Introduction

Welcome

Congratulations on your new 9000 series Appliance. We hope that you will be satisfied with this Security Gateway and our support services. You deserve the best security and Check Point products provide your business with the most up to date and secure solutions available today.

Check Point also delivers worldwide technical services including educational, professional and support services through a network of Authorized Training Centers, Certified Support Partners and Check Point technical support personnel to ensure that you get the most out of your security investment.

For additional information on the Internet Security Product Suite and other security solutions, refer to the Check Point web site, or call Check Point at 1(800) 429-4391. For additional technical information about Check Point products, consult the Check Point Support Center.

Welcome to the Check Point family. We look forward to meeting all of your current and future network, application and management security needs.

9000 Series Appliance Overview

Check Point Appliances pioneer Gen V Cyber Security, are equipped with Intel's latest multi-core technologies, increased encrypted traffic inspection performance, ASICs acceleration capabilities, and lightning-fast networking technologies - all optimized to provide the highest security effectiveness and performance for small to large size enterprise security networks.

Strengthening Check Point Infinity Architecture, the 9000 series appliances deliver consolidation and security across any network, cloud, and mobile environment with full threat visibility and control.

The new 9000 series appliances are optimized for fifth generation cyber threats and the increased portion of HTTPS (SSL) encrypted traffic. By consolidating multiple security technologies into a single Security Gateway, these appliances are engineered to deliver the most advanced and integrated cyber security to meet all of your business needs today and in the future.

The Check Point 9000 series comes with a first year subscription to the full SandBlast Prevention suite.

Security Appliance

U

In This Document

9800 Base/Plus Security Appliance

1U

9800

9700 Base/Plus Security Appliance

1U

9700

9400 Base/Plus Security Appliance

1U

9400

9300 Base/Plus Security Appliance

1U

9300

9200 Base/Plus Security Appliance

1U

9200

9100 Base/Plus Security Appliance

1U

9100

Shipping Carton Contents

This section describes the contents of the shipping carton.

Item

Description                                                                   

Description                                                                      

Appliance

9800 / 9700 / 9400 / 9300

9200 / 9100

Cables and Adapters

  • 1 x CAT6 Straight-through Cable (3m)

  • 1 x RJ45 Console Cable (1.8m)

  • 1 x USB Type-C Cable

  • 1 x RJ45 Loopback adapter

  • 1 x Fiber Optic Loopback adapter

  • 2 x Power cables (in Plus models)
    1 x Power cable (in Base models)

  • 2 x PSU restraints (in Plus models)
    1 x PSU restraint (in Base models)

  • 1 x CAT6 Straight-through Cable (3m)

  • 1 x RJ45 Console Cable (1.8m)

  • 1 x USB Type-C Cable

  • 1 x RJ45 Loopback adapter

  • 1 x Fiber Optic Loopback adapter

  • 2 x Power cables

Rack Mounting

  • Rack Mounting screws

  • Rack Mounting Sliding Rails

  • Ear bracket kit and screws

  • GND (grounding) screws

  • Rack Mounting screws

  • Rack Mounting Fixed Rails

  • Ear bracket kit and screws

  • GND (grounding) screws

Documentation

  • Welcome to Check Point QR Page

  • Before you begin

  • Welcome to Check Point QR Page

  • Before you begin

Terminology

Terms used in this guide:

  • Security Gateway: The security engine that enforces the organization's Security Policy and acts as a security enforcement point.

  • Security Policy: The policy created by the system administrator that regulates the flow of incoming and outgoing communication.

  • Security Management Server: The server used by the system administrator to manage the Security Policy. The organization's databases and Security Policies are stored on the Security Management Server and downloaded to the Security Gateway.

  • SmartConsole: GUI applications that are used to manage various aspects of Security Policy enforcement.

  • SmartDashboard: A Legacy SmartConsole GUI application that is used by the system administrator to create and manage specific settings for some Software Blades.

  • Locally Managed Deployment: When all Check Point components responsible for both the management and enforcement of the Security Policy (the Security Management Server and the Security Gateway) are installed on the same machine.

  • Centrally Managed Deployment: When the Security Gateway and the Security Management Server are installed on separate machines.