Page 1
Check Point 770/790 Appliance Locally Managed Getting Started Guide Models: L-72, L-72W, L-72P Classification: [Protected] P/N 707411...
Page 2
Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.
Page 3
To learn more, visit the Check Point Support Center http://supportcenter.checkpoint.com. Feedback Check Point is engaged in a continuous effort to improve its documentation. Please help us by sending your comments mailto:cp_techpub_feedback@checkpoint.com?subject=Feedba ck on Check Point 770/790 Appliance Locally Managed Getting Started Guide.
To reduce potential safety issues with the DC power source, only use one of these: • The AC adapter supplied with the appliance • A replacement AC adapter supplied by Check Point • An AC adapter purchased as an accessory from Check Point...
Page 5
To prevent damage to any system, it is important to handle all parts with care. These measures are generally sufficient to protect your equipment from static electricity discharge: • Restore the communications appliance system board and peripherals back into the antistatic bag when they are not in use or not installed in the chassis.
Page 6
For California: Perchlorate Material - special handling may apply. See http://www.dtsc.ca.gov/hazardouswaste/perchlorate The foregoing notice is provided in accordance with California Code of Regulations Title 22, Division 4.5, Chapter 33. Best Management Practices for Perchlorate Materials. This product, part, or both may include a lithium manganese dioxide battery which contains a perchlorate substance.
Page 7
YX may be any alphanumeric character. When Y is "P" indication is PoE function. Product Options: 770 Wired, 770 WiFi, 770 PoE 790 Wired, 790 WiFi, 790 PoE Date First Applied: April 2016 Conform to the following Product Specifications: RF/Wi-Fi (* marked model)
Page 8
Certification Type CE EMC, European Standard EN 55032 & EN 55024. EN61000-3-2:2014, Class A EN61000-3-3:2013 EN61000-4-2:2009 EN61000-4-3:2006+A1:2008+A 2:2010 EN61000-4-4:2012 EN61000-4-5:2014 EN61000-4-6:2014 EN61000-4-11:2004 AS/NZS CISPR 22:2009+A1 2010 Class B FCC part 15B , 47 CFR subpart B , Class B ICES-003:2012 Issue 6 Class B ANSI C63.4:2014 VCCI, V-3/2015.4 Class B, V4/2012.04...
Page 9
Certification Type Draft ETSI EN 301 489-1 V2.2.0 (2017-03) Draft ETSI EN 310 489-17 V3.2.0 (2017-03) CE LVD: EN 60950-1 Safety UL/c-UL: UL 60950-1 Safety CB IEC 60950-1 Safety AS/NZS 60950-1 Safety ETSI EN 300 328 V2.2.1:2016 RF/Wi-Fi * ETSI EN 301 893 V2.1.1 (2017-05) RF exposure EN62311:2008, RF/Wi-Fi *...
Page 11
Federal Communications Commission (FCC) Statement: This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interference received, including interference that may cause undesired operation.
Page 12
FCC Caution: • Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. • This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. Radiation Exposure Statement This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment.
Page 13
Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence. L'exploitation est autorisée aux deux conditions suivantes: 1. L'appareil ne doit pas produire de brouillage, et 2. L'utilisateur de l'appareil doit accepter tout brouillage radioélectrique subi, même si le brouillage est susceptible d'en compromettre le fonctionnement.
Page 14
2. The maximum antenna gain permitted for devices in the bands 5250-5350 MHz and 5470-5725 MHz shall comply with the e.i.r.p. limit; and 3. The maximum antenna gain permitted for devices in the band 5725-5825 MHz shall comply with the e.i.r.p. limits specified for point-to-point and non point-to-point operation as appropriate.
Page 15
clairement indiqués. (Pour 5G B2 avec les périphériques DFS uniquement) 5. De plus, les utilisateurs devraient aussi être avisés que les utilisateurs de radars de haute puissance sont désignés utilisateurs principaux (c.-à-d., qu’ils ont la priorité) pour les bandes 5250-5350 MHz et 5650-5850 MHz et que ces radars pourraient causer du brouillage et/ou des dommages aux dispositifs LAN-EL.
