Check Point 730, 750, L-71, L-71W Getting Started Manual

Getting Started Guide
Check Point 730/750
Models: L-71, L-71W Classification: [Protected] P/N 707409
Appliance
2
© 2017 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Refer to the Copyright page
http://www.checkpoint.com/copyright.html for a list of our
trademarks.
Refer to the Third Party copyright notices
http://www.checkpoint.com/3rd_party_copyright.html for a list
of relevant copyrights and third-party licenses.
3
Latest Documentation
Feedback
The latest version of this document is at:
http://downloads.checkpoint.com/dc/download.htm?ID=46103
To learn more, visit the Check Point Support Center
http://supportcenter.checkpoint.com.
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
mailto:cp_techpub_feedback@checkpoint.com?subject=Feedba ck on Check Point 730/750 Appliance Locally Managed Getting Started Guide.
4
Power Supply Information

Health and Safety Information

Read these warnings before setting up or using the appliance.
To reduce potential safety issues with the DC power source, only use one of these:
The AC adapter supplied with the appliance.
A replacement AC adapter supplied by Check Point.
An AC adapter purchased as an accessory from Check
Point.
Warning - Do not block air vents. A minimum 1/2-inch clearance is required.
Warning - This appliance does not contain any user-serviceable parts. Do not remove any covers or attempt to gain access to the inside of the product. Opening the device or modifying it in any way has the risk of personal injury and will void your warranty. The following instructions are for trained service personnel only.
5
To prevent damage to any system, it is important to handle all parts with care. These measures are generally sufficient to protect your equipment from static electricity discharge:
Restore the communications appliance system board and
peripherals back into the antistatic bag when they are not in use or not installed in the chassis. Some circuitry on the system board can continue operating when the power is switched off.
Do not allow the lithium battery cell used to power the
real-time clock to short. The battery cell may heat up under these conditions and present a burn hazard.
INCORRECTLY REPLACED. REPLACE ONLY WITH SAME OR EQUIVALENT TYPE RECOMMENDED BY THE MANUFACTURER. DISCARD USED BATTERIES ACCORDING TO THE MANUFACTURER’S INSTRUCTIONS.
Do not dispose of batteries in a fire or with household
waste.
Contact your local waste disposal agency for the address of
the nearest battery deposit site.
Disconnect the system board power supply from its power
source before you connect or disconnect cables or install or remove any system board components. Failure to do this can result in personnel injury or equipment damage.
Avoid short-circuiting the lithium battery; this can cause it
to superheat and cause burns if touched.
Do not operate the processor without a thermal solution.
Damage to the processor can occur in seconds.
Warning - DANGER OF EXPLOSION IF BATTERY IS
6
For California:
Perchlorate Material - special handling may apply. See http://www.dtsc.ca.gov/hazardouswaste/perchlorate
The foregoing notice is provided in accordance with California Code of Regulations Title 22, Division 4.5, Chapter 33. Best Management Practices for Perchlorate Materials. This product, part, or both may include a lithium manganese dioxide battery which contains a perchlorate substance.
Proposition 65 Chemical
Chemicals identified by the State of California, pursuant to the requirements of the California Safe Drinking Water and Toxic Enforcement Act of 1986, California Health & Safety Code s.
25249.5, et seq. ("Proposition 65"), that is "known to the State to cause cancer or reproductive toxicity." See http://www.calepa.ca.gov.
WARNING:
Handling the cord on this product will expose you to lead, a chemical known to the State of California to cause cancer, and birth defects or other reproductive harm. Wash hands after handling.
7
Declaration of Conformity
Manufacturer's Name: Check Point Software
Technologies Ltd.
Manufacturer's Address: 5 Ha'Solelim Street, Tel Aviv
67897, Israel
Declares under our sole responsibility, that the products:
Model Number: L-71, L-71W *
Product Options: 730, 730 WiFi, 750, 750 Wifi
Date First Applied: January 2016
Conform to the following Product Specifications:
RF/Wi-Fi (* marked model)
8
Certification Type
CE EMC,
EMC
European Standard EN 55032 & EN
55024.
EN61000-3-2:2014
EN61000-3-3:2013
EN61000-4-2:2009
EN61000-4-3:2006+A1:2008+A2:2010
EN61000-4-4:2012
EN61000-4-5:2014
EN61000-4-6:2014
EN61000-4-11:2004
AS/NZS CISPR 22:2009+A1 2010 Class B EMC
FCC part 15B , 47 CFR subpart B ,
EMC
Class B
ICES-003:2012 Issue 5 Class B
ANSI C63.4:2009
VCCI, V-3/2015.4 Class B, V4/2012.04 EMC
Draft ETSI EN 301 489-1 V2.2.0 (2017-03)
Draft ETSI EN 310 489-17 V3.2.0 (2017-03)
EMC
9
Certification Type
CE LVD: EN 60950-1 Safety
UL/c-UL: UL 60950-1 Safety
CB IEC 60950-1 Safety
AS/NZS 60950-1 Safety
ETSI EN 300 328 V2.1.1:2006
RF/Wi-Fi *
ETSI EN 300 893 V2.2.2 (2017-05)
RF exposure EN62311:2008, EN62479 RF/Wi-Fi *
RF exposure IC RSS-102 Issue 5:2015
RF/Wi-Fi *
IEEE C95.3-2002
KDB 447498D01
Canada RSS-247 Issue 1 (2015-05)
RF/Wi-Fi *
Canada RSS-Gen Issue 4 (2014-11)
ANSI C63.10:2013
47 CFR FCC Part15, Subpart C (section
RF/Wi-Fi *
15.247)
ANSI C63.10:2013
FCC Part 2 (Section2.1091)
RF/Wi-Fi *
KDB 447498 D01
10
Federal Communications Commission (FCC) Statement:
Certification Type
47 CFR FCC Part 15, Subpart E
RF/Wi-Fi *
(Section 15.407)
ANSI C63.10:2013
AS/NZS 4268 RF/Wi-Fi *
JP ARIB STD-T66 (V3.7), MIC notice 88
RF/Wi-Fi *
Appendix 43
JP ARIB STD-T71 (V6.1), MIC notice 88 Appendix 45
Date and Place of Issue: January 2016, Tel Aviv, Israel
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interference received, including interference that may cause undesired operation.
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by
11
FCC Caution:
Radiation Exposure Statement
For Country Code Selection Usage (WLAN Devices)
turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and
receiver.
Connect the equipment into an outlet on a circuit different
from that to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician
for help.
Any changes or modifications not expressly approved by
the party responsible for compliance could void the user's authority to operate this equipment.
This transmitter must not be co-located or operating in
conjunction with any other antenna or transmitter.
This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 centimeters between the radiator and your body.
Note: The country code selection is for non-US models only and is not available to all US models. Per FCC regulation, all WiFi products marketed in the US must be fixed to US operation channels only.
12
Canadian Department Compliance Statement
1.
2.
1.
2.
This device complies with Industry Canada license-exempt RSS standard(s). Operation is subject to the following two conditions:
This device may not cause interference, and This device must accept any interference, including
interference that may cause undesired operation of the device.
Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence. L'exploitation est autorisée aux deux conditions suivantes:
L'appareil ne doit pas produire de brouillage, et L'utilisateur de l'appareil doit accepter tout brouillage
radioélectrique subi, même si le brouillage est susceptible d'en compromettre le fonctionnement.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
This device and its antenna(s) must not be co-located or operating in conjunction with any other antenna or transmitter, except tested built-in radios.
Cet appareil et son antenne ne doivent pas être situés ou fonctionner en conjonction avec une autre antenne ou un autre émetteur, exception faites des radios intégrées qui ont été testées.
The County Code Selection feature is disabled for products marketed in the US/ Canada.
13
1.
2.
3.
4.
5.
1.
La fonction de sélection de l'indicatif du pays est désactivée pour les produits commercialisés aux États-Unis et au Canada.
FOR WLAN 5 GHz DEVICE:
Caution :
The device for operation in the band 5150-5250 MHz is only
for indoor use to reduce the potential for harmful interference to co-channel mobile satellite systems;
The maximum antenna gain permitted for devices in the
bands 5250-5350 MHz and 5470-5725 MHz shall comply with the e.i.r.p. limit; and
The maximum antenna gain permitted for devices in the
band 5725-5825 MHz shall comply with the e.i.r.p. limits specified for point-to-point and non point-to-point operation as appropriate.
The worst-case tilt angle(s) necessary to remain compliant
with the e.i.r.p. elevation mask requirement set forth in Section 6.2.2(3) shall be clearly indicated. (For 5G B2 with DFS devices only)
Users should also be advised that high-power radars are
allocated as primary users (i.e. priority users) of the bands 5250-5350 MHz and 5650-5850 MHz and that these radars could cause interference and/or damage to LE-LAN devices.
Avertissement:
Les dispositifs fonctionnant dans la bande 5150-5250 MHz
sont réservés uniquement pour une utilisation à l’intérieur afin de réduire les risques de brouillage préjudiciable aux systèmes de satellites mobiles utilisant les mêmes canaux;
14
2.
3.
4.
5.
Japan Class B Compliance Statement:
Le gain maximal d’antenne permis pour les dispositifs
utilisant les bandes 5250-5350 MHz et 5470-5725 MHz doit se conformer à la limite de p.i.r.e.;
Le gain maximal d’antenne permis (pour les dispositifs
utilisant la bande 5725-5825 MHz) doit se conformer à la limite de p.i.r.e. spécifiée pour l’exploitation point à point et non point à point, selon le cas.
Les pires angles d’inclinaison nécessaires pour rester
conforme à l’exigence de la p.i.r.e. applicable au masque d’élévation, et énoncée à la section 6.2.2 3), doivent être clairement indiqués. (Pour 5G B2 avec les périphériques DFS uniquement)
De plus, les utilisateurs devraient aussi être avisés que les
utilisateurs de radars de haute puissance sont désignés utilisateurs principaux (c.-à-d., qu’ils ont la priorité) pour les bandes 5250-5350 MHz et 5650-5850 MHz et que ces radars pourraient causer du brouillage et/ou des dommages aux dispositifs LAN-EL.
15
European Union (EU) Electromagnetic Compatibility Directive
This product is herewith confirmed to comply with the requirements set out in the Council Directive on the Approximation of the Laws of the Member States relating to Electromagnetic Compatibility Directive (2014/30/EU).
This product is in conformity with Low Voltage Directive 2014/35/EU, and complies with the requirements in the Council Directive 2014/35/EU relating to electrical equipment designed for use within certain voltage limits and the Amendment Directive 93/68/EEC.
16
Product Disposal
This symbol on the product or on its packaging indicates that this product must not be disposed of with your other household waste. Instead, it is your responsibility to dispose of your waste equipment by handing it over to a designated collection point for the recycling of waste electrical and electronic equipment. The separate collection and recycling of your waste equipment at the time of disposal will help to conserve natural resources and ensure that it is recycled in a manner that protects human health and the environment. For more information about where you can drop off your waste equipment for recycling, please contact your local city office or your household waste disposal service.
17
Information pour l'alimentation

