Deploying a Single Security Gateway in Monitor Mode

Introduction to Monitor Mode

You can configure Monitor Mode on a single Check Point Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources.'s interface.

The Check Point Security Gateway listens to traffic from a Mirror Port or Span Port on a connected switch.

Use the Monitor Mode to analyze network traffic without changing the production environment.

The mirror port on a switch duplicates the network traffic and sends it to the Security Gateway with an interface configured in Monitor Mode to record the activity logs.

You can use the Monitor Mode:

Benefits of the Monitor Mode include:

  • There is no risk to your production environment.

  • It requires minimal set-up configuration.

  • It does not require TAP equipment, which is expensive.

Example Topology for Monitor Mode

Item

Description

1

Switch with a mirror or SPAN port that duplicates all incoming and outgoing packets.

The Security Gateway connects to a mirror or SPAN port on the switch.

2

Servers.

3

Clients.

4

Security Gateway with an interface in Monitor Mode.

5

Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. that manages the Security Gateway.

For More About Monitor Mode

See the: