EasyManua.ls Logo

Check Point QUANTUM SPARK 1600 - User Manual

Check Point QUANTUM SPARK 1600
332 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
31 August 2023
QUANTUM SPARK 1500,
1600, AND 1800
APPLIANCES
R81.10.X
Locally Managed
Administration Guide

Table of Contents

Other manuals for Check Point QUANTUM SPARK 1600

Question and Answer IconNeed help?

Do you have a question about the Check Point QUANTUM SPARK 1600 and is the answer not in the manual?

Summary

Important Information

Latest Software

Recommendations for installing the most recent software release for improved functionality, stability, and security.

Certifications

Information on third-party independent certifications for Check Point products.

Latest Version of this Document in English

Links to access the latest version of the document in a web browser or PDF format.

Feedback

Instructions on how to provide comments to improve documentation quality.

Revision History

Overview of Quantum Spark 1500, 1600, and 1800 Appliance Series

1500 Appliances

Details on the Quantum Spark 1500 appliance series, its features, and supported software blades.

1600 and 1800 Appliances

Description of the Quantum Spark 1600/1800 Security Appliances, their capabilities, and management options.

Getting Started with 1500, 1600, and 1800 Appliance Series

Workflow

Step-by-step guide for initial setup and configuration of the appliance.

Setting Up the Quantum Spark Appliance

Connecting the Cables

Instructions on how to connect power and network cables to the appliance.

Using Default WiFi

Information on using the default SSID for WiFi connection in R81.10.07 and later.

First Time Deployment Options

First Time Configuration Wizard

Overview of the First Time Configuration Wizard and relevant Getting Started Guides.

Zero Touch Cloud Service

Details on using Zero Touch Cloud Service for initial gateway deployment.

Deploying from a USB Drive or SD Card

Guide to deploying configuration files from USB/SD card for quick appliance setup.

Deploying from a USB Drive or SD Card

Sample Configuration File

Example configuration file for USB deployment on Quantum Spark 1530 / 1550 appliances.

Preparing the Configuration Files

Information on the structure and naming conventions of Gaia Clish commands for deployment.

Deploying the Configuration File - Initial Configuration

Deploying the Configuration File - Existing Configuration

Viewing Configuration Logs

Details on the log file created after successful configuration from a USB drive.

Troubleshooting Configuration Files

Configuration File Error

Scenarios where configuration files fail and the appliance is not fully configured.

Suggested Workflow - Configuration File Error

Step-by-step workflow for resolving configuration file errors on a USB drive.

Using the set property Command

Configuration and Upgrade Scenarios

Configuring Cloud Services

Connecting the Quantum Spark Appliance to Cloud Services for management.

Configuring a Guest Network

Prerequisites

Requirements for configuring a guest network, including wireless setup.

Configuration

Steps to configure a guest network with Hotspot and access policies.

Monitoring

How to monitor guest network activity and view user activity logs.

Introduction to the WebUI

The Home Tab

Viewing System Information

Overview of appliance status, notifications, network, and statistics.

To configure connection monitoring

Steps to configure monitoring for internet connections and detect connectivity loss.

Controlling and Monitoring Software Blades

To enable or disable a Software Blade

Procedure to activate or deactivate software blades via the Security Dashboard.

To see or edit setting information

Accessing and modifying settings for individual software blades.

Setting the Management Mode

To set the management type

Options for managing the appliance locally or centrally via Security Management Server.

Security Management Server

Viewing management connection status, trust settings, and initializing connections.

Configuring Cloud Services

To connect the appliance to Cloud Services

Steps to connect the appliance to Cloud Services via an activation link or details.

Managing Licenses

If you have Internet connectivity configured

Activating appliance license when internet connectivity is properly configured.

To configure the proxy details

Configuring proxy server details for license activation when required.

If your appliance is not registered

Steps to register the appliance in the Check Point User Center.

Viewing the Site Map

Notifications

Viewing security events and filtering them by time, severity, subject, or message.

Managing Active Devices

Blocking a Device Temporarily

Procedure to temporarily block a device from network activity.

Toobar Buttons

Functionality of toolbar buttons for managing active devices and network objects.

Revoking the Hotspot Access

To revoke the Hotspot access

Steps to revoke Hotspot access for connected devices.

