0% found this document useful (0 votes)
216 views

Ccse 2013 Study Guide

Guide

Uploaded by

saboor11
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
216 views

Ccse 2013 Study Guide

Guide

Uploaded by

saboor11
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

Copyright 2013 Check Point Software Technologies, Inc. All rights reserved.

Check Point Security Engineering


Study Guide
R76 Edition


.

.

.

.

.
iii
2013 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under
licensing restricting their use, copying, distribution, and de-compilation. No part of this product or related
documentation may be reproduced in any form or by any means without prior written authorization of Check
Point. While every precaution has been taken in the preparation of this book, Check Point assumes no
responsibility for errors or omissions. This publication and features described herein are subject to change
without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR
52.227-19.
TRADEMARKS:
Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks.
Refer to the Third Party copyright notices (http:// www.checkpoint.com/
3rd_party_copyright.html) for a list of relevant copyrights and third-party licenses.
iv
0
International Headquarters: 5 HaSolelim Street
Tel Aviv 67897, Israel
Tel: +972-3-753 4555
U.S. Headquarters: 959 Skyway Road, Suite 300
San Carlos, CA 94070
Tel: 650-628-2000
Fax: 650-654-4233
Technical Support, Education
& Professional Services:
6330 Commerce Drive, Suite 120
Irving, TX 75063
Tel: 972-444-6612
Fax: 972-506-7913
E-mail any comments or questions about our courseware to course-
[email protected].
For questions or comments about other Check Point documentation,
e-mail [email protected].
Document #: CPTS-DOC-CCSE-SG-R76
Preface
1
The Check Point Certified Security
Engineering Exam
The Check Point Security Engineering course provides an understanding of upgrad-
ing and advanced configuration of Check Point software blades, installing and man-
aging VPNs (on both internal and external networks), gaining the maximum
security from Security Gateways, and resolving Gateway performance issues. The
Check Point Security Engineering Study Guide supplements knowledge you have
gained from the Security Engineering course, and is not a sole means of study.
The Check Point Certified Security Engineering #156-315.13 exam covers the fol-
lowing topics:
The process for backup of a Security Gateway and Management Server
using your understanding of the differences between backups, snapshots,
and upgrade-exports.
The process for upgrade of Management Server using a database
migration.
How to perform debugs on firewall processes.
Building, testing and troubleshooting a ClusterXL Load Sharing
deployment on an enterprise network.
Building, testing and troubleshooting a ClusterXL High Availability
deployment on an enterprise network.
Preface: The Check Point Certified Security Engineering Exam
2 Check Point Security Engineering Study Guide
Building, testing and troubleshooting a management HA deployment
on an enterprise network.
Configuring, maintaining and troubleshooting SecureXL and CoreXL
acceleration solutions on the corporate network traffic to ensure
noted performance enhancement on the firewall.
Building, testing and troubleshooting a VRRP deployment on an
enterprise network.
Using an external user database such as LDAP, to configure User
Directory to incorporate user information for authentication services
on the network.
Managing internal and external user access to resources for Remote
Access or across a VPN.
Troubleshooting a site-to-site or certificate-based VPN on a
corporate gateway using IKEView, VPN log files and command-line
debug tools.
Optimizing VPN performance and availability using Link Selection
and Multiple Entry Point solutions.
Managing and testing corporate VPN tunnels to allow for greater
monitoring and scalability with multiple tunnels defined in a
community including other VPN providers.
Creating Events and using existing event definitions to generate
reports on specific network traffic using SmartReporter and
SmartEvent in order to provide industry compliance information to
management.
Troubleshoot report generation given command-line tools and
debug-file information.