Page 16
Product Disposal This symbol on the product or on its packaging indicates that this product must not be disposed of with your other household waste. Instead, it is your responsibility to dispose of your waste equipment by handing it over to a designated collection point for the recycling of waste electrical and electronic equipment.
Informations relatives à la santé et à la sécurité Avant de mettre en place ou d'utiliser l'appareil, veuillez lire ces avertissements. Avertissement : ne pas obturer les aérations. Il faut laisser au moins 1,27 cm d'espace libre. Avertissement : cet appareil ne contient aucune pièce remplaçable par l'utilisateur.
Page 18
• Un adaptateur secteur acheté en tant qu'accessoire auprès de Check Point Pour éviter d'endommager tout système, il est important de manipuler les éléments avec soin. Ces mesures sont généralement suffisantes pour protéger votre équipement contre les décharges d'électricité statique : •...
Page 19
• Ne pas court-circuiter la pile au lithium : elle risque de surchauffer et de causer des brûlures en cas de contact. • Ne pas faire fonctionner le processeur sans refroidissement. Le processeur peut être endommagé en quelques secondes. Pour la Californie : Matériau perchloraté...
Page 20
L-72, L-72W *, L-72PL-72(Y)XX YX peut être un caractère alphanumérique. Lorsque Y est "P" indication est fonction Options de produit : 770, 770 Wi-Fi, 770 PoE 790, 790 Wi-Fi, 790 PoE Date de demande initiale : Avril 2016 Sont conformes aux normes produit suivantes :...
Page 21
Certification Type CE EMC, Norme européenne EN 55032 & EN 55024 EN61000-3-2:2014, Classe A EN61000-3-3:2013 EN61000-4-2:2009 EN61000-4-3:2006+A1:2008+A 2:2010 EN61000-4-4:2012 EN61000-4-5:2014 EN61000-4-6:2014 EN61000-4-11:2004 AS/NZS CISPR 22:2009+A1 2010 Classe B FCC partie 15B, 47 CFR sous-partie B, Classe B ICES-003:2012 Édition 5 Classe B ANSI C63.4:2014 VCCI, V-3/2015.4 Classe B,...
Page 22
Certification Type Draft ETSI EN 301 489-1 V2.2.0 (2017-03) Draft ETSI EN 310 489-17 V3.2.0 (2017-03) CE LVD : EN 60950-1 Sécurité UL/c-UL : UL 60950-1 Sécurité CB IEC 60950-1 Sécurité AS/NZS 60950-1 Sécurité ETSI EN 300 328 V2.2.1: 2016 RF/Wi-Fi * ETSI EN 301 893 V2.1.1 (2017-05)
Page 23
Certification Type Canada RSS-247 Édition 1 RF/Wi-Fi * (2015-05) Canada RSS-Gen Édition 4 (2014-11) ANSI C63.10:2013 47 CFR FCC Partie 15, RF/Wi-Fi * Sous-partie C (section 15.247) ANSI C63.10:2013 FCC Partie 2 (Section 2.1091) RF/Wi-Fi * KDB 447498 D01 47 CFR FCC Partie 15, RF/Wi-Fi * Sous-partie E (Section 15.407) ANSI C63.10:2013...
Page 24
Déclaration à la Federal Communications Commission (FCC) : Ce dispositif est conforme à la section 15 des réglementations de la FCC. Son fonctionnement est soumis aux deux conditions suivantes : (1) Cet appareil ne doit pas causer d'interférence préjudiciable et (2) Cet appareil doit tolérer toute interférence reçue, y compris celles qui pourraient causer un fonctionnement indésirable.
Page 25
FCC Attention • Tout changement ou modification non expressément approuvé par la partie responsable de la conformité pourrait empêcher l’utilisateur autorisé de faire fonctionner cet appareil. • Cet émetteur ne doit pas être installé ou utilisé en conjonction avec d'autres antennes ou émetteurs. Déclaration à...
