Publication date : 05/17/2024

Course : Check Point R81, network security, level 2

Practical course - 3d - 21h00 - Ref. CPN
Price : 2100 € E.T.

Check Point R81, network security, level 2




This training course provides all the knowledge you need to optimize your application and set up clustering and high availability mechanisms. It details the use of numerous advanced configuration options such as quality of service (QoS), redundancy...


INTER
IN-HOUSE
CUSTOM

Practical course in person or remote class
Disponible en anglais, à la demande

Ref. CPN
  3d - 21h00
2100 € E.T.




This training course provides all the knowledge you need to optimize your application and set up clustering and high availability mechanisms. It details the use of numerous advanced configuration options such as quality of service (QoS), redundancy...


Teaching objectives
At the end of the training, the participant will be able to:
Identity Awareness
Implementing a High Availability and Load Sharing cluster
Check quality of service (QoS)

Intended audience
System/network/security administrators and engineers, technicians.

Prerequisites
Good knowledge of TCP/IP, IS security and Check Point's main functions, or knowledge equivalent to that provided by course ref. CPB. Experience desirable.

Course schedule

1
Identity Awareness and Application Control

  • Advanced features.
  • Useful CLI commands.
  • On-the-fly certificate creation for HTTPS inspection.
Hands-on work
Implementation of Identity Awareness in various forms.

2
Acceleration modules

  • Introducing CoreXL.
  • Connection acceleration with SecureXL.
  • SecureX module and HTTP session acceleration.
  • Presentation of Optimized Drops and NAT Templates.
  • SecureXL Dynamic Dispatcher.
  • SecureXL and CoreXL operate simultaneously.

3
Check Point clustering

  • Management Server high availability (Smartcenter HA).
  • Firewall redundancy.
  • ClusterXL High Availability (Active/Passive).
  • ClusterXL Load Sharing (Active/Active).
  • VMAC and ARP issues.
  • SecureXL vs VRRP comparison.
Hands-on work
Setting up a High Availability and Load Sharing cluster.

4
VPN and advanced routing

  • Debugging, routing and route-based VPN.
  • Dynamic routing with the RIP, OSPF and BGP routing protocols.
  • Wire Mode operating modes.
  • VTI (Virtual Tunnel Interface).
  • Directional VPN Route Match.
  • Link Selection and VPN redundancy.
  • Traditional/simplified VPN, Tunnel Management.
Hands-on work
Setting up Route-Based VPNs.

5
Advanced firewall

  • Tools (Dbedit, guiDBedit).
  • System files, log management.
  • Implementation of CPInfo, Solr.
  • Example of how InfoView and Confwiz are used.
  • SIC, ICA and certificates.
  • Operation of fw monitor and analysis with Wireshark. Implementation of tcpdump.
  • Introducing CPsizeme, CPView.
Hands-on work
Use of debugging tools.

6
Software Blade Compliance

  • Introducing Software Blade Compliance.
  • Safety best practices.

7
Content Awareness and DLP

  • Overview of Data Type Objects.
  • Setting up a DLP Software Blade.
  • Choice of DLP policy actions.
  • Watermark management.
Hands-on work
Using Software Blade Content Awareness. Creating a Data Type object.

8
QoS

  • Introducing Software Blade QoSAwareness.
  • Implementation of DiffServ and low-latency classes (LLQ).
Hands-on work
Bandwidth control with Software Blade QoS.