Configuring And Activating Check Point Encryption Acceleration - Nokia Check Point IP150 Installation Manual

Security platform
Hide thumbs Also See for Check Point IP150:
Table of Contents

Advertisement

6. Gently slide the encryption accelerator card out of its slot.
7. Gently insert the new encryption accelerator card into the slot, ensuring that it if fully
inserted and the retaining clips lock into position.
8. Replace the top cover, reinstall the appliance in the rack, and reconnect the appliance power
cord.
9. Turn on the power supply at the back of the appliance.
You do not need to activate the encryption accelerator card with Network Voyager or the
command-line interface (CLI), as it is automatically enabled once you have installed it.

Configuring and Activating Check Point Encryption Acceleration

The Check Point encryption accelerator software package is part of the Check Point IPSO
operating system, so the appliance automatically detects and configures the Check Point
encryption accelerator card.
For the Check Point IP150 appliances, SecureXL is on by default. After you install the Check
Point encryption accelerator card and reboot the appliance, SecureXL automatically uses the
Check Point encryption accelerator card for encryption acceleration. If you do not want to use
SecureXL for encryption acceleration, use the Check Point cpconfig utility to disable SecureXL.
You can also configure the IP150 appliances to use the Check Point encryption accelerator card
for IKE acceleration. When you enable IKE acceleration, the Check Point encryption accelerator
card performs cryptographic operations for IPsec tunnel negotiation.
Check Point IP150 Security Platform Installation Guide
Installing or Replacing the Check Point Encryption Accelerator Card
1
2
3
4
I P
1 5
0
00671
49

Advertisement

Table of Contents
loading

Table of Contents