Preface: The Check Point Certified Security Engineering Exam
Check Point Security Engineering Study Guide 3
Frequently Asked Questions
The table below provides answers to commonly asked questions about
the Check Point CCSE #156-315.13 exams:
Question Answer
What are the Check Point rec-
ommendations and prerequi-
sites?
Check Point recommends you have at least 6
months to 1 year of experience with the prod-
ucts, before attempting to take the CCSE
# 156-315.13 exam. In addition, you should
also have basic networking knowledge, knowl-
edge of Windows Server and/or UNIX, and
experience with TCP/IP and the Internet.
Check Point also recommends you take the
Check Point Security Engineering class from a
Check Point Authorized Training Center
(ATC). We recommend you take this class
before taking the CCSE # 156-315.13 exam.
Check Point ATCs also offer Check Points
comprehensive #156-315.13 Exam Prep
course (only available at Check Point ATCs).
To locate an ATC, see:
http://atc.checkpoint.com/
atclocator/locateATC
How do I register? Check Point exams are offered through Pearson
VUE, a third-party testing vendor with more
than 3,500 testing centers worldwide.
Pearson VUE offers a variety of registration
options. Register via the Web or visit a specific
testing center. Registrations at a testing center
may be made in advance or on the day you
wish to test, subject to availability. For same-
day testing, contact the testing center directly.
Locate a testing center from the VUE Pearson
Web site:
www.pearsonvue.com
Preface: The Check Point Certified Security Engineering Exam
4 Check Point Security Engineering Study Guide
What is the exam structure? The exams are composed of multiple-choice
and scenario questions. There is no partial
credit for incorrectly marked questions.
How long is the exam?
Do I get extra time, if I am not
a native English speaker?
The following countries are given 90 minutes
to complete the exam. All other regions get 120
minutes:
Australia
Bermuda
Canada
Japan
New Zealand
Ireland
South Africa
UK
US
What are the pre-requisites for
the CCSE R76 exam?
CCSA R70,CCSA 71, CCSA R75, or CCSA
R76.
How can I update my R65
certification?
If you have any CCSA R60 certification, take
the CCSA R70/71 Update Training Blade to
update your CCSA certification. If you have a
CCSE R60 certification, take the CCSE
R70/71 Update Training Blade to update your
CCSE certification.
How long is my certification
valid?
Check Point certifications are valid for 2 years.
CCMAs are valid for 3 years. Any certification
more than three (3) years old is not considered
current. Certifications become inactive after
five years. Your benefits may be suspended if
your certification is not current. Your certifica-
tion can be maintained with annual continuing
education credits.
Question Answer
Preface: The Check Point Certified Security Engineering Exam
Check Point Security Engineering Study Guide 5
What are continuing education
credits?
Continuing education credits help you maintain
Check Point certifications without starting over
with every product release. Continuing educa-
tion credits can be earned in a variety of ways
like completing shorter training lessons (Train-
ing Blades), by participating in our test devel-
opment process, and even attending CPX.
What are the pre-requisites for
CCMA?
CCSE is mandatory; CCMSE is suggested.
Do you have a test-out option? Though highly recommended, it is not a
requirement to attend a training course before
challenging the exam. You may test at any
time, however it is advised you spend at least 6
months working with Check Point products
before attempting to achieve certification.
Are study materials available? Free study guides and practice exams are avail-
able for download at
http://www.checkpoint.com/services/
education/index.html#resources.
Courseware can be purchased on our eStore
and Training is available from an ATC.
Check Point ATCs also offer Check Points
comprehensive #156-315.13 Exam Prep
course (only available at Check Point ATCs).
How soon can I re-take an
exam if I fail?
If you fail an exam you must wait 24 hours
before your 2nd attempt, and 30 days for the
3rd attempt. Once you pass a test you cannot
take it again for a higher score.
Can I get exam insurance? Students automatically get a 50% re-take dis-
