Day1 02 E80 Architecture
Day1 02 E80 Architecture
Day1 02 E80 Architecture
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 2
Agenda
2 Communication Architecture
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 3
E80 Architecture Overview
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 4
Architecture Overview – E80.40
Endpoint Security
Management
Directory
server
Endpoint
Clients
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 5
Architecture Overview – E80.40
Endpoint Security
Management
Directory
Sync over SIC
server
Endpoint Endpoint
Clients Blades
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 8
Architecture Overview – E80.40
Endpoint Security Secondary
Management Management
Directory
Sync over SIC
server
Secondary
Endpoint Endpoint Management
Clients Blades
Provides management
availability in case Primary
Endpoint Management is
unavailable
Directory
Sync over SIC
server
Endpoint Endpoint
Clients Blades
Endpoint Policy
Servers
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 10
Architecture Overview – E80.40
Endpoint Security Secondary
Management Management
Directory
Sync over SIC
server
Endpoint Endpoint
Clients Blades
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 11
Architecture Overview – E80.40
Endpoint Security Secondary
Management Management
Directory
Sync over SIC
server
Endpoint Endpoint
Clients Blades
Endpoint Policy
Servers
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 12
Endpoint Management Components
R75.40 Management
R75.40 Management
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 14
Endpoint Management Componentss
Software Blades
R75.40 Management
E80.40
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 15
Endpoint Management Componentss
Software Blades
R75.40
R75.40 Management
SmartConsole
E80.40
SmartConsole
R75.40 SmartConsole
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 16
Endpoint Management Componentss
Software Blades
E80.40
SmartEndpoint
R75.40
R75.40 Management
SmartConsole
E80.40
SmartEndpoint
E80.40 SmartEndpoint
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 17
Endpoint Management Componentss
Software Blades
E80.40
SmartEndpoint
R75.40
R75.40 Management
SmartConsole
E80.40
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 18
Server System Requirements
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 19
Important reminders
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 21
Server to Server Communication
Endpoint Policy
Servers SIC (TCP/18193)
Endpoint Security
Management
Secondary
Management
SIC (TCP/18221)
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 22
Management to Server Communication
SmartEndpoint
Endpoint Security
SIC (TCP/18190) Management
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 23
Client to Server Communication
Endpoint Policy
Servers
TCP/80 and TCP/443
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 24
Client-Server Communication
Sync
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 25
Connected / Disconnected Policies
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 26
Scalability & Sizing
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 27
E80.40 Scalability and Sizing Guide
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 29
AD Size Considerations
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 30
Hardware Server Sizing
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 31
How to use the Hardware Table sizing
Policy Servers
– Up to 25 Policy Servers are supported
– Smart-1 5 as a policy server can handle up to 5000 clients
– Smart-1 25 as a policy server can handle up to 27000 clients
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 32
High-Scale (20K+ seats) Configuration
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 33
Sizing Example 1
Endpoint Security
Management
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 34
Sizing Example 2
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 35
Sizing Example 3
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 36
Windows Server Sizing
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 37
Disk Space
Calculation Assumptions:
– Calculations based on AD size of 5x the number of clients
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 38
Deployments
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 39
Q&A ?
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and