Friday, September 2, 2016

CHECK POINT INTERVIEW QUESTIONS

CHECK POINT INTERVIEW QUESTIONS:

 What is anti-spoofing?
Anti-spoofing is one of the features of Check point.  It is protect from attacker, who Generate the traffic from false Ip  packets or spoof source IPAddress. Its determine that whether traffic packets is proper or not.  If the traffic is not proper then the firewall block the traffic.

What is Asymmetric encryption?
Two keys are used in the Asymmetric. One key is used of encrypt the packets and another key user for decrypt. 
Note:
Symmetric Encryption:
One key is used for both Encrypt and decrypt.

What is Stealth Rule in the check point firewall?
Stealth rule protect the check point firewall from the direct access any traffic. Its rule should be place on the top of security rule base.
In this rule administrator denied all the traffic to access checkpoint firewall.

What is cleanup rule in check point firewall?
Clean up rules place at the last of the security rule base, its used to drop all the traffic which not  match with above rule and logged.
Clean up rule mainly created for log purpose.
In this rule administrator denied all the traffic and enable log.


What is different between ESP (50) and AH (51) protocol?
ESP (50) –Encapsulation Security payload – user in both mode tunnel mode and transport mode (encryption authentication and integrity)
AH (51)-it does not provided encryption. It also used two mode transport mode and tunnel mode.

Explicit rule in check point firewall?
Created by administrator, user based rules is called explicit rule.

Different between automatic NAT and Manual NAT?
Automatic NAT:
Automatically created by firewall
Can not modify.
Can not create  ‘No NAT ‘ rule
Can not create dual NAT
Port forwarding is not possible
Proxy arp by default enabled.

Manual  NAT:
 created by administrator
Can be modifying.
Can be create  ‘No NAT ‘ rule
Can be create dual NAT
Port forwarding is   possibl
Proxy arp by default not enabled.




What is different between standalone deployment and distributed deployment?
Standalone deployment- In standalone deployment, security Gateway and Security Management server installed in the same machine.
Distributed deployment - In distributed deployment, security Gateway and Security Management server installed in the different machine.

What is 3 tire architecture component of check point firewall?
Security management
Security gateway
Smart console

What is smart dashboard?
Its tool of smart console, it’s used to configure rule, policy object, create NAT policy, and configure VPN and cluster.

What is packet flow of checkpoint firewall?
SAM databse
Address spoofing
Session lookup
Policy lookup
Destination NAT
Route lookup
Source NAT
Layer 7 Inspection
VPN
Routing


What is SIC?
SIC- stand for “Secure Internal Communication”. It’s a check point firewall feature that is used to make secure communication between checkpoint firewall components.

It’s used when security gateway and secure management server installed in distributed deployment. Its authentication and encryption for secure communication.



How do you verify the manger finger print when using smart dashboard for the first time?
While installed smart console that time its will ask username and password and local address (Management server IP) after that we have to configure finger print. 
Note: command prompt you can configure.
#Cp config
#Option 7 is finger print.
#Exit
Ø   This symbol For super shell


What is needed to be configured on the gateway via https, before the manager takes over?
Interfaces IP address, default route (gateway need to be configure) & banners (optional)

How frequently is the SIC pass phase used between a manger and getway?


Where do you download the smart console utility, such as smart dashboard?
Smart console utilities are down load from management server.  Utility are smart log, smart console, smart monitor, smart track etc.…
Smart dashboard first time:
Username (management server admin)
Password
Local address (management server address)
Finger print

Smart console: (under network object)
Check point + right click and gateway creation (outside interface ip)
Based on the license we can enable the features. (Features are called blades) Need individual license for each feature.
Hardware: open server
Management gateway blades SG103
Management blades: sm 1003
SIC initiation   in the smart console only.
SIC password and initiations


What are the 3 interconnected components in a checkpoint system?
Console, smart management server (policy, log stored in the server- database store location. from management server you can push the policy multiple gateway fw), and gateway fw


What are the 3 check point os names and what device would run them?
IPSO, secure plat form (splat) based on Linux OS and latest Gaia (2012).


What does the inspect engine do?
Stateful inspection, INSPECT engine.  (Stateful table maintains the state of the request, based on the table will allow the traffic).


What are the methods of traffic filtering?
Packet filtering (working at transport and network layer based on the source ip, destination ip and ports or tags)
Stateful filtering (working at transport and network layer, fw maintain the stateful table, based on the traffic will permit or denied. It’s called stateful inspection or inspect engine.
Application-awareness.

What should be planned before starting the installation?
Which method you’re going to install – stand alone or distributed.
IP address of both the servers (management and gateway fw)

What protocol is used to connect to a newly installed management and gateway fw?

https://

thanks to Technet2u

what are the Gaia software versions?

Gaia software versions - R70 R71 R75 R75.4X R75.40VS R76 R77 & R80

Latest: R80

No comments:

Post a Comment