count on any 2nd attempt of the CCSA and
CCSE R76 exams.
Question Answer
Preface: The Check Point Certified Security Engineering Exam
6 Check Point Security Engineering Study Guide
I only failed by 1 point and
based on my calculations I
should have passed what
happened?
The function of certification is to provide proof
the Check Point Certified professional is
qualified to protect the lifeblood of
organizations their data. Check Point takes
this very seriously and we constantly strive to
administer the most effective exams. Passing is
calculated by comparing the number of ques-
tions answered correctly versus the number of
questions answered incorrectly. Not all sections
of the test are weighted equally.
Can I take any R65 level
exams?
No, all R65 exams have been retired except for
the Japanese versions. Our philosophy is to
provide training and certification only for
current technologies so our partners and cus-
tomers will always benefit from the latest secu-
rity advancements.
Where can I find more informa-
tion about Check Point Certi-
fied Professionals?
The Check Point Certified Professionals web-
site and newsletter are a benefit which contain
special information and resources that are not
available to the public.
What happens when I pass my
exam? When will I receive my
Certificate?
After you pass a Check Point exam at VUE,
your exam results are uploaded. On the 15th
and 30th, we process all certification results
and order certification kits. It takes 6-8 weeks
to receive your certificate. Your advanced
access to Secure Knowledge and the Certified
Professionals website is established once you
achieve certification.
Why cant I have more than
one account at Pearson VUE
test centers?
Check Point only allows one Pearson VUE
account to track your Check Point exams. If
you change companies, please update the
contact information in your Pearson VUE
account instead of creating a new one so your
Check Point certifications will follow you. You
can verify your accounts with Customer Ser-
vice here:
http://www.vue.com/checkpoint/contact/
Question Answer
Preface: The Check Point Certified Security Engineering Exam
Check Point Security Engineering Study Guide 7
What happens if someone gets
caught cheating? How do you
prevent it?
Every individual who takes an exam signs our
Non-disclosure agreement. Anyone caught in
the act of cheating or sharing exam items will
have their Check Point certifications revoked
for 2 years. All testing privileges and partner
program participation will be deactivated
during this time. Check Point collaborates with
major technology companies to prevent cheat-
ing through test pattern analysis and distribu-
tion best practices. Together we identify and
take legal action against unauthorized test cen-
ters and inaccurate brain dump sites.
What are the benefits of Check
Point certification?
Check Point Certified Professionals receive
access to the Advanced SecureKnowledge
base, Certified Professionals only website and
quarterly newsletter for 2 years. Check Point
Certified Master Architects (CCMA) receive 3
years Expert level access to SecureKnowledge.
How do take a Training Blade
exam?
You can purchase Training Blades at http://
store.checkpoint.com. Please forward your
email confirmation to:
[email protected] for access to
the exam. Please include your Check Point Cer-
tified Professional ID# for credit. Your certifi-
cation ID# is generated when you create an
account at Pearson VUE. If you have any ques-
tions about your ID#, please email:
[email protected].
How do I access my certifica-
tion benefits?
Make sure your Check Point User Center (UC)
email address matches the email address regis-
tered with Pearson VUE. Your UC profile will
automatically be updated with each certifica-
tion, including advanced access to Secure-
Knowledge and the Certified Professionals
only website. If you have any problems or
questions about your benefits please email:
[email protected]
Question Answer
Preface: The Check Point Certified Security Engineering Exam
8 Check Point Security Engineering Study Guide
For more exam and course information, see:
http://www.checkpoint.com/services/education/
Chapter
7
1
Upgrading
Upgrades are used to save Check Point product configurations, Security Policies, and
