1
Overview
16
IP1280 Security Platform Installation Guide
Two additional single-NIC slots (slots 3 and 4), one of which (slot 4) is pre-populated with a
four-port 1000 BASE-T Ethernet interface
Console port
Serial port
The network interfaces in the external PMC slot are designated for management, monitoring,
and high-availability traffic. Partner application and operating system storage is provided on the
hard-disk drive in disk-based systems or in flash memory in flash-based systems.
The IP1280 security platform is designed to meet other mid- to high-end availability
requirements, including port density for connections to redundant internal, external, DMZ, and
management networks. In addition, the IP1280 security platform provides redundant power
supplies, N + 1 cooling, and hot swapping of hard-disk drives and PMC NICs.
As a network device, the IP1280 security platform supports a comprehensive suite of IP-routing
functions and protocols.
The integrated router functionality eliminates the need for separate intranet and access routers in
security applications.
Managing the Check Point IP1280 Security Platform
You can manage the Check Point IP1280 security platform by using the following interfaces:
Check Point Network Voyager for IP appliances—
an SSL-secured, Web-based element
management interface to Check Point IP security platforms. Check Point Network Voyager
is preinstalled on the IP1280 security platform and enabled through the Check Point IPSO
operating system. With Check Point Network Voyager, you can manage, monitor, and
configure the IP1280 security platform from any authorized location within the network by
using a standard Web browser. Use one of the four Ethernet management ports to access the
Check Point Network Voyager interface.
For information about how to access Check Point Network Voyager and the related
reference materials, see
“Using Check Point Network Voyager”
on page 42.
The Check Point IPSO command-line interface (CLI)—
an SSHv2-secured interface that
enables you to easily configure Check Point IP security platforms from the command line.
Nearly everything that you can accomplish with Check Point Network Voyager—manage,
monitor, and configure the IP1280 security platform —you can also do with the CLI.
For information about how to access the CLI, see the
CLI Reference Guide
for Check Point
IPSO v3.6 or later.
Check Point Horizon Manager for IP appliances—
a secure GUI-based software image
management application. With Check Point Horizon Manager, you can securely install and
upgrade the Check Point IPSO operating system and applications such as Check Point
VPN-1. Check Point Horizon Manager can perform installations and upgrades on up to
2,500 Check Point IP security platforms, offering administrators the most rapid and
dependable method to perform Check Point application upgrades.
For information about how to obtain Check Point Horizon Manager, see the Check Point
Web site at
www.checkpoint.com
.
Содержание IP1280
Страница 6: ...6 Check Point IP1280 Security Platform Installation Guide ...
Страница 8: ...8 Check Point IP1280 Security Platform Installation Guide ...
Страница 10: ...10 Check Point IP1280 Security Platform Installation Guide ...
Страница 14: ...2 14 Check Point IP1280 Security Platform Installation Guide ...
Страница 36: ...2 Installing the Check Point IP1280 Appliance 36 Check Point IP1280 Security Platform Installation Guide ...
Страница 46: ...3 Performing the Initial Configuration 46 Check Point IP1280 Security Platform Installation Guide ...
Страница 81: ...Configuring Check Point IPSO for IP1280 ADP Interfaces IP1280 Security Platform Installation Guide 81 ...
Страница 130: ...A Technical Specifications 130 Check Point IP1280 Security Platform Installation Guide ...
Страница 134: ...B Compliance Information 134 Check Point IP1280 Security Platform Installation Guide ...
Страница 138: ...Index 138 IP1280 Security Platform Installation Guide ...