Check Point CCSA Training Course (R80) Training 課程
Facebook: Check Point CCSA Training Course (R80) Training 課程  
Check Point CCSA Training Course (R80) Training 課程 Check Point CCSA Training Course (R80) Training 課程
Check Point CCSA Training Course (R80) Training 課程 Check Point CCSA Training Course (R80) Training 課程 Check Point CCSA Training Course (R80) Training 課程 Check Point CCSA Training Course (R80) Training 課程 Check Point CCSA Training Course (R80) Training 課程 Check Point CCSA Training Course (R80) Training 課程 Check Point CCSA Training Course (R80) Training 課程 Check Point CCSA Training Course (R80) Training 課程 Check Point CCSA Training Course (R80) Training 課程 Check Point CCSA Training Course (R80) Training 課程 Check Point CCSA Training Course (R80) Training 課程
Check Point CCSA Training Course (R80) Training 課程 Check Point CCSA Training Course (R80) Training 課程

這個頁面上的內容需要較新版本的 Adobe Flash Player。

取得 Adobe Flash Player


想定期知道最新課程及優惠嗎?
免費訂閱本中心的課程通訊!

課堂錄影隨時睇 10 大優點之導師解答:您可於觀看某一課堂視像後提出相關問題,課程導師會樂意為學員以單對單的形式解答!

Check Point CCSA R80 國際認可證書課程
課程簡稱:Check Point CCSA Training Course (R80)


  • 課程時間
  • 課程簡介
  • 課程特點
  • 認證要求
  • 考試須知
  • 課程內容
  • 詳細內容

推介服務:課堂錄影隨時睇
編號 地點 可預約星期及時間 學費低至 85 折  
OK2009MV 旺角 一至五:11:30 - 22:30   六:10:30 - 21:30   日:10:30 - 19:00  (公眾假期休息) 95 折後只需 $2,356 按此報名:Check Point CCSA Training Course (R80) Training 課程
OK2009OV 觀塘 一至五:13:30 - 22:00   六及日:12:30 - 21:00   (星期三及公眾假期休息) 9 折後只需 $2,232 按此報名:Check Point CCSA Training Course (R80) Training 課程
OK2009PV 北角 一至五:13:30 - 22:00   六及日:12:30 - 21:00   (星期三及公眾假期休息) 9 折後只需 $2,232 按此報名:Check Point CCSA Training Course (R80) Training 課程
OK2009SV 沙田 一至五:13:30 - 22:00   六及日:12:30 - 21:00   (星期三及公眾假期休息) 85 折後只需 $2,108 按此報名:Check Point CCSA Training Course (R80) Training 課程
OK2009YV 屯門 一至五:13:30 - 22:00   六及日:12:30 - 21:00   (星期三及公眾假期休息) 85 折後只需 $2,108 按此報名:Check Point CCSA Training Course (R80) Training 課程
* 各政府部門可使用 P Card 付款  
免費試睇: 首 1 小時,請致電與本中心職員預約。 查看各地點電話
旺角 2332-6544
觀塘 3563-8425
北角 3580-1893
沙田 2151-9360
屯門 3523-1560
免費重睇: 學員可於享用時期內於報讀地點不限次數地重看課堂錄影,從而可反覆重溫整個課程!
導師解答: 學員可於觀看某一課堂錄影後提出課堂直接相關的問題,課程導師會樂意為學員以單對單的形式解答!
課時: 18 小時
享用時期: 6 星期 (可於報讀日至 4 星期內觀看整個課程,另加 2 星期備用時期)。進度由您控制,可快可慢。
課堂錄影導師: Franco (任教課程清單)
課堂錄影隨時睇: 詳情及示範片段


地區 地址 電話 教育局註冊編號
旺角 九龍旺角亞皆老街 109 號,皆旺商業大廈 18 樓 1802 - 1807 室 2332-6544 533459
觀塘 九龍觀塘成業街 7 號寧晉中心 12 樓 G2 室 3563-8425 588571
北角 香港北角馬寶道 41-47 號華寶商業大廈 3 樓 01-02 號舖 3580-1893 591262
沙田 新界沙田石門安群街 3 號京瑞廣場 1 期 10 樓 M 室 2151-9360 604488
屯門 新界屯門屯喜路 2 號屯門柏麗廣場 17 樓 1708 室 3523-1560 592552
注意! 客戶必須查問報讀學校的教育局註冊編號,以確認該校為註冊學校,以免蒙受不必要的損失!


隨著網絡技術日益普及,大家都開始擔心網絡和資訊保安的問題。故此各大網絡硬件和軟件製造商紛紛推出多個保安產品以提升企業網絡保安水平。 Check Point 便是當中的翹楚。 Check Point 是著名的防火牆 (Firewall) 及虛擬私人網絡 (VPN) 的生產商,其產品遍佈全球。故此掌握 Check Point 技術乃是大勢所趨。

為證明您能掌握各項 Check Point 技術, Check Point 推出了一系列的認證。而最為普遍的有:

- CCSA R80 (Check Point Certified Security Administrator R80)

- CCSE R80 (Check Point Certified Security Expert R80)

CCSA R80 是 Check Point 入門級的認證,考過 CCSA R80 後,同學便可以考取更高級的 CCSE R80 認證。

本課程專為同學考取 CCSA R80 國際認可證書而設,導師將在課堂上使用 Check Point R80 示範和教授各項 Check Point 技術。修畢課程後,便可參加考試 156-215.80 (Check Point Security Administration R80),合格後便可成為 CCSA R80!


課程名稱: Check Point CCSA R80 國際認可證書課程
- 簡稱:Check Point CCSA Training Course (R80)
課程時數: 合共 18 小時
適合人士: 對防火牆及虛擬私人網絡技術有興趣的人士
授課語言: 以廣東話為主,輔以英語
課程筆記: 本中心導師親自編寫英文筆記

1. Franco 親自教授: Franco 善於控制學習節奏,深入淺出,令學員在輕鬆的氣氛下掌握知識。
2. Franco 親自編寫筆記: Franco 親自編寫筆記,絕對適合考試及實際操作 Check Point 器材之用,令你無須「死鋤」如字典般厚及不適合香港讀書格調的書本。
3. 理論與實習並重: Franco 的筆記不會紙上談兵,筆記內有大量商業實習。
4. 提供模擬考試題目: 本中心為學員提供充足的模擬考試題目,每條考試題目均附有標準答案。而較難理解的題目,均會附有解釋。
5. 免費重讀: 傳統課堂學員可於課程結束後三個月內免費重看課堂錄影。

只要你於下列科目取得合格成績,便可獲 Check Point 頒發 CCSA R80 國際認可證書:

考試編號 科目名稱
156-215.80 Check Point Certified Security Administrator R80



本中心為 Check Point 指定的 CCSA R80 考試試場,報考時請致電本中心,登記欲報考之科目考試編號、考試日期及時間 ( 最快可即日報考 ) 。臨考試前要出示身份證及繳付考試費 HK$2,050。

臨考試前要繳付考試費 HK$2,050,及必須出示下列兩項有效之身份證明文件,否則考生不可進行考試,而已繳付之考試費亦不會退回:
1. 香港身份證 及
2. 附有考生姓名及簽名的證件 (如信用咭、香港特區護照、BNO等)


考試題目由澳洲考試中心傳送到你要應考的電腦,考試時以電腦作答。所有考試題目均為英文,而大多數的考試題目為單項選擇題 ( 意即 O) 或多項選擇題 ( 意即 口 ) 。作答完成後會立即出現你的分數,結果即考即知!考試不合格便可重新報考,不限次數。欲知道作答時間、題目總數、合格分數等詳細考試資料,可瀏覽本中心網頁
"各科考試分數資料"。





