0% found this document useful (0 votes)
124 views1 page

Specifications of Checkpoint VPN

This document summarizes the features and specifications of a software VPN including authentication methods, encryption algorithms, VPN modes, device support, and more. Key capabilities include support for password, RADIUS, LDAP and certificate-based authentication; integrated X.509 certificate authority; automatic site-to-site VPN configuration; and support for IKE, IPSec, L2TP and multiple VPN client options.

Uploaded by

vijay6996
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
124 views1 page

Specifications of Checkpoint VPN

This document summarizes the features and specifications of a software VPN including authentication methods, encryption algorithms, VPN modes, device support, and more. Key capabilities include support for password, RADIUS, LDAP and certificate-based authentication; integrated X.509 certificate authority; automatic site-to-site VPN configuration; and support for IKE, IPSec, L2TP and multiple VPN client options.

Uploaded by

vijay6996
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Software Specifications

Feature Detail
Authentification Methods Password, RADIUS, TACACS, X.509, SecurID, LDAP
Certification Authority Integrated X.509 certificate authority
Automatically sets up site-to-site connections as objects
VPN Communities
are created
Topology Support Star and mesh
Utilizes virtual tunnel interfaces, numbered/un-
Route-based VPN
numbered interfaces
VPN Resiliency Multiple Entry Point (MEP), wire mode
VPN Route Injection Route Injection Mechanism (RIM)
Site-to-site VPN Modes Domain-based, Route-based
Directional VPN Enforcement between or within community
IKE (Phase 1) Key Exchange AES-128, AES-256, 3DES, DES, CAST
IKE (Phase 1) Data Integrity MD5, SHA1, SHA2-256, SHA2-384, AES-XCBC
IKE (Phase 2) Data Encryption 3DES, AES-128, AES-256, DES, CAST, DES-40CP,
CAST-40, NULL
IKE (Phase 2) Data Integrity MD5, SHA1, SHA2-256, SHA2-384, AES-XCBC
Group 1 (768 bit), Group 2 (1024 bit), Group 5 (1536
IKE (Phase 1) & IPSec (Phase
bit), Group 14 (2048 bit), Group 19 (256-bit), Group 20
2) Diffie-Hellman Groups
(384-bit)
IKE (Phase 1) Options Main, Hybrid, Aggressive mode
IPSec (Phase 2) Options Perfect forward secrecy, IP compression
L2TP support for iPhone, SecureClient Mobile for
Mobile Device Support
Windows Mobile
Check Point Endpoint Security, Endpoint Security VPN
Multiple IPSec VPN Clients
R75, SecuRemote

You might also like