Informations relatives à la santé et à la sécurité (Class B)

Avant de mettre en place ou d'utiliser l'appareil, veuillez lire les avertissements suivants.
Pour limiter les risques avec l'alimentation CC, n'utilisez que l'une des solutions suivantes :
L'adaptateur secteur fourni avec l'appareil
Un adaptateur secteur de remplacement, fourni par Check
Point
Un adaptateur secteur acheté en tant qu'accessoire auprès
de Check Point
Pour éviter d'endommager tout système, il est important de manipuler les éléments avec soin. Ces mesures sont
Avertissement : ne pas obturer les aérations. Il faut laisser au moins 1,27 cm d'espace libre.
Avertissement : cet appareil ne contient aucune pièce remplaçable par l'utilisateur. Ne pas retirer de capot ni tenter d'atteindre l'intérieur. L'ouverture ou la modification de l'appareil peut entraîner un risque de blessure et invalidera la garantie. Les instructions suivantes sont réservées à un personnel de maintenance formé.
18
généralement suffisantes pour protéger votre équipement contre les décharges d'électricité statique :
Remettez dans leur sachet antistatique la carte système et
les périphériques de l'appareil de communications lorsqu'ils ne sont pas utilisés ou installés dans le châssis. Certains circuits sur la carte système peuvent rester fonctionnels lorsque si l'appareil est éteint.
Ne jamais court-circuiter la pile au lithium (qui alimente
l'horloge temps-réel). Elle risque de s'échauffer et de causer des brûlures.
PILE EST MAL REMPLACÉE. NE REMPLACER QU'AVEC UN TYPE IDENTIQUE OU ÉQUIVALENT, RECOMMANDÉ PAR LE CONSTRUCTEUR. LES PILES DOIVENT ÊTRE MISES AU REBUT CONFORMÉMENT AUX INSTRUCTIONS DE LEUR FABRICANT.
Ne pas jeter les piles au feu ni avec les déchets ménagers.
Pour connaître l'adresse du lieu le plus proche de dépôt
des piles, contactez votre service local de gestion des déchets.
Débrancher l'alimentation de la carte système de sa
source électrique avant de connecter ou déconnecter des câbles ou d'installer ou retirer des composants. À défaut, les risques sont d'endommager l'équipement et de causer des blessures corporelles.
Ne pas court-circuiter la pile au lithium : elle risque de
surchauffer et de causer des brûlures en cas de contact.
Avertissement : DANGER D'EXPLOSION SI LA
19
Pour la Californie :
Ne pas faire fonctionner le processeur sans
refroidissement. Le processeur peut être endommagé en quelques secondes.
Matériau perchloraté : manipulation spéciale potentiellement requise. Voir http://www.dtsc.ca.gov/hazardouswaste/perchlorate
L'avis suivant est fourni conformément au California Code of Regulations, titre 22, division 4.5, chapitre 33. Meilleures pratiques de manipulation des matériaux perchloratés. Ce produit, cette pièce ou les deux peuvent contenir une pile au dioxyde de lithium manganèse, qui contient une substance perchloratée.
Produits chimiques « Proposition 65 »
Les produits chimiques identifiés par l'état de Californie, conformément aux exigences du California Safe Drinking Water and Toxic Enforcement Act of 1986 du California Health & Safety Code s. 25249.5, et seq. (« Proposition 65 »), qui sont « connus par l'état pour être cancérigène ou être toxiques pour la reproduction » (voir http://www.calepa.ca.gov)
AVERTISSEMENT :
La manipulation de ce cordon vous expose au contact du plomb, un élément reconnue par l'état de Californie pour être cancérigène, provoquer des malformations à la naissance et autres dommages relatifs à la reproduction. Se laver les mains après toute manipulation.
20
Déclaration de conformité
Nom du constructeur : Check Point Software
Technologies Ltd.
Adresse du constructeur : 5 Ha'Solelim Street, Tel Aviv
67897, Israël
Déclare sous son entière responsabilité que les produits :
Numéro de modèle : L-71, L-71W *
Options de produit : 730, 730 Wi-Fi, 750, 750 Wi-Fi
Date de demande initiale : Janvier 2016
Sont conformes aux normes produit suivantes :
RF/Wi-Fi (modèle signalé par *)
21
Certification Type
CE EMC,
Norme européenne EN 55032 & EN 55024.
EN61000-3-2:2014
EN61000-3-3:2013
EN61000-4-2:2009
EN61000-4-3:2006+A1:2008+A 2:2010
EN61000-4-4:2012
EN61000-4-5:2014
EN61000-4-6:2014
EN61000-4-11:2004
AS/NZS CISPR 22:2009+A1 2010 Classe B
FCC partie 15B, 47 CFR sous-partie B, Classe B
EMC
EMC
EMC
ICES-003:2012 Édition 5 Classe B
ANSI C63.4:2009
VCCI, V-3/2015.4 Classe B, V4/2012.04
EMC
2
Certification Type
Draft ETSI EN 301 489-1 V2.2.0
EMC
(2017-03)
Draft ETSI EN 310 489-17 V3.2.0 (2017-03)
CE LVD : EN 60950-1 Sécurité
UL/c-UL : UL 60950-1 Sécurité
CB IEC 60950-1 Sécurité
AS/NZS 60950-1 Sécurité
ETSI EN300 328 V2.1.1:2006
RF/Wi-Fi *
ETSI EN 300 893 V2.1.1 (2017-05)
Exposition aux fréquences
RF/Wi-Fi *
radio EN62311:2008, EN62479
Exposition aux fréquences
RF/Wi-Fi * radio IC RSS-102 Édition 5:2015
IEEE C95.3-2002
KDB 447498D01
2
23
Certification Type
Canada RSS-247 Édition 1
RF/Wi-Fi *
(2015-05)
Canada RSS-Gen Édition 4 (2014-11)
ANSI C63.10:2013
47 CFR FCC Partie 15,
RF/Wi-Fi *
Sous-partie C (section 15.247)
ANSI C63.10:2013
FCC Partie 2 (Section 2.1091)
RF/Wi-Fi *
KDB 447498 D01
47 CFR FCC Partie 15,
RF/Wi-Fi *
Sous-partie E (Section 15.407)
ANSI C63.10:2013
AS/NZS 4268 RF/Wi-Fi *
JP ARIB STD-T66 (V3.7), avis
RF/Wi-Fi *
MIC 88 Annexe 43
JP ARIB STD-T71 (V6.1), avis MIC 88 Annexe 45
Date et lieu d'émission : Janvier 2016, Tel Aviv, Israël
24
Déclaration à la Federal Communications Commission (FCC) :
Ce dispositif est conforme à la section 15 des réglementations de la FCC. Son fonctionnement est soumis aux deux conditions suivantes : (1) Cet appareil ne doit pas causer d'interférence préjudiciable et (2) Cet appareil doit tolérer toute interférence reçue, y compris celles qui pourraient causer un fonctionnement indésirable.
Cet équipement a été testé et déclaré conforme aux limites pour appareils numériques de classe B, selon la section 15 des règlements de la FCC. Ces limitations sont conçues pour fournir une protection raisonnable contre les interférences nocives dans un environnement résidentiel. Cet appareil génère, et peut diffuser des fréquences radio et, dans le cas d’une installation et d’une utilisation non conforme aux instructions, il peut provoquer des interférences nuisibles aux communications radio. Cependant, il n’existe aucune garantie qu’aucune interférence ne se produira dans le cadre d'une installation particulière. Si cet appareil provoque des interférences avec un récepteur radio ou un téléviseur, ce qui peut être détecté en mettant l’appareil sous et hors tension, l’utilisateur peut essayer d’éliminer les interférences en suivant au moins l’une des procédures suivantes :
Réorienter ou déplacer l’antenne de réception.
Augmenter la distance entre l’appareil et le récepteur.
Brancher l’appareil sur une prise appartenant à un circuit
différent de celui sur lequel est branché le récepteur.
Consulter le distributeur ou un technicien radio/télévision
qualifié pour obtenir de l’aide.
25
FCC Attention
Déclaration à la FCC sur l'exposition aux rayonnements
Concernant la sélection du code pays (appareils WLAN)
1.
2.
Tout changement ou modification non expressément
approuvé par la partie responsable de la conformité pourrait empêcher l’utilisateur autorisé de faire fonctionner cet appareil.
Cet émetteur ne doit pas être installé ou utilisé en
conjonction avec d'autres antennes ou émetteurs.
Cet équipement respecte les limites de la FCC en matière d'exposition aux rayonnements radio, pour un environnement non contrôlé. Cet équipement doit être installé et utilisé en réservant au moins 20 cm entre l'élément rayonnant et l'utilisateur.
Remarque: la sélection du code pays est uniquement pour les modèles hors Etats-Unis, et reste indisponible pour tout modèle vendus aux États-Unis. Selon la règlementation FCC tous les produits WIFI commercialisés aux Etats-Unis sont fixés uniquement sur des canaux américains.
Déclaration de conformité du département Canadien :
Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence. L'exploitation est autorisée aux deux conditions suivantes:
L'appareil ne doit pas produire de brouillage, et L'utilisateur de l'appareil doit accepter tout brouillage
radioélectrique subi, même si le brouillage est susceptible d'en compromettre le fonctionnement.
26
1.
2.
3.
4.
