Solved

Basics about CheckPoint firewall

Posted on 2011-09-30
3
778 Views
Last Modified: 2012-05-12
Hi,
Pls provide the Right  book for Check-Point Firewall basics as i am very NEW and i want to start with Basics..

Regards
Ramu
0
Comment
Question by:RAMU CH
3 Comments
 
LVL 14

Expert Comment

by:grimkin
Comment Utility
Hi,

There are a couple of options here:

* Either the Checkpoint documentation available on the Checkpoint website or

* a 3rd party book e.g.: http://www.amazon.co.uk/Check-Point-NGX-Security-Administration/dp/1597492450/ref=sr_1_1?ie=UTF8&qid=1317379817&sr=8-1

Checkpoint is a fairly complicated product though so it doesnt get much more basic than going through the documentation.

HTH
0
 
LVL 2

Accepted Solution

by:
cmoormann earned 500 total points
Comment Utility
Unfortunately there aren't any recent books about checkpoint products, which means the only thing that hasn't (really) changed over the years is the rulebase and one can figure this out easily by oneself.

My advise would be to read the R75 Firewall Administration Guide provided with the product. It's actually not that bad. Then use this information in a lab.
For more but also redundant information you can then consult the CCSA training material, which is quite expensive (iirc ~600$) or visit a one week course, that includes this material. Also there is a chance to grab these material off i.e. ebay.
More advanced features then are better covered in the CCSE training manual.
Loads of other (basic) questions have been answered and are available at the Check Point User Group or CPshared.
0
 
LVL 1

Author Closing Comment

by:RAMU CH
Comment Utility
Thanks
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

I found an issue or “bug” in the SonicOS platform (the firmware controlling SonicWALL security appliances) that has to do with renaming Default Service Objects, which then causes a portion of the system to become uncontrollable and unstable. BACK…
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now