Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Basics about CheckPoint firewall

Posted on 2011-09-30
Last Modified: 2012-05-12
Pls provide the Right  book for Check-Point Firewall basics as i am very NEW and i want to start with Basics..

Question by:RAMU CH
LVL 14

Expert Comment

ID: 36890967

There are a couple of options here:

* Either the Checkpoint documentation available on the Checkpoint website or

* a 3rd party book e.g.: http://www.amazon.co.uk/Check-Point-NGX-Security-Administration/dp/1597492450/ref=sr_1_1?ie=UTF8&qid=1317379817&sr=8-1

Checkpoint is a fairly complicated product though so it doesnt get much more basic than going through the documentation.


Accepted Solution

cmoormann earned 500 total points
ID: 36893358
Unfortunately there aren't any recent books about checkpoint products, which means the only thing that hasn't (really) changed over the years is the rulebase and one can figure this out easily by oneself.

My advise would be to read the R75 Firewall Administration Guide provided with the product. It's actually not that bad. Then use this information in a lab.
For more but also redundant information you can then consult the CCSA training material, which is quite expensive (iirc ~600$) or visit a one week course, that includes this material. Also there is a chance to grab these material off i.e. ebay.
More advanced features then are better covered in the CCSE training manual.
Loads of other (basic) questions have been answered and are available at the Check Point User Group or CPshared.

Author Closing Comment

ID: 36984478

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question