Checkpoint

Check Point Remote Access – Secure Configuration Verification

In this article I will describe Check Point Remote Access – Secure Configuration Verification and demonstrate how to implement it with the Check Point Mobile for Windows.   Use Case Network and Firewall administrators can use different tools to control computers inside their organization. For example, to disable dangerous components such as Java and ActiveX […]

Check Point Remote Access – Secure Configuration Verification Read More »

Check Point R81.10 VSX Cluster Configuration – How to Tutorial

In this Tutorial will be installed Check Point VSX (Virtual System Extension) Cluster with two Security Gateways in ClusterXL High-Availability mode. On this VSX Cluster will be created two Firewall VS’s (Virtual System) VS_FW1 and VS_FW2. Separate isolated Management Network will be used for the communication between Security Management Server and the Security Gateways. Both

Check Point R81.10 VSX Cluster Configuration – How to Tutorial Read More »

Check Point R81 Firewall Security Gateway performance tests

In this article I will carry out empirical network throughput performance tests of the Checkpoint R81 Open Server Security Gateway with different configuration of Threat Prevention Software Blades realized in VMware ESXi Testlab. In this Testlab are up and running only the four hosts from prerequisites section on one dedicated Hardware with 20 CPU Cores.

Check Point R81 Firewall Security Gateway performance tests Read More »

Check Point R81 Firewall HA Cluster configuration with existing Security Gateway – How to Tutorial

There are two most common options how Check Point Security Gateways can be configured as ClusterXL members:   installing Security Gateways from the beginning as part of the ClusterXL and creating Cluster Object with those new Gateways (in first time wizard – Clustering – unit is part of the cluster, type: ClusterXL) creating Cluster Object

Check Point R81 Firewall HA Cluster configuration with existing Security Gateway – How to Tutorial Read More »