CheckPoint NG VPN 1/Firewall 1

1st Edition

Advanced Configuration and Troubleshooting

Authors: Syngress
Paperback ISBN: 9781931836975
eBook ISBN: 9780080476469
Imprint: Syngress
Published Date: 11th May 2003
Page Count: 606
Tax/VAT will be calculated at check-out
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that meets the industry's next generation Internet security requirements, including simplified security management for increasingly complex environments. Built upon Check Point's Secure Virtual Network (SVN) architecture, the Next Generation User Interface revolutionizes the way security administrators define and manage enterprise security by further integrating management functions into a security dashboard and creating a visual picture of security operations. The Next Generation User Interface delivers unparalleled ease-of-use, improved security and true end-to-end security management. Check Point's revenues have more than doubled in each of the last two years, while capturing over 50% of the VPN market and over 40% of the firewall market according to IDC Research. The explosive growth of the company is further evidenced by over 29,000 IT professionals becoming Check Point Certified so far. This book will be the complimentary to Syngress' best-selling Check Point Next Generation Security Administration, which was a foundation-level guide to installing and configuring Check Point NG. This book will assume that readers have already mastered the basic functions of the product and they now want to master the more advanced security and VPN features of the product. Written by a team of Check Point Certified Instructors (the most prestigious Check Point certification) this book will provide readers with a complete reference book to Check Point NG and advanced case studies that illustrate the most difficult to implement configurations. Although not a Study Guide, this book will cover all of the objectives on Check Point's CCSE Exam.

Key Features

· The reader will learn to design and configure a Virtual Private Network (VPN). · The reader will learn to configure Check Point NG for High Availability (HA), which is the ability of a system to perform its function continuously (without interruption) for a significantly longer period of time than the reliabilities of its individual components would suggest. · The reader will learn to use SeucureUpdate, which allows them to perform simultaneous, secure, enterprise-wide software updates.

Table of Contents

Foreword Chapter 1 FW-1 NG Operational Changes Introduction Static NAT Changes from 4.x to NG Server-Side NAT Client-Side NAT Bidirectional NAT Automatic ARP When ARP Is Automatic When ARP Is Manual Upgrading 4.x to NG The 4.x Upgrade Process When to Rebuild Summary Solutions Fast Track Frequently Asked Questions Chapter 2 Smart Clients Introduction SmartDashboard What’s New in NG SmartDashboard A GUI Overview of New FP3 Features SmartView Status What’s New in SmartView Status Highlights of SmartView Status SmartView Tracker What’s New in SmartView Tracker Highlights From the SmartView Tracker SmartView Monitor Installation The Interface Traffic Monitoring Generating Reports User Monitor The Interface Managing Queries Summary Solutions Fast Track Frequently Asked Questions Chapter 3 Advanced Authentication Introduction Active Directory Setting Up Active Directory for FireWall-1 Authentication Setting Up the Firewall for AD Authentication Suggested Uses of MS-AD Authentication Standard LDAP Setting Up the LDAP for FireWall-1 Authentication Setting Up the Firewall for LDAP Authentication Suggested Uses of LDAP Authentication RADIUS Setting Up the Firewall for RADIUS Authentication Setting Up RADIUS for FireWall-1 Authentication Suggested Uses of RADIUS Authentication TACACS+ Setting Up the Firewall for TACACS+ Authentication Setting Up TACACS+ for FireWall-1 Authentication Suggested Uses of TACACS+ Authentication General User Management Self-


No. of pages:
© Syngress 2003
eBook ISBN:
Paperback ISBN:

About the Author