Adding a New Network Object to Bypass SSL Inspection Based on the Host MAC Address

Viewing Monitoring Data

Network

Viewing network statistics for the last hour or day, including bandwidth usage and traffic.

Viewing Reports

Rounding Off of Time

Explanation of how report times are influenced by rounding and system reboots.

System Reboot

How system reboots affect report time intervals and generation.

Using System Tools

Monitor System Resources

Opens popup windows to view CPU, memory, and disk usage history.

Show Routing Table

Opens a popup window displaying route information like source, destination, gateway, and metric.

Show Router Configuration

Opens a popup window to view corresponding Gaia Clish commands for BGP, OSPF, etc.

Test Cloud Services Ports

Opens a popup window showing the result of the Cloud Services Connectivity Test.

Managing the Device

Configuring Internet Connectivity

Setting up and managing appliance connections to the internet.

The Configuration tab

To configure an internet connection over the DMZ port

Steps to configure an internet connection using the DMZ port.

IPv4 connection types

IPv6 connection types

To configure a new internet connection (IPv4)

Procedure to add a new IPv4 internet connection.

To configure a new internet connection (IPv6)

Procedure to configure a new IPv6 internet connection.

Prefix Delegation (IPv6 only)

To enable prefix delegation in an IPv6 connection

Enabling prefix delegation for IPv6 connections to assign internal network prefixes.

Neighbor Discover Protocol (ND Proxy) - IPv6 only

To enable ND Proxy

Enabling ND Proxy to assign globally-routable IPv6 addresses to internal interfaces.

DS-Lite (Dual Stack Lite, IPoE)

To enable DS-Lite

Enabling DS-Lite for internet access to IPv4 networks using an IPv6 tunnel.

IPIP

To enable IPIP

Enabling IPIP feature for tunneling IPv4 traffic over IPv6-only networks.

Creating a New Bond (WAN)

To add a Bond as an additional internet connection

Adding a bond as an additional internet connection for redundancy and performance.

Configuring a USB Cellular Connection

Configuring a Cellular Internet Connection (Cellular models only)

Linking the APN to a SIM card based on a specific MMCNMC number

Configuration

Configuring user-defined mapping of MCC/MNC to APN in a special configuration file.

Switching the Active Image

The Connection Monitoring tab

The Advanced tab

Port Settings

ISP Redundancy - supported in IPv4 connections only

NAT Settings

Disabling NAT settings for specified internet connections.

DHCP Settings

Configuring hostname via WAN DHCP.

Monitoring

Monitoring internet connections and configuring probing settings.

Configuring the Wireless Network

To enable or disable the Wireless network

Enabling or disabling the wireless radio and VAPs.

To configure a new wireless network or edit an existing network

Steps to configure new wireless networks (SSID) or edit existing ones.

Dynamic Frequency Selection (DFS)

Cloning a VAP

Additional Configurations

Changing the Wireless Network password and other additional configurations.

Wireless Scheduler

Wi-Fi Quality Analyzer

Configuring the Local Network

Configuring multiple switches (port based VLANs)

Configuring port-based VLANs for local LAN interfaces and wireless networks.

Configuring multiple bridges between interfaces

Steps to configure multiple bridges between interfaces for traffic inspection.

Create and configure tag based VLANs (802.1 q)

Creating tag-based VLANs on LAN interfaces or DMZ.

Create an alias IP

Associating multiple IP addresses to a single network interface.

Create and configure VPN tunnels (VTI)

Creating Virtual Tunnel Interfaces for route-based VPN tunnels.

Create a BOND (Link Aggregation)

Creating link aggregation bundles for improved performance and redundancy.

On wireless devices - Add new wireless networks (Virtual Access Points)

Adding new wireless networks (VAPs) on wireless devices.

Reserved IP Address for Specific MAC

To configure

Configuring static IP assignments for known hosts based on MAC address.

Switch

WAN as LAN

Monitor Mode

To configure monitor mode in the WebUI

Steps to configure monitor mode using Automatic Learning or user-defined networks.

To configure monitor mode in Gaia Clish

CLI commands to configure monitor mode, automatic learning, and user-defined networks.

Mirror Port

To configure a mirror port

Procedure to configure a mirror port for traffic duplication and monitoring.

