Table of Contents

Advertisement

12 April 2022
QUANTUM SPARK 1500,
1600 AND 1800
APPLIANCE SERIES
R80.20.40
Locally Managed
Administration Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CHECK POINT SPARK 1550 and is the answer not in the manual?

Questions and answers

Summarization of Contents

Quantum Spark 1500, 1600 and 1800 Appliance Series Overview
1500 Appliances
Describes the Quantum Spark 1500 appliance series, including models 1530, 1550, 1570, 1590, and 1570R.
1600 and 1800 Appliances
Describes the Quantum Spark 1600/1800 Security Appliances, part of the new 1600/1800 Appliance family.
Getting Started
Setting up the Quantum Spark Appliance
Provides instructions for physical setup, connecting cables, and initial power-on.
First Time Deployment Options
Outlines the different options available for the initial deployment of SMB gateways.
Configuring VPN
Configuring Remote Access VPN
Explains how to set up secure encrypted connections for remote users.
Configuring Site to Site VPN with a Preshared Secret
Details the configuration for site-to-site VPN using a preshared secret for authentication.
Configuring Site to Site VPN with a Certificate
Details the configuration for site-to-site VPN using certificates for authentication.
Managing Clusters
Configuring a Cluster
Describes how to configure a cluster for redundancy and high availability.
Upgrading a Cluster
Provides steps for upgrading cluster members while maintaining network connectivity.
Appliance Configuration
The Home Tab
Describes the Home tab of the WebUI application, including system information.
Controlling and Monitoring Software Blades
Explains how to manage and monitor active Software Blades.
Setting the Management Mode
Details how to set the appliance's management mode (Local or Centralized).
Managing Licenses
If you have Internet connectivity configured
Steps to activate the appliance license when internet connectivity is available.
If your appliance is not registered
Instructions for registering the appliance and activating the license.
Managing Active Devices
To block a device temporarily
Procedure to temporarily block a device's network access.
Manage the display
Options for managing the display of active devices, including saving and filtering.
Viewing Monitoring Data
Network
Details network statistics for last hour or last day, including bandwidth usage.
Security
Provides information on infected devices, high-risk applications, and security events.
Using System Tools
To monitor system resources
Instructions for monitoring CPU, memory, and disk usage.
To ping or trace an IP address
Steps to perform ping or trace route operations for network troubleshooting.
Managing the Device
Configuring Internet Connectivity
Guides on setting up and managing the appliance's internet connections.
The 'Configuration' tab
Details the configuration options for internet connections, including interface types.
IPv4 connection types
Lists and describes various IPv4 connection types supported by the appliance.
IPv6 connection types
Lists and describes various IPv6 connection types supported by the appliance.
Configuring Wireless Network
Cloning a VAP
Procedure for cloning a Virtual Access Point (VAP).
Wireless Scheduler
Enables setting scheduled times for Wi-Fi to be on and off.
Configuring the Local Network
Reserved IP Address for Specific MAC
Configures network to assign IP addresses only for known hosts.
Monitor Mode
Allows Security Gateways to monitor traffic for automatic learning.
Physical Interfaces
Details on configuring physical interface settings.
Managing the Access Policy
Configuring the Firewall Access Policy and Blade
Sets the default Access Policy control level and configures blades.
Firewall Policy
Defines the default access policy mode (Strict, Standard, Off).
Application & URL Filtering
Defines how to handle applications and URL categories for traffic.
User Awareness
To configure User Awareness with the wizard
Guides through configuring user identification methods for logs and policy.
Configuring the QoS Blade
QoS default policy
Selects options for the default QoS policy or defines it via QoS Policy page.
SSL Inspection Policy
Deploying SSL Inspection
Steps to enable and configure SSL inspection for secure connections.
SSL Inspection Bypass Policy
Allows configuration of exceptions to bypass SSL inspection for specific traffic.
HTTPS Categorization
Enables filtering HTTPS URLs and applications without activating SSL inspection.
Managing Threat Prevention
Configuring Threat Prevention Blade Control
Activates and configures IPS, Anti-Virus, Anti-Bot, and Threat Emulation blades.
To create a custom policy for Threat Prevention
Guides on creating a custom policy for Threat Prevention settings.
Advanced Threat Prevention Engine Settings
IPS
Configures settings for Intrusion Prevention System (IPS) protections.
Anti-Virus
Configures settings for Anti-Virus scanning of incoming files.
Anti-Bot
Configures protections against botnet and malware activity.
Threat Emulation
Configures settings for emulating files to detect unknown threats.
Configuring the Anti-Spam Blade Control
To configure the Anti-Spam Policy
Configures spam filtering based on sender address and email content.
Managing VPN