5.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
Cet appareil et son antenne ne doivent pas être situés ou fonctionner en conjonction avec une autre antenne ou un autre émetteur, exception faites des radios intégrées qui ont été testées.
La fonction de sélection de l'indicatif du pays est désactivée pour les produits commercialisés aux États-Unis et au Canada.
POUR WLAN 5 GHz DISPOSITIF:
Avertissement:
Les dispositifs fonctionnant dans la bande 5150-5250 MHz
sont réservés uniquement pour une utilisation à l’intérieur afin de réduire les risques de brouillage préjudiciable aux systèmes de satellites mobiles utilisant les mêmes canaux;
Le gain maximal d’antenne permis pour les dispositifs
utilisant les bandes 5250-5350 MHz et 5470-5725 MHz doit se conformer à la limite de p.i.r.e.;
Le gain maximal d’antenne permis (pour les dispositifs
utilisant la bande 5725-5825 MHz) doit se conformer à la limite de p.i.r.e. spécifiée pour l’exploitation point à point et non point à point, selon le cas.
Les pires angles d’inclinaison nécessaires pour rester
conforme à l’exigence de la p.i.r.e. applicable au masque d’élévation, et énoncée à la section 6.2.2 3), doivent être clairement indiqués. (Pour 5G B2 avec les périphériques DFS uniquement)
De plus, les utilisateurs devraient aussi être avisés que les
utilisateurs de radars de haute puissance sont désignés utilisateurs principaux (c.-à-d., qu’ils ont la priorité) pour les bandes 5250-5350 MHz et 5650-5850 MHz et que ces
27
Déclaration de conformité de classe B pour le Japon :
Directive de l'Union européenne relative à la compatibilité électromagnétique
radars pourraient causer du brouillage et/ou des dommages aux dispositifs LAN-EL.
Ce produit est certifié conforme aux exigences de la directive du Conseil concernant le rapprochement des législations des États membres relatives à la directive sur la compatibilité électromagnétique (2014/30/EU).
Ce produit est conforme à la directive basse tension 2014/35/EU et satisfait aux exigences de la directive 2014/35/EU du Conseil relative aux équipements électriques conçus pour être utilisés dans une certaine plage de tensions, selon les modifications de la directive 93/68/CEE.
28
Mise au rebut du produit
Ce symbole apposé sur le produit ou son emballage signifie que le produit ne doit pas être mis au rebut avec les autres déchets ménagers. Il est de votre responsabilité de le porter à un centre de collecte désigné pour le recyclage des équipements électriques et électroniques. Le fait de séparer vos équipements lors de la mise au rebut, et de les recycler, contribue à préserver les ressources naturelles et s'assure qu'ils sont recyclés d'une façon qui protège la santé de l'homme et l'environnement. Pour obtenir plus d'informations sur les lieux où déposer vos équipements mis au rebut, veuillez contacter votre municipalité ou le service de gestion des déchets.
Contents
Health and Safety Information 4
Informations relatives à la santé et à la sécurité (Class B)17
Introduction 33
Before You Get Started ..........................................................34
Shipping Carton Contents .....................................................35
Appliance Diagrams and Specifications ............................36
Front Panel
Back Panel...................................................................................... 39
Check Point Software Blades Overview ............................41
Access Policy ...........................................................................42
Threat Prevention ...................................................................42
VPN ............................................................................................43
Cloud Services .........................................................................43
Configuring Check Point 730/750 Appliance 45
Workflow ..................................................................................45
Setting up the Check Point 730/750 Appliance ................46
Connecting the Cables ...........................................................46
Using the First Time Configuration Wizard 47
Starting the First Time Configuration Wizard..................47
Welcome ...................................................................................48
.................................................................................... 37
Authentication Details .......................................................... 49
Appliance Date and Time Settings ..................................... 50
Appliance Name ..................................................................... 51
Internet Connection .............................................................. 52
Local Network ........................................................................ 55
Wireless Network .................................................................. 57
Administrator Access ........................................................... 58
Appliance Activation .............................................................. 60
Software Blade Activation ................................................... 63
Summary ................................................................................. 64
Basic System Configuration 65
Threat Prevention Updates ................................................. 65
Firmware Upgrades .............................................................. 66
Internet Connectivity............................................................. 67
Licensing.................................................................................. 67
Backup and Restore .............................................................. 68
Configuring Access Policy 69
Configuring Firewall Policy ................................................. 69
Setting Outgoing Services ................................................... 71
Configuring Applications and URL Filtering .................... 71
Configuring Access Policy ................................................... 73
Blocking Specific Applications or URLs ........................... 74
Creating a Permanent Access Rule ................................... 74
Blocking Access for Users or Groups ................................76
Configuring Threat Prevention 77
Cyber Threats ..........................................................................77
Enabling/Disabling Threat Prevention Control ...............78
IPS Security Levels ................................................................79
Changing the Anti-Virus, Anti-Bot and Threat Emulation
.........................................................................................80
Policy
Scheduling Blade Updates ...................................................81
Configuring the Anti-Spam Blade .......................................82
Configuring the Anti-Spam Policy ......................................83
Configuring Anti-Spam Exceptions ....................................84
Configuring Anti-Spam to Detect-Only Mode...................85
Setting up Users and Administrators 87
Configuring Local System Administrators .......................88
Editing Information of Locally Defined Administrators .89
Deleting a Locally Defined Administrator ........................90
Configuring Local Users .......................................................90
Granting Remote Access Permissions ..............................92
Editing a Specific User or Group .........................................93
Deleting a User or Group ......................................................93
Setting up Cloud Services 95
Connecting to Cloud Services ..............................................96
Guest Network 99
Configuring a Guest Network ............................................. 99
Monitoring and Reports 101
Viewing Monitoring Reports ...............................................101
Viewing Security Reports ....................................................102
Viewing System Logs ...........................................................103
Getting Support 105
Support ....................................................................................105
Where to From Here ............................................................106
33
CHAPTER 1

