Check Point 770/790 Appliance: Getting Started Guide Locally Managed
Check Point 770/790 Appliance: Getting Started Guide Locally Managed
Appliance
Locally Managed
Getting Started Guide
2
Latest Documentation
The latest version of this document is at:
http://downloads.checkpoint.com/dc/download.htm?ID=50903
To learn more, visit the Check Point Support Center
http://supportcenter.checkpoint.com.
Feedback
Check Point is engaged in a continuous effort to improve its
documentation.
Please help us by sending your comments
mailto:cp_techpub_feedback@checkpoint.com?subject=Feedba
ck on Check Point 770/790 Appliance Locally Managed Getting
Started Guide.
3
Health and Safety
Information
Read these warnings before setting up or using the appliance.
4
To prevent damage to any system, it is important to handle all
parts with care. These measures are generally sufficient to
protect your equipment from static electricity discharge:
• Restore the communications appliance system board and
peripherals back into the antistatic bag when they are not
in use or not installed in the chassis. Some circuitry on the
system board can continue operating when the power is
switched off.
• Do not allow the lithium battery cell used to power the
real-time clock to short. The battery cell may heat up
under these conditions and present a burn hazard.
Warning - DANGER OF EXPLOSION IF BATTERY IS
INCORRECTLY REPLACED. REPLACE ONLY WITH
SAME OR EQUIVALENT TYPE RECOMMENDED BY
THE MANUFACTURER. DISCARD USED
BATTERIES ACCORDING TO THE
MANUFACTURER’S INSTRUCTIONS.
5
For California:
Perchlorate Material - special handling may apply. See
http://www.dtsc.ca.gov/hazardouswaste/perchlorate
The foregoing notice is provided in accordance with California
Code of Regulations Title 22, Division 4.5, Chapter 33. Best
Management Practices for Perchlorate Materials. This product,
part, or both may include a lithium manganese dioxide battery
which contains a perchlorate substance.
Proposition 65 Chemical
Chemicals identified by the State of California, pursuant to the
requirements of the California Safe Drinking Water and Toxic
Enforcement Act of 1986, California Health & Safety Code s.
25249.5, et seq. ("Proposition 65"), that is "known to the State
to cause cancer or reproductive toxicity." See
http://www.calepa.ca.gov.
WARNING:
Handling the cord on this product will expose you to lead, a
chemical known to the State of California to cause cancer, and
birth defects or other reproductive harm. Wash hands after
handling.
6
Declaration of Conformity
7
Certification Type
8
Certification Type
9
Certification Type
10
Federal Communications Commission (FCC) Statement:
This device complies with Part 15 of the FCC Rules. Operation
is subject to the following two conditions: (1) This device may
not cause harmful interference, and (2) This device must
accept any interference received, including interference that
may cause undesired operation.
This equipment has been tested and found to comply with the
limits for a Class B digital device, pursuant to Part 15 of the
FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential
installation. This equipment generates, uses and can radiate
radio frequency energy and, if not installed and used in
accordance with the instructions, may cause harmful
interference to radio communications. However, there is no
guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference
to radio or television reception, which can be determined by
turning the equipment off and on, the user is encouraged to try
to correct the interference by one of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and
receiver.
• Connect the equipment into an outlet on a circuit different
from that to which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician
for help.
11
FCC Caution:
• Any changes or modifications not expressly approved by
the party responsible for compliance could void the user's
authority to operate this equipment.
• This transmitter must not be co-located or operating in
conjunction with any other antenna or transmitter.
12
Le présent appareil est conforme aux CNR d'Industrie Canada
applicables aux appareils radio exempts de licence.
L'exploitation est autorisée aux deux conditions suivantes:
1. L'appareil ne doit pas produire de brouillage, et
2. L'utilisateur de l'appareil doit accepter tout brouillage
radioélectrique subi, même si le brouillage est susceptible
d'en compromettre le fonctionnement.
This Class B digital apparatus complies with Canadian
ICES-003.
Cet appareil numérique de la classe B est conforme à la norme
NMB-003 du Canada.
This device and its antenna(s) must not be co-located or
operating in conjunction with any other antenna or transmitter,
except tested built-in radios.
Cet appareil et son antenne ne doivent pas être situés ou
fonctionner en conjonction avec une autre antenne ou un autre
émetteur, exception faites des radios intégrées qui ont été
testées.
The County Code Selection feature is disabled for products
marketed in the US/ Canada.
La fonction de sélection de l'indicatif du pays est désactivée
pour les produits commercialisés aux États-Unis et au Canada.
FOR WLAN 5 GHz DEVICE:
Caution :
1. The device for operation in the band 5150-5250 MHz is only
for indoor use to reduce the potential for harmful
interference to co-channel mobile satellite systems;
13
2. The maximum antenna gain permitted for devices in the
bands 5250-5350 MHz and 5470-5725 MHz shall comply
with the e.i.r.p. limit; and
3. The maximum antenna gain permitted for devices in the
band 5725-5825 MHz shall comply with the e.i.r.p. limits
specified for point-to-point and non point-to-point
operation as appropriate.
