EasyManua.ls Logo

Check Point UTM-1 Edge - User Manual

Check Point UTM-1 Edge
707 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
Check Point UTM-1 Edge
Internet Security Appliance
User Guide
Version 7.5
Part No: 700800, August 2007

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Check Point UTM-1 Edge and is the answer not in the manual?

Summary

About This Guide

About Your Check Point UTM-1 Embedded NGX Appliance

Introduces the UTM-1 appliance, its features, and integration with Check Point's SMART architecture.

The UTM-1 Edge X Series and UTM-1 Edge W Series

Details the different hardware series and models within the UTM-1 Edge X and Edge W product families.

Contacting Technical Support

Provides information on how to obtain technical assistance for the UTM-1 appliance.

UTM-1 Security

Introduction to Information Security

Explains basic security concepts and the value of information in an organizational context.

The UTM-1 Firewall

Defines firewall functionality, security requirements, and Check Point's Stateful Inspection technology.

Installing and Setting Up UTM-1

Before You Install the UTM-1 Appliance

Details pre-installation requirements and checks, including TCP/IP configuration.

UTM-1 Edge X and UTM-1 Edge W Installation

Provides step-by-step instructions for installing UTM-1 Edge X and Edge W appliances.

Getting Started

Initial Login to the UTM-1 Portal

Guides users through the first-time login process and initial password setup for the UTM-1 Portal.

Logging on to the UTM-1 Portal

Explains how to log in to the UTM-1 Portal via HTTP or HTTPS.

Configuring the Internet Connection

Overview

Introduces the different types of Internet connection configurations supported by the UTM-1 appliance.

Using the Internet Wizard

Provides a step-by-step guide for configuring Internet connections using the wizard interface.

Using Internet Setup

Explains manual configuration of Internet connections, including advanced options.

Managing Your Network

Configuring Network Settings

Details how to configure LAN, IP addresses, NAT, DHCP, DMZ, and VLAN settings for network management.

Using Network Objects

Explains how to add and manage computers and networks as objects for policy configuration.

Configuring Network Service Objects

Describes how to add and edit custom network services for policy definition.

Using Static Routes

Explains how to configure static routes for directing network traffic.

Using Bridges

Overview

Introduces bridging functionality for connecting network segments and provides advantages like network segmentation.

Adding and Editing Bridges

Provides steps for adding and editing bridges for network connectivity.

Adding Internal Networks to Bridges

Explains how to add internal networks, including VLANs, to a bridge configuration.

Adding Internet Connections to Bridges

Details how to add Internet connections to bridge configurations.

Configuring High Availability

Overview

Explains High Availability (HA) clustering, master/backup roles, and virtual IP address management.

Configuring High Availability on a Gateway

Provides the procedure to configure HA settings on a single gateway.

Using Traffic Shaper

Overview

Introduces Traffic Shaper for bandwidth management and prioritizing important traffic.

Setting Up Traffic Shaper

Details the steps required to enable and configure Traffic Shaper for Internet connections.

Predefined QoS Classes

Describes the predefined Quality of Service (QoS) classes available for traffic prioritization.

Working with Wireless Networks

Overview

Introduces the UTM-1's wireless capabilities, including 802.11 standards and extended range modes.

Configuring Wireless Networks

Guides users through configuring wireless networks, including using the Wireless Configuration Wizard.

Troubleshooting Wireless Connectivity

Provides solutions for common problems related to wireless network connectivity.

Viewing Reports

Viewing the Event Log

Explains how to view and interpret the Event Log for tracking network activity and events.

Using the Traffic Monitor

Details how to view and analyze incoming and outgoing traffic data using the Traffic Monitor.

Viewing Computers

Describes how to view active computers on the network, their status, and node limit information.

Setting Your Security Policy

The UTM-1 Firewall Security Policy

Explains the UTM-1 Firewall's security policy, its components, and implementation.

Setting the Firewall Security Level

Details how to adjust the firewall's security level using a simple lever interface.

Configuring Servers

Guides on configuring public Internet servers like Web, Mail, FTP, or exposed hosts.

Using Rules

Explains how to create and manage firewall rules for traffic control and policy customization.

Using SmartDefense

Overview

Introduces Check Point SmartDefense Services for attack safeguards and blocking.

Configuring SmartDefense

Details how to configure SmartDefense using the Wizard or the Tree interface.

SmartDefense Categories

Provides a breakdown of SmartDefense categories and their associated attacks.

Using VStream Antivirus

Overview

Introduces VStream Antivirus, its stream-based engine, and scanning capabilities.

Enabling;Disabling VStream Antivirus

Explains how to enable or disable the VStream Antivirus feature for network computers.

