Send Us an Inquiry

Checkpoint 80 Training in Nepal

Checkpoint 80 Training

Updated on: 4th Sep, 2018

Checkpoint 80 Training

Pre-requisites for Checkpoint 80 Training

Checkpoint 80 Training

Courses Outline :- Checkpoint 80 Training in Nepal
  • Describe Check Point's unified approach to network management and the key elements of this architecture.
  • Design a distributed environment using the network detailed in the course topology.
  • Install the Security Gateway version R77 in a distributed environment using the network
  • detailed in the course topology.
  • Given network specifications, perform a backup and restore the current Gateway installation from the command line.
  • Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line.
  • Deploy Gateways using sysconfig and cpconfig from the Gateway command line.
  • Given the network topology, create and configure network, host and gateway objects.
  • Verify SIC establishment between the Security Management Server and the Gateway using SmartDashboard.
  • Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use.
  • Evaluate existing policies and optimize the rules based on current corporate requirements.
  • Maintain the Security Management Server with scheduled backups and policy versions to
  • ensure seamless upgrades and minimal downtime.
  • Configure NAT rules on Web and Gateway servers.
  • Use Queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data.
  • Using packet data on a given corporate network, generate reports, troubleshoot system and security issues, and ensure network functionality.
  • Using SmartView Monitor, configure alerts and traffic counters, view a Gateway's status, monitor suspicious activity rules, analyze tunnel activity and monitor remote user access based on corporate requirements.
  • Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications.
  • Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways.
  • Upgrade and attach product licenses using SmartUpdate. Centrally manage users to ensure
  • only authenticated users securely access the corporate network either locally or remotely.
  • Manage users to access to the corporate LAN by using external databases. Use Identity Awareness to provide granular level access to network resources.
  • Acquire user information used by the Security Gateway to control access.
  • Define Access Roles for use in an Identity Awareness rule.
  • Implementing Identity Awareness in the Firewall Rule Base
  • Configure a pre-shared secret site-to-site VPN with partner sites.
  • Configure permanent tunnels for remote access to corporate resources.
  • Configure VPN tunnel sharing, given the difference between host-based, subunit-based and
  • gateway-based tunnels.
  • Resolve security administration issues.

Send Enquiry

Choose Course
  • Checkpoint 80 Training