objects, so that Security Administrators do not need to re-create Gateway and Security
Management Server configurations.
Chapter Objectives:
Perform a backup of a Security Gateway and Management Server using your
understanding of the differences between backups, snapshots, and upgrade-exports.
Upgrade and troubleshoot a Management Server using a database migration.
Upgrade and troubleshoot a clustered Security Gateway deployment.
Chapter 1: Upgrading Upgrading Topics
8 Check Point Security Engineering Study Guide
Upgrading Topics
The following table outlines the topics covered in the Upgrading
chapter of the Check Point Security Engineering Course. This table is
intended as a supplement to knowledge you have gained from the
Security Engineering Courseware handbook, and is not meant to be a
sole means of study.
Topics Key Elements
Page
Numbers
Backup and Restore Secu-
rity Gateways and Man-
agement Servers
p. 11
Snapshot management
Upgrade Tools
Backup Schedule Recommenda-
tions
Upgrade Tools
Performing Upgrades
Support Contract
p. 11
p. 12
p. 12
p. 12
p. 13
p.13
Upgrading Standalone
Full High Availability
p. 16
Table 1-1: Upgrade Topics
Topic Key Element
Page
Number
Lab 1: Upgrading to Check
Point R76 L-p. 1
Install Security Management Server L-p. 2
Table 1-2: Upgrading to Check Point R76 - Lab Topics
Upgrading Topics Chapter 1: Upgrading
Check Point Security Engineering Study Guide 9
Migrating Management server Data L-p. 6
Importing the Check Point Database L-p. 30
Launch SmartDashboard L-p. 34
Upgrading the Security Gateway L-p. 36
Topic Key Element
Page
Number
Table 1-2: Upgrading to Check Point R76 - Lab Topics
Chapter 1: Upgrading Sample CCSE Exam Question
10 Check Point Security Engineering Study Guide
Sample CCSE Exam Question
During an upgrade to the management server, the contract file is
transferred to a gateway when the gateway is upgraded. Where is the
contract file retrieved from
a. ISO
b. Technical Support
c. Management.
d. User Center.
Answer Chapter 1: Upgrading
Check Point Security Engineering Study Guide 11
Answer
During an upgrade to the management server, the contract file is
transferred to a gateway when the gateway is upgraded. Where is the
contract file retrieved from
a. ISO
b. Technical Support
c. Management.
d. User Center...
Chapter 1: Upgrading Answer
12 Check Point Security Engineering Study Guide
Chapter
17
2
Advanced Firewall
The Check Point Firewall Software Blade builds on the award-winning technology,
first offered in Check Points firewall solution, to provide the industrys best gate-
way security with identity awareness. Check Points firewalls are trusted by 100%
of Fortune 100 companies and deployed by over 170,000 customers. Check Point
products have demonstrated industry leadership and continued innovation since the
introduction of FireWall-1 in 1994.
Objectives:
Using knowledge of Security Gateway infrastructure, including chain modules,
packet flow and kernel tables to describe how to perform debugs on firewall
processes.
Chapter 2: Advanced Firewall Advanced Firewall Topics
18 Check Point Security Engineering Study Guide
Advanced Firewall Topics
The following table outlines the topics covered in the Advanced
Firewall chapter of the Check Point Security Engineering Course. This
table is intended as a supplement to knowledge you have gained from
the Security Engineering Courseware handbook, and is not meant to be
a sole means of study..
Topic Key Element
Page
Number
Check Point Firewall Infra-
structure
p. 21
GUI Clients
Management
p. 21
p. 21
Security Gateway p. 22
User and Kernel Mode Processes
CPC Core Process
FWM
FWD
CPWD
Inbound and Outbound Packet Flow
Inbound FW CTL Chain Modules
Outbound Chain Modules
Columns in a Chain
Stateful Inspection
p. 23
p. 24
p. 24
p. 25
p. 25
p. 26
p. 27
p. 28
p. 29
p. 30
Kernel Tables p. 32
Connections Table
Connections Table Format
p. 33
p. 44
Check Point Firewall Key
Features
p. 35
Table 2-1: Advanced Firewall Topics
Advanced Firewall Topics Chapter 2: Advanced Firewall
Check Point Security Engineering Study Guide 19
Packet Inspection Flow
Policy Installation Flow
Policy Installation Process
Policy Installation Process Flow
p. 35
p. 36
p. 38
p. 39
NAT p. 41
How NAT Works
Hide NAT Process
Security Servers
How a Security Server Works
Basic Firewall Administration
Common Commands