課程名稱:Check Point CCSA R80 國際認可證書課程
- 簡稱:Check Point CCSA Training Course (R80)

第 1 部份:Check Point Software Architecture

  • 教授 Gaia 在 Check Point solutions 的功能和角色,安裝及設定 [GUI (Graphical User Interface) + CLI (Command Line Interface)]

Check Point CCSA R80 Course Training 課程

Check Point CCSA R80 Course Training 課程

  • 教授 Security Management Server 在 Check Point solutions 的功能和角色,安裝及設定 Security Management Server。

Check Point CCSA R80 Course Training 課程


  • 教授 Security Gateway 在 Check Point solutions 的功能和角色,安裝及設定 Security Gateway。

Check Point CCSA R80 Course Training 課程

  • 教授 Smart Console 在 Check Point solutions 的功能和角色,安裝及設定 Smart Console。

Check Point CCSA R80 Course Training 課程

Check Point CCSA R80 Course Training 課程

  • 教授 Distributed deployment。

Check Point CCSA R80 Course Training 課程

  • 其他相關知識包括 SIC、folder / file architecture 等等。

Check Point CCSA R80 Course Training 課程

第 2 部份:Firewall

  • 教授 Anti-spoofing 概念及設定。

Check Point CCSA R80 Course Training 課程

  • 教授基本 Packet filtering。

Check Point CCSA R80 Course Training 課程

  • 教授 Threat Prevention (IPS, Intrusion Prevention System),並以過濾過大的 ping packet 作示範。

Check Point CCSA R80 Course Training 課程

  • 教授 Application Inspection,並以過濾 HTTP GET 作示範。

Check Point CCSA R80 Course Training 課程

  • 教授 Geo Protection,並以過濾外國的 packets 作示範。

Check Point CCSA R80 Course Training 課程

  • 教授 Application Control 和 URL filtering,並以過濾 YouTube / Facebook 等網站作示範。

Check Point CCSA R80 Course Training 課程

Check Point CCSA R80 Course Training 課程

  • 教授 NAT 並作 dynamic 和 static NAT 的示範。

Check Point CCSA R80 Course Training 課程

  • 教授其他 Firewall 相關知識,例如 implied rules, policy management, sessions, publish 等概念。

Check Point CCSA R80 Course Training 課程

第 3 部份:Identity awareness, monitor and log management

  • 教授 Identity awareness 理論並教授如何將 Security Gateway連接 Microsoft Active Directory。

Check Point CCSA R80 Course Training 課程

  • 教授從 Check Point 產品內 browse Active Directory 結構。

Check Point CCSA R80 Course Training 課程

Check Point CCSA R80 Course Training 課程

  • 在記錄內顯示 Active Directory 的 computers 和 users。

Check Point CCSA R80 Course Training 課程

  • 在 Rule 上加上 Active Directory 的 users / machines。

Check Point CCSA R80 Course Training 課程

  • 教授 Check Point R80 的 monitor 和 logs 機制。

Check Point CCSA R80 Course Training 課程

  • 教授 Views 並顯示 Views。

Check Point CCSA R80 Course Training 課程

  • 教授如何產生 reports。

Check Point CCSA R80 Course Training 課程

  • 教授將記錄 export 為 csv 以便其他程式使用。

Check Point CCSA R80 Course Training 課程

  • 教授將記錄 security administrator 的活動,例如修改 Firewall rules。

Check Point CCSA R80 Course Training 課程

  • 教授了解 Check Point Security Management Server 及 Security Gateway 的情況。

Check Point CCSA R80 Course Training 課程

  • 教授如何處理 CPU 太高或 disk space 過少等問題。

Check Point CCSA R80 Course Training 課程

  • 教授 Block Suspicious Activity 的概念,應用時機並實踐出來。

Check Point CCSA R80 Course Training 課程

  • 教授其他 Identity awareness, monitor and log management 知識。

 