Physical Interfaces

Bridge

To configure Advanced IPv6 settings

Configuring router advisement and prefix delegation for IPv6 settings.

VLANs

Alias IP

To configure an alias IP for WAN

Configuring an alias IP for WAN by creating a static IP type connection.

To create an alias IP (LAN)

Creating an alias IP for LAN by adding a new object.

VPN Tunnel (VTI)

Virtual Access Point (VAP)

GRE

To create a GRE tunnel

Procedure to create a GRE tunnel for routing traffic between two sites.

BOND

To create a BOND (LAN)

Creating a LAN bond for improved performance and link redundancy.

Configuring a Hotspot

To define a network interface for a Hotspot

Defining network interfaces for Hotspot access.

Guest access

Configuring guest access sessions with terms and timeouts.

Customize the Hotspot portal appearance

Customizing the Hotspot portal title, message, terms of use, and logo.

Hotspot exceptions

Defining IP addresses or networks to exclude from the Hotspot.

User Authentication

To require user authentication

Configuring authentication requirements for users and user groups.

To configure the session timeout

Setting the duration for user login sessions before they end.

To prevent simultaneous login to the Hotspot portal

Preventing multiple simultaneous logins for users to the Hotspot portal.

Disabling the Hotspot

Procedure to disable the Hotspot feature.

Configuring MAC Filtering

To enable MAC filtering

Enabling MAC filtering to manage an allowlist of MAC addresses for LAN access.

To edit the LAN MAC Filter allowlist

Adding, editing, or deleting MAC addresses from the LAN MAC Filter allowlist.

To disable MAC filtering for a specific interface

Disabling MAC filtering for a specific LAN interface.

802.1 x Authentication Protocol

Workflow

Steps for setting up and configuring 802.1x authentication with a RADIUS server.

To enable 802.1 x authentication on a LAN switch or interface

Enabling 802.1x authentication on LAN switches and interfaces.

To enable 802.1 x authentication on a tag based VLAN interface

Enabling 802.1x authentication on tag-based VLAN interfaces.

To disable 802.1 x authentication on an interface

To configure logging for MAC filtering and 802.1 x authentication

Configuring logging settings for MAC filtering and 802.1x authentication.

Configuring the DNS Server

To configure DNS

Configuring DNS server settings and defining the domain name.

Configuring the Proxy Server

Backup, Restore, Upgrade, and Other System Operations

To reboot the appliance

Procedure to reboot the Quantum Spark Appliance.

To restore factory default settings

Restoring the appliance to its factory default settings via WebUI.

To revert to the factory default image

Restoring the appliance to its factory default software image.

To make sure you have the latest firmware version

Checking for and installing the latest firmware version.

Using the Software Upgrade Wizard

Welcome

Accessing the Check Point Download Center to download upgrade packages.

Backing up the System

To create a backup file

Creating a backup file of system settings, including network and DNS configuration.

Configuring Local and Remote System Administrators

Administrator Roles

Description of administrator roles: Super, Read Only, Networking, Mobile, Remote Access, Access Policy.

Local Administrators

Creating, editing, deleting, and resetting passwords for local administrators.

Remote Administrators

To allow access for administrators defined in a remote RADIUS server

Enabling RADIUS authentication for administrators and configuring roles or groups.

Pairing a Mobile Device

Configuring a RADIUS Server for non-local Quantum Spark Appliance users

Configuring Administrator Access

To set the interface sources from which administrator access is allowed

Defining allowed interface sources (LAN, Trusted wireless, VPN, Internet) for administrator access.

To allow administrator access from any IP address

Allowing administrator access from any IP address, with options to change WEB/SSH ports.

To allow administrator access from specified IP addresses

Allowing administrator access only from specified IP addresses.

Managing Device Details

To assign a Web portal certificate

Assigning a Web portal certificate from the list of installed certificates.

Managing Date and Time

To configure date and time manually

Manually setting the appliance's date and time.

To set the date and time using a Network Time Protocol (NTP) server

Synchronizing appliance clocks with an NTP server.

To enable a local NTP server

Enabling the appliance to function as an NTP server for connected devices.

To configure a Time Zone

Setting the appliance's time zone and enabling automatic daylight saving adjustments.

Configuring DDNS and Access Service

DDNS

Configuring DDNS account details to update IP addresses with providers.