p. 41
p. 42
p. 43
P. 43
p. 44
p. 45
FW Monitor p. 46
What is FW Monitor
C2S Connections and S2C Packets
fw monitor
p. 46
p. 47
p. 48
Topic Key Element
Page
Number
Lab 2: Core CLI Elements
of Firewall Administration
L-p. 43
Policy Management and Status
Verification from the CLI L-p. 44
Using cpinfo L-p. 47
Table 2-2: Advanced Firewall - Lab Topics
Topic Key Element
Page
Number
Table 2-1: Advanced Firewall Topics
Chapter 2: Advanced Firewall Advanced Firewall Topics
20 Check Point Security Engineering Study Guide
Run cpinfo on the Security
Management Server L-p. 52
Analyzing cpinfo in InfoView
(Optional) L-p. 53
using fw ctl pstat L-p. 58
Using tcpdump L-p. 62
Topic Key Element
Page
Number
Table 2-2: Advanced Firewall - Lab Topics
Sample CCSE Exam Question Chapter 2: Advanced Firewall
Check Point Security Engineering Study Guide 21
Sample CCSE Exam Question
User definitions are stored in __________________
a. $FWDIR/conf/fwmuser.conf
b. $FWDIR/conf/users/NDB
c. $FWDIR/conf/fwauth.NDB
d. $FWDIR/conf/conf/fwusers.conf
Chapter 2: Advanced Firewall Answer
22 Check Point Security Engineering Study Guide
Answer
User definitions are stored in __________________
a. $FWDIR/conf/fwmuser.conf
b. $FWDIR/conf/users/NDB
c. $FWDIR/conf/fwauth.NDB
d. $FWDIR/conf/conf/fwusers.conf
Chapter 2: Advanced Firewall Answer
24 Check Point Security Engineering Study Guide
Chapter
23
3
Clustering and Acceleration
Whether your preferred network redundancy protocol is Check Point ClusterXL
technology or standard VRRP protocol, it is no longer a platform choice you will
have to make with Gaia. Both ClusterXL and VRRP are fully supported by Gaia,
and Gaia is available to all Check Point Appliances, open servers and virtualized
environments. There are no more trade-off decisions between required network pro-
tocols and preferred security platforms/functions.
Objectives:
Build, test and troubleshoot a ClusterXL Load Sharing deployment on an
enterprise network.
Build, test and troubleshoot a ClusterXL High Availability deployment on an
enterprise network.
Build, test and troubleshoot a management HA deployment on an enterprise
network.
Configure, maintain and troubleshoot SecureXL and CoreXL acceleration
solutions on the corporate network traffic to ensure noted performance
enhancement on the firewall.
Build, test and troubleshoot a VRRP deployment on an enterprise network.
Chapter 3: Clustering and Acceleration Clustering and Acceleration Topics
24 Check Point Security Engineering Study Guide
Clustering and Acceleration Topics
The following table outlines the topics covered in the Clustering and
Acceleration chapter of the Check Point Security Engineering Course.
This table is intended as a supplement to knowledge you have gained
from the Security Engineering Courseware handbook, and is not meant
to be a sole means of study..
Topic Key Element
Page
Number
VRRP p. 53
VRRP vs ClusterXL
Monitored Circuit VRRP
Troubleshooting VRRP
p. 53
p. 57
p. 57
Clustering and Accelera-
tion
p. 60
Clustering Terms
ClusterXL
Cluster Synchronization
Synchronized-Cluster Restrictions
Securing the Sync Interface
To Synchronize or Not to Synchro-
nize
p. 61
p. 62
p. 63
p. 64
p. 64
p. 65
ClusterXL: Load Sharing p. 66
Multicast Load Sharing
Unicast Load Sharing
How Packets Travel Through a Uni-
cast LS Cluster
Sticky Connections
p. 66
p. 66\p.
p. 67
p. 68
Maintenance Tasks and
Tools
p. 70
Table 3-1: Clustering and Acceleration Topics
Clustering and Acceleration Topics Chapter 3: Clustering and Acceleration
Check Point Security Engineering Study Guide 25
Perform a Manual Failover of the
FW Cluster
Advanced Cluster Configuration
Examples
p. 70
p. 71
Management HA p. 72
The Management High Availability
Environment
Active vs. Standby
What Data is Backed Up?
Synchronization Modes
Synchronization Status
p. 72
p. 73
p. 73
p. 73
p. 74
SecureXL: Security Accel-
eration
p. 75
What SecureXL Does
Packet Acceleration
Session Rate Acceleration
Masking the Source Port
Application Layer Protocol - An
Example with HTTP
HTTP 1.1
Factors that Preclude Acceleration
Factors that Preclude Templating
(Session Acceleration)
Packet Flow
VPN Capabilities
p. 75
p. 75
p. 76
p. 76
p. 76
p. 78
p. 79
p. 78
p. 80
p. 81
CoreXL: Multicore Accel-
eration
p. 82
Topic Key Element
Page
Number
