Skip navigation
All Places >

SecureKnowledge

Log in to follow, share, and participate in this community.

Recent Activity

Valeri Loukine
Did you know that there is a way to connect one of your Security Gateways to a switch mirror (span) port on a switch to run security inspection of the traffic without interfering?   This type of deployment is called Monitor Mode.   Monitor Mode on Check Point Security Gateway interface is usually configured to monitor and analyze network traffic… (Show more)
in SecureKnowledge
Valeri Loukine
Click to view contentUnderstanding how a particular connection is matched through your security policy is vital. There is now a tool for that, Check Point Packet Injector.   This utility is executed on the Security Gateway, simulating packets arriving from the sender on their way to the target host. After the packets are sent, Packet Injector listens for response… (Show more)
in SecureKnowledge
Ronen Zel
In case you missed the November SET Newsletter we released last week, here it is again: Security Expert Technical Newsletter (SET November2018) .
in SecureKnowledge
Valeri Loukine
Arguably, the most popular tool to troubleshoot traffic crossing a Security Gateway is fw monitor. However, not all security engineers and administrators are familiar with the full potential of fw monitor.   The tool is extremely powerful, flexible and versatile.   To unleash its full potential, please look into the article of the week: What is… (Show more)
in SecureKnowledge
Valeri Loukine
One of the classic yet not so commonly used features of ClusterXL is the ability to configure cluster IP addresses in a manner where physical IP addresses and VIPs are on different network subnets.      The advantage of this is that it: Enables a multi-machine cluster to replace a single-machine gateway in a pre-configured network, without the… (Show more)
in SecureKnowledge
Valeri Loukine
Our featured SecureKnowledge article of the week is SecureXL Penalty Box.    Protecting your networks from DDoS attacks is a challenge. With SecureXL Penalty Box, your Security Gateway can start dropping IPs frequently reported by IPS, without decreasing performance.   To learn more about this feature, please read the article.
in SecureKnowledge
Valeri Loukine
The Threat Emulation RESTful API is available on any Check Point appliance with enabled Threat Emulation blade. It allows you to: Query for emulation results Download reports Upload files for emulation/extraction   For more details and usage examples, look into the following SK article: Threat Prevention API for Security Gateway 
in SecureKnowledge
Valeri Loukine
This week we feature the Advanced Technical Reference Guide for R80.x Multi-Domain Security Management.   As you know, Check Point management server architecture has been completely changed after R77.30. Understanding the new structure, data flows, dependencies and troubleshooting techniques is vital for maintaining a stable and reliable security… (Show more)
in SecureKnowledge
Valeri Loukine
Today we feature SandBlast Mobile 3.0 release.    SandBlast Mobile 3.0 release adds Anti-Phishing and more protections to a light-weight iOS or Android app which integrates with leading UEM (Unified Endpoint Management) vendors like VMware AirWatch, BlackBerry, IBM MaaS360, MobileIron, Microsoft Intune and Ctirix XenMbobile.   Find the latest… (Show more)
in SecureKnowledge
Valeri Loukine
Whether you work on improving performance of your Security Gateways or Management Servers, OS cumulative statistics are important for understanding the issue in hands and identifying a bottleneck.    Gaia OS uses standard Linux instrument sar to provide such information. With sar command one can look into statistics about disk operations, system… (Show more)
in SecureKnowledge
Load more items