第 4 部份:VPN

  • 教授一般的 IPSec VPN 理論 (非常重要)。
  • 教授針對 Check Point的 IPSec VPN 概念。

Check Point CCSA R80 Course Training 課程

  • 教授同時管理多個 Security Gateways 以準備設定 VPN。

Check Point CCSA R80 Course Training 課程

  • 教授建立和監察 VPN。

Check Point CCSA R80 Course Training 課程

Check Point CCSA R80 Course Training 課程

 

第 5 部份:Miscellaneous

  • 教授在 Security Gateway 內 capture Wireshark 以便學習及解決問題。

Check Point CCSA R80 Course Training 課程

  • Administrations and disaster recovery concepts (e.g. Backup, restoration, account management, etc.)。
  • 其他話題。

The course content above may change at any time without notice in order to better reflect the content of the examination.





1 Background Knowledge
1.1 Firewall Technologies
1.1.1 Packet filtering
1.1.2 Stateful Inspection
1.1.3 Application Intelligence
1.2 Deployments
1.2.1 Layer 3 deployment
1.2.2 Layer 3 deployment with DMZ
1.2.3 Layer 2 deployment
1.2.3.1 More information about the Bridge mode in Gaia

2 Check Point Gaia
2.1 What is Gaia?
2.2 Gaia Features

3 Check Point Architectures
3.1 Overall Concepts
3.1.1 Security Management Server
3.1.2 Security Gateway
3.1.3 SmartConsole
3.1.3.1 Login
3.1.3.2 Gateways & Servers
3.1.3.3 Security Policies
3.1.3.3.1 Access Control Policy
3.1.3.3.2 NAT
3.1.3.3.3 Threat Prevention
3.1.3.3.4 Geo Policy
3.1.3.4 Logs & Monitor
3.1.3.5 Manage & Settings
3.1.3.6 The main SmartConsole Menu
3.1.3.7 The Objects Menu
3.2 Secure Internal Communication (SIC)
3.2.1 SIC Overview
3.2.2 One-time password for initializing trust
3.2.3 SIC status
3.3 Internal Certificate Authority (ICA)
3.4 Deployment Options
3.4.1 Standalone Deployment
3.4.2 Distributed Deployment
3.4.3 Bridge Mode

4 Check Point Products
4.1 Security Gateways
4.2 Smart-1 Appliances

5 Installation and Initial Setup
5.1 Minimum System Requirements / Open Server Hardware Requirements
5.1.1 Security Management Server
5.1.2 Security Gateways
5.1.3 SmartConsole
5.1.4 Logging Requirements
5.2 Lab Topology
5.3 Demonstration: Security Management Server
5.3.1 Demonstration: Install Gaia for Security Management Server
5.3.2 Demonstration: Configure Gaia for Security Management Server
5.3.2.1 Demonstration: Gaia Login
5.3.2.2 Demonstration: IP addresses and MAC address
5.3.2.3 Demonstration: Default Gateway / Static Route
5.3.2.4 Demonstration: Hosts and DNS
5.3.2.5 Demonstration: Logout
5.3.3 Demonstration: Install Security Management Server on Gaia
5.4 Demonstration: Security Gateway
5.4.1 Demonstration: Install Gaia for Security Gateway
5.4.2 Demonstration: Configure Gaia for Security Gateway
5.4.2.1 Demonstration: Gaia Login
5.4.2.2 Demonstration: IP addresses and MAC address
5.4.2.3 Demonstration: Default Gateway / Static Route
5.4.2.4 Demonstration: Logout
5.4.3 Demonstration: Install Security Gateway on Gaia
5.4.4 Demonstration: SmartConsole
5.4.4.1 Install SmartConsole
5.5 Demonstration: Accessing to security management server through SmartConsole
5.6 Demonstration: Establishing SIC between the Management Server and Security Gateway

6 Firewall Policy
6.1 Demonstration: View License Status
6.2 Administrator Collaboration and Sessions
6.2.1 Purpose of Sessions and Session Start
6.2.2 Publishing
6.2.3 Disconnect and Take Over
6.3 Anti-spoofing
6.3.1 Anti-spoofing Concepts
6.3.2 Demonstration: Network Topology and Anti-spoofing
6.4 Create Objects
6.4.1 Demonstration: Create Objects
6.5 Demonstration: Create Access Control Policy
6.6 Demonstration: Verify Access Control Policy
6.7 Demonstration: Install Policy
6.8 Stealth rule and Cleanup rule (Best Practices for all Rule Bases)
6.8.1 Demonstration: Stealth rule and Cleanup rule
6.9 Implied Rules
6.9.1 Demonstration: Implied Rule
6.10 Policy management and version control
6.10.1 Policy Package Management and layers
6.10.1.1 Demonstration: View Existing Policy Package (Standard)
6.10.1.2 Demonstration: Create a New Policy Package and then policy install to the Security Gateway
6.10.1.3 Demonstration: Rollback to Default Policy Package (Standard)
6.10.1.4 Demonstration: Delete a Policy Package
6.10.2 Database Revision
6.10.2.1 Demonstration: Display Database Revisions
6.10.2.2 Demonstration: View Database Revisions’ Audit Logs
6.10.2.3 Demonstration: View Database Revisions’ Content
6.10.2.4 Purge Database Revisions
6.10.3 Policy Installation History
6.10.3.1 Demonstration: View Policy Installation History
6.10.3.2 Demonstration: Revert to specific history
6.11 More about Rules: Section, Disable, Negate, Hit Count
6.11.1 Demonstration: Section
6.11.2 Demonstration: Disabling a Rule
6.11.3 Demonstration: Negate
6.11.4 Demonstration: Hit Count

7 Logging and Monitoring
7.1 Preparation of this chapter
7.1.1 Demonstration: Confirming / Enabling Logging on the Security Management Server
7.1.2 Demonstration: Confirming / Enabling Logging and Monitoring on the Security Gateway
7.1.3 Demonstration: Enabling SmartEvent on the Security Management Server
7.2 Logging
7.2.1 Rules Tracking Options
7.2.2 Demonstration: View Logs with filtering
7.2.3 Demonstration: Rule Logs
7.3 Event Analysis and Reports
7.3.1 Events
7.3.2 From logs to events
7.3.3 Views and Reports
7.3.3.1 Demonstration: Views
7.3.3.2 Demonstration: Reports
7.4 Monitoring Traffic, Connections and Check Point Products status
7.4.1 SmartView Monitoring
7.4.1.1 Demonstration: Open SmartView Monitoring
7.4.2 Suspicious Activity Rules (SAM)
7.4.2.1 Demonstration: Suspicious Activity Rules (SAM)
7.4.3 Demonstration: Real-time monitor Security Gateway Traffic
7.5 Demonstration: System Alerts and Thresholds (e.g. CPU usage, free disk space, etc.)
7.6 Demonstration: Audit Logs
7.7 Export logs to a csv file
7.8 Demonstration: “ping” by “Logs & Monitor”

8 Network Address Translation (NAT)
8.1 Preparation of this chapter
8.2 Basic Concepts
8.3 Hide NAT
8.3.1 Overview of Hide NAT
8.3.2 Demonstration: Hide NAT
8.4 Static NAT
8.4.1 Overview of Static NAT
8.4.2 Demonstration: Static NAT
8.5 Automatic and Manual NAT Rules
8.5.1 Automatic NAT
8.5.2 Manual NAT
8.5.2.1 Overview of Manual NAT
8.5.2.2 Demonstration: Manual NAT