Table 3-1: Clustering and Acceleration Topics
Chapter 3: Clustering and Acceleration Clustering and Acceleration Topics
26 Check Point Security Engineering Study Guide
Supported Platforms and Features
Default Configuration
Processing Core Allocation
Allocating Processing Cores
Adding Processing Cores to the
Hardware
Allocating an Additional Core to
the SND
Allocating a Core for Heavy Log-
ging
Packet Flows with SecureXL
Enabled
p. 82
p. 83
p. 83
p. 84
p. 84
p. 85
p. 85
p. 86
Topic Key Element
Page
Number
Lab 3 Migrating to a Clus-
tering Solution
L-p. 63
Installing and Configuring the
Secondary Security Gateway L-p. 64
Re-configuring the Primary
Gateway L-p. 76
Configuring Management Server
Routing L-p. 79
Configuring the Cluster Object L-p. 82
Testing High Availability L-p. 107
Table 3-2: Clustering and Acceleration - Lab Topics
Topic Key Element
Page
Number
Table 3-1: Clustering and Acceleration Topics
Clustering and Acceleration Topics Chapter 3: Clustering and Acceleration
Check Point Security Engineering Study Guide 27
Installing the Secondary
Management Server L-p. 111
Configuring Management High
Availability
L-p. 119
Topic Key Element
Page
Number
Table 3-2: Clustering and Acceleration - Lab Topics
Chapter 3: Clustering and Acceleration Sample CCSE Exam Question
28 Check Point Security Engineering Study Guide
Sample CCSE Exam Question
A zero downtime upgrade of a cluster...?
a. Upgrades all cluster members except one at the same time
b. Is only supported in major releases (R70,to R71, R71 to R76)
c. Treats each individual cluster member as an individual gateway
d. Requires breaking the cluster and upgrading members
independently.
Chapter 3: Clustering and Acceleration Answer
29 Check Point Security Engineering Study Guide
Answer
A zero downtime upgrade of a cluster...?
a. Upgrades all cluster members except one at the same time
b. Is only supported in major releases (R70,to R71, R71 to R76)
c. Treats each individual cluster member as an individual gateway
d. Requires breaking the cluster and upgrading members
independently.
Chapter
29
4
Advanced User Management
Consistent user information is critical for proper security. Without a centralized
data store, managing user information across multiple applications can be a manual,
error-prone process.
Objectives:
Using an external user database such as LDAP, configure User Directory
to incorporate user information for authentication services on the
network.
Manage internal and external user access to resources for Remote Access
or across a VPN.
Troubleshoot user access issues found when implementing Identity
Awareness.
Chapter 4: Advanced User Management Advanced User Management Topics
30 Check Point Security Engineering Study Guide
Advanced User Management Topics
The following table outlines the topics covered in the Advanced User
Management chapter of the Check Point Security Engineering Course.
This table is intended as a supplement to knowledge you have gained
from the Security Engineering Courseware handbook, and is not meant
to be a sole means of study.
Topic Key Element
Page
Number
User Management p. 91
Active Directory OU Structure
Using LDAP Servers with Check
Point
LDAP User Management with User
Directory
Defining an Account Unit
Configuring Active Directory
Schemas
Multiple User Directory (LDAP)
Servers
Authentication Process Flow
Limitations of Authentication Flow
User Directory (LDAP) Profiles
p. 91
p. 93
p. 94
p. 95
p. 95
p. 95
p. 96
p. 96
p. 97
p. 97
Troubleshooting User
Authentication and User
Directory (LDAP)
p. 98
Common Configuration Pitfalls
Some LDAP Tools
Troubleshooting User Authentica-
tion
p. 99
p. 99
p. 100
Identity Awareness p. 101
Table 4-1: Advanced User Management Topics
Advanced User Management Topics Chapter 4: Advanced User Management
Check Point Security Engineering Study Guide 31
Enabling AD Query
AD Query Setup
Identifying users behind an HTTP
Proxy
Verifying theres a logged on AD
user at the source IP
Checking the source computer OS.
Using SmartView Tracker
p. 102
p. 103
p.104
p. 104
p. 105
p. 106
Topic Key Element
Page
Number
Lab 4: Configuring Smart-
Dashboard to Interface
with Active Directory
L-p. 133
Creating the Active Directory
Object in SmartDashboard
Verify SmartDashboard Communi-
cation with the AD Server
L-p. 134
L-p. 141
