CHECK POINT SOFTWARE TECHNOLOGIES Education Services S e c u r i t y A d m i n i s t r a t i o n L a b S e t u p G u i d e
E D U C A T I O N S E R V I C E S Security Administration - Lab Setup Guide Check Point Software Technologies [email protected]6330 Commerce Dr., Suite 120, Irving, TX 75063 March 3, 2017
S E C U R I T Y A D M I N I S T R A T I O N - L A B S E T U P P R O C E D U R E S Configuring the Lab Environment The Check Point Security Administration class topology was designed as a “sandbox” environment. All student machines have the same set of IP addresses. The virtual machines connect to the Internet using a NAT connection through the host machine. Internet connectivity is required for each host machine used by students attending the course. Follow the steps below to configure the virtual machines needed for the students to perform all Security Administration labs. ATCs may use whatever virtualization software they choose, but Check Point assumes most Virtual Machines will be created in either a VMware Workstation or an ESX environment. Our tests were all performed on VMware Workstation 12. A Special Note about LicensingThe built-in 15 day evaluation licenses are no longer used in this classroom configuration.All Check Point servers at the Alpha site are required to have a license before the students begin this class. The Bravo license will be added during a specific lab by the students and should not be preloaded. To get 6-month BCK licenses provided to you for use in this and other Check Point classes, contact your ATC coordinator. Configuring Virtual Machine Settings All virtual machines should be configured with the following options: Snapshots –Power off VMware Tools –Installed Floppy –Remove from the Hardware Settings Time Synchronization –Synchronization between Guest and Host should be active. LDAP Information Configure the virtual machines on the Alpha Internal network to be in the alpha.cp domain. All users should log into the domain and not the local virtual machine.
S E C U R I T Y A D M I N I S T R A T I O N - L A B S E T U P P R O C E D U R E S Lab Topology Configure each student machine with the following virtual environment:
S E C U R I T Y A D M I N I S T R A T I O N - L A B S E T U P P R O C E D U R E S
You've reached the end of your free preview.
Want to read all 15 pages?
Spring '20
IP address, Subnetwork, Network address translation, Dynamic Host Configuration Protocol