Reach My Device

Enabling remote access to the appliance via WebUI or CLI through Check Point Cloud Service.

Using System Tools

Monitor System Resources

Opens popup windows to view CPU, memory, and disk usage history.

Show Routing Table

Opens a popup window displaying route information like source, destination, gateway, and metric.

Show Router Configuration

Opens a popup window to view corresponding Gaia Clish commands for BGP, OSPF, etc.

Test Cloud Services Ports

Opens a popup window showing the result of the Cloud Services Connectivity Test.

Advanced Routing

BGP

Configuring Border Gateway Patrol (BGP) dynamic routing settings.

OSPF

Configuring Open Shortest Path First (OSPF) dynamic routing settings.

Inbound Route Filters

Controlling which external routes a routing protocol accepts.

Route Redistribution

Routing Options

Routing Monitor

Configuring the Routing Table

Background

Overview of the routing table and how routes are added to the appliance.

Routing Table Columns

Limitations

Constraints and limitations related to routing table configuration.

Adding a Specific IPv4 Static Route

Procedure

Procedure to add a specific static route for traffic to a specific IPv4 address.

Adding a Default IPv4 Static Route

Procedure

Procedure to add a default static route for traffic to a specific IPv4 address.

Editing an Existing Static Route

Deleting an Existing Static Route

Enabling or Disabling an Existing Static Route

Managing Installed Certificates

Creating, managing, and uploading appliance certificates and P12 files.

Managing Internal Certificates

To reinitialize certificates

Reinitializing certificates for internal VPNs when IP addresses change.

To replace an internal CA certificate

Replacing the internal CA certificate with a new one.

To export an internal CA certificate

Exporting the internal CA certificate for use with remote sites.

Configuring High Availability

Background

How clusters provide redundancy and maintain connections during failures.

Limitations

Prerequisites

Requirements before configuring a cluster, including network settings and appliance compatibility.

Configuration Workflow

Notes

Important notes regarding sync interface configuration and connections.

Configuring a Primary Cluster Member

Procedure

Steps to configure an appliance as the primary Cluster Member.

Configuring a Secondary Cluster Member

Procedure

Steps to configure an appliance as the secondary Cluster Member.

Viewing Cluster Interfaces

Procedure

Connecting to WebUI and viewing cluster interface details.

Viewing the Cluster Status

Procedure

Viewing cluster status and diagnostics.

Failing Over Manually

Manually failing over from the primary to the secondary cluster member.

Changing Network Configuration of Cluster Members

Resetting Cluster Configuration

Procedure to reset all cluster configuration settings.

Upgrading a Cluster Manually

Notes

Information about manual cluster upgrades, including individual member upgrades.

Cluster Managed by Quantum Spark Portal

Advanced Settings

Filtering the List of Attributes

Searching and filtering attributes in the advanced settings list.

Configuring the Attribute Values

Editing attribute values or restoring them to default settings.

Restoring Default Values

Resetting all appliance attributes to their default factory settings.

Clarifications

Changes Between Versions

Managing the Access Policy

Configuring the Firewall Access Policy and Blade

Setting default access policy control level and defining firewall rules.

Firewall Policy

To set specified outgoing services in a standard Firewall policy

Configuring allowed outgoing services within a standard firewall policy.

Application & URL Filtering

To configure Access Policy rules manually

Manually configuring access policy rules for applications and URLs.

Updates

User Awareness

To schedule updates

Scheduling automatic updates for software blades.

Tracking

More Information

Working with the Firewall Access Policy

Firewall Policy

Managing the Firewall Rule Base: creating, editing, deleting, enabling/disabling rules.

Manual Rules

Manually creating rules as exceptions to the default policy.

Auto Generated Rules

System-determined rules based on policy mode and other system elements.

Configuring Access Rules

To create a new manually defined access rule

Steps to create a new access rule with positioning and rule base fields.

Updatable Objects

To import an updatable object

Importing updatable objects for use in firewall policy rules.

Customizing Messages

To customize messages

Customizing messages for user notifications on website and application access.

Defining Firewall Servers

Step 1: Server Type

Selecting the server type and editing protocol ports.

Step 2: Server Definitions

Entering server name, IP address, comments, and selecting applicable options.