9 Threat Prevention
9.1 Preparation of this chapter
9.2 Overview of Threat Prevention
9.2.1 Threat Prevention Components
9.2.1.1 IPS
9.2.1.2 Anti-Bot
9.2.1.3 Anti-Virus
9.2.1.4 SandBlast
9.3 Demonstration: Enable Threat Prevention (IPS) in the Security Gateway
9.4 Profile
9.4.1 Overview of Profile
9.5 Demonstration: Create an IPS profile and attach it in the policy.
9.6 Demonstration: Block “Large Ping”
9.7 Demonstration: TTL Masking
9.8 Demonstration: HTTP Headers Pattern
9.9 IPS under heavy loading
9.10 Geo Policy
9.10.1 Overview of Geo Policy
9.10.2 Demonstration: Geo Policy
9.11 Demonstration: Final tasks

10 Application Control and URL Filtering
10.1 Preparation of this chapter
10.2 Demonstration: Enable Application Control and URL Filtering + adjust Policy Layer
10.3 Application Wiki
10.4 Demonstration: Blocking YouTube
10.5 Demonstration: Monitoring Facebook
10.6 Demonstration: Block “Sex” websites
10.7 Demonstration: Block traffic by HTTP Methods

11 Identity and Access Management
11.1 Preparation of this chapter
11.2 Managing Administrator Accounts
11.2.1 Permission Profiles
11.2.1.1 Overview of Permission Profiles
11.2.1.2 Default Permission Profiles
11.2.1.3 Demonstration: Create a Custom Permission Profile
11.2.2 Demonstration: Create an Administrator with Custom Permission Profiles
11.3 Authentication
11.3.1 User Authentication
11.3.1.1 Overview of User Authentication
11.3.1.2 Demonstration: Part 1 of 2 - Create a User for User Authentication
11.3.1.3 Demonstration: Part 2 of 2 – Configure User Authentication
11.3.2 Client Authentication
11.3.2.1 Overview of Client Authentication
11.3.2.2 Demonstration: Client Authentication (Manual sign on by HTTP)
11.3.2.3 Demonstration: Client Authentication (Manual sign on by Telnet)
11.4 Identity Awareness
11.4.1 Overview of Identity Awareness
11.4.1.1 Introduction to Identity Awareness
11.4.1.2 Access Role Objects
11.4.2 Identity Sources with AD Query
11.4.2.1 Overview of Identity Sources with AD Query
11.4.2.2 Process of AD Query
11.4.2.3 Limitations of Identity Sources with AD Query
11.4.2.4 Demonstration: Identity Sources with AD Query
11.4.2.4.1 Demonstration: Identity Sources with AD Query (Check AD DS)
11.4.2.4.2 Demonstration: Identity Sources with AD Query (Enable Identity Awareness with AD Query)
11.4.3 Browser-Based Authentication
11.4.3.1 Overview of Browser-Based Authentication
11.4.3.2 Demonstration: Browser-Based Authentication for Internal Users
11.4.3.3 Demonstration: Browser-Based Authentication for Guests

12 Virtual Private Network (VPN)
12.1 Overview of Virtual Private Network (VPN)
12.2 Encryption
12.3 Hashing
12.4 Internet Key Exchange (IKE)
12.4.1.1 IKE phase 1
12.4.1.2 IKE phase 2
12.5 VPN Communities
12.6 VPN Topologies
12.6.1 Meshed VPN Community
12.6.2 Star VPN Community
12.7 Demonstration: Site-to-Site VPN
12.7.1 Demonstration: Site-to-Site VPN (Part 1: Preparation)
12.7.1.1 Demonstration: Preparation in HQ’s Security Gateway
12.7.1.2 Demonstration: Install Gaia in Branch’s Security Gateway
12.7.1.3 Demonstration: Install Security Gateway in Branch
12.7.1.4 Demonstration: Establish SIC between the Management Server and Branch’s Security Gateway
12.7.2 Demonstration: Site-to-Site VPN (Part 2: Build VPN)
12.7.2.1 Demonstration: Create objects representing sites’ networks and enable VPN feature in Security Gateways
12.7.2.2 Demonstration: VPN Community and Access Rule Configurations
12.7.3 Demonstration: Site-to-Site VPN (Part 3: Monitor VPN)

