Print Download PDF Send Feedback

Previous

Next

Getting Started

In This Section:

Welcome

R80.30 Documentation

R80.30 Software Images

For New Check Point Customers

Disk Space

Product Deployment Scenarios

Before you install or upgrade to R80.30:

  1. Read the R80.30 Release Notes.
  2. Back up the current system.

Welcome

Thank you for choosing Check Point Software Blades for your security solution. We hope that you will be satisfied with this solution and our support services. Check Point products provide your business with the most up to date and secure solutions available today.

Check Point also delivers worldwide technical services including educational, professional, and support services through a network of Authorized Training Centers, Certified Support Partners, and Check Point technical support personnel to ensure that you get the most out of your security investment.

For additional information on the Internet Security Product Suite and other security solutions, go to https://www.checkpoint.com or call Check Point at 1(800) 429-4391. For additional technical information, visit the Check Point Support Center.

Welcome to the Check Point family. We look forward to meeting all of your current and future network, application, and management security needs.

R80.30 Documentation

This guide is for administrators responsible for installing R80.30 on appliances and open servers that run the Gaia Operating System.

To learn what is new in R80.30, see the R80.30 Release Notes.

See the R80.30 Home Page SK for information about the R80.30 release.

R80.30 Software Images

You can use the Upgrade/Download Wizard to download the applicable installation and upgrade images.

For New Check Point Customers

New Check Point customers can access the Check Point User Center to:

Disk Space

When you install or upgrade R80.30, the installation or upgrade wizard makes sure that there is sufficient space on the hard disk to install the Check Point products.

If there is not sufficient space on the hard disk, an error message is shown. The message states:

To learn how to remove old Check Point packages and files, see sk91060.

After there is sufficient disk space, install or upgrade the Check Point product.

Product Deployment Scenarios

There are different deployment scenarios for Check Point software products.

Distributed Deployment

The Security Management Server (1) and the Security Gateway (3) are installed on different computers, with a network connection (2).

Standalone Deployment

The Security Management Server (1) and the Security Gateway (3) are installed on the same computer (2).

Management High Availability

A Primary Security Management Server (1) has a direct or indirect connection (2) to a Secondary Security Management Server (3).

The databases of the Security Management Servers are synchronized, manually or on a schedule, to back up one another.

The administrator makes one Security Management Server Active and the others Standby.

If the Active Security Management Server is down, the administrator can promote the Standby server to be Active.

Full High Availability

In a Full High Availability Cluster on two Check Point Appliances, each appliance runs both as a ClusterXL Cluster Member and as a Security Management Server, in High Availability mode.

This deployment lets you reduce the maintenance required for your systems.

In the image below, the appliances are denoted as (1) and (3).

The two appliances are connected with a direct synchronization connection (2) and work in High Availability mode: