- Products
- Learn
- Local User Groups
- Partners
- More
Check Point
for Beginners
OPEN OTHER ARTICLES
 Part 2 - Preparing the Lab
           Part 2 - Preparing the Lab
        
        
              
               Part 10 - Identity Awareness
           Part 10 - Identity Awareness
        
        
              
               Site to Site VPN in R80.x - Tutorial for Beginners
           Site to Site VPN in R80.x - Tutorial for Beginners
        
        
               Absolute Beginner’s Guide to R80.x
           Absolute Beginner’s Guide to R80.x
        
        
               Handling Traffic in the Access Policy - Knowledge Nuggets
           Handling Traffic in the Access Policy - Knowledge Nuggets
        
        
               Video - Security Administration Experience
           Video - Security Administration Experience
        
        
               Video - Securing Hybrid Cloud Environment
           Video - Securing Hybrid Cloud Environment
        
        
               Video - Smart-1 Cloud - Cloud Based Security Management
           Video - Smart-1 Cloud - Cloud Based Security Management
        
        
               Video - Container Security
           Video - Container Security
        
        
               Video - Identity Based Segmentation
           Video - Identity Based Segmentation
        
        
               Video - Securing Public Cloud Environment
           Video - Securing Public Cloud Environment
        
        
               Video - Threat Hunting, Detection, and Monitoring
           Video - Threat Hunting, Detection, and Monitoring
        
        
               Video - Firewall as a Service (FWaaS)
           Video - Firewall as a Service (FWaaS)
        
        
               Video - Application Control and URL Filtering
           Video - Application Control and URL Filtering
        
        
               Video - TLS Inspection
           Video - TLS Inspection
        
        
               Video - Hyper Scale Clustering with Quantum Maestro
           Video - Hyper Scale Clustering with Quantum Maestro
        
        
               Video - Check Point R81.X - Crash Course - Introduction
           Video - Check Point R81.X - Crash Course - Introduction
        
        
               Video - Check Point R81.X - Crash Course - Admin GUI
           Video - Check Point R81.X - Crash Course - Admin GUI
        
        
               Video - Check Point R81.X - Crash Course - SmartConsole
           Video - Check Point R81.X - Crash Course - SmartConsole
        
        
               Check Point R81.X - Crash Course - Admin GUI Part 2
           Check Point R81.X - Crash Course - Admin GUI Part 2
        
      Check Point Software Technologies (Check Point for short) is a company operating exclusively on the field of Information Security and covering four main areas:
In this article, we are discussing Network Security solutions with Check Point.
The main product of Check Point is the network security solution – Next Generation Firewall (NGFW). When working with it, you will encounter three main components: Security Gateway, Security Management Server and SmartConsole.
Administration process includes the following steps:
Historically, Check Point Software Technologies was oriented to different OSs: SUN, AIX, HP-OS, various flavors of Linux and Windows, IPSO, Secure Platform (SPLAT) and others. Today three component of Check Point are using the following Operating Systems:
Note: Check Point SMB appliances based on ARM processors are using Gaia Embedded OS, which is a stripped and optimized version of Gaia.
At this moment Check Point supports three main software versions of its products:
R77.30 is planned to go out of support in May 2019. R80.20 was released at the end of September 2018.
There are different deployment options for a Network Security System based on Check Point products:
Security Gateway and Security Management Server components can be deployed on the same hardware of VM (Standalone):
or as different entities (Distributed Deployment).
Standalone option is economical but also limited, especially when talking about performance.
Distributed is the most popular and deployment option for Check Point customers. For some specific functions, such as SmartEvent, distributed deployment is a requirement.
Security Gateway is deployed in a Routed Mode or a Bridge Mode.
Routed Mode is the most common. In this case, Security Gateway performs L3 routing when forwarding traffic allowed by Security Policy.
Bridge Mode can be deployed without changing network topology, to control traffic on Layer 2. Some functionality is limited in this mode.
One of the most frequent questions beginners have is about the term “Software Blades”. In plain words, Check Point is using this term for specific features of its products.
Security Gateways and Management Servers have collections of related Software Blades that one can enable or disable when required, depending on licensing. Combination of those defines specific flavor of Check Point products.
We will be addressing most of the Software Blades and their functions in the further CP4B materials. However, it worth listing all Software Blades available for Management and Gateways here.
In this article we have introduce you to the main terms and concepts of Check Point Network Security product family. In the next articles, we will address installation and initial configuration flow for both Security Gateway and Security Management Server.
----------------------------
Author - Evgeniy Olkov, CTO at TS Solution. 
Founded in 2010, the TS Solution is a fast growing Russian company, focused on integrating high-tech networking, security and server virtualization systems and technologies, along with maintenance and professional services.
Translation and editing - Valeri Loukine
Review and editing - Dameon Welch-Abernathy
Check Point Software Technologies (Check Point for short) is a company operating exclusively on the field of Information Security and covering four main areas:
   
In this article, we are discussing Network Security solutions with Check Point.
The main product of Check Point is the network security solution – Next Generation Firewall (NGFW). When working with it, you will encounter three main components: Security Gateway, Security Management Server and SmartConsole.
   
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY