Professional Documents
Culture Documents
Answer : Anti-Spoofing is the feature of Checkpoint Firewall. which is protect from attacker who generate IP
Packet with Fake or Spoof source address. Its determine that whether traffic is legitimate or not. If traffic is not
legitimate then firewall block that traffic on interface of firewall.
Answer : In Asymmetric Encryption there is two different key used for encrypt and decrypt to packet. Means
that one key used for Encrypt packet, and second key used to for decrypt packet. Same key can not encrypt and
decrypt.
Answer : Stealth Rule Protect Checkpoint firewall from direct access any traffic. Its rule should be place on
the top of Security rule base. In this rule administrator denied all traffic to access checkpoint firewall.
Answer : Cleanup rule place at last of the security rule base, Its used to drop all traffic which not match with
above rule and Logged. Cleanup rule mainly created for log purpose. In this rule administrator denied all the
traffic and enable log.
5. What Is Nat?
Answer : NAT stand for Network Address Translation. Its used to map private IP address with Public IP
Address and Public IP address map with Private IP Address. Mainly its used for Provide Security to the Internal
Network and Servers from Internet. NAT is also used to connect Internet with Private IP Address. Because
Private IP not route able on Internet.
Answer : Source NAT used to initiate traffic from internal network to external network. In source NAT only
source IP will translated in public IP address.
Answer : VPN (Virtual Private Network) is used to create secure connection between two private network
over Internet. Its used Encryption authentication to secure data during transmission. There are two type of VPN
Answer : IP Sec (IP Security) is a set of protocol. which is responsible for make secure communication
between two host machine, or network over public network such as Internet. IPSec Protocol provide
Confidentiality , Integrity, Authenticity and Anti Replay protection. There is two IPSec protocol which provide
security
Answer :
ESP: ESP Protocol is a part of IPsec suit , Its provide Confidentiality, Integrity and Authenticity. Its used in two
mode Transport mode and Tunnel mode.
AH: Its is also part of a IPsec suit, Its provide only Authentication and Integrity, Its does not provide
Encryption. Its also used to two mode Transport mode and Tunnel mode.
Answer : It's a rule in ruse base which is manually created by network security administrator that called
Explicit rule.
Answer : Hide NAT used to translate multiple private IP or Network with single public IP address. Means
many to one translation. Its can only be used in source NAT translation. Hide NAT can not be used in
Destination NAT.
Answer : When request to translate Destination IP address for connect with Internal Private network from
Public IP address. Only static NAT can be used in Destination NAT.
Answer :
Automatic NAT:
Answer :
Standalone deployment : In standalone deployment, Security Gateway and Security management server
installed on same Machine.
Distributed deployment: In Distributed deployment, Security Gateway and Security Management Server
installed on different machine.
Answer : SIC stand for “Secure Internal Communication”. Its a checkpoint firewall feature that is used to
make secure communication between Checkpoint firewall component. Its used when Security Gateway and
Security management server installed in Distributed deployment. Its Authentication and Encryption for secure
communication.
Answer :
Smart Console.
Security Management.
Security Gateway.
Answer :
SAM Database.
Address Spoofing.
Session Lookup.
Policy Lookup.
Destination NAT.
Route Lookup.
Source NAT.
Layer 7 Inspection.
VPN.
Routing.
18. What Advantage Of Nat?
Answer :
Answer : Its tool of smart console. Its used to Configure Rule, Policy object, Create NAT Policy, Configure
VPN and Cluster.
20. Which Of The Applications In Check Point Technology Can Be Used To Configure Security Objects?
Answer : SmartDashboard
21. Which Of The Applications In Check Point Technology Can Be Used To View Who And What The
Administrator Do To The Security Policy?
Answer : Central and Local licenses: Central licenses are the new licensing model for NG and are bound to
the SmartCenter server. Local licenses are the legacy licensing model and are bound to the enforcement module.
Answer : Using cpstop and then cpstart will restart all Check Point components, including the SVN
foundation. Using fwstop and then fwstart will only restart VPN-1/FireWall-1.
24. What Are The Functions Of Cpd, Fwm, And Fwd Processes?
Answer :
CPD :CPD is a high in the hierarchichal chain and helps to execute many services, such as Secure Internal
Communcation (SIC), Licensing and status report.
FWM: The FWM process is responsible for the execution of the database activities of the SmartCenter server.
It is; therefore, responsible for Policy installation, Management High Availability (HA) Synchronization, saving
the Policy, Database Read/Write action, Log Display, etc.
FWD:The FWD process is responsible for logging. It is executed in relation to logging, Security Servers and
communication with OPSEC applications.
25. What Are The Types Of Nat And How To Configure It In Check Point Firewall?
Answer : SSL is meant to verify the sender’s identity but it doesn’t search in a hard way for more hazards. SSL
will be able to track down the real person you are talking to but that too can be tricked at times. TLS is another
identity verification tool which works the same as SSL but better than it. This provides some additional
protection to the data so that no breaches are formed.
Answer : SSL (Secure Sockets Layer) is a protocol which enables safe conversations between two or more
parties over the internet. HTTPS (Hypertext Transfer Protocol Secure) is HTTP combined with SSL which
provides you with a safer browsing experience with encryption. So, this is a very tricky question but SSL wins
in terms of security.
Answer : HTTP sends data in clear text whereas HTTPS sends data encrypted.
Answer : A Firewall is software that blocks unauthorized users from connecting to your computer. All
computers at Bank Street are protected by a firewall which is monitored and updated by CIS.
In case of SNAT
Antispoofing
Session lookup
Policy lookup
Routing
Netting
In case of DNAT
Antispoofing
Session lookup
Policy lookup
Netting
Routing