Seminarinhalt
Die Teilnehmer*innen lernen, wie sie SmartConsole, das Gaia-Betriebssystem, einen Sicherheitsmanagementserver und ein Sicherheitsgateway installieren und grundlegend konfigurieren.
Darüber hinaus lernen die Teilnehmer*innen, wie sie eine grundlegende Richtlinie erstellen, einen Sicherheitsgateway-Cluster bereitstellen, einen dedizierten Protokollserver konfigurieren, Wartungsaufgaben wie Systemsicherungen und Snapshots durchführen und Objekte und Regeln stapelweise importieren.
Programm
- Identify the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.
- dentify key considerations when planning a new Quantum Security deployment.
- Verify the Check Point Hosts
- Document the Network Environment
- Verify the A-GUI Client Host
- Identify the basic workflow, guidelines, and best practices for a Primary Security Management Server deployment.
- Lab Tasks
- Install the Gaia Operating System
- Configure the Primary Security Management Server
- Deploy SmartConsole
- Identify the basic workflow, guidelines, and best practices for a Security Gateway deployment.
- Run the First Time Wizard on the Security Gateway
- Create a Security Gateway Object
- Test SIC and Install Licenses
- Describe the essential elements of a Security Policy.
- Identify features and capabilities that enhance the configuration and management of the Security Policy.
- Create an Access Control Policy Package
- Add and Modify a Rule in the Access Control Policy
- Identify the basic workflow, guidelines, and best practices for a Security Gateway Custer deployment.
- Reconfigure the Security Environment
- Configure Cluster Members as Security Gateways
- Configure Cluster Member Interfaces
- Add Members to the Clusters
- Add Licenses to the Cluster Members
- Identify the basic workflow, guidelines, and best practices for a dedicated Log Server deployment.
- Configure a dedicated Log Server
- Add a dedicated Log Server
- Explain the purpose of a regular maintenance strategy.
- Identify the basic workflow, guidelines, and best practices for Backup/Restore, Snapshot Management, Load/Save Configuration, Hardware Health Monitoring, and Software Updates.
- Collect and Download System Backups
- Collect and Download Snapshots
- Describe purpose of a batch import and give import use cases.
- Identify the basic workflow, guidelines, and best practices for a batch import.
- Import and Create Host Objects
- Import and Create Network Objects
- Import and Create Group Objects
- Import and Create Access Control Rules
Zielgruppen
- Deployment Administrators
- Security Administrators
- Security Consultants
Vorkenntnisse
- Unix-like and/or Windows OS
- Internet Fundamentals
- Networking Fundamentals
- Networking Security
- System Administration
- TCP/IP Networking
- Text Editors in Unix-like OS
- No prerequisite courses