EasyManua.ls Logo

Check Point R80.20 - User Manual

Check Point R80.20
626 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
28 December 2020
Guide
NEXT GENERATION
SECURITY GATEWAY
R80.20
Classification: [Protected]

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Check Point R80.20 and is the answer not in the manual?

Summary

Important Information

Check Point Next Generation Security Gateway Solution

Components of the Check Point Firewall Solution

Details the primary components of a Check Point firewall solution, including SmartConsole, SMS, Security Gateway, and network.

Mirror and Decrypt

Mirror and Decrypt Requirements

Details the requirements for implementing the Mirror and Decrypt feature, including designated interfaces and HTTPS inspection.

Configuring Mirror and Decrypt in Gateway mode

Provides a workflow for configuring the Mirror and Decrypt feature on a Security Gateway or Cluster in Gateway mode.

ICAP Client

The ICAP Client Configuration File

Details the parameters within the ICAP Client configuration file, covering feature control, HTTP methods, and services.

Hardware Security Module (HSM)

Workflow for Setting Up Your HSM Environment

Outlines the steps to configure Check Point Gateway to work with the Gemalto HSM Appliance Server for secure key storage.

Creating an Access Control Policy

Creating a Basic Access Control Policy

Explains how to create a fundamental Access Control Rule Base using secure rules and optimized network performance.

Installing the Access Control Policy

Details the process of installing the Access Control Policy on Security Gateways via SmartConsole.

Preventing IP Spoofing

Describes how to configure Anti-Spoofing protection on Security Gateway interfaces to prevent unauthorized IP address usage.

Creating a Threat Prevention Policy

Threat Prevention Components

Introduces the Check Point Threat Prevention solution and its available Software Blades for comprehensive security.

Creating Threat Prevention Rules

Provides a guide on creating and managing policies and rules for the Threat Prevention Software Blade.

Out-of-the-Box Protection from Threats

Getting Quickly and Running with the Threat Prevention Policy

Explains how to quickly configure Threat Prevention for immediate protection using enabled blades and policy installation.

Enabling the Threat Prevention Software Blades

Details the steps to enable specific Threat Prevention Software Blades like IPS, Anti-Bot, and Anti-Virus on a Security Gateway.

The Threat Prevention Policy

Workflow for Creating a Threat Prevention Policy

Outlines the high-level workflow for creating and deploying a Threat Prevention policy, including enabling blades and installing policy.

Creating Threat Prevention Rules

Configuring IPS Profile Settings

Details how to configure IPS settings within a Threat Prevention profile, including activation modes and custom protections.

Configuring Threat Emulation Settings

Explains how to configure Threat Emulation settings within a Threat Prevention profile, including emulation location and scope.

The Check Point ThreatCloud

Creating Shared Policies

Configuring HTTPS Inspection

Describes how to enable and configure HTTPS Inspection on Security Gateways to decrypt and inspect encrypted traffic.

Adding Users to the Policy

Using Identity Awareness

Explains how to enforce access control for users and groups using Identity Sources to gather user information.

Creating Access Roles

Details how to create Access Role objects, which define users, machines, and network locations for policy rules.

Logging and Monitoring

Log Analysis

Provides guidance on transforming log data into security intelligence using SmartConsole's search and query capabilities.

Views and Reports

Explains how to create and customize views and reports for log and event monitoring to inform stakeholders about security activities.

Maximizing Network Performance and Redundancy

CoreXL

Describes the CoreXL feature for replicating the Firewall kernel for concurrent traffic handling across multiple CPU cores.

ClusterXL

Explains ClusterXL as a software-based solution for Security Gateway redundancy and Load Sharing, ensuring high availability.

Configuring ClusterXL

Provides steps for configuring ClusterXL, including installing cluster members, routing, CCP transport mode, and cluster objects.

Simplifying Security for Private Clouds

Introduction to Virtual Systems (VSX)

Introduces VSX as a security and VPN solution for large-scale environments, providing comprehensive protection for multiple networks.

Configuring a VSX Cluster

Details the process of configuring a VSX cluster using the VSX Cluster Wizard for basic cluster configurations.

Securing Data

Data Loss Prevention Features

Highlights key features of the Data Loss Prevention Software Blade, including UserCheck, MultiSpect, and Data Owner Auditing.

Enabling DLP

Provides steps to enable Data Loss Prevention on an existing Security Gateway or cluster, including portal and mail server configuration.

ConnectControl - Server Load Balancing

ConnectControl Packet Flow

Explains the packet flow for ConnectControl, detailing client requests, internet routing, and logical server processing.

Deploying a Security Gateway in Monitor Mode

Troubleshooting Specific Problems

Resetting SIC in Security Gateways

Provides guidance on resetting Secure Internal Communication (SIC) and troubleshooting SIC-related issues.

Security Before Firewall Activation

The Initial Policy

Explains the purpose and operation of the Initial Policy, which enforces security until a user-defined policy is loaded.

Command Line Reference

comp_init_policy

Generates, loads, or removes the Initial Policy on a Security Gateway or Cluster Member.

fw

Controls the Firewall module, fetches and unloads Threat Prevention policy, and manages various firewall processes.

fw ctl

Controls the Firewall kernel module, managing various parameters and statistics.

cpwd_admin

Manages Check Point processes, monitors critical processes, and attempts to restart them if they fail.

usrchk

Controls the UserCheck daemon, allowing management of user hits, incidents, and debug settings.

Kernel Debug Syntax

Provides the syntax and general procedure for collecting kernel debug messages to aid in troubleshooting.

Kernel Debug on Security Gateway

Kernel Debug Procedure

Details the steps for collecting kernel debug output into an output file for analysis.

Kernel Debug Filters

Explains how to configure filters for kernel debug to collect messages for applicable connections.

Check Point R80.20 Specifications

General IconGeneral
BrandCheck Point
ModelR80.20
CategoryGateway
LanguageEnglish

Related product manuals