Do you have a question about the Check Point R80.20 and is the answer not in the manual?
Details the primary components of a Check Point firewall solution, including SmartConsole, SMS, Security Gateway, and network.
Details the requirements for implementing the Mirror and Decrypt feature, including designated interfaces and HTTPS inspection.
Provides a workflow for configuring the Mirror and Decrypt feature on a Security Gateway or Cluster in Gateway mode.
Details the parameters within the ICAP Client configuration file, covering feature control, HTTP methods, and services.
Outlines the steps to configure Check Point Gateway to work with the Gemalto HSM Appliance Server for secure key storage.
Explains how to create a fundamental Access Control Rule Base using secure rules and optimized network performance.
Details the process of installing the Access Control Policy on Security Gateways via SmartConsole.
Describes how to configure Anti-Spoofing protection on Security Gateway interfaces to prevent unauthorized IP address usage.
Introduces the Check Point Threat Prevention solution and its available Software Blades for comprehensive security.
Provides a guide on creating and managing policies and rules for the Threat Prevention Software Blade.
Explains how to quickly configure Threat Prevention for immediate protection using enabled blades and policy installation.
Details the steps to enable specific Threat Prevention Software Blades like IPS, Anti-Bot, and Anti-Virus on a Security Gateway.
Outlines the high-level workflow for creating and deploying a Threat Prevention policy, including enabling blades and installing policy.
Details how to configure IPS settings within a Threat Prevention profile, including activation modes and custom protections.
Explains how to configure Threat Emulation settings within a Threat Prevention profile, including emulation location and scope.
Describes how to enable and configure HTTPS Inspection on Security Gateways to decrypt and inspect encrypted traffic.
Explains how to enforce access control for users and groups using Identity Sources to gather user information.
Details how to create Access Role objects, which define users, machines, and network locations for policy rules.
Provides guidance on transforming log data into security intelligence using SmartConsole's search and query capabilities.
Explains how to create and customize views and reports for log and event monitoring to inform stakeholders about security activities.
Describes the CoreXL feature for replicating the Firewall kernel for concurrent traffic handling across multiple CPU cores.
Explains ClusterXL as a software-based solution for Security Gateway redundancy and Load Sharing, ensuring high availability.
Provides steps for configuring ClusterXL, including installing cluster members, routing, CCP transport mode, and cluster objects.
Introduces VSX as a security and VPN solution for large-scale environments, providing comprehensive protection for multiple networks.
Details the process of configuring a VSX cluster using the VSX Cluster Wizard for basic cluster configurations.
Highlights key features of the Data Loss Prevention Software Blade, including UserCheck, MultiSpect, and Data Owner Auditing.
Provides steps to enable Data Loss Prevention on an existing Security Gateway or cluster, including portal and mail server configuration.
Explains the packet flow for ConnectControl, detailing client requests, internet routing, and logical server processing.
Provides guidance on resetting Secure Internal Communication (SIC) and troubleshooting SIC-related issues.
Explains the purpose and operation of the Initial Policy, which enforces security until a user-defined policy is loaded.
Generates, loads, or removes the Initial Policy on a Security Gateway or Cluster Member.
Controls the Firewall module, fetches and unloads Threat Prevention policy, and manages various firewall processes.
Controls the Firewall kernel module, managing various parameters and statistics.
Manages Check Point processes, monitors critical processes, and attempts to restart them if they fail.
Controls the UserCheck daemon, allowing management of user hits, incidents, and debug settings.
Provides the syntax and general procedure for collecting kernel debug messages to aid in troubleshooting.
Details the steps for collecting kernel debug output into an output file for analysis.
Explains how to configure filters for kernel debug to collect messages for applicable connections.
| Brand | Check Point |
|---|---|
| Model | R80.20 |
| Category | Gateway |
| Language | English |