Step 3: Access

Selecting zones from which the server is accessible.

Defining NAT Control

To disable NAT for outgoing traffic (Hide NAT)

Disabling NAT for outgoing traffic by setting 'Hide internal networks' to OFF.

Advanced - Manual NAT Rules

Advanced - Creating and Editing NAT Rules

To create a new NAT rule

Creating custom NAT rules with original and translated source, destination, and service.

To edit a rule

Editing existing NAT rules.

To delete a rule

Deleting NAT rules from the NAT rules table.

To enable or disable a rule

Enabling or disabling manually defined NAT rules.

Inspecting VoIP Traffic

Introduction

Overview of VoIP technology and its inspection support on Quantum Spark appliances.

To configure VoIP inspection in the WebUI

Steps to configure VoIP inspection, including SIP provider and on-premise devices.

Smart Accel

Configuring Smart Accel in R81.10.05 and higher

Enabling and disabling Smart Accel for Services and Assets.

Working with User Awareness

Workflow

Steps to enable User Awareness, configure sources for user identities.

Identity Sources

User Awareness identity sources: AD Query, Browser-Based Authentication, Identity Collector.

Enabling User Awareness

Active Directory Queries

Configuring Active Directory queries to identify users and user groups.

To add a new Active DirectoryDomain

Steps to add a new Active Directory domain server.

Browser-Based Authentication

Blocking unauthenticated users

Blocking unauthenticated users and redirecting them to Captive Portal.

To edit settings and configure portal customization for Browser-Based Authentication

Editing settings and customizing the portal appearance for Browser-Based Authentication.

Identity Collector

To configure the Identity Collector

Configuring the Identity Collector to identify clients and their associated IP addresses.

Configuring QoS

Introduction

Overview of QoS policy for setting bandwidth parameters and prioritizing traffic.

Prerequisites

Ensuring the QoS blade is enabled before configuration.

Configuration

Steps to configure QoS settings via Internet connections and QoS policy rules.

Configuring the QoS Blade

QoS

Activating QoS and configuring the default QoS policy.

QoS Default Policy

To add a guaranteed service to the QoS default policy

Adding guaranteed bandwidth services to the QoS default policy.

Configuring the QoS Policy

Rule Base Field

Description of fields used in QoS policy rules: No., Source, Destination, Service, Guarantee/Limit, Weight, Track, Comment.

Weight

To create a QoS rule

Creating QoS rules, including setting weights, limits, and low latency traffic.

SSL Inspection Policy

SSL Inspection

Enabling and configuring SSL inspection for traffic inspection.

Deploying SSL Inspection

Steps to deploy SSL inspection, including downloading and installing the CA certificate.

To install the certificate

Manually copying and installing the CA certificate on a PC.

SSL Inspection Bypass Policy

To configure the SSL inspection bypass policy

Configuring bypass policy for protocols, assets, wireless networks, and categories.

HTTPS Categorization

To enable HTTPS categorization

Enabling HTTPS categorization for filtering URLs and applications without SSL inspection.

To disable SSL inspection and HTTPS categorization

Disabling both SSL inspection and HTTPS categorization.

SSL Inspection Exceptions

To add bypass exceptions

Defining manual rules to bypass SSL inspection for specific traffic.

SSL Inspection Advanced

Trusted CA types

Managing trusted certificate authorities, including default and user-added CAs.

To add a CA manually to the trusted CA list

Manually adding a CA certificate to the trusted CA list.

To delete a trusted CA

Deleting trusted CA certificates from the list.

To disable;enable a trusted CA

Disabling or enabling trusted CA certificates.

Managing Threat Prevention

Configuring Threat Prevention Blade Control

Activating IPS, Anti-Virus, Anti-Bot, Threat Emulation, and Anti-Spam blades.

Enabling and Disabling Threat Prevention

Turning the Threat Prevention blades ON or OFF.

Enabling Threat Emulation Policy for the FTP Protocol

Enabling Threat Emulation for FTP protocol, available from R81.10.05.

Configuring a Custom Policy for Threat Prevention

Tracking options

Selecting tracking options (None, Log, Alert) for threat prevention rules.

Protection Activation

Selecting actions (Ask, Prevent, Detect, Inactive) for confidence levels.

Severity

Selecting severity levels (Low, Medium, High, Critical) for threat prevention.

