Course Outline

Introduction to Check Point Technology
Describe Check Point’s unified approach to network management and the key elements of this architecture
Design a distributed environment using the network detailed in the course topology
Install the Security Gateway version R75 in a distributed environment using the network detailed in the course topology

Deployment Platforms
Given network specifications, perform a backup and restore the current Gateway installation from the command line
Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line
Deploy Gateways using sysconfig and cpconfig from the Gateway command line

Introduction to the Security Policy
Given the network topology, create and configure network, host and gateway objects
Verify SIC establishment between the Security Management Server and the Gateway using Smart Dashboard
Create a basic Rule Base in Smart Dashboard that includes permissions for administrative users, external services, and LAN outbound use
Configure NAT rules on Web and Gateway servers
Evaluate existing policies and optimize the rules based on current corporate requirements
Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades with minimal downtime

Monitoring Traffic and Connections
Use Queries in Smart View Tracker to monitor IPS and common network traffic and troubleshoot events using packet data
Using packet data on a given corporate network, generate reports, troubleshoot system and security issues, and ensure network functionality
Using Smart View Monitor, configure alerts and traffic counters, view a Gateway’s status, monitor suspicious activity rules, analyze tunnel activity and monitor remote user access based on corporate requirements

Using Smart Update
Monitor remote Gateways using Smart Update to evaluate the need for upgrades, new installations, and license modifications
Use Smart Update to apply upgrade packages to single or multiple VPN-1 Gateways
Upgrade and attach product licenses using Smart Update

User Management and Authentication
Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely
Manage users to access the corporate LAN by using external databases

Identity Awareness
Use Identity Awareness to provide granular level access to network resources
Acquire user information used by the Security Gateway to control access
Define Access Roles for use in an Identity Awareness rule
Implement Identity Awareness in the Firewall Rule Base

Introduction to Check Point VPNs
Configure a pre-shared secret site-to-site VPN with partner sites
Configure permanent tunnels for remote access to corporate resources
Configure VPN tunnel sharing, given the difference between host-based, subunit-based and gateway-based tunnels

Lab Exercises Include
Distributed Installations
Branch Office Security Gateway Installations
CLI Tools
Building a Security Policy
Configure the DMZ
Configure NAT
Monitor with Smart View Tracker
Client Authentication
Identity Awareness
Site-to-Site VPN between corporate and branch office