Page 26
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Cet appareil et son antenne ne doivent pas être situés ou fonctionner en conjonction avec une autre antenne ou un autre émetteur, exception faites des radios intégrées qui ont été testées.
Page 27
radars pourraient causer du brouillage et/ou des dommages aux dispositifs LAN-EL. Déclaration de conformité de classe B pour le Japon : Directive de l'Union européenne relative à la compatibilité électromagnétique Ce produit est certifié conforme aux exigences de la directive du Conseil concernant le rapprochement des législations des États membres relatives à...
Page 28
Mise au rebut du produit Ce symbole apposé sur le produit ou son emballage signifie que le produit ne doit pas être mis au rebut avec les autres déchets ménagers. Il est de votre responsabilité de le porter à un centre de collecte désigné pour le recyclage des équipements électriques et électroniques.
..............48 ....................49 Cloud Services .................49 Configuring Check Point 770/790 Appliance Workflow ..................51 Setting up the Check Point 770/790 Appliance ....52 Connecting the Cables ............52 About the PoE ................53 Using the First Time Configuration Wizard Starting the First Time Configuration Wizard...
Page 30
Welcome .................. 55 Authentication Details ............56 Appliance Date and Time Settings ........57 Appliance Name ..............58 Internet Connection .............. 59 Local Network ................ 62 Wireless Network ..............64 Administrator Access ............65 Appliance Activation .............. 67 Software Blade Activation ...........
Page 31
Creating a Permanent Access Rule ........82 Blocking Access for Users or Groups ........84 Configuring Threat Prevention Cyber Threats ................85 Enabling/Disabling Threat Prevention Control ....86 IPS Security Levels ..............87 Changing the Anti-Virus, Anti-Bot and Threat Emulation Policy ..................88 Scheduling Blade Updates ...........89 Configuring the Anti-Spam Blade ........90...
Page 32
Guest Network Configuring a Guest Network ..........106 Monitoring and Reports Viewing Monitoring Reports ..........107 Viewing Security Reports ............108 Viewing System Logs ............109 Getting Support Support ..................111 Where to From Here ............112...
..............................................Cloud Services ......................Thank you for choosing Check Point's Internet Security Product Suite. Check Point products provide your business with the most up to date and secure solutions available today. Check Point also delivers worldwide technical services including educational, professional, and support services...
For more information about the Check Point 770/790 Check Point 600/700 Appliance Appliance, see the Administration Guide. For more technical information, go to: http://support.checkpoint.com Before You Get Started Review these documents before doing the procedures in this guide: • Release Notes •...
2 standard network cables • 1 serial console cable • 1 mini USB console cable • Wall mount kit (screws and plastic anchors) Check Point 770/790 Appliance Quick Start • Guides Guide Check Point 770/790 Appliance Getting • Started Guide...
Appliance Diagrams and Specifications The Check Point 770 Appliance has 3 cores, and the Check Point 790 Appliance has 4. Otherwise, they are very much alike. These are the Check Point 770/790 Appliance models: • Wired • Wireless (WiFi) •...
Page 38
Item Description USB1 and USB ports that are used for: USB2 ports • Cellular and analog modems. • Reinstalling the appliance with new firmware. • Running a first-time configuration script. • Green when the appliance is turned on. Power LED •...
Page 39
Item Description LAN1 - Speed Indicator: LAN16, DMZ, • Orange when the port speed is 1000 Mbps. WAN LEDs • Green when the port speed is 100 Mbps. • Not lit when the port speed is 10 Mbps. Activity Indicator: •...
Page 40
PoE Wired Model Item Description USB1 and USB 3.0 ports that are used for: USB2 ports • Cellular and analog modems. • Reinstalling the appliance with new firmware. • Running a first-time configuration script. • Green when the appliance is turned on. Power LED •...
