1.91k likes | 2.13k Views
Check Point Security Administration I NGX (R65). Slide Graphic Legend. Course Objectives. Part 1: Getting Started Chapter 1: Introduction to VPN-1
E N D
Course Objectives • Part 1: Getting Started • Chapter 1: Introduction to VPN-1 • Given your understanding of Check Point’s three-tier architecture and basic firewall concepts, design and install a distributed deployment of VPN-1. • Test to verify the VPN-1 deployment, based on SIC establishment between the SmartCenter Server and the Gateway using SmartDashboard. • Chapter 2: Introduction to SecurePlatform • Given the most current configuration, update the appropriate network interface using the sysconfig utility to change the management interface. • Given specific instructions, perform a backup and restore of the current Gateway installation from the command line.
Course Objectives • Part 2: Security Policy • Chapter 3: Introduction to the Security Policy • Given the network topology, create and configure network, host, and gateway objects for your city site. • In SmartMap view, actualize your city site’s network objects. • In SmartMap, given your partner city’s network data, create and configure your partner city’s Web server object. • Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use. Test your Rule Base with your partner city, and evaluate logs in SmartView Tracker. • Given your Policy’s implicit rules, configure an implied rule for logging purposes.
Course Objectives • Manually configure NAT rules on your Web-server and Gateway objects. Refer to the Global Properties of the Gateway object. • Configure the Policy using Database Revision Control. • Part 3: Access Control and Management • Chapter 4: Monitoring Traffic and Connections • Given a deployment strategy, test and verify a new Policy using SmartView Tracker. • Given evidence of a potential intrusion or attack using SmartView Tracker, change the Policy to block the offending connection. • Use SmartView Monitor to block and monitor a user’s activities by implementing the SAM rule. • Given accumulated raw-logged data, configure Eventia Reporter to monitor and audit network traffic.
Course Objectives • Chapter 5: Authentication • Create and configure users in SmartDirectory for access to your LAN. • Modify your Rule Base to provide permissions for users. • Configure partially automatic Client Authentication, and install, test, and verify the Policy in SmartView Tracker. • Chapter 6: Check Point QoS • Given a distributed network deployment, design a strategy for implementing QoS. • Based on an implementation of QoS, configure the required bandwidth allocation for the network.
Course Objectives • Part 4: SmartDefense • Chapter 7: Basic SmartDefense and Content Inspection • Using content inspection, Application Intelligence, and/or Web Intelligence, configure for port scanning and HTTP worm catcher. • Create a SmartDefense profile, and incorporate port-scanning and successive-events settings into the profile. Test the configuration with your partner city’s Web server, and evaluate logs using SmartView Tracker. • Block connections, given evidence of a potential intrusion or attack. Evaluate logs. • Based on network analysis disclosing threats by specific sites, configure a Web-filtering and antivirus Policy to filter and/or scan the threatening traffic.
Course Layout • Prerequisites • Check Point Certified Security Administrator (CCSA)
Recommended Setup for Labs • Recommended Lab Topology
Recommended Setup for Labs • IP Addresses • Lab Terms
Check Point Security Architecture • PURE Security
Check Point Security Architecture • Check Point Components
Check Point Security Architecture • Unified Security Architecture
Check Point Security Architecture • Broad Range of Security Solutions
Check Point Security Architecture • Network Security • Data Security • Security Management • Services
Training and Certification • CCMA • Learn More
Part 1: Introduction to VPN-1 • Chapter 1: VPN-1 Overview • Chapter 2: Introduction to SecurePlatform
1 • VPN-1 Overview
Objectives 1 • Given your understanding of Check Point’s three-tier architecture and basic firewall concepts, design and install a distributed deployment of VPN-1. • Test to verify the VPN-1 deployment, based on SIC establishment between the SmartCenter Server and the Gateway using SmartDashboard.
VPN-1 Fundamentals 1 • VPN-1 Components
Check Point’s Security Gateway 1 • OSI Communication Stack
Check Point’s Security Gateway 1 • Packet Filtering
Check Point’s Security Gateway 1 • Stateful Inspection
Check Point’s Security Gateway 1 • Application Intelligence
Check Point’s Security Gateway 1 • Bridge Mode and STP
Check Point’s Security Gateway 1 • VPN-1 Gateway Inspection Architecture • Inspection Module Flow
Security Policy Management 1 • SmartConsole Components
SmartLSM 1
VPN-1 SmartCenter Server 1 • Basic Concepts and Terminology • Using Management Plug-Ins • Securing Channels of Communication
VPN-1 SmartCenter Server 1 • Distributed VPN-1 Configuration Showing Components with Certificates
VPN-1 SmartCenter Server 1 • Administrative Login Using SIC
SmartUpdate and Managing Licenses 1 • Understanding SmartUpdate • Overview of Managing Licenses • Contracts/Services • Service Contracts • Working with Contract Files
1 • VPN-1 Distributed Installation
Review Questions & Answers 1 • What is the primary purpose for the VPN-1 three-tier architecture?
Review Questions & Answers 1 • Separate components provide a more secure management environment.
Review Questions & Answers 1 • What are the primary components of the Check Point Security Gateway? Explain Stateful Inspection as it relates to the OSI Model?
Review Questions & Answers 1 • Packet filtering • Stateful Inspection • SmartDefense and Application Intelligence • Stateful Inspection incorporates layer 4 awareness to the standard packet-filtering technology. It examines the contents of the packet up through the application layer of the OSI Model.
Review Questions & Answers 1 • What are the advantages of Check Point’s Secure Management Architecture (SMART)? In what way does it benefit an enterprise network and its Administrators?
Review Questions & Answers 1 • SMART is a unified approach to centralizing Policy management and configuration, including monitoring, logging, analysis, and reporting within a single control center.
Review Questions & Answers 1 • What is the main purpose for the SmartCenter Server? Which function is it necessary to perform on the SmartCenter Server when incorporating Security Gateways into the network?
Review Questions & Answers 1 • Used by the Security Administrator, the SmartCenter Server manages the Security Policy. In order to perform that role, the SmartCenter Server must establish SIC with other components, so that communication is verified and management can be performed on any component on the network.
2 • Introduction to SecurePlatform
Objectives 2 • Given the most current configuration, update the appropriate network interface using the sysconfig utility to change the management interface. • Given specific instructions, perform a backup of the current Gateway installation from the command line.
Introduction 2 • SecurePlatform allows easy configuration of your computer and networking aspects, along with installed Check Point products.