1
Introduction
- Check Point products.
- What's new in the R80 version.
2
Operation and installation
- Architecture in distributed mode and standalone mode.
- The management server. The SIC protocol.
- Backup and restore commands.
- Overview of the Gaia system.
Hands-on work
Installing Check Point R80.
3
Setting up a security policy
- Getting started with SmartConsole.
- Starting and using SmartDashboard R80.
- Security policy. Rule management.
Hands-on work
Installing SmartConsole. Creating objects. Creating a security policy. Activating anti-spoofing.
4
Address translation (NAT)
- NAT rules with IPv4 and IPv6.
- Static NAT (One-to-One NAT) and dynamic NAT (Many-to-One NAT)/PAT.
- The ARP issue and routing.
Hands-on work
Setting up automatic one-to-one NAT, Hide, and manual transaction rules.
5
Monitoring and log management
- The log management policy.
- Tracking connections with SmartView Tracker.
- The SmartView Monitor, features, and alert thresholds.
Hands-on work
Activating monitoring, using the Suspicious Activity Monitoring Protocol, viewing traffic, monitoring the status of the security policy.
6
R80 client identification
- Identity Awareness. Application Control.
- Authentication types.
Hands-on work
Setting up an Identity Awareness.
7
Site-to-site VPN and roaming VPN
- VPN architecture. Basics of encryption.
- Introduction to IKE and IPSec.
- The certification authority (CA). Domain-Based VPN.
- SecureClient and the SSL Network Extender.
Hands-on work
Setting up an IPSec site-to-site tunnel using a preshared key and certificate. Configuring remote access with VPN IPSec and VPN SSL.
8
The IPS module
- Overview of IPS.
- Web Intelligence. Application Intelligence.
- IPS and IDS security profiles.
Hands-on work
Example of protecting against vulnerabilities with the IPS module.