Announcing 5.4: New rule engine, Check Point 61000/41000 support
Welcome 5.4! In this release we’ve included phase one of our infrastructure operations platform, added new content and as well as Check Point 41k/61k support.… Read More
Welcome 5.4! In this release we’ve included phase one of our infrastructure operations platform, added new content and as well as Check Point 41k/61k support.… Read More
Find detailed steps required to configure and troubleshoot a VPN for the DAIP gateway connected to the Internet using USB 3G-modem. Read more …
Find detailed steps required to create scripts, increase VSX visibility, understand the resulting output, create integrations, etc. Read more …
The following excerpt from Timothy C. Hall’s latest book “Max Power: Check Point Firewall Performance Optimization” describes the Dual Default Gateway problem and their impact on performance. Read more …
UPDATE: The book is no longer offered by indeni. Please go to www.maxpowerfirewalls.com to purchase the book. Below is the original blog post as it… Read More
Rasheen Whidbee describes how to automate the export of Check Point log files into a readable format. Read more …
Johnathan Browall Nordström describes how to set up Authenticaton for Administrators in both in WebUI/SSH and SmartDashboard (for Check Point GAIA). Read more …
Danny Jung describes visually how to set up certificate based VPNs with Check Point appliances. Read more …
UPDATE May 31st 2016: Check Point has updated the SK. The rollout of SHA-256 has been postponed to June 5th 2016. Back in April 2015, Check… Read More
Maxim Bilyukov compiled this FAQ about How the Certification Revocation List (CRL) check mechanism works on a Check Point gateway. Maxim Bilyukov is a Technical Solutions Architect at AKON Technologies and has been working with Check Point Firewalls for five years. Read more …
We often get asked if we have data pertaining to the upgrade processes and cycles of Check Point users around the world. The short answer… Read More
This is a real life sample alert from the indeni guide to preemptive maintenance for Check Point Firewalls. Description: This firewall used to have (51) proxy ARP… Read More
The summary: SmartWorkflow helps you track your rulebase, the Compliance blade helps you identify specific configurations that are not in compliance with known security regulations.… Read More
This is a real life sample alert from the indeni Check Point Firewall configuration guide. Description: There are 248742 concurrent connections while the limit is… Read More
This is a real life sample alert from the indeni Check Point Firewall guide to alerts. Alert Description: The memory usage in the operating system… Read More
This is a real life sample alert from indeni. Description: This cluster member has SecureXL disabled. This does not match the SecureXL configuration of other… Read More
We have been running a webinar for a while now that discusses the top configuration-related mistakes we see people making with Check Point firewalls. Some… Read More
This is a real life sample alert from indeni. Description: The firewall kernel memory usage has crossed the high threshold. It is now at 80.0%.… Read More