4. The worst-case tilt angle(s) necessary to remain compliant
with the e.i.r.p. elevation mask requirement set forth in
Section 6.2.2(3) shall be clearly indicated. (For 5G B2 with
DFS devices only)
5. Users should also be advised that high-power radars are
allocated as primary users (i.e. priority users) of the bands
5250-5350 MHz and 5650-5850 MHz and that these radars
could cause interference and/or damage to LE-LAN
devices.
Avertissement:
1. Les dispositifs fonctionnant dans la bande 5150-5250 MHz
sont réservés uniquement pour une utilisation à l’intérieur
afin de réduire les risques de brouillage préjudiciable aux
systèmes de satellites mobiles utilisant les mêmes
canaux;
2. Le gain maximal d’antenne permis pour les dispositifs
utilisant les bandes 5250-5350 MHz et 5470-5725 MHz doit
se conformer à la limite de p.i.r.e.;
3. Le gain maximal d’antenne permis (pour les dispositifs
utilisant la bande 5725-5825 MHz) doit se conformer à la
limite de p.i.r.e. spécifiée pour l’exploitation point à point et
non point à point, selon le cas.
4. Les pires angles d’inclinaison nécessaires pour rester
conforme à l’exigence de la p.i.r.e. applicable au masque
d’élévation, et énoncée à la section 6.2.2 3), doivent être
14
clairement indiqués. (Pour 5G B2 avec les périphériques
DFS uniquement)
5. De plus, les utilisateurs devraient aussi être avisés que les
utilisateurs de radars de haute puissance sont désignés
utilisateurs principaux (c.-à-d., qu’ils ont la priorité) pour
les bandes 5250-5350 MHz et 5650-5850 MHz et que ces
radars pourraient causer du brouillage et/ou des
dommages aux dispositifs LAN-EL.
15
Product Disposal
16
Informations relatives à la
santé et à la sécurité
Avant de mettre en place ou d'utiliser l'appareil, veuillez lire
ces avertissements.
17
• Un adaptateur secteur acheté en tant qu'accessoire auprès
de Check Point
Pour éviter d'endommager tout système, il est important de
manipuler les éléments avec soin. Ces mesures sont
généralement suffisantes pour protéger votre équipement
contre les décharges d'électricité statique :
• Remettez dans leur sachet antistatique la carte système et
les périphériques de l'appareil de communications
lorsqu'ils ne sont pas utilisés ou installés dans le châssis.
Certains circuits sur la carte système peuvent rester
fonctionnels lorsque si l'appareil est éteint.
• Ne jamais court-circuiter la pile au lithium (qui alimente
l'horloge temps-réel). Elle risque de s'échauffer et de
causer des brûlures.
Avertissement : DANGER D'EXPLOSION SI LA
PILE EST MAL REMPLACÉE. NE REMPLACER
QU'AVEC UN TYPE IDENTIQUE OU ÉQUIVALENT,
RECOMMANDÉ PAR LE CONSTRUCTEUR. LES
PILES DOIVENT ÊTRE MISES AU REBUT
CONFORMÉMENT AUX INSTRUCTIONS DE LEUR
FABRICANT.
18
• Ne pas court-circuiter la pile au lithium : elle risque de
surchauffer et de causer des brûlures en cas de contact.
• Ne pas faire fonctionner le processeur sans
refroidissement. Le processeur peut être endommagé en
quelques secondes.
Pour la Californie :
Matériau perchloraté : manipulation spéciale potentiellement
requise. Voir
http://www.dtsc.ca.gov/hazardouswaste/perchlorate
L'avis suivant est fourni conformément au California Code of
Regulations, titre 22, division 4.5, chapitre 33. Meilleures
pratiques de manipulation des matériaux perchloratés. Ce
produit, cette pièce ou les deux peuvent contenir une pile au
dioxyde de lithium manganèse, qui contient une substance
perchloratée.
Produits chimiques « Proposition 65 »
Les produits chimiques identifiés par l'état de Californie,
conformément aux exigences du California Safe Drinking
Water and Toxic Enforcement Act of 1986 du California Health
& Safety Code s. 25249.5, et seq. (« Proposition 65 »), qui sont
« connus par l'état pour être cancérigène ou être toxiques
pour la reproduction » (voir http://www.calepa.ca.gov)
AVERTISSEMENT :
La manipulation de ce cordon vous expose au contact du
plomb, un élément reconnue par l'état de Californie pour être
cancérigène, provoquer des malformations à la naissance et
autres dommages relatifs à la reproduction. Se laver les mains
après toute manipulation.
19
Déclaration de conformité
20
Certification Type
21
Certification Type
22
Certification Type
23
Déclaration à la Federal Communications Commission (FCC) :
Ce dispositif est conforme à la section 15 des réglementations
de la FCC. Son fonctionnement est soumis aux deux conditions
suivantes : (1) Cet appareil ne doit pas causer d'interférence
préjudiciable et (2) Cet appareil doit tolérer toute interférence
reçue, y compris celles qui pourraient causer un
fonctionnement indésirable.
