Check Point 1800 Next Generation firewall
We’re going to look at the new Check Point 1800 next-generation firewall. The Check Point 1600 and the 1800, are fairly new appliances, and the largest in the Quantum Spark family of firewalls.
Check Point’s focus is on prevention rather than detection. In other words, blocking known and unknown cyber-attacks to ensure business continuity.
The list of security features is long, and impressive. To name a few, there are site-to-site VPN, remote access VPN, IoT device recognition, intrusion prevention, antispam, and intrusion prevention.
There’s also application control, advanced URL filtering, IPS, antivirus, anti-bot. In addition, there’s email security, policy management, monitoring and event management.
Check Points are not intended to be as plug-and-play as some other vendors. However, if you decide to simply use the default setting, you can be up and running in just a minute or two. Setup can be done in minutes using pre-defined security policies and a step-by-step configuration wizard. The Quantum Spark series, like the 1800, are easy to manage locally via a Web interface. They can also be managed centrally with a cloud-based Check Point Security Management Portal or R80 Security Management.
However, Check Points are devices you build around and customize into your environment. And that customization is the beauty of the Check Point 1800. You can use the defaults if you like. But, if you do need to tune the system to do something just for your environment, you can do so with the Checkpoint. This granularity also gives you better visibility into your environment than many other vendors.
The 1800 by the numbers
By comparison, the 1800 pushes 2 Gbps of Threat Protection Throughput, 5 Gbps of Next-Gen Firewall Throughput, and 5.5 Gbps of IPS Throughput. Firewall Throughput is 7.5 Gbps. It also has 2 2.5 GbE copper ports (LAN), 1 10GbE copper port (DMZ), and an additional 1GbE copper WAN port that the 1600 does not. It also has a 1GbE management port.
The great thing about Check Point is that because of its central architecture, you can very quickly pinpoint where the attacks are coming from. It gives you comprehensive reporting when the attacks start and when they’ve stopped. So you can see the complete, end-to-end picture: where the point of attack is, at what time, and what host. It can track all of that. One of the main advantages of having Check Point firewall is definitely that it gives you absolute in-depth visibility.