Solved

Checkpoint IP Appliances

Posted on 2010-08-21
5
596 Views
Last Modified: 2013-11-16
Hi,

About to purchase IP565 or IP695.   The spec on these devices R/70/R71 is there a big difference between the 2 platforms ?

If they come with R70 is it worth upgrading R71 ?

0
Comment
Question by:skywalker101
  • 3
  • 2
5 Comments
 
LVL 18

Accepted Solution

by:
deimark earned 500 total points
ID: 33491713
Have a look here bud
http://www.checkpoint.com/products/ip-appliances

Basically, the 695 is the newer model with more beans inside.

The 565 is the original 560 (which has been around for a while now) optimised for blade architecture check point.

Review the specs and see which one is the best fit for your requirements.
0
 

Author Comment

by:skywalker101
ID: 33499540
Hi,

Not seeing much of difference between the IP565 and 695 apart from the 695 having more portsd and the  Support optional ADP service modules.

From the spec the device is shipped with R70/R71 would I better going with R71 is there much of a difference ?  
0
 
LVL 18

Expert Comment

by:deimark
ID: 33502051
CP advise sticking with the latest version but it also depends on what security certification you need on the software, ie EAL4 etc.  The newer versions will still be going through the process to get this certification so the older versions tend to be more popular.

If the security certification is not an issue then I would suggest getting R71
0
 

Author Comment

by:skywalker101
ID: 33502459
Is R70 EAL4 ?
0
 
LVL 18

Expert Comment

by:deimark
ID: 33502552
Sadly not yet.

http://www.checkpoint.com/products/certifications/ has more info.

The latest version for EAL4 is R65 HFA 30.

Note, getting EAL 4 certification is a long process that can take up to 2 years so it needs to be taken into account when scoping new solutions
0

Featured Post

Now Available: Firebox Cloud for AWS and FireboxV

Firebox Cloud brings the protection of WatchGuard’s leading Firebox UTM appliances to public cloud environments. It enables organizations to extend their security perimeter to protect business-critical assets in Amazon Web Services (AWS).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Exchange OWA - failed logins and brute force monitor 7 365
ACL per VPN User 12 107
centos7 firewalld udp ports 33 81
Current Mac OS X Network Profiles and Firewall 5 94
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question