- Products
- Learn
- Local User Groups
- Partners
- More
Check Point
for Beginners
OPEN OTHER ARTICLES
 Part 10 - Identity Awareness
           Part 10 - Identity Awareness
        
        
              
               Site to Site VPN in R80.x - Tutorial for Beginners
           Site to Site VPN in R80.x - Tutorial for Beginners
        
        
               Absolute Beginner’s Guide to R80.x
           Absolute Beginner’s Guide to R80.x
        
        
               Handling Traffic in the Access Policy - Knowledge Nuggets
           Handling Traffic in the Access Policy - Knowledge Nuggets
        
        
               Video - Security Administration Experience
           Video - Security Administration Experience
        
        
               Video - Securing Hybrid Cloud Environment
           Video - Securing Hybrid Cloud Environment
        
        
               Video - Smart-1 Cloud - Cloud Based Security Management
           Video - Smart-1 Cloud - Cloud Based Security Management
        
        
               Video - Container Security
           Video - Container Security
        
        
               Video - Identity Based Segmentation
           Video - Identity Based Segmentation
        
        
               Video - Securing Public Cloud Environment
           Video - Securing Public Cloud Environment
        
        
               Video - Threat Hunting, Detection, and Monitoring
           Video - Threat Hunting, Detection, and Monitoring
        
        
               Video - Firewall as a Service (FWaaS)
           Video - Firewall as a Service (FWaaS)
        
        
               Video - Application Control and URL Filtering
           Video - Application Control and URL Filtering
        
        
               Video - TLS Inspection
           Video - TLS Inspection
        
        
               Video - Hyper Scale Clustering with Quantum Maestro
           Video - Hyper Scale Clustering with Quantum Maestro
        
        
               Video - Check Point R81.X - Crash Course - Introduction
           Video - Check Point R81.X - Crash Course - Introduction
        
        
               Video - Check Point R81.X - Crash Course - Admin GUI
           Video - Check Point R81.X - Crash Course - Admin GUI
        
        
               Video - Check Point R81.X - Crash Course - SmartConsole
           Video - Check Point R81.X - Crash Course - SmartConsole
        
        
               Check Point R81.X - Crash Course - Admin GUI Part 2
           Check Point R81.X - Crash Course - Admin GUI Part 2
        
       Network Security
 Network Security
  Our lectures are designed for mastering both theoretical and practical aspects of Check Point products. Before moving forward, we need to build a lab environment. All further discussions have in mind the virtualization lab setup described below.
The virtual lab layout is presented on the diagram below.
It consists of five virtual machines
While we are using VMware Workstation 14 in our lab, you can also use ESXI or Virtual box as a virtualization platform.
To install and setup all Check Point machines you need R81.20 Check Point ISO file. It can be found here.
You will also need to install Windows Client (Windows 7 or higher) and Windows Server (2012 or higher) machines.
Note: Installation and setup of Windows machines are out of scope.
Minimal Hardware requirements for Gaia R80.10 Open Server installation are listed in Check Point R81.20 Release Notes:
Although going below these requirements is definitely not recommended in the production, we can have some allowances in the lab.
These are recommended virtual machine parameters for our lab:
You can chose your own RAM, CPU and HDD settings for Windows lab machines.
We believe the lab can be performed on a virtualization host with the following parameters:
We recommend using the same IP addresses as shown on the lab diagram above. Make sure you use different VMnet segments for each of the lab networks.
All three Security Gateway network interfaces should be defined in the different network segments.
In case of VirtualBox based lab, chose Host-Only Ethernet Adapter.
[1] In case you are building this lab on your Windows PC, your virtualization host can take the role of SmartConsole Client.
Author - Evgeniy Olkov, CTO at TS Solution. 
Founded in 2010, the TS Solution is a fast growing Russian company, focused on integrating high-tech networking, security and server virtualization systems and technologies, along with maintenance and professional services.
Translation and editing - Valeri Loukine
Review and editing - Dameon Welch-Abernathy
Our lectures are designed for mastering both theoretical and practical aspects of Check Point products. Before moving forward, we need to build a lab environment. All further discussions have in mind the virtualization lab setup described below.
The virtual lab layout is presented on the diagram below.
   
It consists of five virtual machines
While we are using VMware Workstation 14 in our lab, you can also use ESXI or Virtual box as a virtualization platform.
To install and setup all Check Point machines you need R81.20 Check Point ISO file. It can be found here
...You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY