Manual. Rev , 5 VG422R User s Manual Rev 1.0 2003, 5 CONGRATULATIONS ON YOUR PURCHASE OF VG422R... 1 THIS PACKAGE CONTAINS... 1 CONFIRM THAT YOU MEET INSTALLATION REQUIREMENTS... 1 1. INSTALLATION GUIDE... 2 1.1. HARDWARE

More information

The Privileged Remote Access Appliance in the Network

The Privileged Remote Access Appliance in the Network The Privileged Remote Access Appliance in the Network The architecture of the BeyondTrust application environment relies on the BeyondTrust Appliance as a centralized routing point for all communications

More information

NGX (R60) Link Selection VPN Deployments August 30, 2005

NGX (R60) Link Selection VPN Deployments August 30, 2005 NGX (R60) Link Selection VPN Deployments August 30, 2005 Introduction In This Document Introduction page 1 Link Selection in NGX R60 page 1 Configuration Scenarios page 7 This document provides general

More information

Integrate Check Point Firewall. EventTracker v8.x and above

Integrate Check Point Firewall. EventTracker v8.x and above EventTracker v8.x and above Publication Date: March 23, 2017 Abstract This guide helps you in configuring Check Point and EventTracker to receive Check Point events. You will find the detailed procedures

More information

Remote Access Clients for Windows 32-bit/64-bit

Remote Access Clients for Windows 32-bit/64-bit Remote Access Clients for Windows 32-bit/64-bit R75 HFA1 EA Administration Guide 27 January 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation

More information

Security in the Privileged Remote Access Appliance

Security in the Privileged Remote Access Appliance Security in the Privileged Remote Access Appliance 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

Administering vrealize Log Insight. September 20, 2018 vrealize Log Insight 4.7

Administering vrealize Log Insight. September 20, 2018 vrealize Log Insight 4.7 Administering vrealize Log Insight September 20, 2018 4.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

MsActivator (VSOC 8.2) Administration Guide

MsActivator (VSOC 8.2) Administration Guide MsActivator (VSOC 8.2) Administration Guide 18-20 rue Henri Barbusse B.P. 2501 38035 GRENOBLE cedex 2 FRANCE Phone : +33 (0) 438 498 360 Fax : +33 (0) 438 498 361 support@ubiqube.com Copyright 2009 UBIqube

More information

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 Table of Contents Introduction to Horizon Cloud with Manager.... 3 Benefits of Integration.... 3 Single Sign-On....3

More information

Data Loss Prevention R71. Release Notes

Data Loss Prevention R71. Release Notes Data Loss Prevention R71 Release Notes 19 September 2010 2010 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed

More information

Security in Bomgar Remote Support

Security in Bomgar Remote Support Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

McAfee Network Security Platform Administration Course

McAfee Network Security Platform Administration Course McAfee Network Security Platform Administration Course Education Services administration course The McAfee Network Security Platform Administration course from McAfee Education Services is an essential

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Update 2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 452330 Revision Date 11 November 2014 Introduction WatchGuard is pleased to announce the release of

More information