Configuring VStream Antivirus

Details how to configure the VStream Antivirus policy and advanced settings.

SMART Management and Subscription Services

Overview

Introduces Service Centers, SMART management, and SofaWare Security Management Portal (SMP).

Connecting to a Service Center

Guides users on connecting the UTM-1 appliance to a Service Center for updates and services.

Viewing Services Information

Explains how to view subscription details and service status on the Account page.

Web Filtering

Details Web Filtering service, category blocking, and user override permissions.

Working with VPNs

Overview

Introduces Virtual Private Networks (VPNs), their types, and benefits.

Setting Up Your UTM-1 Appliance as a VPN Server

Guides on setting up the UTM-1 appliance as a Remote Access, Internal, or L2TP VPN Server.

Adding and Editing VPN Sites

Provides instructions for adding and editing VPN sites, including Site-to-Site and Remote Access configurations.

Managing Users

Changing Your Login Credentials

Explains how to change the username and password for accessing the UTM-1 appliance.

Adding and Editing Users

Details the process for adding new users and editing existing user accounts and permissions.

Viewing and Deleting Users

Provides steps for viewing, deleting, and clearing expired user accounts.

Using Remote Desktop

Overview

Introduces the integrated Microsoft Terminal Services client for remote desktop access.

Configuring Remote Desktop

Details how to enable and configure the Remote Desktop feature on the UTM-1 appliance.

Configuring the Host Computer

Explains how to enable the Remote Desktop server on computers for remote access.

Accessing a Remote Computers Desktop

Provides steps for accessing a remote computer's desktop using the UTM-1's Remote Desktop feature.

Maintenance

Viewing Firmware Status

Explains how to view the current firmware version and hardware details of the UTM-1 appliance.

Updating the Firmware

Provides instructions for updating the UTM-1 appliance's firmware manually or automatically.

Upgrading Your License

Details how to upgrade the UTM-1 product license by installing a new Product Key.

Configuring Syslog Logging

Guides on configuring the UTM-1 appliance to send event logs to a Syslog server.

Controlling the Appliance via the Command Line

Explains how to control the UTM-1 appliance using the command line interface via Portal, console, or SSH.

Configuring HTTPS

Details how to enable and configure HTTPS access to the UTM-1 Portal from the Internet.

Configuring SSH

Explains how to enable and configure SSH management protocol for appliance control.

Configuring SNMP

Guides on configuring Simple Network Management Protocol (SNMP) for appliance monitoring.

Setting the Time on the Appliance

Details how to set or synchronize the UTM-1 appliance's date and time.

Using Diagnostic Tools

Introduces diagnostic tools like Ping, Traceroute, WHOIS, and Packet Sniffer for troubleshooting.

Backing Up the UTM-1 Appliance Configuration

Explains how to export and import the UTM-1 appliance configuration file for backup and restore.

Resetting the UTM-1 Appliance to Defaults

Provides steps to reset the UTM-1 appliance to its factory default settings via Web interface or Reset button.

Running Diagnostics

Guides on viewing technical information and exporting diagnostic data for troubleshooting.

Rebooting the UTM-1 Appliance

Explains how to restart the UTM-1 appliance to resolve functioning issues.

Using Network Printers

Overview

Introduces the built-in print server for connecting USB-based printers and sharing them across the network.

Setting Up Network Printers

Details the procedure for setting up a network printer by connecting it to the UTM-1 appliance.

Configuring Computers to Use Network Printers

Provides instructions for configuring Windows Vista and Mac OS-X computers to use network printers.

Troubleshooting

Connectivity

Offers solutions for common connectivity problems, including Internet, DSL, and Cable access issues.

Service Center and Upgrades

Addresses issues related to node limits, Service Center connection failures, and software upgrades.

Other Problems

Provides solutions for common issues like forgotten passwords, incorrect date/time, and inaccessible applications.

Specifications

Technical Specifications

Presents detailed technical specifications, including physical attributes, power, environmental conditions, and standards compliance.

CE Declaration of Conformity

Details the CE declaration and compliance with various EU directives and standards.

Check Point UTM-1 Edge Specifications

General IconGeneral
ModelUTM-1 Edge
Form FactorDesktop
VPN Tunnels50
Power SupplyExternal AC adapter
Operating Temperature0° to 40° C
Storage Temperature-20°C to 70°C (-4°F to 158°F)
Humidity10% to 90% (non-condensing)
Device TypeUnified Threat Management (UTM) Appliance
Dimensions220 x 160 x 44 mm (8.66 x 6.30 x 1.73 in)

Related product manuals