• United India colony ,Kodambakkam, Chennai.
  • +91 - 99406 11306     044-24731102/ 24732532
  • training@rjpinfotek.com

Checkpoint R77 (CCSA)

Duration:40 Hrs

Introduction & Installation

  1. Introduction to Check Point Fundamentals & Check Points unified approach to network management
  2. Design a distributed environment using the network detailed in the course topology
  3. Install the Security Gateway version R77 (GAIA) in a distributed environment
  4. Deploy Gateways using cpconfig from the Gateway command line and using web GUI

Basic Checkpoint Administration

  1. Create and configure network, host and gateway objects
  2. Verify SIC establishment between the Security Management Server and the Gateway using Smart Dashboard
  3. Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services
  4. Configure NAT rules on Web and Gateway servers

Checkpoint monitoring, Updating & Upgrading

  1. SmartView Monitor - configure alerts and traffic counters, view a Gateway s status, monitor suspicious activity rules, analyze tunnel activity and monitor remote user access based on corporate requirements.
  2. Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications.
  3. Upgrade and attach product licenses using SmartUpdate.

Advanced Identity Management

  1. Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely
  2. Manage users to access to the corporate LAN by using other authentication sources i.e. like LDAP
  3. Acquire user information used by the Security Gateway to control access
  4. Define Access Roles for use in an Identity Awareness rule
  5. Implementing Identity Awareness in the Firewall Rule Base
  6. App Control and URL Filtering & HTTPS Inspection

Implement VPN using Checkpoint firewall

  1. Configure a pre-shared secret site-to-site VPN with partner sites
  2. Configure permanent tunnels for remote access to corporate resources
  3. Configure VPN tunnel sharing, given the difference between host-based, subnet-based and gateway-based tunnels

Maintaining Checkpoint Implementation

  1. Policy Packages & Database Versions
  2. Perform a backup and restore the current Gateway installation from the command line
  3. Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line
  4. Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades and minimal downtime

Student Speak


MR. Ashok Kumar gave the clear idea about the concept, the classes was interactive. Practical session was good, we were able to understand the concept easily. 

In-Demand Courses