Cet équipement a été testé et déclaré conforme aux limites
pour appareils numériques de classe B, selon la section 15 des
règlements de la FCC. Ces limitations sont conçues pour
fournir une protection raisonnable contre les interférences
nocives dans un environnement résidentiel. Cet appareil
génère, et peut diffuser des fréquences radio et, dans le cas
d’une installation et d’une utilisation non conforme aux
instructions, il peut provoquer des interférences nuisibles aux
communications radio. Cependant, il n’existe aucune garantie
qu’aucune interférence ne se produira dans le cadre d'une
installation particulière. Si cet appareil provoque des
interférences avec un récepteur radio ou un téléviseur, ce qui
peut être détecté en mettant l’appareil sous et hors tension,
l’utilisateur peut essayer d’éliminer les interférences en
suivant au moins l’une des procédures suivantes :
• Réorienter ou déplacer l’antenne de réception.
• Augmenter la distance entre l’appareil et le récepteur.
• Brancher l’appareil sur une prise appartenant à un circuit
différent de celui sur lequel est branché le récepteur.
• Consulter le distributeur ou un technicien radio/télévision
qualifié pour obtenir de l’aide.
24
FCC Attention
• Tout changement ou modification non expressément
approuvé par la partie responsable de la conformité
pourrait empêcher l’utilisateur autorisé de faire
fonctionner cet appareil.
• Cet émetteur ne doit pas être installé ou utilisé en
conjonction avec d'autres antennes ou émetteurs.
25
Cet appareil numérique de la classe B est conforme à la norme
NMB-003 du Canada.
Cet appareil et son antenne ne doivent pas être situés ou
fonctionner en conjonction avec une autre antenne ou un autre
émetteur, exception faites des radios intégrées qui ont été
testées.
La fonction de sélection de l'indicatif du pays est désactivée
pour les produits commercialisés aux États-Unis et au Canada.
POUR WLAN 5 GHz DISPOSITIF:
Avertissement:
1. Les dispositifs fonctionnant dans la bande 5150-5250 MHz
sont réservés uniquement pour une utilisation à l’intérieur
afin de réduire les risques de brouillage préjudiciable aux
systèmes de satellites mobiles utilisant les mêmes
canaux;
2. Le gain maximal d’antenne permis pour les dispositifs
utilisant les bandes 5250-5350 MHz et 5470-5725 MHz doit
se conformer à la limite de p.i.r.e.;
3. Le gain maximal d’antenne permis (pour les dispositifs
utilisant la bande 5725-5825 MHz) doit se conformer à la
limite de p.i.r.e. spécifiée pour l’exploitation point à point et
non point à point, selon le cas.
4. Les pires angles d’inclinaison nécessaires pour rester
conforme à l’exigence de la p.i.r.e. applicable au masque
d’élévation, et énoncée à la section 6.2.2 3), doivent être
clairement indiqués. (Pour 5G B2 avec les périphériques
DFS uniquement)
5. De plus, les utilisateurs devraient aussi être avisés que les
utilisateurs de radars de haute puissance sont désignés
utilisateurs principaux (c.-à-d., qu’ils ont la priorité) pour
les bandes 5250-5350 MHz et 5650-5850 MHz et que ces
26
radars pourraient causer du brouillage et/ou des
dommages aux dispositifs LAN-EL.
27
Mise au rebut du produit
28
Contents
Health and Safety Information 4
Informations relatives à la santé et à la sécurité 17
Introduction 33
Before You Get Started..........................................................34
Shipping Carton Contents.....................................................35
Appliance Diagrams and Specifications ............................36
Front Panel ....................................................................................37
Back Panel......................................................................................42
Check Point Software Blades Overview ............................47
Access Policy ...........................................................................48
Threat Prevention...................................................................48
VPN ............................................................................................49
Cloud Services.........................................................................49
Configuring Check Point 770/790 Appliance 51
Workflow ..................................................................................51
Setting up the Check Point 770/790 Appliance ................52
Connecting the Cables...........................................................52
About the PoE ..........................................................................53
Using the First Time Configuration Wizard 54
Starting the First Time Configuration Wizard..................54
Welcome .................................................................................. 55
Authentication Details .......................................................... 56
Appliance Date and Time Settings ..................................... 57
Appliance Name ..................................................................... 58
Internet Connection .............................................................. 59
Local Network ........................................................................ 62
Wireless Network .................................................................. 64
Administrator Access ........................................................... 65
Appliance Activation.............................................................. 67
Software Blade Activation ................................................... 70
Summary ................................................................................. 71
Basic System Configuration 73
Threat Prevention Updates ................................................. 73
Firmware Upgrades .............................................................. 74
Internet Connectivity............................................................. 75
Licensing.................................................................................. 75
Backup and Restore .............................................................. 76
Configuring Access Policy 77
Configuring Firewall Policy ................................................. 77
Setting Outgoing Services ................................................... 79
Configuring Applications and URL Filtering.................... 79
Configuring Access Policy ................................................... 80
Blocking Specific Applications or URLs ........................... 81
Creating a Permanent Access Rule ...................................82
Blocking Access for Users or Groups ................................84
Configuring Threat Prevention 85
Cyber Threats ..........................................................................85
Enabling/Disabling Threat Prevention Control ...............86
IPS Security Levels ................................................................87
Changing the Anti-Virus, Anti-Bot and Threat Emulation
Policy .........................................................................................88
Scheduling Blade Updates ...................................................89
Configuring the Anti-Spam Blade.......................................90
Configuring the Anti-Spam Policy ......................................90
Configuring Anti-Spam Exceptions ....................................92
Configuring Anti-Spam to Detect-Only Mode...................92
Setting up Users and Administrators 93
Configuring Local System Administrators .......................94
Editing Information of Locally Defined Administrators.95
Deleting a Locally Defined Administrator ........................96
Configuring Local Users .......................................................96
Granting Remote Access Permissions ..............................98
Editing a Specific User or Group .........................................99
Deleting a User or Group ......................................................99
Setting up Cloud Services 101
Connecting to Cloud Services ............................................102
Guest Network 105
Configuring a Guest Network ............................................106
Monitoring and Reports 107
Viewing Monitoring Reports ...............................................107
Viewing Security Reports....................................................108
Viewing System Logs ...........................................................109
Getting Support 111
Support....................................................................................111
Where to From Here ............................................................112
CHAPTER 1
Introduction
In This Section:
Before You Get Started ............................................................................................. 34
Shipping Carton Contents ........................................................................................ 35
Appliance Diagrams and Specifications ................................................................ 36
Check Point Software Blades Overview ................................................................ 47
Access Policy............................................................................................................... 48
Threat Prevention ...................................................................................................... 48
VPN................................................................................................................................ 49
Cloud Services ............................................................................................................ 49
33
For more information about the Check Point 770/790
Appliance, see the Check Point 600/700 Appliance
Administration Guide.