Performance impact

Selecting the allowed impact level for performance.

Scheduling Threat Prevention Updates

Configuring Threat Prevention Policy Exceptions

Threat Prevention Exceptions

Configuring exception rules for traffic that IPS and malware engines do not inspect.

To add a new Threat Prevention exception rule

Steps to add new exception rules with scope, source, destination, protection, and action.

allowlists

To add a file or URL to the allowlist

Adding files or URLs to the allowlist to prevent scanning.

To add an email address to the allowlist

Adding email addresses to the allowlist for Threat Emulation.

To edit or delete an exception rule

Editing or deleting existing exception rules.

Threat Prevention - Horizon SOC

To enable the Horizon SOC feature in the WebUI

Enabling Horizon SOC via WebUI for improved cybersecurity threat detection.

To enable the Horizon SOC feature in Gaia Clish

Enabling Horizon SOC via Gaia Clish commands for data sharing and statistics.

Viewing Infected Devices

The Infected Devices table shows this information for each entry

Details displayed for infected devices: Icon, Object name, IP/MAC address, Incident type, Severity, Protection name.

To filter the infected devices list

Filtering the infected devices list by servers, severity, or infection status.

To add a malware exception rule for a specified protection

Adding exception rules for specific protections to bypass malware engine inspection.

Viewing the IPS Protections List

To search for a specified protection

Searching for specific IPS protections in the list for monitoring or configuration.

Advanced Threat Prevention Engine Settings

IPS

Configuring settings for newly downloaded IPS protections: Active, Detect, Inactive.

Anti-Virus

Enabling POP3S or IMAP scans and configuring Anti-Virus settings.

Anti-Bot

Threat Emulation

To configure the Threat Emulation settings

Configuring Threat Emulation settings for incoming files and protocols.

User Messages

To customize messages

Customizing user messages for Ask and Block actions in Anti-Virus and Anti-Bot.

Configuring the Anti-Spam Blade Control

To enable or disable Anti-Spam

Enabling or disabling the Anti-Spam engine to block or flag spam content.

To configure Detect-only mode

Configuring Anti-Spam in Detect-only mode to log but not block emails.

To configure the Anti-Spam Policy

Setting actions for spam emails based on sender, content, or header.

To handle suspected spam separately from known spam

To edit or delete an exception rule

Editing or deleting sender/domain/IP address exceptions from allow/block lists.

Configuring Anti-Spam Exceptions

To add a new sender;domain;IP address to the Allow or Block list

Adding new senders, domains, or IP addresses to the Allow or Block list.

SSH Authentication

Procedure

Configuring RSA key authorization for SSH login instead of password-based authentication.

Managing VPN

Configuring VPN

Configuring Remote Access VPN

Introduction to remote access VPN options: clients, SSL VPN, L2TP.

Prerequisites

Requirements for VPN configuration, including blade control and DDNS feature.

Remote Access Configuration

Methods to configure remote access users: Local, RADIUS, and AD users.

L2 TP VPN Client configuration

Advanced Options

Advanced options for Remote Access, including Office Mode network.

Monitoring

Ensuring Remote Access VPN is working by connecting to internal resources.

Configuring Site to Site VPN with a Preshared Secret

Introduction

Using preshared secret for authentication in Site to Site VPN configuration.

Prerequisites

Requirements for Site to Site VPN, including blade activation and peer device configuration.

Configuration

Entering host name or IP address and preshared secret information.

Monitoring

Checking VPN tunnel status by sending traffic between local and peer gateways.

Configuring Site to Site VPN with a Certificate

Introduction

Using certificates for authentication in Site to Site VPN configuration.

Prerequisites

Requirements for certificate-based VPN, including reinitializing certificates.

Configuration

Trust Procedures

Procedures for exchanging CAs, signing requests, and authenticating with 3rd party CAs.

Configuring the Remote Access Blade

To configure DDNS

Configuring DDNS for dynamic IP addresses to connect via hostname.

To configure the static IP address

Configuring an internet connection with a static IP address for appliance accessibility.

Getting Started with VPN Remote Access

Two-Factor Authentication

To configure Two-Factor Authentication

Steps to configure Two-Factor Authentication using SMS, email, or Google Authenticator.