Introduction

In This Section:
Before You Get Started ............................................................................................. 34
Shipping Carton Contents ........................................................................................ 35
Appliance Diagrams and Specifications ................................................................ 36
Check Point Software Blades Overview ................................................................ 41
Access Policy............................................................................................................... 42
Threat Prevention ...................................................................................................... 42
VPN ................................................................................................................................ 43
Cloud Services ............................................................................................................ 43
Thank you for choosing Check Point's Internet Security Product Suite. Check Point products provide your business with the most up to date and secure solutions available today.
Check Point also delivers worldwide technical services including educational, professional, and support services through a network of Authorized Training Centers, Certified Support Partners, and Check Point technical support personnel to ensure that you get the most out of your security investment.
34
For more information about the Check Point 730/750 Appliance, see the
Administration Guide.
Check Point 730/750 Appliance
For more technical information, go to:
http://support.checkpoint.com

Before You Get Started

Review these documents before doing the procedures in this guide:
Release Notes
• Known Limitations
35
Contents of the Shipping Carton
Started Guide
3 wireless network antennas (only

Shipping Carton Contents

This section describes the contents of the shipping carton.
Item Description
Appliance A single Check Point 730/750
Appliance
Power Supply and Accessories
Guides
1 power adapter
1 power cord
2 standard network cables
1 serial console cable
1 mini USB console cable
Wall mount kit (screws and plastic anchors)
Check Point 730/750 Appliance Quick Start Guide
Check Point 730/750 Appliance Getting
Wireless Network Antennas
in wireless network models)
Sticker LEDs behavior
License Agreement End user license agreement
36

Appliance Diagrams and Specifications

These are the Check Point 730/750 Appliance models:
• Wired
• Wireless (WiFi)
This section describes the differences in the front and back panels.
37
Wired Model
WiFi Model

Front Panel

38
memory shortage.
but fails to connect.
Blinking green when encountering traffic.
maintenance mode.
Running a first-time configuration script.
• Green when there is no WiFi activity.
Key Item Description
1 Alert LED
Blinking green during boot.
Red when the appliance has a resource problem such as
2 Internet LED
Green when connected to the Internet.
Blinking red when the Internet connection is configured
3 SD LED Green when SD card is inserted.
4 USB LED Green when a USB device is connected.
5 LAN1 -
LAN6, DMZ, WAN LEDS
Speed Indicator
Orange when the port speed is 1000 Mbps.
Green when the port speed is 100 Mbps.
Not lit when the port speed is 10 Mbps.
Activity Indicator
Not lit when there is no link.
Green when there is a link but no traffic encountered.
6 Power LED
• Green when the appliance is turned on.
Red when there is a boot error or the appliance is in
7 USB port USB port that is used for:
• Cellular and analog modems.
Reinstalling the appliance with new firmware.
8 WiFi LED (Only in WiFi models).
Blinking green when there is WiFi activity.
39
Wired Model
WiFi Model

Back Panel

40
appliance chassis to prevent accidental reboot. The appliance reboots after you
Key Item Description
1 Ground (Earth) Functional grounding.
2 DMZ and WAN
Built in Ethernet ports.
ports
3 Console port RJ45 or Mini USB Serial connection
configured to 115200 bps by default. Note - When both the RJ45 and Mini USB cables are connected, the Mini USB takes precedence.
4 Reboot button Lets you forcibly reboot the appliance.
The button is recessed into the
press the button.
5 PWR+12VDC Connects to the power supply unit's
cable. Note - The power unit cable must be securely screwed in to the appliance.
6 Factory Default
button
Lets you restore the appliance to its factory defaults. The button is recessed into the appliance chassis to prevent accidental restoring of factory default settings. See Restoring Factory Defaults.
41
Key Item Description
7
LAN1-LAN6 ports
Built in Ethernet ports.
8 ANT1, ANT2 and
ANT3
Ports for attaching wireless network antennas. (Only in WiFi models).

Check Point Software Blades Overview

The available Check Point Software Blades can be divided into these major groups:
Access Policy
Threat Prevention
• VPN
42

Access Policy

The Access Policy has these features:
Firewall - Makes sure that only allowed traffic enters the
company's network. Other traffic is blocked before it enters.
Application Control and URL Filtering - Makes sure that
only authorized applications are used on the network and only allowed websites can be accessed.
User Awareness - Lets you define policies for individual
users.
Quality of Service (QoS) - Enables bandwidth control and
lets you give priority to your most important traffic.

