Download Complete PDF Send Feedback Print This Page

Previous

Synchronize Contents

Next

Deployment Options

There are different deployment scenarios for Check Point software products.

  • Standalone Deployment - The Security Management Server and the Security Gateway are installed on the same computer or appliance.

IUG_Standalone Deployment

Item

Description

1

Standalone computer

IUG_FW Icon

Security Gateway component

IUG_Blades ICON

Security Management Server component

  • Distributed Deployment - The Security Gateway and the Security Management Server are installed on different computers or appliances.

Item

Description

1

Security Management Server

2

Network connection

3

Security Gateway

IUG_FW Icon

Security Gateway component

IUG_Blades ICON

Security Management Server component

  • Standalone Full HA - Security Management server and Security Gateway are each installed on one appliance, and two appliances work in High Availability mode.

IUG_Standalone Full HA Deployment

Item

Description

1

Primary appliance

2

Direct appliance to appliance connection

3

Backup appliance

IUG_FW Icon

Security Gateway component

IUG_Blades ICON

Security Management Server component

  • Bridge Mode - Add a Security Gateway to an existing environment without changing IP Routing.

 

Item

Description

1 and 2

Switches

IUG_FW Icon

Security Gateway Firewall bridging Layer-2 traffic over the one IP address, with a subnet on each side using the same address.

  • Management HA - A Primary and Secondary Security Management server are configured. The databases of the Security Management servers are synchronized, either manually or on a schedule, so they can back up one another. The administrator makes one Security Management server Active and the other(s) Standby. If the Active Security Management server is down, the administrator can make the Standby server Active.

IUG_Standalone Full HA Deployment

Item

Description

1

Primary Security Management server

2

Direct or indirect Security Management server to Security Management server connection

3

Secondary Security Management server

 

IUG_Blades ICON

Security Management Server component

 
Top of Page ©2013 Check Point Software Technologies Ltd. All rights reserved. Download Complete PDF Send Feedback Print