Check Point NG[s]AI
Chapter 1: Introduction to Check Point Next Generation with Application Intelligence
- Table 1.1: OSI Reference Model
Chapter 2: Installing and Configuring VPN-1/FireWall-1 Next Generation with Application Intelligence
- Table 2.1: Minimum System Requirements
- Table 2.2: newimage Command Line Arguments
- Table 2.3: newpkg Command Line Arguments
Chapter 3: Using the Graphical Interface
- Table 3.1: Configuration Matrix
- Table 3.2: dynamic-objects Command Options
- Table 3.3: ICMP Codes
Chapter 4: Creating a Security Policy
- Table 4.1: Categories of Security Controls
Chapter 6: Authenticating Users
- Table 6.1: Client Authentication versus User Authentication
- Table 6.2: Session Authentication versus Client and User Authentication
Chapter 7: Open Security (OPSEC) and Content Filtering
- Table 7.1: Path Field Search Examples
Chapter 8: Managing Policies and Logs
- Table 8.1: FireWall-1 Throughput
- Table 8.2: Relevant Powers of 2
- Table 8.3: Quick Recommendations
- Table 8.4: Logging Options
Chapter 9: Tracking and Alerts
- Table 9.1: Basic User-Defined Alert Input
- Table 9.2: ICMP and NAT User-Defined Input
- Table 9.3: fw sam Command Options
Chapter 10: Configuring Virtual Private Networks
- Table 10.1: Check Point Encryption Algorithms
- Table 10.2: VPN Ports and Protocols
Chapter 11: Securing Remote Clients
- Table 11.1: Encryption Protocols
Chapter 12: Advanced VPN Configurations
- Table 12.1: cphaprob Command Options
Appendix A: Class C Subnet Mask Cheat Sheet
- Table A.1: Netmasks and Aggregates