1
Check Point R80: Operation and updating
- Updating Check Point R80.
- Update compatibility.
- Upgrade tools.
- Overview of Database Revision Control.
Hands-on work
Installing systems and updates in R80.
2
Identity Awareness and Application Control
- The limits of a traditional IP-based and port-based firewall.
- Access control.
- The four authentication methods in Identity Awareness R80
- Check Point 3D Security. HTTPS Inspection.
- The AppWiki. URL Filtering.
Hands-on work
Setting up Identity Awareness. Installing Security Management Server R80. Installing the Smartconsole and creating objects
3
The SecurityCore acceleration module
- Overview of the new SecurityCore acceleration module.
- Accelerating connections with SecureXL.
- The SecureX module and session acceleration.
- The case of http. CoreXL technology.
- Getting SecureXL and CoreXL to work at the same time.
4
Check Point clustering
- High availability of the Management Server.
- Firewall redundancy.
- ClusterXL High Availability (Active/Passive).
- ClusterXL Load Sharing (Active/Active).
- VMAC and ARP issues.
- VRRP. Comparing ClusterXL and VRRP.
Hands-on work
Implementing Active/Passive firewall redundancy, a cluster in Active/Active unicast (pivot mode) and multicast mode.
5
VPN and advanced routing
- VPN routing. Route-Based VPN.
- Dynamic routing with the RIP, OSPF, and BGP routing protocols.
- Wire Mode operating modes.
- Directional VPN Route Match.
- Link Selection and VPN redundancy.
- Traditional/simplified VPN. Tunnel Management.
Hands-on work
Setting up route-based VPN tunnels, static/dynamic routing, and configuring Wire Mode.
6
Advanced firewalls.
- Tools: Dbedit and guiDBedit.
- System files. Log management.
- Retrieving a CPInfo file.
- Example use of "InfoView" and "Confwiz".
- SIC, ICA, and certificates.
- Check Point processes.
- Tcpdump. The command fw monitor.
Hands-on work
Using debug tools.