13 Miscellaneous topics
13.1 Command Line Interface (CLI), Standard Mode and Expert Mode
13.1.1 Command Line Interface (CLI)
13.1.1.1 Default Settings
13.1.1.2 Demonstration: Command Line Interface (CLI)
13.1.2 Standard Mode and Expert Mode
13.1.2.1 Standard Mode
13.1.2.2 Expert Mode
13.1.2.3 Demonstration: Expert Mode (with initializing expert mode password)
13.2 Network Traffic Capturing (Wireshark)
13.2.1 Introduction to FW Monitor
13.2.2 FW Monitor vs tcpdump / snoop
13.2.3 Inspection points
13.2.4 Demonstration: Capture “ALL” traffic
13.2.5 More examples of Capturing
13.2.5.1 Host-specific capture
13.2.5.2 Port-specific capture
13.2.5.3 Host-Port-specific capture
13.2.5.4 Protocol-specific capture
13.3 Maintenance
13.3.1 License Management
13.3.2 Snapshot
13.3.2.1 Snapshot Content
13.3.2.2 Snapshot’s Best Practices
13.3.2.3 Create a snapshot
13.4 System Configuration Backup / System Backup
13.4.1 System Configuration Backup Content
13.4.2 Perform System Configuration Backup
13.4.3 Schedule Perform System Configuration Backup
13.4.4 Restore from System Configuration Backup

14 Setup Home Lab
14.1 Prerequisites
14.2 Install VMware WorkStation Player
14.3 Topology
14.4 Management Server
14.5 Windows Server (PC)
14.5.1 Install Windows Server
14.5.2 Install VMware Tools
14.6 Ubuntu (Internet)
14.7 Ubuntu (Branch)
14.8 Security Gateway (HQ)
14.9 Security Gateway (Branch)

