Specifications of Checkpoint VPN
Specifications of Checkpoint VPN
Feature Detail
Authentification Methods Password, RADIUS, TACACS, X.509, SecurID, LDAP
Certification Authority Integrated X.509 certificate authority
Automatically sets up site-to-site connections as objects
VPN Communities
are created
Topology Support Star and mesh
Utilizes virtual tunnel interfaces, numbered/un-
Route-based VPN
numbered interfaces
VPN Resiliency Multiple Entry Point (MEP), wire mode
VPN Route Injection Route Injection Mechanism (RIM)
Site-to-site VPN Modes Domain-based, Route-based
Directional VPN Enforcement between or within community
IKE (Phase 1) Key Exchange AES-128, AES-256, 3DES, DES, CAST
IKE (Phase 1) Data Integrity MD5, SHA1, SHA2-256, SHA2-384, AES-XCBC
IKE (Phase 2) Data Encryption 3DES, AES-128, AES-256, DES, CAST, DES-40CP,
CAST-40, NULL
IKE (Phase 2) Data Integrity MD5, SHA1, SHA2-256, SHA2-384, AES-XCBC
Group 1 (768 bit), Group 2 (1024 bit), Group 5 (1536
IKE (Phase 1) & IPSec (Phase
bit), Group 14 (2048 bit), Group 19 (256-bit), Group 20
2) Diffie-Hellman Groups
(384-bit)
IKE (Phase 1) Options Main, Hybrid, Aggressive mode
IPSec (Phase 2) Options Perfect forward secrecy, IP compression
L2TP support for iPhone, SecureClient Mobile for
Mobile Device Support
Windows Mobile
Check Point Endpoint Security, Endpoint Security VPN
Multiple IPSec VPN Clients
R75, SecuRemote