Check Point NG/AI: Next Generation with Application Intelligence Security Administration

Summary

The beginning of this chapter started out by preparing you to install the Check Point VPN-1/FireWall-1 NG with Application Intelligence product on a computer. There are several steps you can take to prepare your host computer prior to turning it into a firewall. First, make sure that your hardware meets and exceeds the minimum system requirements provided by Check Point. You will then need to install a base operating system, apply OS patches, configure and test your network interface cards and DNS, enable IP forwarding, disable any unnecessary services, and populate your hosts file with at least the external IP address of your firewall, which is configured on the first interface card in your computer.

Next, you will need to prepare for the various Check Point installation screens, you should know in advance which server/gateway components to choose and to be prepared for the initial configuration options by obtaining a license in advance, deciding on administrators usernames, passwords, and privileges, and statically assigning IP addresses to your administrator s workstations so that you can add them as GUI clients.

If you are installing the VPN-1/FireWall-1 NG software on a Windows server, then you can start the installation wizard by inserting the CD or running windows\wrapper\demo32.exe. The SVN Foundation will be installed before any other Check Point components. After the installation wizard is done copying files, it will run through the initial configuration screens of Licenses, Administrators, GUI Clients, and then the CA initialization screens. Once the configuration is complete, you...