15 Additional Reading
15.1 Reset SIC (Security Internal Communication)
15.1.1 Background information
15.1.2 Demonstration: Reset SIC (Security Internal Communication)
15.1.2.1 Reset SIC: Part 1 (from management servers)
15.1.2.2 Reset SIC: Part 2 (from security gateways)
15.1.2.3 Reset SIC: Part 3 (re-establish SIC between security management server and security gateway)
15.2 “Trick” to reset Check Point administrators’ passwords
15.2.1 Demonstration: “Trick” to reset Check Point administrators’ passwords
15.2.2 Emergendisk
15.3 Connection persistence when installing a new policy
15.3.1 Keep all connections
15.3.2 Keep data connections
15.3.3 Rematch connections
15.4 LDAP (Lightweight Directory Access Protocol)
15.4.1 Introduction to LDAP (Lightweight Directory Access Protocol)
15.4.2 Retrieving information from a LDAP Server
15.4.3 Demonstration: LDAP Authentication
15.4.3.1 Demonstration: Enable User Directory
15.4.3.2 Demonstration: Create a host object to represent LDAP server
15.4.3.3 Demonstration: Create a LDAP Account Unit
15.4.3.4 Browse LDAP objects from Check Point
15.4.3.5 Demonstration: Create a LDAP Group
15.4.3.6 Demonstration: Create a rule to “use LDAP”
15.4.3.7 Demonstration: Verification
15.5 Check Point Cluster / HA (High Availability) solutions
15.5.1 Management High Availability (Management HA) for management servers
15.5.1.1 Introduction to Management High Availability (Management HA)
15.5.1.2 Demonstration: Install Gaia + Secondary Management Server
15.5.1.3 Demonstration: Add Secondary Management Server in SmartConsole
15.5.1.4 Demonstration: Verify the Management HA status
15.5.1.5 Demonstration: Failover between primary and secondary server
15.5.1.6 Synchronization Status and Trapshooting
15.5.1.6.1 When connecting to “Active”
15.5.1.6.2 When connecting to “Standby”
15.5.1.6.3 Troubleshooting Management HA
15.5.1.6.3.1 Not communicating
15.5.1.6.3.2 Collision or HA Conflict
15.5.1.6.3.3 Sync Error
15.5.2 ClusterXL for security gateways
15.5.2.1 Introduction to ClusterXL
15.5.2.1.1 ClusterXL High Availability
15.5.2.1.2 ClusterXL Load Sharing
15.5.2.2 State Synchronization, Cluster Control Protocol (CCP), Synchronization Network and Non-Synchronized Services
15.5.2.2.1 State Synchronization and Cluster Control Protocol (CCP)
15.5.2.2.2 Synchronization Network
15.5.2.2.3 Non-Synchronized Services
15.5.2.2.4 Momentum to considering services not to be synchronized
15.5.2.3 ClusterXL Load Sharing Modes (Multicast + Unicast)
15.5.2.3.1 Introduction to ClusterXL Load Sharing Modes
15.5.2.3.2 ClusterXL Load Sharing Multicast Mode
15.5.2.3.3 ClusterXL Load Sharing Unicast Mode
15.5.2.4 Demonstration: Install Gaia + Security Gateway with ClusterXL capability
15.5.2.5 Demonstration: Steps to create a cluster
15.5.2.6 Demonstration: Verify ClusterXL status
15.5.2.7 Miscellaneous topics in ClusterXL
15.5.2.7.1 Sticky connections and Non-Sticky connections
15.5.2.7.1.1 TCP 3-Way handshake of non-sticky connections
15.5.2.7.1.2 Sticky Decision Function
15.6 QoS
15.6.1 Introduction to QoS
15.6.2 Steps of configuring QoS
15.6.2.1 In SmartConsole
15.6.2.2 In SmartDashboard
15.6.3 Demonstration: QoS
15.6.3.1 Demonstration: Preparation
15.6.3.2 Demonstration: Enable QoS in Security Gateway
15.6.3.3 Demonstration: Configure Policy Layer for QoS
15.6.3.4 Demonstration: Configure a QoS rule
15.6.4 More about Check Point QoS
15.6.4.1 Bandwidth allocation and rules
15.6.4.1.1 Weight
15.6.4.1.2 Guarantees
15.6.4.1.3 Limit
15.6.4.2 Action types
15.6.4.2.1 Simple
15.6.4.2.2 Advanced
15.6.4.3 Sub-rules
15.6.4.4 Examples of rule design
15.6.4.4.1 Example 1: Weight
15.6.4.4.2 Example 2: Weight + Guarantee
15.6.4.4.3 Problematic QoS Rule 1
15.6.4.4.4 Problematic QoS Rule 2
15.6.4.4.5 Problematic QoS Rule 3
15.6.4.4.6 Problematic QoS Rule 4

 

更多綜合課程
  攝影課程
  • 攝影初級
  • 攝影中級 (風景專題)
  法律課程
  • 代理人的法律責任
  • 公司董事和合夥人的法律責任
  • 婚姻的法律責任
  • 遺產繼承的合法權益
  英文課程
  • IPA 拼音:級別 1 2 3 4
  普通話課程
  • 基礎普通話拼音 (免費)
  • 進階普通話拼音
  • 普通話會話:級別 1 2 3
  西班牙語文課程
  • 級別 1 2 3
  中醫課程
  • 濕疹與皮膚敏感病
  • 暗瘡與色斑 | 鼻敏感與感冒
  • 脫髮與白髮 | 從五官看健康
  風水命理課程
  • 紫微斗數:級別 1 2 3
  • 子平八字:級別 1 2 3
  • 八字風水:級別 1 2 3
  • 奇門遁甲:級別 1 2 3

這個頁面上的內容需要較新版本的 Adobe Flash Player。

取得 Adobe Flash Player