System Requirements

This section contains the requirements for Management Servers, Maestro OrchestratorClosed See "Maestro Orchestrator"., and Security Appliances.

Security Gateway Requirements

Supported Security Appliances

R80.30SP supports only these Appliances (see sk162373):

  • 6200, 6400, 6600, 6700, 6900

  • 7000

  • 16000, 16200, 16600HS

  • 26000

  • 28000, 28600HS

Supported Network Cards on Security Appliances

To connect a Appliance to Quantum Maestro Orchestrator with DAC cables, one of these Check Point cards has to be installed in the Appliance:

Network Card

Notes

10 GbE Fiber SFP+

SKUs:
CPAC-4-10F-B
CPAC-4-10F-6500/6800-C

Output of the lspci -v command must show one of these:

  • Intel Corporation 82599ES 10-Gigabit SFI/SFP+ Network Connection

  • Intel Corporation Ethernet Controller X710 for 10GbE SFP+

To verify, run this command in the Expert mode on the Appliance:

lspci -v | grep 'Ethernet controller' | grep Intel

40 GbE Fiber QSFP+

SKU:
CPAC-2-40F-B

 

 

100 GbE Fiber QSFP

SKU:
CPAC-2-100/25F-B

The minimal required card firmware version is 12.22.1002

To verify, run this single long command in the Expert mode on the Appliance:

for NIC in $(ifconfig | grep ethsBP | awk '{print $1}') ; do echo $NIC: ; ethtool -i $NIC | grep firmware ; done

Example output:

ethsBP4-01:
firmware-version: 12.22.1002
ethsBP4-02:
firmware-version: 12.22.1002

Important:

  • It is not supported to install 10 GbE cards together with 40 GbE or 100 GbE cards in the same Appliance (see MBS-5227).

  • All Security Appliances in the same Maestro Security Group must have identical Expansion Cards installed - the type and the number (see MBS-6466):

    • All Security Appliances must have 1 x Quad-Port Expansion Card, 1 x Dual-Port Expansion Card, or 2 x Dual-Port Expansion Cards.

    • All other Expansion Cards must be removed from all Security Appliances, even if these Expansion Cards are not used.

Supported Security Gateway Software Blades and Features

Note - Support for VSXClosed Virtual System Extension. Check Point virtual networking solution, hosted on a computer or cluster with virtual abstractions of Check Point Security Gateways and other network devices. These Virtual Devices provide the same functionality as their physical counterparts. mode is planned (see MBS-7920 in sk162552).

Software Blade or Feature

Gateway
Mode

Firewall

Yes

SecureXLClosed Check Point product on a Security Gateway that accelerates IPv4 and IPv6 traffic that passes through a Security Gateway.

Yes

IPsec VPNClosed Check Point Software Blade on a Security Gateway that provides a Site to Site VPN and Remote Access VPN access.

Yes - IPv4 only

IPSClosed Check Point Software Blade on a Security Gateway that inspects and analyzes packets and data for numerous types of risks (Intrusion Prevention System).

Yes

Threat EmulationClosed Check Point Software Blade on a Security Gateway that monitors the behavior of files in a sandbox to determine whether or not they are malicious. Acronym: TE.

Yes

Threat Emulation - MTA

Yes

Threat ExtractionClosed Check Point Software Blade on a Security Gateway that removes malicious content from files. Acronym: TEX.

Yes

Anti-BotClosed Check Point Software Blade on a Security Gateway that blocks botnet behavior and communication to Command and Control (C&C) centers. Acronyms: AB, ABOT.

Yes

Anti-VirusClosed Check Point Software Blade on a Security Gateway that uses real-time virus signatures and anomaly-based protections from ThreatCloud to detect and block malware at the Security Gateway before users are affected. Acronym: AV.

Yes

URL FilteringClosed Check Point Software Blade on a Security Gateway that allows granular control over which web sites can be accessed by a given group of users, computers or networks. Acronym: URLF.

Yes

Application ControlClosed Check Point Software Blade on a Security Gateway that allows granular control over specific web-enabled applications by using deep packet inspection. Acronym: APPI.

Yes

Identity AwarenessClosed Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA.

Yes

Data Loss PreventionClosed Check Point Software Blade on a Security Gateway that detects and prevents the unauthorized transmission of confidential information outside the organization. Acronym: DLP.

Yes - IPv4 only

Content AwarenessClosed Check Point Software Blade on a Security Gateway that provides data visibility and enforcement. See sk119715. Acronym: CTNT.

Yes

Mobile AccessClosed Check Point Software Blade on a Security Gateway that provides a Remote Access VPN access for managed and unmanaged clients. Acronym: MAB.

Yes

Anti-SpamClosed Check Point Software Blade on a Security Gateway that provides comprehensive protection for email inspection. Synonym: Anti-Spam & Email Security. Acronyms: AS, ASPAM. & Email Security

Yes

Dynamic Routing and Multicast

Yes

QoSClosed Check Point Software Blade on a Security Gateway that provides policy-based traffic bandwidth management to prioritize business-critical traffic and guarantee bandwidth and control latency.

Not supported

Mirror and Decrypt

Yes

ICAP Server

Not supported

ICAP Client

Yes

Support for using NAT64 and NAT46 objects
in Access Control policies

Not supported

R80.30SP does not support IPv6
(see MBS-7903 in sk162552)

In addition, see the limitations listed in the sk144295.

Compatibility with Clients

For the list of Endpoint clients that are supported by this release, see the R80.30SP Quantum Maestro Release Notes.

Number of Supported Items

Item

Number of
Supported Items

Notes

Number of Security Groups configured

  • Minimum: 1

  • Maximum: 8

 

Number of Security Appliances in one Security Group

In Single Site deployment:

  • Minimum: 1

  • Maximum: 31

Support for Dual Site is planned (see MBS-7514 in sk162552).

Number of interfaces configured on top of Uplink portsClosed Interfaces on the Quantum Maestro Orchestrator used to connect to external and internal networks. Gaia operating system shows these interfaces in Gaia Portal and in Gaia Clish. SmartConsole shows these interfaces in the corresponding SMO Security Gateway object. in one Security Group

In Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. Mode:

  • Minimum: 2

  • Maximum: 1024

Includes all interface types

(Physical, Bonds, VLAN).