CHECKPOINT FIREWALL

Check Point provides customers of all sizes with the latest data and network security protection in an integrated Next Generation Firewall Platform. Whether they need next-generation security for their data centre, enterprise, small business or home office, Check Point has a solution.

Register for Free Demo Class!!

It’s High Time to make a smart move for your career. Register Now!

  • This field is for validation purposes and should be left unchanged.

Objectives

Objective of our course is to cover everything you need to understand the basic concepts and skills necessary to effectively build, modify, deploy, and troubleshoot Check Point Security Gateway and Management Software Blades systems on the GAiA operating system

Course Curriculum

Introduction to Check Point Technology

Introduction to the Security Policy
  • 2.1) Security Policy Basics
    – The Rule Base
    – SmartDashboard and Objects
    – Basic Rule Base Concepts
    – Implicit/Explicit Rules
    – Control Connections
    – IP Spoofing & Anti-Spoofing
  • 2.2) Policy Management and Revision Control
    – Policy Package Management
    – Database Revision Control
  • Lab-2) Building a Security Policy
    – Create Security Gateway Object
    – Create Access Rules for Gateway
    – Save the Policy
    – Install the Policy
    – Test the Policy
    – Database Revision Control

Introduction to Monitoring Traffic and Connections
  • 3.1) SmartView Tracker
    – Log Types
    – SmartView Tracker Tabs
    – Action Icons
    – Log-File Management
    – Administrator Auditing
    – Global Logging and Alerting
    – Time Setting
    – Blocking Connections
  • 3.2) SmartView Monitor
    – Customized Views
    – Gateway Status View
    – Traffic View
    – Tunnels View
    – Remote Users View
    – Cooperative Enforcement View
  • 3.3) Monitoring Suspicious Activity Rules
  • 3.4) SmartView Tracker Vs. SmartView Monitor
  • Lab-3) Monitoring Through SmartView Tracker & SmartView Monitor
    – Launch SmartView Tracker
    – Track by Source and Destination
    – SmartView Monitor
    – Check the health status of Gateway

Introduction Network Address Translation
  • 4.1) Network Address Translation
    – IP Addressing
    – Hide NAT
    – Static NAT
    – Original Packet
    – Reply Packet
    – NAT Global Properties
    – Hide NAT Using Another Interface
    – Manual NAT
  • Lab-4) Configure and Test NAT
    – Configure Static NAT
    – Test the Static NAT Address
    – Configure Hide NAT
    – Test the Hide NAT Address
    – Observe Hide NAT Traffic Using fw monitor
    – Observe Static NAT Traffic Using fw monitor
    – Configure Manual NAT rules

Introduction to Automated Software and License Updates
  • 5.1) Smart Update
    – SmartUpdate Architecture
    – Overview of Managing Licenses
    – License Terminology
    – Upgrading Licenses
    – Retrieving License Data from Security Gateways
    – Adding New Licenses to the License & Contract Repository
    – Importing License Files
    – Adding License Details Manually
    – Attaching Licenses
    – Detaching Licenses
    – Deleting Licenses From
    – Checking for Expired Licenses To Export a License to a File
    – Managing Contracts Updating Contracts
  • Lab-5) Using SmartUpdate
    – View License Properties
    – Add New Licenses to the License & Contract Repository
    – Attach Licenses
    – Detach Licenses
    – Delete Licenses From

Introduction to User Management & Identity Awareness
  • 6.1) Users and Groups
    – User Types
    – Authentication Methods
    – LDAP Features
    – Distinguished Name
    – Using an Existing LDAP Server
    – Configuring Entities to Work with the Gateway
    – Defining an Account Unit
    – Managing Users
    – User Directory Groups
  • 6.2) Identity Awareness
    – AD Query
    – Browser-Based Authentication
  • Lab-6) Configuring User Directory & Implement Identity Awareness
    – Connect User Directory to Security Management Server
    – Test Identity Based Awareness

Introduction to Check Point VPNs
  • 7.1) VPN Deployments
    – Site-to-Site VPNs
    – Remote-Access VPNs
  • 7.2) VPN Topologies
    – Meshed VPN Community
    – Star VPN Community
  • 7.3) VPN Gateway Conditions
    – Domain-Based VPNs
    – Route-Based VPN
  • 7.4) Access Control and VPN Communities
    – Accepting All Encrypted Traffic
    – Excluded Services
  • 7.5) Remote Access VPNs
    – Connection between a Remote User and a Gateway
  • Lab-7) Site-to-site VPN
    – Define the VPN Domain
    – Create the VPN Community
    – Create the VPN Rule and Modifying the Rule Base
    – Test VPN Connection
    – VPN Troubleshooting

Introduction to Checkpoint High Availability
  • 8.1) ClusterXL
    – ClusterXL
    – Cluster Synchronization
    – Synchronized-Cluster Restrictions
    – Securing the Sync Interface
    – To Synchronize or Not to Synchronize
  • Lab-8) Build and Test Checkpoint Cluster

Upgrade the Checkpoint Cluster OS
  • 9.1) Backup and Restore Security Gateways and Management Servers
    – Snapshot management
    – Upgrade Tools
    – Backup Recommendations
  • 9.2) Performing Upgrade
  • Lab-9) Upgrade Security Gateway from R77 to R77.30

Troubleshooting Tools
  • 10.1) TCPDUMP
  • 10.2) FW MONITOR

Why Choose Us ??

0
Years Experience
0
Job Assistance
0
Success Stories
0
Batches

Placement Updates