Page 41
Item Description • Blinking green when trying to connect to the Internet LED Internet. • Green when connected to the Internet. • Blinking red when the Internet connection is configured but fails to connect. LAN1-LAN16, Speed Indicator: • Orange when the port speed is 1000 Mbps. DMZ: •...
Page 43
For more information on how to restore factory defaults, see Check Point 600/700 Appliance Administration Guide PWR+12VDC Connects to the power supply's cable. Note - The power cable must be securely screwed in to the appliance.
Page 45
PoE Wired Model Item Description LAN1-LAN12 RJ45 Ethernet ports. ports Ground (Earth) Functional grounding. LAN13-LAN16 Serves as Power Sourcing Equipment (PSE). Total power budget is 62W maximum. By default, the PoE port automatically provides power when a compliant PD is connected. PoE supports up to four standard 802.3af devices or up to two standard 802.3at devices.
Page 46
Button factory defaults. The button is recessed into the appliance chassis to prevent accidental restoring of factory default settings. For more information on how to restore factory defaults, see Check Point 600/700 Appliance Administration Guide WAN port RJ45 Ethernet port.
Check Point Software Blades Overview The available Check Point Software Blades can be divided into these major groups: • Access Policy • Threat Prevention •...
Access Policy The Access Policy has these features: • Firewall - Makes sure that only allowed traffic enters the company's network. Other traffic is blocked before it enters. Application Control and URL Filtering - Makes sure that • only authorized applications are used on the network and only allowed websites can be accessed.
• multiple sites in your network. Cloud Services Cloud Services lets you connect your Check Point 770/790 Appliance to a Cloud Services Provider that uses a Web-based application to manage, configure, and monitor the appliance. See Setting up Cloud Services (on page 101).
Workflow This is the recommended workflow for configuring Check Point 770/790 Appliance: 1. Setting up the Check Point 770/790 Appliance (on page 52). 2. Connecting the cables (on page 52). 3. Configuring the appliance with the First Time Configuration Wizard.
Setting up the Check Point 770/790 Appliance 1. Remove the Check Point 770/790 Appliance from the shipping carton and place it on a tabletop. 2. Identity the network interface marked as LAN1. This interface is preconfigured with the IP address 192.168.1.1.
About the PoE The PoE wired model is in 770/790 appliances only. The PoE switch is a type of PSE (Power Sourcing Equipment), and delivers power to the PD (Powered Devices) end point. By default, the PoE port automatically provides power when a compliant PD is connected.
Starting the First Time Configuration Wizard To configure the Check Point 770/790 Appliance for the first time after you complete the hardware setup, use the First Time Configuration Wizard. If you do not complete the wizard because of one of these...
To open the WebUI, enter one of these addresses in the browser: • http://my.firewall • http://192.168.1.1:4434 If a security warning message shows, confirm it and continue. The First Time Configuration Wizard runs. Welcome The Welcome page introduces the product.
Note that only English is allowed as the input language. Authentication Details In the Authentication Details page, enter the required details to log in to the Check Point 770/790 Appliance WebUI application or if the wizard terminates abnormally: • Administrator Name - We recommend that you change the default "admin"...
Appliance Date and Time Settings In the Appliance Date and Time Settings page, configure the appliance's date, time, and time zone settings manually or use the Network Time Protocol option. When you set the time manually, the host computer's settings are used for the default date and time values.
Appliance Name In the Appliance Name page, enter a name to identify the Check Point 770/790 Appliance, and enter a domain name (optional). When the gateway performs DNS resolving for a specified object’s name, the domain name is appended to the object name.
Internet Connection In the Internet Connection page, configure your Internet connectivity details or select Configure Internet connection later. To configure Internet connection now: 1. Select Configure Internet connection now. 2. From the Connection Protocol drop down list, select the protocol used to connect to the Internet. 3.
