Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Create a Post
icon Network Security

Part 2 - Preparing the Lab

Introduction

Our lectures are designed for mastering both theoretical and practical aspects of Check Point products. Before moving forward, we need to build a lab environment. All further discussions have in mind the virtualization lab setup described below.

Attention: this document refers to R80.10 version. You can use exactly the same settings to run any of R80.x versions in the lab.

Virtual Lab

The virtual lab layout is presented on the diagram below.

_Val__0-1591874184094.png

 

 

 

It consists of five virtual machines

  • Security Management Server (SMS)
  • Security Gateway (SG)
  • Lab User PC
  • PC with SmartConsole[1]
  • Windows Server (Active Directory and IIS are enabled)

 

Virtualization platform

While we are using VMware Workstation 14 in our lab, you can also use ESXI or Virtual box as a virtualization platform.

 

Installation Software Images

To install and setup all Check Point machines you need R80.10 Check Point ISO file. It is available here

...;
TO READ THE FULL POST it's simple and free
1 Comment
DaraSinghCCS
Participant

good contents to understand the network diagram