Table 4-2: Advanced User Management- Lab Topics
Topic Key Element
Page
Number
Table 4-1: Advanced User Management Topics
Chapter 4: Advanced User Management Sample CCSE Exam Question
32 Check Point Security Engineering Study Guide
Sample CCSE Exam Question
Choose the BEST sequence for configuring user managemetn in
SmartDashboard, using an LDAP server.
a. Configure a workstation object for the LDAP server, configure a
server object for the LDAP Account Unit, and enable LDAP in
Global Properties.
b. Configure a server object for the LDAP Account Unit, and create
an LDAP resource object
c. Enable LDAP in Global Properties, configure a host-node object
for the LDAP server, and configure a server object for the LDAP
Account Unit.
d. Configure a server object for the LDAP Account Unit, enable
LDAP in Global Properties, and create an LDAP resource object.
Answer Chapter 4: Advanced User Management
Check Point Security Engineering Study Guide 33
Answer
Choose the BEST sequence for configuring user managemetn in
SmartDashboard, using an LDAP server.
a. Configure a workstation object for the LDAP server, configure a
server object for the LDAP Account Unit, and enable LDAP in
Global Properties.
b. Configure a server object for the LDAP Account Unit, and create
an LDAP resource object
c. Enable LDAP in Global Properties, configure a host-node
object for the LDAP server, and configure a server object for the
LDAP Account Unit.
d. Configure a server object for the LDAP Account Unit, enable
LDAP in Global Properties, and create an LDAP resource object.
Chapter 4: Advanced User Management Answer
34 Check Point Security Engineering Study Guide
Chapter
29
5
Advanced IPsec VPN
and Remote Access
Check Point's VPN Software Blade is an integrated software solution that provides
secure connectivity to corporate networks, remote and mobile users, branch offices
and business partners. The blade integrates access control, authentication and en-
cryption to guarantee the security of network connections over the public Internet.
Objectives:
Using your knowledge of fundamental VPN tunnel concepts,
troubleshoot a site-to-site or certificate-based VPN on a corporate
gateway using IKEView, VPN log files and command-line debug tools.
Optimize VPN performance and availability by using Link Selection and
Multiple Entry Point solutions.
Manage and test corporate VPN tunnels to allow for greater monitoring
and scalability with multiple tunnels defined in a community including
other VPN providers.
Chapter 5: Advanced IPsec VPN and Remote Access Advanced IPsec VPN and Remote Access
30 Check Point Security Engineering Study Guide
Advanced IPsec VPN and Remote Access
The following table outlines the topics covered in the Advanced IPsec
VPN and Remote Access chapter of the Check Point Security
Engineering Course. This table is intended as a supplement to
knowledge you have gained from the Security Engineering Courseware
handbook, and is not meant to be a sole means of study
Topic Key Element
Page
Number
Advanced VPN Concepts
and Practices
p. 111
IPsec
Internet Key Exchange (IKE)
IKE Key Exchange Process - Phase
1
Phase 2 Stages
p. 111
p. 111
p. 112
p. 115
Remote Access VPNs p. 118
Connection Initiation
Link Selection
p. 118
p. 119
Multiple Entry Point VPNs p. 121
How Does MEP Work
Explicit MEP
Implicit MEP
p. 121
p. 121
p. 122
Tunnel Management p. 123
Table 5-1: Advanced IPsec VPN and Remote Access Topics
Advanced IPsec VPN and Remote Access Chapter 5: Advanced IPsec VPN and Remote Access
Check Point Security Engineering Study Guide 31
Permanent Tunnels
Tunnel Testing
VPN Tunnel Sharing
Tunnel-Management Configuration
Permanent-Tunnel Configuration
Tracking Options
Advanced Permanent-Tunnel
configuration
VPN Tunnel Sharing Configuration
p. 123
p. 124
p. 124
p. 125
p. 126
p. 126
p. 127
p. 127
Troubleshooting p. 128
VPN Debug p. 129
vpn debug Command
vpn debug on | off
vpn debug ikeon |ikeoff
vpn Log Files
vpn debug trunc
VPN Environment Variables
vpn Command
vpn tu
Comparing SAs
Examples
VPN Encryption Issues
Example 1
Example 2
p. 129
p. 130
p. 130
p. 130
p. 130
p. 131
p. 131
p. 132
p. 132
p. 133
p. 133
p. 134
p. 134
Topic Key Element
Page
Number
Table 5-1: Advanced IPsec VPN and Remote Access Topics
Chapter 5: Advanced IPsec VPN and Remote Access Advanced IPsec VPN and Remote Access