Page 60
• DHCP - Dynamic Host Configuration Protocol (DHCP) automatically issues IP addresses within a specified range to devices on a network. This is a common option when you connect through a cable modem. PPPoE (PPP over Ethernet) - A network protocol for •...
Page 61
WebUI application, under Device > DNS. We recommend that you configure the DNS since Check Point 770/790 Appliance needs to perform DNS resolving for different functions. For example, to connect to Check Point User Center during license activation or when Application Control, Web Filtering, Anti-Virus, or Anti-Spam services are enabled.
To test your ISP connection status: Click Connect. The appliance connects to your ISP. Success or failure shows at the bottom of the page. Local Network In the Local Network page, select to enable or disable switch on LAN ports and configure your network settings. By default, they are enabled.
Page 63
include predefined static IPs in your network. Set the exclusion range for IP addresses that should not be defined by the DHCP server. The appliance's IP address is automatically excluded from the range. For example, if the appliance IP is 1.1.1.1, the range also starts from 1.1.1.1, but will exclude its own IP address.
Wireless Network This applies to Wireless Network models only. In the Wireless Network page, configure wireless connectivity details. When you configure a wireless network, you must define a network name (SSID). The SSID (service set identifier) is a unique string that identifies a WLAN network to clients that try to open a wireless connection with it.
For example, if the radio is set to a 5 GHz band, the wireless client cannot connect to 2.4 GHz band networks. Administrator Access In the Administrator Access page, configure if administrators can use Check Point 770/790 Appliance from a specified IP address or any IP address.
Page 66
• Internet - Clear traffic from the Internet (not recommended). 2. Select the IP address from which the administrator can access Check Point 770/790 Appliance: • Any IP address • Specified IP addresses only •...
Appliance Activation The appliance can connect to the Check Point User Center to pull the license information and activate the appliance. You must register the appliance in your Check Point User Center account. If you don't already have an account, you must create one.
Page 68
License activation is not completed. • The registration information for your MAC address can't be found in the Check Point User Center. To activate your appliance later In the WebUI, go to Home > License > Activate License. To configure a proxy server: 1.
Page 69
7. You will be notified that you successfully activated the appliance. The next page shows the license status for each blade.
Software Blade Activation Select the software blades to activate on this Check Point 770/790 Appliance. QoS (bandwidth control) can only be activated from the WebUI after completing the First Time Configuration Wizard.
Summary The Summary page shows the details of the elements configured with the First Time Configuration Wizard. Click Finish to complete the First Time Configuration Wizard. The WebUI opens on the Home > System page. To back up the system configuration in the WebUI: Go to Device >...
CHAPTER 3 Basic System Configuration In This Section: Threat Prevention Updates ..................Firmware Upgrades ....................Internet Connectivity ....................Licensing ........................Backup and Restore ....................Do these configurations after you complete the First Time Configuration Wizard and log in to the appliance. Threat Prevention Updates Click the status bar at the bottom of the WebUI to see updates.
3. Select Recurrence: • Daily • Weekly • Monthly 4. Click Apply. Firmware Upgrades To see notifications of available upgrades: 1. Click the status bar. We recommend you configure automatic upgrades. 2. Move the cursor over the notification to show the version number.
If you are not connected, go to Devices > Internet. Licensing You must first register the appliance in your Check Point User Center account. If you do not have a User Center account, you must create one to receive support and updates.
MAC address • Registration key 4. Select Hardware Platform. 5. In Hardware Model, select Check Point 770/790 Appliance. 6. Click Activate License. You are notified when you successfully activate the appliance. If changes are made to your license, click Reactivate to get the updated license information.
Creating a Permanent Access Rule ............... Blocking Access for Users or Groups ..............Configuring Firewall Policy Your Check Point 770/790 Appliance is assigned a Firewall policy. To manually change the policy: 1. Go to Access Policy > Firewall Blade Control. 2. Select an action: •...