For more technical information, go to:
http://support.checkpoint.com
34
Shipping Carton Contents
This section describes the contents of the shipping carton.
Contents of the Shipping Carton
Item Description
• 1 power adapter
Power Supply and
Accessories • 1 power cord
35
Appliance Diagrams and
Specifications
The Check Point 770 Appliance has 3 cores, and the Check
Point 790 Appliance has 4. Otherwise, they are very much alike.
These are the Check Point 770/790 Appliance models:
• Wired
• Wireless (WiFi)
• PoE Wired
This section describes the differences in the front and back
panels.
36
Front Panel
Wired Model
WiFi Model
37
Key Item Description
38
Key Item Description
Activity Indicator:
• Not lit when there is no link.
39
PoE Wired Model
40
Key Item Description
• Blinking green when trying to connect to the
6 Internet LED
Internet.
41
Back Panel
Wired Model
WiFi Model
42
Key Item Description
• Right - SFP
43
Key Item Description
7
LAN1 - LAN16 RJ45 Ethernet ports.
ports
44
PoE Wired Model
45
Key Item Description
• Right - SFP
46
Check Point Software Blades
Overview
The available Check Point Software Blades can be divided into
these major groups:
• Access Policy
• Threat Prevention
• VPN
47
Access Policy
The Access Policy has these features:
• Firewall - Makes sure that only allowed traffic enters the
company's network. Other traffic is blocked before it
enters.
• Application Control and URL Filtering - Makes sure that
only authorized applications are used on the network and
only allowed websites can be accessed.
• User Awareness - Lets you define policies for individual
users.
• Quality of Service (QoS) - Enables bandwidth control and
lets you give priority to your most important traffic.
Threat Prevention
The Threat Prevention policy has these features:
• Intrusion Prevention System (IPS) - Blocks attempts to
exploit known vulnerabilities in files and network protocols.
• Anti-Virus - Blocks malware, such as viruses and worms,
before it can get into the network.
• Anti-Spam - Blocks spam.
• Anti-Bot - Detects bot-infected machines and blocks bot
Command and Control (C&C) communications.
• Threat Emulation - Protects networks against unknown
threats in files that are downloaded from the internet or
attached to emails.
48
VPN
The VPN protects your business data in these ways:
• Remote Access - Encrypts traffic from authorized PCs and
user devices that access your network, both in the office
and from a remote location.
• Site-to-Site VPN - Encrypts all communications between
multiple sites in your network.
Cloud Services
Cloud Services lets you connect your Check Point 770/790
Appliance to a Cloud Services Provider that uses a Web-based
application to manage, configure, and monitor the appliance.
See Setting up Cloud Services (on page 101).
49
CHAPTER 2
Configuring Check Point
770/790 Appliance
In This Section:
Workflow ...................................................................................................................... 51
Setting up the Check Point 770/790 Appliance .................................................... 52
Connecting the Cables .............................................................................................. 52
About the PoE ............................................................................................................. 53
Workflow
This is the recommended workflow for configuring Check Point
770/790 Appliance:
1. Setting up the Check Point 770/790 Appliance (on page 52).
2. Connecting the cables (on page 52).
3. Configuring the appliance with the First Time Configuration
Wizard.
4. Defining a security policy with the Web User Interface
(WebUI).
51
Setting up the Check Point
770/790 Appliance
1. Remove the Check Point 770/790 Appliance from the
shipping carton and place it on a tabletop.
2. Identity the network interface marked as LAN1. This
interface is preconfigured with the IP address 192.168.1.1.
52
About the PoE
The PoE wired model is in 770/790 appliances only.
The PoE switch is a type of PSE (Power Sourcing Equipment),
and delivers power to the PD (Powered Devices) end point. By
default, the PoE port automatically provides power when a
compliant PD is connected. There are no specified
management requirements.
