Basics about CheckPoint firewall

Posted on 2011-09-30
Last Modified: 2012-05-12
Pls provide the Right  book for Check-Point Firewall basics as i am very NEW and i want to start with Basics..

Question by:RAMU CH
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 14

Expert Comment

ID: 36890967

There are a couple of options here:

* Either the Checkpoint documentation available on the Checkpoint website or

* a 3rd party book e.g.:

Checkpoint is a fairly complicated product though so it doesnt get much more basic than going through the documentation.


Accepted Solution

cmoormann earned 500 total points
ID: 36893358
Unfortunately there aren't any recent books about checkpoint products, which means the only thing that hasn't (really) changed over the years is the rulebase and one can figure this out easily by oneself.

My advise would be to read the R75 Firewall Administration Guide provided with the product. It's actually not that bad. Then use this information in a lab.
For more but also redundant information you can then consult the CCSA training material, which is quite expensive (iirc ~600$) or visit a one week course, that includes this material. Also there is a chance to grab these material off i.e. ebay.
More advanced features then are better covered in the CCSE training manual.
Loads of other (basic) questions have been answered and are available at the Check Point User Group or CPshared.

Author Closing Comment

ID: 36984478

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Use of vpn-filter value  in S2S VPN 2 62
VOIP gateways - feedback 23 125
Standalone trial or freeware to do SSL scan 4 81
Rensome / malware protection 9 117
In every aspect, security is essential for your business, and for that matter you need to always keep an eye on it. The same can be said about your computer network system too. Your computer network is prone to various malware and security threats t…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question