Configure users and user groups for the Remote Access VPN

Adding a new local user

Adding new local users with remote access permissions and SSL VPN bookmarks.

Adding new users from Active Directory; RADIUS

Populating users and groups from Active Directory or RADIUS servers.

Configuring an existing local user

Editing existing local users to configure remote access permissions.

Configuring the permissions for existing local users; user groups

Setting permissions for local users and groups via checkboxes.

Monitor Remote Access VPN

Changing the Default Remote Access VPN Port

Connections Between Remote Access VPN Clients in the Same Office Mode Pool

Procedure

Allowing connections between VPN clients in the same Office Mode Pool.

Configuring Remote Access Users

To add a new local user with remote access permissions

Adding new local users with remote access permissions and SSL VPN bookmarks.

To add a new local users group with remote access permissions

Adding new local user groups with remote access permissions.

To add remote access permissions to an existing Active Directory group

Adding remote access permissions to existing Active Directory groups.

To add remote access permissions to all users in defined in an Active Directory

Granting remote access permissions to all users defined in Active Directory.

Remote Access - Connected Remote Users

Configuring Remote Access Authentication Servers

To add a RADIUS server

Adding primary and secondary RADIUS servers for authentication.

TACACS+ Server

To add a TACACS+ server

Adding TACACS+ servers for administration authentication and authorization.

Active Directory

To add an Active Directory domain

Adding an Active Directory domain for user authentication and policy configuration.

Managing Applications & URLs

What is a custom application?

Defining custom applications using strings or regular expressions on URLs.

What is a category?

Inspecting URLs using Check Point Cloud to match them to built-in categories.

The Application and Categories List

List of applications and categories filterable by Common, Custom, Categories, or All.

To search for a category or application

Filtering the list to show required views by entering text in the filter box.

Managing System Services

To create a new service

Adding new services, editing services, and deleting services.

Managing Service Groups

To create a new service group

Creating new service groups by selecting available services.

To edit a service group

Editing existing service groups.

To delete a service group

Deleting user-defined service groups.

Built-in System Service Groups

Managing Network Objects

To create a network object of type Single IP

Creating a network object of type Single IP (host object).

To create a network object of type IP Range

To create a network object of type Network

Creating a network object of type Network.

To create a network object of type Domain Name

Creating a network object of type Domain Name.

To create a network object of type Device

To edit a network object

Editing an existing network object.

To delete a network object

Deleting a network object from the list.

To filter for a specified network object

Filtering the network object list by name.

To add a new network object and bypass SSL inspection based on the host MAC address (locally managed only)

Managing Network Object Groups

To create a new network object group

Creating new network object groups and adding network objects to them.

To edit a network object group

Editing existing network object groups.

To delete a network object group

Deleting network object groups.

Logs and Monitoring

Viewing Security Logs

Viewing the last 100 log records and searching security logs.

To search for a security log

Entering queries to search for specific security logs.

To see the security log record

Selecting a log entry to view its details.

To refresh the security log data

Refreshing the security log data to display the latest records.

To stop local logging

Stopping local logging for better performance.

Storing Logs

To delete logs from local log storage

Clearing logs from local storage and external SD cards.

Viewing System Logs

To download the full log file

Downloading the complete system log file.

To refresh the system logs list

Refreshing the system logs list to display the latest entries.

To clear the log list

Clearing the system log list and confirming the action.

To search system logs table

Searching system logs table using keywords in the text search field.

Configuring External Log Servers

External Check Point Log Server

Using an external Check Point Log Server for storing additional logs.

Use cases for an external Check Point Log Server

Extending log retention time and exporting logs for data mining.

Do these steps before you configure an external Check Point Log Server from this page in the WebUI

Pre-configuration steps for setting up an external Check Point Log Server.

To configure an external Check Point Log Server

Configuring an external Check Point Log Server via WebUI.

Syslog Server Configuration

To configure a syslog server

Configuring a gateway to send logs to multiple syslog servers.

Secured Syslog

To configure additional syslog servers

Adding additional syslog servers for sending secured and encrypted logs.

To edit the syslog server

Editing the configuration of an existing syslog server.

To delete the syslog server

Deleting a syslog server configuration.

Notifications

Managing Active Devices

Blocking a Device Temporarily

Temporarily blocking a device from network activity.

