Download Complete PDF Send Feedback Print This Page

Synchronize Contents

Next

Getting Started

Before you install or upgrade to R76, read the R76 Release Notes.

Related Topics

Welcome

R76 Documentation

For New Check Point Customers

Downloading R76

USB Installation

Compatibility Tables

Disk Space

Glossary

Welcome

Thank you for choosing Check Point software blades for your security solution. We hope that you will be satisfied with this solution and our support services. Check Point products provide your business with the most up to date and secure solutions available today.

Check Point also delivers worldwide technical services including educational, professional, and support services through a network of Authorized Training Centers, Certified Support Partners, and Check Point technical support personnel to ensure that you get the most out of your security investment.

For additional information on the Internet Security Product Suite and other security solutions, go to: http://www.checkpoint.com or call Check Point at 1(800) 429-4391. For additional technical information, visit the Check Point Support center.

Welcome to the Check Point family. We look forward to meeting all of your current and future network, application, and management security needs.

R76 Documentation

This guide is intended for administrators responsible for installing R76 and upgrading to R76 Check Point security products on the corporate network. To install and upgrade other versions, see the Release Notes or the Installation and Upgrade Guide of that version.

To find out about what is new in R76, see the R76 Release Notes. To find the release notes and the documentation, see the R76 home page.

For New Check Point Customers

New Check Point customers can access the Check Point User Center to:

  • Manage users and accounts
  • Activate products
  • Get support offers
  • Open service requests
  • Search the Technical Knowledge Base

Downloading R76

You can download the R76 software images from the R76 home page. There are different software images for each operating system.

To use a software image, download it and copy it to the media in one of these ways:

  • Create a removable USB device (for installing SecurePlatform or Gaia).
  • Burn it to a DVD.

USB Installation

You can install a SecurePlatform or Gaia appliance or open server using an ISO on a removable USB device. To create the removable device, download the Check Point ISOmorphic utility.

Compatibility Tables

If the existing Check Point implementation contains products that are not supported by R76, the installation process terminates. For a list of compatible products by platform, refer to the R76 Release Notes.

Disk Space

When you install R76, the installation wizard makes sure that there is sufficient space on the hard disk to install the product on the computer or appliance.

If there is not sufficient space on the hard disk, an error message is shown. The message states:

  • The amount of disk space necessary to install the product.
  • The directory where the product is installed.
  • The amount of free disk space that is available in the directory.

After there is sufficient disk space, install the product.

Glossary

Check Point product names and technologies, and industry standard terms:

Term

Definition

Database Migration

Installing the latest Security Management Server or Multi-Domain Server version from the distribution media on separate computer and then migrating the database from the existing Security Management Server or Multi-Domain Server. This method minimizes upgrade risks for an existing deployment.

ClusterXL

A software-based, load sharing and high availability solution for Check Point gateway deployments. It distributes traffic between clusters of redundant gateways so that the computing capacity of multiple machines may be combined to increase total throughput. In the event that any individual gateway becomes unreachable, all connections are re-directed to a designated backup without interruption. Tight integration with Check Point's Security Management server and security gateway solutions ensures that ClusterXL deployment is a simple task for security gateway administrators.

Distributed Deployment

The gateway and the Security Management server are deployed on different computers.

Standalone Deployment

The Check Point components responsible for managing the Security Policy (the Security Management Server and the Security Gateway) are installed on the same machine.

Gateway or Check Point Gateway

A gateway is the software component which actively enforces the Security Policy of the organization.

Open Server

Non-Check Point hardware platform that is certified by Check Point as supporting Check Point products. Open Servers allow customers the flexibility of deploying Check Point software on systems which have not been pre-hardened or pre-installed (servers running standard versions of Solaris, Windows, Red Hat Linux).

In-Place Upgrade

Upgrading a Security Management Server or Multi-Domain Server to the latest version on the existing computer.

SmartProvisioning

Enables enterprises to easily scale, deploy, and manage VPNs and security for thousands of remote locations.

Package Repository

A SmartUpdate repository on the Security Management server that stores uploaded packages. These packages are then used by SmartUpdate to perform upgrades of Check Point Gateways.

SmartLSM Security Gateway

A Remote Office/Branch Office Gateway, previously known as ROBO Gateway)

SmartLSM Profile

(previously ROBO Profile): An object that you define to represent properties of multiple SmartLSM Security Gateways. Profile objects are version dependent. When you plan to upgrade SmartLSM Security Gateways to a new version, first define new Profile objects. In general, it is recommended that you keep the Profile objects of the previous versions until all SmartLSM Security Gateways of the previous version are upgraded.

Security Policy

Used to regulate the incoming and outgoing flow of communication.

Security Management server

Used to manage the Security Policy. The databases and policies of the organization are stored on the Security Management server, and are downloaded from time to time to the gateways.

SmartConsole Clients

GUI applications used to manage different aspects of the Security Policy. For example, SmartView Tracker is a SmartConsole client used to view logs.

SmartDashboard

SmartConsole client that is used to create Security Policies.

SmartUpdate

SmartConsole client used to centrally upgrade and manage Check Point software and licenses.

Multi-Domain Security Management specific terms:

Term

Definition

Active Domain Management Server

In a High Availability deployment, the only Domain Management Server that can manage a specific Domain.

Active Multi-Domain Server

The only Multi-Domain Server in a High Availability deployment from which you can add, change or delete global objects and global policies. By default, this is the primary Multi-Domain Server. You can change the active Multi-Domain Server.

Administrator

Security administrator with permissions to manage elements of a Multi-Domain Security Management deployment.

Domain

A network or group of networks belonging to a specified entity, such as a company, business unit or organization.

Domain Log Server

Virtual log server for a specified Domain.

Domain Management Server

Virtual Security Management Server that manages Security Gateways for one Domain.

Global Objects

Network objects used in global policy rules. Examples of global objects include hosts, global Domain Management Servers, and global VPN communities.

Global Policy

Policies that are assigned to all Domains, or to specified groups of Domains.

Internal Certificate Authority (ICA)

Check Point component that authenticates administrators and users. The ICA also manages certificates for Secure Internal Communication (SIC) between Security Gateways and Multi-Domain Security Management components.

Multi-Domain Log Server

Physical log server that hosts the log database for all Domains.

Multi-Domain Security Management

Check Point centralized management solution for large-scale, distributed environments with many different network Domains.

Multi-Domain Server

Multi-Domain Security Management server that contains all system information as well as the security policy databases for individual Domains.

Primary Multi-Domain Server

The first Multi-Domain Server that you define and log into in a High Availability deployment.

Secondary Multi-Domain Server

Any subsequent Multi-Domain Server that you define in a High Availability deployment.

Standby Domain Management Server

In a High Availability deployment, any Domain Management Server for a specified Domain that is not designated as the active Domain Management Server.

Standby Multi-Domain Server

All other Multi-Domain Servers in a High Availability deployment, which cannot manage global policies and objects. Standby Multi-Domain Servers are synchronized with the active Multi-Domain Server.

 
Top of Page ©2013 Check Point Software Technologies Ltd. All rights reserved. Download Complete PDF Send Feedback Print