Threat Prevention

The Threat Prevention policy has these features:
Intrusion Prevention System (IPS) - Blocks attempts to
exploit known vulnerabilities in files and network protocols.
Anti-Virus - Blocks malware, such as viruses and worms,
before it can get into the network.
Anti-Spam - Blocks spam.
Anti-Bot - Detects bot-infected machines and blocks bot
Command and Control (C&C) communications.
Threat Emulation - Protects networks against unknown
threats in files that are downloaded from the internet or attached to emails.
43
VPN
The VPN protects your business data in these ways:
Remote Access - Encrypts traffic from authorized PCs and
user devices that access your network, both in the office and from a remote location.
Site-to-Site VPN - Encrypts all communications between
multiple sites in your network.

Cloud Services

Cloud Services lets you connect your Check Point 730/750 Appliance to a Cloud Services Provider that uses a Web-based application to manage, configure, and monitor the appliance. See Setting up Cloud Services (on page 95).
45
1.
2.
3.
4.
CHAPTER 2

Configuring Check Point 730/750 Appliance

In This Section:
Workflow ...................................................................................................................... 45
Setting up the Check Point 730/750 Appliance .................................................... 46
Connecting the Cables .............................................................................................. 46
The appliance is a Security Gateway and uses a web application to manage a Security Policy. After you configure the appliance with the First Time Configuration Wizard, the default Security Policy is enforced automatically. Use the WebUI to configure the software blades you activated in the First Time Configuration Wizard and fine tune the Security Policy.

Workflow

This is the recommended workflow for configuring Check Point 730/750 Appliance:
Setting up the Check Point 730/750 Appliance (on page 46). Connecting the cables (on page 46). Configuring the appliance with the First Time Configuration
Wizard.
Defining a security policy with the Web User Interface
(WebUI).
46
1.
2.
1.
2.
3.

Setting up the Check Point 730/750 Appliance

Remove the Check Point 730/750 Appliance from the
shipping carton and place it on a tabletop.
Identity the network interface marked as LAN1. This
interface is preconfigured with the IP address 192.168.1.1.

Connecting the Cables

Connect the power supply unit to the appliance and to a
power outlet. The appliance is turned on when the power supply unit is connected to an outlet. The Power LED on the front panel lights up. This indicates that the appliance is turned on. The Alert LED (called the Notice LED in the 600 appliance) on the front panel starts to blink. This indicates that the appliance is booting up. When the Alert LED turns off, the appliance is ready for login.
Connect the standard network cable to the LAN1 port on
the appliance and to the network adapter on your PC.
Connect another standard network cable to the WAN port
on the appliance and to the external modem, external router, or network point.
47

Using the First Time Configuration Wizard

Configure the Check Point 730/750 Appliance with the First Time Configuration Wizard.
To close the wizard and save configured settings, click Quit.
Note - In the First Time Configuration Wizard, you may not see all the pages described in this guide. The pages that show in the wizard depend on your Check Point 730/750 Appliance model and the options you select.

Starting the First Time Configuration Wizard

To configure the Check Point 730/750 Appliance for the first time after you complete the hardware setup, use the First Time Configuration Wizard.
If you do not complete the wizard because of one of these conditions, the wizard will run again the next time you connect to the appliance:
The browser window is closed.
The appliance is restarted while you run the wizard.
After you complete the wizard, you can use the WebUI (Web User Interface) to change settings configured with the First Time Configuration Wizard and to configure advanced settings.
48
To open the WebUI, enter one of these addresses in the browser:
• http://my.firewall
http://192.168.1.1:4434
If a security warning message shows, confirm it and continue.
The First Time Configuration Wizard runs.

Welcome

The Welcome page introduces the product and shows the name of your appliance.
49
To change the language of the WebUI application:
Select the language link at the top of the page.
Note that only English is allowed as the input language.

Authentication Details

In the Authentication Details page, enter the required details to log in to the Check Point 730/750 Appliance WebUI application or if the wizard terminates abnormally:
Administrator Name - We recommend that you change the
default "admin" login name of the administrator. The name is case sensitive.
Password - A strong password has a minimum of 6
characters with at least one capital letter, one lower case letter, and a special character. Use the Password strength meter to measure the strength of your password. Note - The meter is only an indicator and does not enforce creation of a password with a specified number of characters or character combination. To enforce password complexity, click the check box.
Confirm Password - Enter the password again.
Country - Select a country from the list (for wireless
network models).
50

Appliance Date and Time Settings

In the Appliance Date and Time Settings page, configure the appliance's date, time, and time zone settings manually or use the Network Time Protocol option.
When you set the time manually, the host computer's settings are used for the default date and time values. If necessary, change the time zone setting to show your correct location. Daylight Savings Time is automatically enabled by default. You can change this in the WebUI application on the Device > Date and Time page.
51
When you use the NTP option, there are two default servers you can use. These are ntp.checkpoint.com and ntp2.checkpoint.com.

Appliance Name

In the Appliance Name page, enter a name to identify the Check Point 730/750 Appliance, and enter a domain name (optional).
52
To configure Internet connection now:
1.
2.
When the gateway performs DNS resolving for a specified object’s name, the domain name is appended to the object name. This lets hosts in the network look up hosts by their internal names.

Internet Connection

In the Internet Connection page, configure your Internet connectivity details or select Configure Internet connection later.
Select Configure Internet connection now. From the Connection Protocol drop down list, select the
protocol used to connect to the Internet.
53
3.
Fill in the fields for the selected connection protocol. The
information you must enter is different for each protocol. You can get it from your Internet Service Provider (ISP).
Static IP - A fixed (non-dynamic) IP address.
DHCP - Dynamic Host Configuration Protocol (DHCP)
automatically issues IP addresses within a specified range to devices on a network. This is a common option when you connect through a cable modem.
PPPoE (PPP over Ethernet) - A network protocol for
encapsulating Point-to-Point Protocol (PPP) frames inside Ethernet frames. It is used mainly with DSL services where individual users connect to the DSL modem over Ethernet and in plain Metro Ethernet networks.
PPTP - The Point-to-Point Tunneling Protocol (PPTP) is
a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.
L2TP - Layer 2 Tunneling Protocol (L2TP) is a tunneling
protocol used to support virtual private networks (VPNs). It does not provide any encryption or confidentiality by itself. It relies on an encryption protocol that it passes within the tunnel to provide privacy.
Cellular Modem - Connect to the Internet using a
wireless modem to a cellular ISP through the USB port.
Analog Modem - Connect to the Internet using an
analog modem through a USB port. In the WebUI application, you can configure to use an analog modem through the serial port.
Bridge - Connects multiple network segments at the
data link layer (Layer 2).
54
4.
Wireless - Connects to a wireless network. Connection
through the wireless interface in the First Time Configuration Wizard is always DHCP.
DNS Server (Static IP and Bridge connections) - Enter
the DNS server address information in the relevant fields. For DHCP, PPPoE, PPTP, L2TP, Analog Modem, and Cellular Modem, the DNS settings are supplied by your service provider. You can override these settings later in the WebUI application, under Device > DNS.
We recommend that you configure the DNS since Check Point 730/750 Appliance needs to perform DNS resolving for different functions. For example, to connect to Check Point User Center during license activation or when Application Control, Web Filtering, Anti-Virus, or Anti-Spam services are enabled.
In the Network names(SSID) field, click the arrow to select
a wireless network.
If the network is secure, enter a password. Depending on the security type, you might need to enter the user name.
55
To test your ISP connection status:
Click Connect. The appliance connects to your ISP. Success or failure shows at the bottom of the page.