The PoE standard model is fully supported. It is fully compliant
with 802.3af (PoE) and 802.3at (PoE+). All 4 ports support
802.3af. Due to power budget limitations, only 2 ports at a time
support 802.3at.
The total power dedicated for all PoE ports is 62W:
• 802.3af maximum power delivery per port is 15.4W
• 802.3at maximum power delivery per port is 31W
53
Using the First Time
Configuration Wizard
Configure the Check Point 770/790 Appliance with the First
Time Configuration Wizard.
To close the wizard and save configured settings, click Quit.
Note - In the First Time Configuration Wizard, you may not see
all the pages described in this guide. The pages that show in
the wizard depend on your Check Point 770/790 Appliance
model and the options you select.
54
To open the WebUI, enter one of these addresses in the
browser:
• http://my.firewall
• http://192.168.1.1:4434
If a security warning message shows, confirm it and continue.
The First Time Configuration Wizard runs.
Welcome
The Welcome page introduces the product.
55
To change the language of the WebUI application:
Select the language link at the top of the page.
Note that only English is allowed as the input language.
Authentication Details
In the Authentication Details page, enter the required details
to log in to the Check Point 770/790 Appliance WebUI
application or if the wizard terminates abnormally:
• Administrator Name - We recommend that you change the
default "admin" login name of the administrator. The name
is case sensitive.
• Password - A strong password has a minimum of 6
characters with at least one capital letter, one lower case
letter, and a special character. Use the Password strength
meter to measure the strength of your password.
Note - The meter is only an indicator and does not enforce
creation of a password with a specified number of
character or character combination. To enforce password
complexity, click the check box.
• Confirm Password - Enter the password again.
• Country - Select a country from the list (for wireless
network models).
56
Appliance Date and Time Settings
In the Appliance Date and Time Settings page, configure the
appliance's date, time, and time zone settings manually or use
the Network Time Protocol option.
When you set the time manually, the host computer's settings
are used for the default date and time values. If necessary,
change the time zone setting to show your correct location.
Daylight Savings Time is automatically enabled by default. You
can change this in the WebUI application on the Device > Date
and Time page.
When you use the NTP option, there are two default servers
you can use. These are ntp.checkpoint.com and
ntp2.checkpoint.com.
57
Appliance Name
In the Appliance Name page, enter a name to identify the
Check Point 770/790 Appliance, and enter a domain name
(optional).
When the gateway performs DNS resolving for a specified
object’s name, the domain name is appended to the object
name. This lets hosts in the network look up hosts by their
internal names.
58
Internet Connection
In the Internet Connection page, configure your Internet
connectivity details or select Configure Internet connection
later.
59
• DHCP - Dynamic Host Configuration Protocol (DHCP)
automatically issues IP addresses within a specified
range to devices on a network. This is a common option
when you connect through a cable modem.
• PPPoE (PPP over Ethernet) - A network protocol for
encapsulating Point-to-Point Protocol (PPP) frames
inside Ethernet frames. It is used mainly with DSL
services where individual users connect to the DSL
modem over Ethernet and in plain Metro Ethernet
networks.
• PPTP - The Point-to-Point Tunneling Protocol (PPTP) is
a method for implementing virtual private networks.
PPTP uses a control channel over TCP and a GRE
tunnel operating to encapsulate PPP packets.
• L2TP - Layer 2 Tunneling Protocol (L2TP) is a tunneling
protocol used to support virtual private networks
(VPNs). It does not provide any encryption or
confidentiality by itself. It relies on an encryption
protocol that it passes within the tunnel to provide
privacy.
• Cellular Modem - Connect to the Internet using a
wireless modem to a cellular ISP through the USB port.
• Analog Modem - Connect to the Internet using an
analog modem through a USB port. In the WebUI
application, you can configure to use an analog modem
through the serial port.
• Bridge - Connects multiple network segments at the
data link layer (Layer 2).
• Wireless - Connects to a wireless network. Connection
through the wireless interface in the First Time
Configuration Wizard is always DHCP.
60
• DNS Server (Static IP and Bridge connections) - Enter
the DNS server address information in the relevant
fields. For DHCP, PPPoE, PPTP, L2TP, Analog Modem,
and Cellular Modem, the DNS settings are supplied by
your service provider. You can override these settings
later in the WebUI application, under Device > DNS.
We recommend that you configure the DNS since Check
Point 770/790 Appliance needs to perform DNS resolving
for different functions. For example, to connect to Check
Point User Center during license activation or when
Application Control, Web Filtering, Anti-Virus, or Anti-Spam
services are enabled.
4. In the Network names(SSID) field, click the arrow to select
a wireless network.
If the network is secure, enter a password. Depending on
the security type, you might need to enter the user name.
61
To test your ISP connection status:
Click Connect.
The appliance connects to your ISP. Success or failure shows
at the bottom of the page.
Local Network
In the Local Network page, select to enable or disable switch
on LAN ports and configure your network settings. By default,
they are enabled. You can change the IP address and stay
connected as the appliance's original IP is kept as an alias IP
until the first time you boot the appliance.
DHCP is enabled by default and a default range is configured.
Make sure to set the range accordingly and be careful not to
62
include predefined static IPs in your network. Set the exclusion
range for IP addresses that should not be defined by the DHCP
server.