Configuring the Remote Access Blade
Sets up secure encrypted connections for remote users via VPN.
Configuring Site to Site VPN Blade
Activates the appliance's ability to create VPN tunnels with remote sites.
Configuring Remote Access Users
To add a new local user with remote access permissions
Procedure to add local users and configure their remote access permissions.
To add remote access permissions to an existing Active Directory group
Adds remote access permissions for users from an existing Active Directory group.
Configuring Advanced Remote Access Options
Office Mode
Configures the network settings for remote access VPN clients using Office Mode.
DNS Servers for Remote Access users
Defines up to three DNS servers for Remote Access clients.
Configuring VPN Sites
To add a new VPN site
Steps to add a new VPN site, configuring remote site details and encryption.
Select the Remote Site Encryption Domain
Configures the conditions to encrypt traffic sent to a remote site.
Managing Trusted CAs
Recommended configurations
Recommendations for certificate-based site-to-site VPN configurations.
To add a trusted CA
Procedure to add a CA certificate to the trusted CA list.
Managing Installed Certificates
These are the steps to create a signed certificate
Outlines the process for creating a certificate and obtaining a signature from a CA.
To create a new certificate to be signed by a CA
Steps to generate a new certificate signing request.
Managing Internal Certificates
To reinitialize certificates
Procedure to reinitialize certificates when Internet connection IPs change.
To replace an internal CA certificate
Steps to replace the internal CA certificate with a new one.
Managing Users and Objects
Working with User Awareness
Configures user identity sources for logging and policy enforcement.
To configure User Awareness with the wizard
Guides through the wizard to configure user identification methods.
Configuring Local Users and User Groups
To add a new local user
Procedure to create a new local user account with permissions.
To add a new local users group with remote access permissions
Procedure to create a new group and assign remote access permissions.
Configuring Local and Remote System Administrators
Administrator Roles
Defines different administrator roles and their permissions.
To create a local administrator
Step-by-step guide to creating a new local administrator account.
Managing Authentication Servers
You can define these types of authentication servers
Lists RADIUS server and Active Directory domain as authentication types.
To add a RADIUS server
Procedure to configure primary and secondary RADIUS server details.
Managing Applications & URLs
What is a custom application?
Defines a custom application using URL strings or regular expressions.
What is a category?
Explains URL inspection by Check Point Cloud for categorization.
The Application and Categories List
Shows a list of applications and categories filtered by common, custom, or all.
Managing System Services
To create a new service
Procedure to define network protocols and ports for services.
General
Covers general session timeout, source port usage, and reply handling.
Managing Service Groups
To create a new service group
Procedure to create a new group for organizing services.
Managing Network Objects
To create a Single IP network object
Steps to create a network object representing a single IP address.
To create an IP Range network object
Steps to create a network object representing a range of IP addresses.
Managing Network Object Groups
To create a new network object group
Procedure to add new network object groups for security policy configuration.
Logs and Monitoring
Viewing Security Logs
Shows the last 100 log records and provides search capabilities.
Storing Logs
Details on storing logs locally or on an external SD card.
Viewing System Logs
To download the full log file
Instructions to download the complete system log file.
To search system logs table
How to search system logs using keywords in the text search field.
Configuring External Log Servers
External Check Point Log Server
Configures an external Check Point Log Server for storing additional logs.
Syslog Server Configuration
Configures a gateway to send logs to multiple syslog servers.
SNMP
To enable or disable SNMP
Instructions to turn the SNMP agent on or off.
SNMP v3 Users
Steps to add, edit, or delete SNMP v3 users.
Advanced Configuration
Upgrade Using a USB Drive
Explains how to upgrade the appliance firmware using a USB drive.
Upgrade Using an SD Card
Explains how to upgrade firmware using an SD card on specific appliances.
Restoring Factory Defaults
To restore factory defaults with the WebUI
Procedure to restore appliance to factory default settings via WebUI.
To restore factory defaults with the button on the back panel
Procedure to restore appliance to factory default settings using the back panel button.
RESTful API
Enabling and disabling the REST API
Commands to enable or disable the REST API on the gateway.
Request Structure
Details the structure of HTTP POST requests for the API.
Response Structure
Describes the structure of API responses on success and failure.
Versioning
Explains how to specify API versions in HTTP POST requests.

Table of Contents