Page 78
These are the security levels: • Standard (Default) - Allows outgoing traffic on configured services, and traffic between internal and trusted wireless networks. Blocks incoming unencrypted traffic. • Strict - Blocks all traffic in all directions. Off - Allows all traffic. Manually defined rules are not •...
Setting Outgoing Services To set outgoing services in a Standard policy: Click all services. To allow specified services only: 1. Click Block all outgoing services except the following. 2. Select the services to allow. To allow all services 1. Click Allow all outgoing services. 2.
• Botnet • Spam • Anonymizer • Hacking This option is selected by default. Block inappropriate content - Lets you block access to • websites with inappropriate content like pornography, violence, gambling and alcohol. • Block file sharing applications - Lets you block file-sharing from sources that use torrents and peer-to-peer (P2P) applications.
3. Select the applications and URLs to block. 4. Click Apply. Blocking Specific Applications or URLs To customize your access policy: 1. Go to Users & Objects > Applications & URLs. 2. Click Applications Default Policy or Applications Blade Control page.
3. Select Custom or New to enter a specified application or URL to block. 4. Click Apply. For more information on application and URL control, see the Check Point 600/700 Appliance Administration Guide or the online help from the top right corner of your WebUI. Creating a Permanent Access Rule A Permanent Access Rule is used to make exceptions to the default category definitions for specified users or groups.
Page 83
5. In the Add Rule window, click Any in the Application column. 6. From the Common or Custom filter, select a URL or application to apply to the rule. Click New at the bottom of this window, and then select URL or Application to enter a customized URL or application.
Blocking Access for Users or Groups To block internet access for users or groups: 1. Complete steps 1 to 4 in Creating a Permanent Access Rule (on page 82). 2. Make sure Any is selected in the Application column and Block is selected in the Action column.
Examples include worms, blended threats (combinations of malicious code and vulnerabilities for infection and dissemination) and Trojans. To challenge today's malware landscape, Check Point's comprehensive Threat Prevention solution offers a multi-layered, pre- and post-infection defense approach and a consolidated platform that enables enterprise security to deal with modern malware.
The Intrusion Prevention System (IPS) blocks potentially malicious attempts to exploit known vulnerabilities in files and network protocols. The Anti-Virus engine blocks viruses that pass through web and mail traffic (HTTP and SMTP) as well as through the File Transfer Protocol (FTP). The Anti-Bot engine detects bot-infected machines and blocks bot Command and Control communications.
the next synchronization between the gateway and Cloud Services. IPS Security Levels Select the level of IPS protection you want: • Typical - Most suitable for small or medium sized businesses and provides the best mixture of security and performance. •...
Changing the Anti-Virus, Anti-Bot and Threat Emulation Policy Anti-Virus, Anti-Bot, and Threat Emulation share the same policy. Your Check Point 770/790 Appliance is configured to manage a standard policy. To manually change the policy: Go to Threat Prevention > Engine Settings.
Scheduling Blade Updates The Blade Control page also shows the update status: • Up to date • Updated service unreachable - Usually caused by a loss in Internet connectivity. Check your Internet connection in the Device > Internet page and contact your ISP if the problem continues.
1. Go to Threat Prevention > Anti-Spam Blade Control. 2. Select On or Off. 3. Click Apply. Configuring the Anti-Spam Policy Your Check Point 770/790 Appliance is configured to manage a typical Anti-Spam Policy. To change this policy, see Configuring Anti-Spam Exceptions (on page 92).
Page 91
The spam filter can identify spam emails by their source address (default), or by email content. To configure your appliance to inspect email content: 1. Go to Threat Prevention > Anti-Spam Blade Control. 2. Click Email content. 3. Select one or more of these actions: Block spam emails.
Anti-Spam Blade control page to apply Anti-Spam policies. For more information on Anti-Spam Blade control options, see Check Point 600/700 Appliance Administration Guide or the online help from the top right-hand corner of your WebUI. Configuring Anti-Spam to...