The appliance's IP address is automatically excluded from the
range. For example, if the appliance IP is 1.1.1.1, the range
also starts from 1.1.1.1, but will exclude its own IP address.
63
Wireless Network
This applies to Wireless Network models only.
In the Wireless Network page, configure wireless connectivity
details.
When you configure a wireless network, you must define a
network name (SSID). The SSID (service set identifier) is a
unique string that identifies a WLAN network to clients that try
to open a wireless connection with it.
We recommend that you protect the wireless network with a
password. Otherwise, a wireless client can connect to the
network without authentication.
64
7. Radio Band - Click the arrow to select the required
frequency. The wireless client options are affected by
which mode is set. For example, if the radio is set to a 5
GHz band, the wireless client cannot connect to 2.4 GHz
band networks.
Administrator Access
In the Administrator Access page, configure if administrators
can use Check Point 770/790 Appliance from a specified IP
address or any IP address.
65
To configure administrator access:
1. Select the sources from where administrators are allowed
access:
• LAN - All internal physical ports.
• Trusted wireless - Wireless networks that are allowed
access to the LAN by default. This field is only shown in
wireless network modes.
• VPN - Using encrypted traffic through VPN tunnels
from a remote site or using a remote access client.
• Internet - Clear traffic from the Internet (not
recommended).
2. Select the IP address from which the administrator can
access Check Point 770/790 Appliance:
• Any IP address
• Specified IP addresses only
• Specified IP addresses from the Internet and any IP
address from other sources - Select this option to
allow administrator access from the Internet from
specific IP addresses only and access from other
selected sources from any IP address. This option is
the default.
To specify IP addresses:
1. Click New.
2. In the IP Address Configuration window, select an option:
• Specific IP address - Enter the IP address or click Get
IP from my computer.
• Specific network - Enter the Network IP address and
Subnet mask.
3. Click Apply.
66
Appliance Activation
The appliance can connect to the Check Point User Center to
pull the license information and activate the appliance. You
must register the appliance in your Check Point User Center
account. If you don't already have an account, you must create
one.
67
A 30 day trial license will be used if:
• License activation is not completed.
• The registration information for your MAC address can't be
found in the Check Point User Center.
68
7. You will be notified that you successfully activated the
appliance. The next page shows the license status for each
blade.
69
Software Blade Activation
Select the software blades to activate on this Check Point
770/790 Appliance.
QoS (bandwidth control) can only be activated from the WebUI
after completing the First Time Configuration Wizard.
70
Summary
The Summary page shows the details of the elements
configured with the First Time Configuration Wizard.
Click Finish to complete the First Time Configuration Wizard.
71
CHAPTER 3
Basic System Configuration
In This Section:
Threat Prevention Updates ...................................................................................... 73
Firmware Upgrades................................................................................................... 74
Internet Connectivity ................................................................................................. 75
Licensing ...................................................................................................................... 75
Backup and Restore .................................................................................................. 76
To schedule updates:
1. Click Schedule at the bottom of the page or move the
cursor over the update status.
2. Select the blades you want to schedule for updates.
Note - When a "Not up to date" message shows for other
blades, you must manually update them.
73
3. Select Recurrence:
• Daily
• Weekly
• Monthly
4. Click Apply.
Firmware Upgrades
To see notifications of available upgrades:
1. Click the status bar.
We recommend you configure automatic upgrades.
2. Move the cursor over the notification to show the version
number.
3. Click Upgrade Now or More Information.
74
To make sure you have the latest version:
1. Go to Device > System Operations.
2. Click Check now.
Internet Connectivity
To see the Internet Connectivity status:
Click the status bar.
If you are not connected, go to Devices > Internet.
Licensing
You must first register the appliance in your Check Point User
Center account. If you do not have a User Center account, you
must create one to receive support and updates.
75
If Internet connectivity is configured:
1. Click Activate License
2. Browse to http://register.checkpoint.com/cpapp
3. Complete these fields:
• MAC address
• Registration key
4. Select Hardware Platform.
5. In Hardware Model, select Check Point 770/790
Appliance.
6. Click Activate License.
You are notified when you successfully activate the appliance. If
changes are made to your license, click Reactivate to get the
updated license information.
76
CHAPTER 4
Configuring Access Policy
In This Section:
Configuring Firewall Policy ...................................................................................... 77
Setting Outgoing Services ........................................................................................ 79
Configuring Applications and URL Filtering......................................................... 79
Configuring Access Policy ........................................................................................ 80
Blocking Specific Applications or URLs ................................................................ 81
Creating a Permanent Access Rule ....................................................................... 82
Blocking Access for Users or Groups.................................................................... 84
77
These are the security levels:
• Standard (Default) - Allows outgoing traffic on configured
services, and traffic between internal and trusted wireless
networks. Blocks incoming unencrypted traffic.
• Strict - Blocks all traffic in all directions.
• Off - Allows all traffic. Manually defined rules are not
applied.
Note - When the firewall is deactivated, your network is not
secured.
78
Setting Outgoing Services
To set outgoing services in a Standard policy:
Click all services.
79
• Botnet
• Spam
• Anonymizer
• Hacking
This option is selected by default.
