Next Generation Security Gateway Guide R80.10 CP Nex Gen
User Manual:
Open the PDF directly: View PDF
Page Count: 198 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- Next Generation Security Gateway
- Important Information
- Terms
- Check Point Next Generation Security Gateway Solution
- Creating an Access Control Policy
- Introducing the Unified Access Control Policy
- Creating a Basic Access Control Policy
- Creating Application Control and URL Filtering Rules
- Ordered Layers and Inline Layers
- The Need for Ordered Layers and Inline Layers
- Order of Rule Enforcement in Inline Layers
- Order of Rule Enforcement in Ordered Layers
- Creating an Inline Layer
- Creating a Ordered Layer
- Enabling Access Control Features
- Types of Rules in the Rule Base
- Administrators for Access Control Layers
- Sharing Layers
- Visual Division of the Rule Base with Sections
- Exporting Layer Rules to a .CSV File
- Managing Policies and Layers
- The Columns of the Access Control Rule Base
- Source and Destination Column
- VPN Column
- Services & Applications Column
- Service Matching
- Application Matching
- Configuring Matching for an Allowed Application
- Configuring Matching for Blocked Applications
- Adding Services, Applications, and Sites to a rule
- Creating Custom Applications, Categories, and Groups
- Services and Applications on R80 and Lower Gateways, and after Upgrade
- Content Column
- Actions Column
- Tracking Column
- Unified Rule Base Use Cases
- Rule Matching in the Access Control Policy
- Best Practices for Access Control Rules
- Installing the Access Control Policy
- Analyzing the Rule Base Hit Count
- Preventing IP Spoofing
- Translating IP Addresses (NAT)
- UserCheck Interactions in the Access Control Policy
- Configuring the Security Gateway for UserCheck
- Blocking Applications and Informing Users
- UserCheck for Access Control Default Messages
- Creating a UserCheck Interaction Object
- Example UserCheck Message Using Field Variables
- Localizing and Customizing the UserCheck Portal
- UserCheck Frequency and Scope
- UserCheck Settings
- UserCheck CLI
- Revoking Incidents
- UserCheck Client
- Blade Settings
- Creating a Threat Prevention Policy
- Threat Prevention Components
- Assigning Administrators for Threat Prevention
- Analyzing Threats
- Out-of-the-Box Protection from Threats
- The Threat Prevention Policy
- Creating Threat Prevention Rules
- The Check Point ThreatCloud
- To Learn More About Threat Prevention
- Creating Shared Policies
- Shared Policies
- Configuring HTTPS Inspection
- Inspecting HTTPS Packets
- Configuring Gateways to inspect outbound and inbound HTTPS
- Enabling HTTPS Inspection
- Creating an Outbound CA Certificate
- Importing an Outbound CA Certificate
- Exporting and Deploying the Generated CA
- Configuring Inbound HTTPS Inspection
- HTTPS Inspection Policy
- Managing Certificates by Gateway
- Adding Trusted CAs for Outbound HTTPS Inspection
- HTTPS Validation
- Showing HTTPS Inspection Logs
- Configuring the Geo Policy
- Adding Users to the Policy
- Logging and Monitoring
- Maximizing Network Performance and Redundancy
- Solutions for Enhancing Network Performance and Redundancy
- CoreXL
- SecureXL
- Multi-Queue
- ClusterXL
- VRRP Cluster
- To Learn More About Maximizing Network Performance
- Simplifying Security for Private Clouds
- Introduction to Virtual Systems (VSX)
- VSX Architecture and Concepts
- Configuring a VSX Cluster
- To Learn More About VSX
- Securing Data