CHAPTER 6 Setting up Users and Administrators In This Section: Configuring Local System Administrators ............Editing Information of Locally Defined Administrators ........Deleting a Locally Defined Administrator ............. Configuring Local Users ................... Granting Remote Access Permissions ..............Editing a Specific User or Group ................
Configuring Local System Administrators We recommend you configure your system so an administrator can log in from a specific network only. To configure local system Administrators: 1. Go to Device > Administrators. 2. Click New. The Add Administrator window opens. 3.
Editing Information of Locally Defined Administrators To edit information of locally defined administrators: 1. Go to Device > Administrators. 2. Select the administrator and click Edit. 3. Edit the information. 4. Click Apply. Note - Only administrators with full access privileges can edit administrators.
Deleting a Locally Defined Administrator To delete a locally defined administrator: 1. Go to Device > Administrators. 2. Select the administrator and click Delete. 3. Click Yes in the confirmation window. Note - You cannot delete an administrator who is logged in. Configuring Local Users User profiles define how users can operate within the network: •...
Page 97
8. Click Apply. The user is added to the table in the Users window.
Granting Remote Access Permissions To add a new local users group and grant remote access permissions: 1. Go to Users & Objects > Users. 2. Click the arrow on the New button and select Users Group. 3. Enter a group name. 4.
Editing a Specific User or Group To edit a specific user or group: 1. Go to Users & Objects > Users. 2. Select the user or group from the list. 3. Click Edit. 4. Edit the information. 5. Click Apply. Deleting a User or Group To delete a user or group: 1.
In This Section: Connecting to Cloud Services ................Cloud Services lets you connect your Check Point 770/790 Appliance to a Cloud Services that uses a Web-based application to manage, configure, and monitor the appliance. This lets your appliance be remotely serviced by your managed services provider.
Connecting to Cloud Services To automatically connect to Cloud Services: 1. In the email that the Security Gateway owner gets from the Cloud Services Provider, click the activation link. After you log in, a window opens and shows the activation details sent in the email.
Page 103
Click Apply to connect. Your appliance will connect to smbmgmt.provisioning.local&Sample-Gateway.domain.Prime (Gateway ID) using the key 6382020 (registration key). Thank you, Service Center security team When connectivity is established, the Cloud Services section at the top of the page shows: • The date of the synchronization •...
In This Section: Configuring a Guest Network ................Your Check Point security appliance lets you provide guest Internet access without giving access to your local network. When you configure a guest network with a Hotspot, you can monitor users that connect through your guest network.
Configuring a Guest Network To configure a guest network: 1. Go to Device > Wireless. 2. Click Guest. 3. Select Use Hotspot. 4. Set Wireless Security to Unprotected or Protected. 5. In the Access Policy tab, set the access and log policy options.
PTER 9 Monitoring and Reports In This Section: Viewing Monitoring Reports ................... Viewing Security Reports ..................Viewing System Logs ....................Viewing Monitoring Reports The Monitoring page shows statistics for security events and network analysis. When you enter this page, the latest data shows.
Viewing Security Reports The Reports page shows security reports for the time frame you specify. Security events include: • High Risk Applications - The number of potentially risky applications accessed. Infected Hosts - The number of infected hosts or servers •...
2. Click View Details to get more information on the highlighted log. For more information on Reports, Logs, and Monitoring, see Check Point 600/700 Appliance Administration Guide or the online help from the top right-hand corner of your WebUI.
In This Section: Support ........................Where to From Here ....................Support For technical assistance, contact Check Point 24 hours a day, seven days a week at: • +1 972-444-6600 (Americas) • +972 3-611-5100 (International) When you contact support, you must provide your MAC address.
Where to From Here You have now learned the basics that are necessary to begin using your Check Point 770/790 Appliance. For more information about the Check Point 770/790 Appliance Check Point 600/700 Appliance Administration and links to the Guide , go to the Check Point Support Center (http://www.checkpoint.com/cp600) where you can find all...
Need help?
Do you have a question about the 770 and is the answer not in the manual?
Questions and answers