• Block inappropriate content - Lets you block access to
websites with inappropriate content like pornography,
violence, gambling and alcohol.
• Block file sharing applications - Lets you block
file-sharing from sources that use torrents and
peer-to-peer (P2P) applications.
• Block other undesired applications - Lets you block
specified applications or URLs. Click this option to manage
your basic Application and URL Filtering policy.
• Limit bandwidth-consuming applications - Lets you limit
or block applications that take up a lot of bandwidth. P2P
file sharing, media sharing and media streams are
selected by default. You can edit the group to add other
applications or categories.
Note - Your maximum bandwidth limit must be lower than
the actual bandwidth provided by your ISP.
80
3. Select the applications and URLs to block.
4. Click Apply.
81
3. Select Custom or New to enter a specified application or
URL to block.
4. Click Apply.
For more information on application and URL control, see the
Check Point 600/700 Appliance Administration Guide or the
online help from the top right corner of your WebUI.
82
5. In the Add Rule window, click Any in the Application
column.
6. From the Common or Custom filter, select a URL or
application to apply to the rule.
Or
Click New at the bottom of this window, and then select
URL or Application to enter a customized URL or
application.
7. Select Apply.
8. Click Block or Accept in the Action column
• Block - Prevent the selected users from accessing the
URLs or Applications included in the rule.
• Accept - Override a generic block rule to let the
selected users access URLs or Applications.
9. Select when this rule applies.
Note - This type of access rule will affect all users and
groups, unless you set up an overriding rule for individual
users or groups.
83
Blocking Access for Users or
Groups
To block internet access for users or groups:
1. Complete steps 1 to 4 in Creating a Permanent Access
Rule (on page 82).
2. Make sure Any is selected in the Application column and
Block is selected in the Action column.
3. Use the time of day feature to apply this rule.
For example, you can block the network to staff after
hours, or block children’s Internet access at bedtime at
home.
84
CHAPTER 5
Configuring Threat
Prevention
In This Section:
Cyber Threats.............................................................................................................. 85
Enabling/Disabling Threat Prevention Control.................................................... 86
IPS Security Levels .................................................................................................... 87
Changing the Anti-Virus, Anti-Bot and Threat Emulation Policy ..................... 88
Scheduling Blade Updates ....................................................................................... 89
Configuring the Anti-Spam Blade........................................................................... 90
Configuring the Anti-Spam Policy .......................................................................... 90
Configuring Anti-Spam Exceptions ........................................................................ 92
Configuring Anti-Spam to Detect-Only Mode....................................................... 92
Cyber Threats
Malware is a major threat to network operations that is
increasingly dangerous and sophisticated. Examples include
worms, blended threats (combinations of malicious code and
vulnerabilities for infection and dissemination) and Trojans.
To challenge today's malware landscape, Check Point's
comprehensive Threat Prevention solution offers a
multi-layered, pre- and post-infection defense approach and a
consolidated platform that enables enterprise security to deal
with modern malware.
85
The Intrusion Prevention System (IPS) blocks potentially
malicious attempts to exploit known vulnerabilities in files and
network protocols.
The Anti-Virus engine blocks viruses that pass through web
and mail traffic (HTTP and SMTP) as well as through the File
Transfer Protocol (FTP).
The Anti-Bot engine detects bot-infected machines and blocks
bot Command and Control communications.
The Anti-Spam engine blocks or flags emails that contain or
are suspected to contain spam.
The Threat Emulation protects networks against unknown
threats in files that are downloaded from the internet or
attached to emails.
Enabling/Disabling Threat
Prevention Control
In Threat Prevention > Blade Control, you can enable or
disable the IPS, Anti-Bot, and Anti-Virus blades.
86
the next synchronization between the gateway and Cloud
Services.
87
To see the logs:
Go to Logs & Monitoring > Security Logs page.
88
Scheduling Blade Updates
The Blade Control page also shows the update status:
• Up to date
• Updated service unreachable - Usually caused by a loss in
Internet connectivity. Check your Internet connection in the
Device > Internet page and contact your ISP if the problem
continues.
• Update available / Not up to date - A new package is ready
to download but it is not time for the scheduled update.
89
To schedule updates:
1. Go to Threat Prevention > Blade Control.
2. Click Schedule Updates.
3. Select the blades you want to update.
4. Select the recurrence.
5. Click Apply.
For more information on Anti-Virus Blade control options, see
the Check Point 600/700 Appliance Administration Guide or the
online help from the top right-hand corner of your WebUI.
90
The spam filter can identify spam emails by their source
address (default), or by email content.
91
Configuring Anti-Spam Exceptions
You can configure which senders, domains, or IP addresses are
not considered spam. Emails from these senders are not
inspected.
You can also identify specified senders, domains or IP
addresses for the Anti-Spam engine to automatically block.
Configuring Anti-Spam to
Detect-Only Mode
To configure the Anti-Spam to work in detect only mode:
1. Click Detect-only mode.
2. Click Apply.
Note - In detect-only mode, only logs will show. The blade
will not block emails.