32 Check Point Security Engineering Study Guide
Topic Key Element
Page
Number
Lab 5: Configure Site-to-
Site VPNs with Third Party
Certificates
L-p. 143
Configure Access to the Active
Directory Server
Create the Certificate
Importing the Certificate Chain and
Generating Encryption Keys
Installing the Certificate
Environment Specific
Configuration
Testing the VPN Using 3rd Party
Certificates
L-p. 144
L-p. 149
L-p. 151
L-p. 164
L-p. 167
L-p. 178
Lab 6: Remote Access with
Endpoint Security VPN
L-p. 179
Defining LDAP Users and Groups
Configuring LDAP User Access
Defining Encryption Rules
Defining Remote Access Rules
Configuring the Client Side
L-p. 180
L-p. 190
L-p. 201
L-p. 203
L-p. 210
Table 5-2: Advanced IPsec VPN and Remote Access Topics - Lab Topics
Sample CCSE Exam Question Chapter 5: Advanced IPsec VPN and Remote Access
Check Point Security Engineering Study Guide 33
Sample CCSE Exam Question
Remote clients are using IPSec VPN to authenticate via LDAP server to
connect to the organization. Which gateway process is responsible for
the authentication?:
a. vpnd
b. cvpnd
c. fwm
d. fwd
Chapter 5: Advanced IPsec VPN and Remote Access Answer
34 Check Point Security Engineering Study Guide
Answer
Remote clients are using IPSec VPN to authenticate via LDAP server to
connect to the organization. Which gateway process is responsible for
the authentication?:
a. vpnd
b. cvpnd
c. fwm
d. fwd
Chapter
35
6
Auditing and Reporting
The SmartEvent Software Blade turns security information into action with real-
time security event correlation and management for Check Point security gateways
and third-party devices. SmartEvents unified event analysis identifies critical se-
curity events from the clutter, while correlating events across all security systems.
Its automated aggregation and correlation of data not only minimizes the time spent
analyzing log data, but also isolates and prioritizes the real security threats.
The SmartReporter Software Blade centralizes reporting on network, security, and
user activity and consolidates the data into concise predefined and custom-built re-
ports. Easy report generation and automatic distribution save time and money.
Objectives:
Create Events or use existing event definitions to generate reports on
specific network traffic using SmartReporter and SmartEvent in order to
provide industry compliance information to management.
Using your knowledge of SmartEvent architecture and module
communication, troubleshoot report generation given command-line
tools and debug-file information.
Chapter 6: Auditing and Reporting Auditing and Reporting Topics
36 Check Point Security Engineering Study Guide
Auditing and Reporting Topics
The following table outlines the topics covered in the Auditing and
Reporting chapter of the Check Point Security Engineering Course.
This table is intended as a supplement to knowledge you have gained
from the Security Engineering Courseware handbook, and is not meant
to be a sole means of study.
Topic Key Element
Page
Number
Auditing and Reporting
Process
p. 139
Auditing and Reporting Standards p. 139
SmartEvent p. 141
SmartEvent Intro p. 142
SmartEvent Architecture p. 143
Component Communication Pro-
cess
Event Policy User Interface
p. 144
p. 145
SmartReporter p. 154
Report Types p. 156
Table 6-6: Using SmartUpdate Topics
Topic Key Element
Page
Number
Lab 7: SmartEvent and
SmartReporter
L-p. 219
Configure the Network Object in
SmartDashboard L-p. 220
Table 6-7: Using SmartUpdate - Lab Topics
Auditing and Reporting Topics Chapter 6: Auditing and Reporting
Check Point Security Engineering Study Guide 37
Configuring Security Gateways to
work with SmartEvent
L-p. 224
Monitoring Events with SmartEvent L-p. 232
Generate Reports Based on
Activities L-p. 237
Topic Key Element
Page
Number
Table 6-7: Using SmartUpdate - Lab Topics
Chapter 6: Auditing and Reporting Sample CCSE Exam Question
38 Check Point Security Engineering Study Guide
Sample CCSE Exam Question
How many Events can be shown at one time in the Event preview pane?
a. 5,000
b. 30,000
c. 15,000
d. 1,000
Chapter 6: Auditing and Reporting Answer
39 Check Point Security Engineering Study Guide
Answer
How many Events can be shown at one time in the Event preview pane?
a. 5,000
b. 30,000
c. 15,000
d. 1,000

You might also like