Local Network

In the Local Network page, select to enable or disable switch on LAN ports and configure your network settings. By default, they are enabled. You can change the IP address and stay connected as the appliance's original IP is kept as an alias IP until the first time you boot the appliance.
DHCP is enabled by default and a default range is configured. Make sure to set the range accordingly and be careful not to include predefined static IPs in your network. Set the exclusion
56
network cable is placed in the LAN1 port. Otherwise,
range for IP addresses that should not be defined by the DHCP server.
The appliance's IP address is automatically excluded from the range. For example, if the appliance IP is 1.1.1.1, the range also starts from 1.1.1.1, but will exclude its own IP address.
Important - If you choose to disable the switch on LAN ports (clear the checkbox), make sure your
connectivity will be lost when you click Next.
57
To configure the wireless network now:
1.
2.
3.
4.
5.
6.

Wireless Network

This applies to Wireless Network models only.
In the Wireless Network page, configure wireless connectivity details.
When you configure a wireless network, you must define a network name (SSID). The SSID (service set identifier) is a unique string that identifies a WLAN network to clients that try to open a wireless connection with it.
We recommend that you protect the wireless network with a password. Otherwise, a wireless client can connect to the network without authentication.
Select Configure wireless network now. Enter a name in the Network name (SSID) field. This is the
name shown to clients that look for access points in the transmission area.
Select Protected network (recommended) if the wireless
network is protected by password.
Enter a Password. Click Hide to conceal the password. Allow access from this network to the local network is
selected by default. Clear if it is not necessary. If this option is selected, the wireless network is considered trusted and access by default is allowed from it to the local network.
58
To configure administrator access:
1.

Administrator Access

In the Administrator Access page, configure if administrators can use Check Point 730/750 Appliance from a specified IP address or any IP address.
Select the sources from where administrators are allowed
access:
LAN - All internal physical ports.
• Trusted wireless - Wireless networks that are allowed
access to the LAN by default. This field is only shown in wireless network modes.
59
2.
To specify IP addresses:
1.
2.
3.
VPN - Using encrypted traffic through VPN tunnels
from a remote site or using a remote access client.
Internet - Clear traffic from the Internet (not
recommended).
Select the IP address from which the administrator can
access Check Point 730/750 Appliance:
Any IP address
Specified IP addresses only
Specified IP addresses from the Internet and any IP
address from other sources - Select this option to allow administrator access from the Internet from specific IP addresses only and access from other selected sources from any IP address. This option is the default.
Click New. In the IP Address Configuration window, select an option:
Specific IP address - Enter the IP address or click Get
IP from my computer.
Specific network - Enter the Network IP address and
Subnet mask.
Click Apply.
60
To activate the appliance:

Appliance Activation

The appliance can connect to the Check Point User Center to pull the license information and activate the appliance. You must register the appliance in your Check Point User Center account. If you don't already have an account, you must create one.
Click Activate License.
61
To activate your appliance later:
To configure a proxy server:
1.
2.
3.
4.
To configure the appliance offline:
1.
2.
3.
4.
5.
6.
A 30 day trial license will be used if:
License activation is not completed.
The registration information for your MAC address can't be
found in the Check Point User Center.
In the WebUI, go to Home > License > Activate License.
Click Set Proxy.
The Proxy Configuration box opens.
Select the checkbox Use proxy server. Enter the address and port. Click Apply.
Go to http://register.checkpoint.com/cpapp to register your
appliance.
Enter the appliance's credentials, MAC address and
registration key.
After you complete the registration wizard, download the
activation file to a local location.
In the Appliance Activation page, click Offline.
The Import from File window opens.
Browse to the activation file you downloaded and click
Import.
The activation process starts.
62
7.
You will be notified that you successfully activated the
appliance. The next page shows the license status for each blade.
63

Software Blade Activation

Select the software blades to activate on this Check Point 730/750 Appliance.
QoS (bandwidth control) can only be activated from the WebUI after completing the First Time Configuration Wizard.
64
To back up the system configuration in the WebUI:

Summary

The Summary page shows the details of the elements configured with the First Time Configuration Wizard.
Click Finish to complete the First Time Configuration Wizard.
The WebUI opens on the Home > System page.
Go to Device > System Operations > Backup.
65
To schedule updates:
1.
2.
CHAPTER 3

Basic System Configuration

In This Section:
Threat Prevention Updates ...................................................................................... 65
Firmware Upgrades ................................................................................................... 66
Internet Connectivity ................................................................................................. 67
Licensing ...................................................................................................................... 67
Backup and Restore .................................................................................................. 68
Do these configurations after you complete the First Time Configuration Wizard and log in to the appliance.

Threat Prevention Updates

Click the status bar at the bottom of the WebUI to see updates. To keep your protection up to date, configure automatic updates.
Click Schedule at the bottom of the page or move the
cursor over the update status.
Select the blades you want to schedule for updates.
Note - When a "Not up to date" message shows for other blades, you must manually update them.
66
3.
4.
To see notifications of available upgrades:
1.
2.
3.
To configure automatic upgrades:
1.
2.
3.
4.
5.
Select Recurrence:
• Daily
Weekly
• Monthly
Click Apply.

Firmware Upgrades

Click the status bar.
We recommend you configure automatic upgrades.
Move the cursor over the notification to show the version
number.
Click Upgrade Now or More Information.
Go to Device > System Operations. Click Configure automatic upgrades.
The Automatic Firmware Upgrades window opens.
Click Perform firmware upgrades automatically. Click Upgrade immediately or Upgrade according to this
frequency.
Click Apply.
Note - If the gateway is configured by Cloud Services,
automatic firmware upgrades are locked.
67
To make sure you have the latest version:
1.
2.
To see the Internet Connectivity status:
To see license information:
1.
2.
Go to Device > System Operations. Click Check now.

Internet Connectivity

Click the status bar.
If you are not connected, go to Devices > Internet.

Licensing

You must first register the appliance in your Check Point User Center account. If you do not have a User Center account, you must create one to receive support and updates.
Go to Home > License. If you did not do this during the First Time Configuration
Wizard, click Activate.
68
If Internet connectivity is configured:
1.
2.
3.
4.
5.
6.
If your license is expired:
To pull a new license:
Click Activate License Browse to http://register.checkpoint.com/cpapp Complete these fields:
MAC address
• Registration key
Select Hardware Platform. In Hardware Model, select Check Point 730/750
Appliance.
Click Activate License.
You are notified when you successfully activate the appliance. If changes are made to your license, click Reactivate to get the updated license information.
Contact your local Check Point representative or visit
http://www.checkpoint.com.
Go to User Center > License > Reactivate.

Backup and Restore

See
Check Point 600/700 Appliance Administration Guide
backup and restore instructions.
for
69
To manually change the policy:
1.
2.
CHAPTER 4

Configuring Access Policy

In This Section:
Configuring Firewall Policy ...................................................................................... 69
Setting Outgoing Services ........................................................................................ 71
Configuring Applications and URL Filtering ......................................................... 71
Configuring Access Policy ........................................................................................ 73
Blocking Specific Applications or URLs ................................................................ 74
Creating a Permanent Access Rule ....................................................................... 74
Blocking Access for Users or Groups .................................................................... 76

Configuring Firewall Policy

Your Check Point 730/750 Appliance is assigned a Firewall policy.
Go to Access Policy > Firewall Blade Control. Select an action:
Set the default Access Policy control level.
Set the default applications.
Set URLs to block.
Allow secure browsing.
Configure User Awareness.
70
To add access policy rules:
These are the security levels:
Standard (Default) - Allows outgoing traffic on configured
services, and traffic between internal and trusted wireless networks. Blocks incoming unencrypted traffic.
• Strict - Blocks all traffic in all directions.
• Off - Allows all traffic. Manually defined rules are not
applied. Note - When the firewall is deactivated, your network is not
secured.
Go to Access Policy > Firewall Policy.
You can also define access to specified servers.
71
To set outgoing services in a Standard policy:
To allow specified services only:
1.
2.
To allow all services
1.
2.