92
CHAPTER 6
Setting up Users and
Administrators
In This Section:
Configuring Local System Administrators ........................................................... 94
Editing Information of Locally Defined Administrators ..................................... 95
Deleting a Locally Defined Administrator ............................................................. 96
Configuring Local Users ........................................................................................... 96
Granting Remote Access Permissions .................................................................. 98
Editing a Specific User or Group ............................................................................. 99
Deleting a User or Group.......................................................................................... 99
93
Configuring Local System
Administrators
We recommend you configure your system so an administrator
can log in from a specific network only.
94
Editing Information of Locally
Defined Administrators
To edit information of locally defined administrators:
1. Go to Device > Administrators.
2. Select the administrator and click Edit.
3. Edit the information.
4. Click Apply.
Note - Only administrators with full access privileges can
edit administrators.
95
Deleting a Locally Defined
Administrator
To delete a locally defined administrator:
1. Go to Device > Administrators.
2. Select the administrator and click Delete.
3. Click Yes in the confirmation window.
Note - You cannot delete an administrator who is logged in.
96
8. Click Apply.
The user is added to the table in the Users window.
97
Granting Remote Access
Permissions
To add a new local users group and grant remote access
permissions:
1. Go to Users & Objects > Users.
2. Click the arrow on the New button and select Users Group.
3. Enter a group name.
4. Click Apply.
98
Editing a Specific User or Group
To edit a specific user or group:
1. Go to Users & Objects > Users.
2. Select the user or group from the list.
3. Click Edit.
4. Edit the information.
5. Click Apply.
99
CHAPTER 7
Setting up Cloud Services
In This Section:
Connecting to Cloud Services................................................................................102
101
Connecting to Cloud Services
To automatically connect to Cloud Services:
1. In the email that the Security Gateway owner gets from the
Cloud Services Provider, click the activation link.
After you log in, a window opens and shows the activation
details sent in the email.
2. Make sure the details are correct and click Connect.
This is a sample email:
Dear John Doe,
You are invited to activate your security services using the
Security Appliance.
Once connected, you will be fully protected by a comprehensive
security solution that will secure your assets and minimize the
risks of a data breach.
Click http://myfirewall:443476382020.
If the First Time Configuration Wizard for the Security
Appliance appears, follow the initial setup instructions in your
Getting Started Guide.
If the above activation link doesn't work, do the following:
1. On a computer connected to the Security Appliance,
browse to the Security Appliance management interface:
http://myfirewall:4434.
2. Go to the Home tab and select Cloud Services.
3. Click on the Configure button.
4. Copy your activation key
smbmgmt.provisioning.local&Sample-Gateway.domain.Pri
me&6382020 to the Activation Key field.
102
5. Click Apply to connect.
Your appliance will connect to
smbmgmt.provisioning.local&Sample-Gateway.domain.Prime
(Gateway ID) using the key 6382020 (registration key).
Thank you,
Service Center security team
When connectivity is established, the Cloud Services section at
the top of the page shows:
• The date of the synchronization
• The On/Off lever shows that Cloud Services is turned on.
A Cloud Services Server widget shows Connected on the
status bar. Click this widget to open the Cloud Services page.
103
CHAPTER 8
Guest Network
In This Section:
Configuring a Guest Network ................................................................................106
105
Configuring a Guest Network
To configure a guest network:
1. Go to Device > Wireless.
2. Click Guest.
3. Select Use Hotspot.
4. Set Wireless Security to Unprotected or Protected.
5. In the Access Policy tab, set the access and log policy
options.
Note - Do not select the boxes in the Access Policy tab if
you do not want guests to access your local network.
6. Enter a password.
7. Click Apply.
106
PTER 9
Monitoring and Reports
In This Section:
Viewing Monitoring Reports...................................................................................107
Viewing Security Reports........................................................................................108
Viewing System Logs...............................................................................................109
107
Viewing Security Reports
The Reports page shows security reports for the time frame
you specify. Security events include:
• High Risk Applications - The number of potentially risky
applications accessed.
• Infected Hosts - The number of infected hosts or servers
detected.
• Malwares - The number of malwares detected by Anti-Bot
and Anti-Virus.
To generate a report:
1. Go to Reports > Generate to create a new report or
Regenerate if a report already exists.
2. Click the link to see the report.
The date and time link shows the date and time of the
latest report generation.
Note - The last generated report for each type is saved.
When you generate a new report, you overwrite the last
saved report.
108
Viewing System Logs
The Security Logs page shows the last 100 log records. To load
more records, scroll down the page. The log table is
automatically refreshed.
109
CHAPTER 10
Getting Support
In This Section:
Support .......................................................................................................................111
Where to From Here................................................................................................112
Support
For technical assistance, contact Check Point 24 hours a day,
seven days a week at:
• +1 972-444-6600 (Americas)
• +972 3-611-5100 (International)
When you contact support, you must provide your MAC
address.
For more technical information, go to:
http://supportcenter.checkpoint.com
To learn more about the Check Point Internet Security Product
Suite and other security solutions, go to:
http://www.checkpoint.com
111
Where to From Here
You have now learned the basics that are necessary to begin
using your Check Point 770/790 Appliance.
For more information about the Check Point 770/790 Appliance
and links to the Check Point 600/700 Appliance Administration
Guide, go to the Check Point Support Center
(http://www.checkpoint.com/cp600) where you can find all
related sks, downloads, and documentation.
112