Check Point software is designed to work across multiple platforms. Each installation differs depending on the product and the platform.
Stateful Inspection Technology – Standalone Deployment – Distributed Deployment – GAIA – Security Gateway – Security Management Server – Secure Internal Communication
The firewall rule base should be as simple as possible. The fewer rules you have the more efficient and less error prone the rule base will be.
Smart Dashboard – Node Object – Network Object – Service Object – Accept – Drop – Implied Rule- Stealth Rule
Network address translation (NAT) allows a router to modify packets to allow for multiple devices to share a single public IP address.
Overview – Static NAT – Hide Mode NAT – Manual NAT – Automatic NAT
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be.
Overview – User Authentication – Session Authentication – Client Authentication
A Virtual Private Network is a mechanism for providing secure communication over the Internet.
Overview – Cryptography – VPN Phases – ISAKMP – IPSec – Encapsulating Security Payload – Authentication Header – Site to Site VPN – Site to Client VPN
A cluster is two or more interconnected computers that create a solution to provide higher availability, higher scalability or both.
Security Cluster – Cluster Member – Cluster Synchronization – High Availability – Load Sharing
Protecting database against data loss and reconstructing the database after any kind of data loss.
Content security extends data inspection to the highest level, protecting users from viruses while providing granular access control to the Internet.
Overview – Content Security for Web – Content Security for FTP – Content Security for SMTP
It is the process of moving from the use of one operating environment to another operating environment.
Overview – Migration from R75 to R77
Management High Availability – Primary Security Management Server – Secondary Security Management Server – Log Server