Setting Outgoing Services

Click all services.
Click Block all outgoing services except the following. Select the services to allow.
Click Allow all outgoing services. Click Apply.

Configuring Applications and URL Filtering

The Applications & URL Filtering lets you define the access policy for Internet applications and websites. Select if you want Applications & URL Filtering to be On, Off, or URL Filtering only.
You can select which categories and applications to block. Security risk categories and applications are blocked by default.
72
Configure one or more of these options:
Block security risk categories - Lets you block
applications and URLs that may be security risks:
• Spyware
• Phishing
Botnet
• Spam
• Anonymizer
• Hacking
This option is selected by default.
Block inappropriate content - Lets you block access to
websites with inappropriate content like pornography, violence, gambling and alcohol.
Block file sharing applications - Lets you block
file-sharing from sources that use torrents and peer-to-peer (P2P) applications.
Block other undesired applications - Lets you block
specified applications or URLs. Click this option to manage your basic Application and URL Filtering policy.
Limit bandwidth-consuming applications - Lets you limit
or block applications that take up a lot of bandwidth. P2P file sharing, media sharing and media streams are selected by default. You can edit the group to add other applications or categories.
Note - Your maximum bandwidth limit must be lower than the actual bandwidth provided by your ISP.
73
To configure your access policy using standard categories:
1.
2.
3.
4.

Configuring Access Policy

Go to Users & Objects > Applications & URLs. Click applications Default Policy or Applications Blade
Control page.
Select the applications and URLs to block. Click Apply.
74
To customize your access policy:
1.
2.
3.
4.

Blocking Specific Applications or URLs

Go to Users & Objects > Applications & URLs. Click Applications Default Policy or Applications Blade
Control page.
Select Custom or New to enter a specified application or
URL to block.
Click Apply.
For more information on application and URL control, see the
Check Point 600/700 Appliance Administration Guide
online help from the top right corner of your WebUI.
or the

Creating a Permanent Access Rule

A Permanent Access Rule is used to make exceptions to the default category definitions for specified users or groups. You can set stand-alone access rules and block one group of users from an area that others can access, or override the policy and give access to certain applications for only specified users. For example, HR can access Facebook during work hours as part of their job but other users are blocked. Another example of an exception is the payroll records of a company can only be accessed by the finance group.
75
To create a permanent access rule:
1.
2.
3.
4.
5.
6.
7.
8.
9.
Go to Access Policy > Firewall > Policy. In Outgoing access to the Internet, click New.
The Add Rule window opens.
In the Add Rule window, click Any in the Source column
and then click Users in the new window (Filter: Users).
This lets you create a rule for the selected user only. See Configuring Local Users (on page 90) for steps to create local users. You can also click New > Local user to create a new local user from the rule wizard.
Select a user from the list. In the Add Rule window, click Any in the Application
column.
From the Common or Custom filter, select a URL or
application to apply to the rule. Or Click New at the bottom of this window, and then select
URL or Application to enter a customized URL or application.
Select Apply. Click Block or Accept in the Action column
Block - Prevent the selected users from accessing the
URLs or Applications included in the rule.
Accept - Override a generic block rule to let the
selected users access URLs or Applications.
Select when this rule applies.
Note - This type of access rule will affect all users and groups, unless you set up an overriding rule for individual users or groups.
76
To block internet access for users or groups:
1.
2.
3.

Blocking Access for Users or Groups

Complete steps 1 to 4 in Creating a Permanent Access
Rule (on page
Make sure Any is selected in the Application column and
Block is selected in the Action column.
Use the time of day feature to apply this rule.
For example, you can block the network to staff after hours, or block children’s Internet access at bedtime at home.
74).
77
CHAPTER 5

Configuring Threat Prevention

In This Section:
Cyber Threats.............................................................................................................. 77
Enabling/Disabling Threat Prevention Control.................................................... 78
IPS Security Levels .................................................................................................... 79
Changing the Anti-Virus, Anti-Bot and Threat Emulation Policy ..................... 80
Scheduling Blade Updates ....................................................................................... 81
Configuring the Anti-Spam Blade........................................................................... 82
Configuring the Anti-Spam Policy .......................................................................... 83
Configuring Anti-Spam Exceptions ........................................................................ 84
Configuring Anti-Spam to Detect-Only Mode....................................................... 85

Cyber Threats

Malware is a major threat to network operations that is increasingly dangerous and sophisticated. Examples include worms, blended threats (combinations of malicious code and vulnerabilities for infection and dissemination) and Trojans.
To challenge today's malware landscape, Check Point's comprehensive Threat Prevention solution offers a multi-layered, pre- and post-infection defense approach and a consolidated platform that enables enterprise security to deal with modern malware.
78
To enable/disable the blade:
1.
2.
3.
4.
The Intrusion Prevention System (IPS) blocks potentially malicious attempts to exploit known vulnerabilities in files and network protocols.
The Anti-Virus engine blocks viruses that pass through web and mail traffic (HTTP and SMTP) as well as through the File Transfer Protocol (FTP).
The Anti-Bot engine detects bot-infected machines and blocks bot Command and Control communications.
The Anti-Spam engine blocks or flags emails that contain or are suspected to contain spam.
The Threat Emulation protects networks against unknown threats in files that are downloaded from the internet or attached to emails.

Enabling/Disabling Threat Prevention Control

In Threat Prevention > Blade Control, you can enable or disable the IPS, Anti-Bot, and Anti-Virus blades.
Go to Threat Prevention > Blade Control. For the blades you want to enable, select On. For the blades you want to disable, select Off. Click Apply.
When the blade is managed by Cloud Services, a lock icon is shown. You cannot toggle between the on and off states. If you change other policy settings, the change is temporary. Any changes made locally will be overridden in
79
the next synchronization between the gateway and Cloud Services.

IPS Security Levels

Select the level of IPS protection you want:
Typical - Most suitable for small or medium sized
businesses and provides the best mixture of security and performance.
Strict - Focuses on security.
Custom - You can manually define your protection level.
After you select this option, click Apply.
You can also set IPS to detect-only mode and use the logs to see any attack attempts.
80
To see the logs:
To manually change the policy:
Go to Logs & Monitoring > Security Logs page.

Changing the Anti-Virus, Anti-Bot and Threat Emulation Policy

Anti-Virus, Anti-Bot, and Threat Emulation share the same policy. Your Check Point 730/750 Appliance is configured to manage a standard policy.
Go to Threat Prevention > Engine Settings.
You can:
Configure when files will be inspected.
By default, only incoming files are inspected.
Select policy overrides.
Select file types policy.
Block viruses from web and mail traffic (HTTP, SMTP,
and POP3) and from the File Transfer Protocol (FTP).
Prevent virus and bot attacks. You can also set detect
only mode and use the logs to see if there are any
attacks.
Protect against malicious files.
81

Scheduling Blade Updates

The Blade Control page also shows the update status:
Up to date
• Updated service unreachable - Usually caused by a loss in
Internet connectivity. Check your Internet connection in the Device > Internet page and contact your ISP if the problem continues.
Update available / Not up to date - A new package is ready
to download but it is not time for the scheduled update.
82
To schedule updates:
1.
2.
3.
4.
5.
To configure the Anti-Spam blade:
1.
2.
3.
Go to Threat Prevention > Blade Control. Click Schedule Updates. Select the blades you want to update. Select the recurrence. Click Apply.
For more information on Anti-Virus Blade control options, see the
Check Point 600/700 Appliance Administration Guide
or the
online help from the top right-hand corner of your WebUI.