Toobar Buttons

Functionality of toolbar buttons for managing active devices and network objects.

Revoking the Hotspot Access

To revoke the Hotspot access

Revoking Hotspot access for connected devices.

Adding a New Network Object to Bypass SSL Inspection Based on the Host MAC Address

Wireless Active Devices

Paired Mobile Devices

Viewing and revoking paired mobile devices connected to the gateway.

Viewing Infected Devices

Viewing information about infected devices and servers.

Viewing VPN Tunnels

To filter the list

Filtering the list of VPN tunnels by criteria.

To refresh the list

Refreshing the VPN tunnels list to display updated information.

Viewing Active Connections

To filter the list

Filtering the list of active connections by criteria.

To refresh the list

Refreshing the active connections list.

Access Points

Viewing Monitoring Data

Viewing network, security, and troubleshooting information.

Viewing Reports

Viewing network analysis, security analysis, and infected devices reports.

Dr. Spark

Checking appliance performance, sizing, and health status.

Using System Tools

Monitor System Resources

Opens popup windows to view CPU, memory, and disk usage history.

Show Routing Table

Opens a popup window displaying route information like source, destination, gateway, and metric.

Show Router Configuration

Opens a popup window to view corresponding Gaia Clish commands for BGP, OSPF, etc.

Test Cloud Services Ports

Opens a popup window showing the result of the Cloud Services Connectivity Test.

SNMP

To enable or disable SNMP

Enabling or disabling the SNMP agent on the appliance.

To configure SNMP settings

Configuring SNMP general settings, including traps and users.

SNMP v3 Users

Adding, editing, or deleting SNMP v3 users.

SNMP Traps Receivers

SNMP Traps

Enabling or disabling traps and setting threshold values.

SNMP Traps for VPN Tunnels

Monitoring VPN tunnel status and receiving alerts when tunnels go down.

SNMP Traps for Hardware Sensors

Receiving information on hardware sensor values and their thresholds.

To enable an SNMP trap

Enabling specific SNMP traps and configuring their details.

To edit an SNMP trap

Advanced Configuration

Upgrade Using a USB Drive

Upgrading appliance firmware using a USB drive without a console connection.

Installing a new firmware image from a USB drive

Steps to install a new firmware image from a USB drive.

To upgrade to a new firmware image from a USB drive

Procedure for upgrading to a new firmware image using a USB drive.

Upgrade Using an SD Card

To upgrade to a new firmware image from an SD card

Upgrading appliance firmware or configuration file using an SD card.

To upgrade using Gaia Clish commands

File names that can be used with Gaia Clish commands for upgrades.

Boot Loader

Upgrade Using Boot Loader

Restoring Factory Defaults

To restore factory defaults with the WebUI

Restoring appliance to factory defaults using the WebUI.

To restore factory defaults with the button on the back panel

Restoring appliance to factory defaults using the back panel button.

To disable the reset to default

Custom Default Image

To update the default image

Updating the default image using Clish commands.

Fonic Bypass

Configuring Bypass mode in the WebUI

Configuring Bypass mode (Active/Force-Bypass) through the WebUI.

Configuring Bypass mode in Gaia Clish

Switching between Active and Bypass modes using Gaia Clish commands.

RESTful API

Enabling and disabling the REST API

Enabling or disabling the REST API on the gateway using Gaia Clish commands.

Request Structure

Structure of HTTP POST requests, including URL, headers, and payload.

Response Structure

Versioning

Handling API versioning in HTTP POST requests.

REST API Commands

(1) Login

Logging into the SMB appliance using admin credentials via REST API.

(2) Logout

Logging out from the current session via REST API.

(3) Generate-Report

Generating security report data according to selected time frame via REST API.

(4) Run-Clish-Command

Executing a single Gaia Clish command via REST API.

Check Point QUANTUM SPARK 1600 Specifications

General IconGeneral
Form FactorDesktop
New Sessions per Second5, 000
Storage64 GB SSD
RAM8 GB
Humidity10% to 90% non-condensing
Interfaces8x 1GbE
Power SupplyAC Power Supply
Dimensions (H x W x D)44 x 210 x 160 mm
Operating Temperature0°C to 40°C
Storage Temperature-20° to 70°C

Related product manuals