1 / 185

Check Point Security Administration I NGX (R65)

Check Point Security Administration I NGX (R65). Slide Graphic Legend. Course Objectives. Part 1: Getting Started Chapter 1: Introduction to VPN-1

monty
Download Presentation

Check Point Security Administration I NGX (R65)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Check Point Security Administration INGX (R65)

  2. Slide Graphic Legend

  3. Course Objectives • Part 1: Getting Started • Chapter 1: Introduction to VPN-1 • Given your understanding of Check Point’s three-tier architecture and basic firewall concepts, design and install a distributed deployment of VPN-1. • Test to verify the VPN-1 deployment, based on SIC establishment between the SmartCenter Server and the Gateway using SmartDashboard. • Chapter 2: Introduction to SecurePlatform • Given the most current configuration, update the appropriate network interface using the sysconfig utility to change the management interface. • Given specific instructions, perform a backup and restore of the current Gateway installation from the command line.

  4. Course Objectives • Part 2: Security Policy • Chapter 3: Introduction to the Security Policy • Given the network topology, create and configure network, host, and gateway objects for your city site. • In SmartMap view, actualize your city site’s network objects. • In SmartMap, given your partner city’s network data, create and configure your partner city’s Web server object. • Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use. Test your Rule Base with your partner city, and evaluate logs in SmartView Tracker. • Given your Policy’s implicit rules, configure an implied rule for logging purposes.

  5. Course Objectives • Manually configure NAT rules on your Web-server and Gateway objects. Refer to the Global Properties of the Gateway object. • Configure the Policy using Database Revision Control. • Part 3: Access Control and Management • Chapter 4: Monitoring Traffic and Connections • Given a deployment strategy, test and verify a new Policy using SmartView Tracker. • Given evidence of a potential intrusion or attack using SmartView Tracker, change the Policy to block the offending connection. • Use SmartView Monitor to block and monitor a user’s activities by implementing the SAM rule. • Given accumulated raw-logged data, configure Eventia Reporter to monitor and audit network traffic.

  6. Course Objectives • Chapter 5: Authentication • Create and configure users in SmartDirectory for access to your LAN. • Modify your Rule Base to provide permissions for users. • Configure partially automatic Client Authentication, and install, test, and verify the Policy in SmartView Tracker. • Chapter 6: Check Point QoS • Given a distributed network deployment, design a strategy for implementing QoS. • Based on an implementation of QoS, configure the required bandwidth allocation for the network.

  7. Course Objectives • Part 4: SmartDefense • Chapter 7: Basic SmartDefense and Content Inspection • Using content inspection, Application Intelligence, and/or Web Intelligence, configure for port scanning and HTTP worm catcher. • Create a SmartDefense profile, and incorporate port-scanning and successive-events settings into the profile. Test the configuration with your partner city’s Web server, and evaluate logs using SmartView Tracker. • Block connections, given evidence of a potential intrusion or attack. Evaluate logs. • Based on network analysis disclosing threats by specific sites, configure a Web-filtering and antivirus Policy to filter and/or scan the threatening traffic.

  8. PrefaceCheck Point Security Administration INGX (R65)

  9. Course Layout • Prerequisites • Check Point Certified Security Administrator (CCSA)

  10. Recommended Setup for Labs • Recommended Lab Topology

  11. Recommended Setup for Labs • IP Addresses • Lab Terms

  12. Check Point Security Architecture • PURE Security

  13. Check Point Security Architecture • Check Point Components

  14. Check Point Security Architecture • Unified Security Architecture

  15. Check Point Security Architecture • Broad Range of Security Solutions

  16. Check Point Security Architecture • Network Security • Data Security • Security Management • Services

  17. Training and Certification • CCMA • Learn More

  18. Part 1: Introduction to VPN-1 • Chapter 1: VPN-1 Overview • Chapter 2: Introduction to SecurePlatform

  19. 1 • VPN-1 Overview

  20. Objectives 1 • Given your understanding of Check Point’s three-tier architecture and basic firewall concepts, design and install a distributed deployment of VPN-1. • Test to verify the VPN-1 deployment, based on SIC establishment between the SmartCenter Server and the Gateway using SmartDashboard.

  21. VPN-1 Fundamentals 1 • VPN-1 Components

  22. Check Point’s Security Gateway 1 • OSI Communication Stack

  23. Check Point’s Security Gateway 1 • Packet Filtering

  24. Check Point’s Security Gateway 1 • Stateful Inspection

  25. Check Point’s Security Gateway 1 • Application Intelligence

  26. Check Point’s Security Gateway 1 • Bridge Mode and STP

  27. Check Point’s Security Gateway 1 • VPN-1 Gateway Inspection Architecture • Inspection Module Flow

  28. Security Policy Management 1 • SmartConsole Components

  29. Check Point SmartDashboard 1

  30. SmartView Tracker 1

  31. SmartView Monitor 1

  32. SmartLSM 1

  33. Eventia Reporter 1

  34. Eventia Analyzer 1

  35. VPN-1 SmartCenter Server 1 • Basic Concepts and Terminology • Using Management Plug-Ins • Securing Channels of Communication

  36. VPN-1 SmartCenter Server 1 • Distributed VPN-1 Configuration Showing Components with Certificates

  37. VPN-1 SmartCenter Server 1 • Administrative Login Using SIC

  38. SmartUpdate and Managing Licenses 1 • Understanding SmartUpdate • Overview of Managing Licenses • Contracts/Services • Service Contracts • Working with Contract Files

  39. 1 • VPN-1 Distributed Installation

  40. Review Questions & Answers 1 • What is the primary purpose for the VPN-1 three-tier architecture?

  41. Review Questions & Answers 1 • Separate components provide a more secure management environment.

  42. Review Questions & Answers 1 • What are the primary components of the Check Point Security Gateway? Explain Stateful Inspection as it relates to the OSI Model?

  43. Review Questions & Answers 1 • Packet filtering • Stateful Inspection • SmartDefense and Application Intelligence • Stateful Inspection incorporates layer 4 awareness to the standard packet-filtering technology. It examines the contents of the packet up through the application layer of the OSI Model.

  44. Review Questions & Answers 1 • What are the advantages of Check Point’s Secure Management Architecture (SMART)? In what way does it benefit an enterprise network and its Administrators?

  45. Review Questions & Answers 1 • SMART is a unified approach to centralizing Policy management and configuration, including monitoring, logging, analysis, and reporting within a single control center.

  46. Review Questions & Answers 1 • What is the main purpose for the SmartCenter Server? Which function is it necessary to perform on the SmartCenter Server when incorporating Security Gateways into the network?

  47. Review Questions & Answers 1 • Used by the Security Administrator, the SmartCenter Server manages the Security Policy. In order to perform that role, the SmartCenter Server must establish SIC with other components, so that communication is verified and management can be performed on any component on the network.

  48. 2 • Introduction to SecurePlatform

  49. Objectives 2 • Given the most current configuration, update the appropriate network interface using the sysconfig utility to change the management interface. • Given specific instructions, perform a backup of the current Gateway installation from the command line.

  50. Introduction 2 • SecurePlatform allows easy configuration of your computer and networking aspects, along with installed Check Point products.

More Related