Configuring the Anti-Spam Blade

The Anti-Spam blade lets you block or flag emails that contain spam. If you flag emails, you prevent the loss of any emails as suspected spam. You can handle suspected spam differently. You can also set to detect-only mode and use the logs to see if there are spam attacks.
Go to Threat Prevention > Anti-Spam Blade Control. Select On or Off. Click Apply.
83
To configure your appliance to inspect email content:
1.
2.
3.

Configuring the Anti-Spam Policy

Your Check Point 730/750 Appliance is configured to manage a typical Anti-Spam Policy. To change this policy, see Configuring Anti-Spam Exceptions (on page 84).
The spam filter can identify spam emails by their source address (default), or by email content.
Go to Threat Prevention > Anti-Spam Blade Control. Click Email content. Select one or more of these actions:
Block spam emails.
• Flag spam email subject with X - Replace X with
manually defined text to add to the subject line for spam emails.
Flag spam email header - Identify email as spam in the
email message header.
Handle suspected spam separately
84
To configure Anti-Spam exceptions:
1.
2.

Configuring Anti-Spam Exceptions

You can configure which senders, domains, or IP addresses are not considered spam. Emails from these senders are not inspected.
You can also identify specified senders, domains or IP addresses for the Anti-Spam engine to automatically block.
Go to Threat Prevention > Anti-Spam. Click Exceptions.
Note - Filter Spam based on: Email content must be activated on the Anti-Spam Blade control page to apply Anti-Spam policies.
85
To configure the Anti-Spam to work in detect only mode:
1.
2.
For more information on Anti-Spam Blade control options, see the
Check Point 600/700 Appliance Administration Guide
online help from the top right-hand corner of your WebUI.
or the

Configuring Anti-Spam to Detect-Only Mode

Click Detect-only mode. Click Apply.
Note - In detect-only mode, only logs will show. The blade will not block emails.
87
CHAPTER 6

Setting up Users and Administrators

In This Section:
Configuring Local System Administrators ........................................................... 88
Editing Information of Locally Defined Administrators ..................................... 89
Deleting a Locally Defined Administrator ............................................................. 90
Configuring Local Users ........................................................................................... 90
Granting Remote Access Permissions .................................................................. 92
Editing a Specific User or Group ............................................................................. 93
Deleting a User or Group .......................................................................................... 93
These sections explain how to set up the initial configuration of your network:
Administrators - Have permission to configure policies and
settings
Users - Individuals who have permission to use the
appliance but not make any changes to policies
Groups - Users with the same rules are grouped together
Important - You must complete the First Time
Configuration Wizard before you do these procedures.
88
To configure local system Administrators:
1.
2.
3.
4.
5.

Configuring Local System Administrators

We recommend you configure your system so an administrator can log in from a specific network only.
Go to Device > Administrators. Click New.
The Add Administrator window opens.
Enter Administrator Name and Password.
Note - You cannot use these characters in your password: { } [ ] ` ~ | ’ "
Optional: To set the administrator with read-only
privileges, click Read-only Administrator.
Click Apply.
89
To edit information of locally defined administrators:
1.
2.
3.
4.

Editing Information of Locally Defined Administrators

Go to Device > Administrators. Select the administrator and click Edit. Edit the information. Click Apply.
Note - Only administrators with full access privileges can edit administrators.
90
To delete a locally defined administrator:
1.
2.
3.
To add a new local user:
1.
2.
3.
4.
5.
6.
7.

Deleting a Locally Defined Administrator

Go to Device > Administrators. Select the administrator and click Delete. Click Yes in the confirmation window.
Note - You cannot delete an administrator who is logged in.

Configuring Local Users

User profiles define how users can operate within the network:
The time frame that users can access the network
If users can work remotely
Go to Users & Objects > User Awareness. Click On. Click Users. Click New. Enter User name, Password and Comments (optional).
Note - You cannot use these characters in your password { } [ ] ` ~ | ’ "
For temporary or guest users, click Temporary User.
Enter the expiration date and time.
To give remote access permissions, select Remote Access
permissions.
91
8.
Click Apply.
The user is added to the table in the Users window.
92
To add a new local users group and grant remote access permissions:
1.
2.
3.
4.
To give remote access permissions:
To add users to the group:
1.
2.

Granting Remote Access Permissions

Go to Users & Objects > Users. Click the arrow on the New button and select Users Group. Enter a group name. Click Apply.
Click Remote Access permissions.
Select from the user list or click New to create new users.
You can see a summary of the group members above the user list. Click the X next to the table to remove members.
Click Apply.
The group is added.
93
To edit a specific user or group:
1.
2.
3.
4.
5.
To delete a user or group:
1.
2.
3.
4.

Editing a Specific User or Group

Go to Users & Objects > Users. Select the user or group from the list. Click Edit. Edit the information. Click Apply.

Deleting a User or Group

Go to Users & Objects > Users. Select the user or group from the list. Click Delete. Click OK to confirm.
95
CHAPTER 7

Setting up Cloud Services

In This Section:
Connecting to Cloud Services .................................................................................. 96
Cloud Services lets you connect your Check Point 730/750 Appliance to a Cloud Services that uses a Web-based application to manage, configure, and monitor the appliance. This lets your appliance be remotely serviced by your managed services provider.
Before you can connect to Cloud Services, make sure you have:
Received an email from your Cloud Services Provider that
contains an activation link. Or
The Service Center IP address, the Check Point 730/750
Appliance gateway ID, and the registration key. Use these details to manually connect your Check Point 730/750 Appliance to Cloud Services.
96
To automatically connect to Cloud Services:
1.
2.
1.
2.
3.
4.

Connecting to Cloud Services

In the email that the Security Gateway owner gets from the
Cloud Services Provider, click the activation link.
After you log in, a window opens and shows the activation details sent in the email.
Make sure the details are correct and click Connect.
This is a sample email:
Dear John Doe, You are invited to activate your security services using the
Security Appliance. Once connected, you will be fully protected by a comprehensive security solution that will secure your assets and minimize the risks of a data breach.
Click http://myfirewall:443476382020. If the First Time Configuration Wizard for the Security
Appliance appears, follow the initial setup instructions in your Getting Started Guide.
If the above activation link doesn't work, do the following:
On a computer connected to the Security Appliance, browse to the Security Appliance management interface: http://myfirewall:4434.
Go to the Home tab and select Cloud Services. Click on the Configure button. Copy your activation key
smbmgmt.provisioning.local&Sample-Gateway.domain.Pri me&6382020 to the Activation Key field.
97
5.
Click Apply to connect.
Your appliance will connect to smbmgmt.provisioning.local&Sample-Gateway.domain.Prime (Gateway ID) using the key 6382020 (registration key).
Thank you, Service Center security team
When connectivity is established, the Cloud Services section at the top of the page shows:
The date of the synchronization
The On/Off lever shows that Cloud Services is turned on.
A Cloud Services Server widget shows Connected on the status bar. Click this widget to open the Cloud Services page.
99
To configure a guest network:
1.
2.
3.
4.
CHAPTER 8

Guest Network

In This Section:
Configuring a Guest Network .................................................................................. 99
Your Check Point security appliance lets you provide guest Internet access without giving access to your local network. When you configure a guest network with a Hotspot, you can monitor users that connect through your guest network.
To establish a Guest Network:
Enable a WiFi network on your appliance. The guest
network is actually a Virtual Access Point (VAP).
Define the network interfaces that will redirect users to the
Hotspot portal when they browse from those defined interfaces.

Configuring a Guest Network

Go to Device > Wireless. Click Guest. Select Use Hotspot. Set Wireless Security to Unprotected or Protected.
100
5.
6.
7.
In the Access Policy tab, set the access and log policy
options.
Note - Do not select the boxes in the Access Policy tab if you do not want guests to access your local network.
Enter a password. Click Apply.
Loading...