Checkpoint Interview
Checkpoint Interview
Checkpoint Interview
Answer:
5)What is SIC ?
Answer: Stealth Rule is on the top of the policy and explicitly blocks access to firewall. Clean up rule is
placed at the bottom of the policy and explicitly drops and logs all the traffic that has not matched the
other rules
Answer: Clean up rule is placed at the bottom of the policy and explicitly drops and logs all the traffic
that has not matched the other rules
13)How you can take manual backup and which folders are necessary ?
14)How you can configure Log server and where in CP we configure it?
15)How you use smart view tracker tell about three pannes of it.
16)Have you ever configure smart defence if yes tell us the few feature of it.
19)How you can integrate gateway boxes with CP like Nokia and Nortel or UTM boxes?
22)What is VRRP? (Accept packets from Nokia VRRP cluster member within from Global Properties)
23)What is FW monitor ?
24)Try to give 5 important CLI commands which are helpful for CP admin ?
25)Have you done CCSA if yes then what is the career path for it and how many question were there .
27)If log folder is crossed the threshold value which you had defined in CP server then what will happen?
29)Have you ever configure VPN if yes then tell us about Site to Site with IPSEC in CP?
30)Have you ever upgrade the R60 to R62 or R65 if yes then tell us the process?
31)What is FW unloadlocal
32)If log tracker is showing green means accepted even though defined rule is not working then what
40)If you restarted the remote gateway then what will happen in CP network ?
Interview Question
I would like to cover some important and frequently asked Q&A in this Page. You all are also invited to
share your replies and suggestions. I hope this page will be useful for all the Network and Network
Security Domain Students, Job-Seekers, Professionals, Trainers, etc.
CHECKPOINT
Ans.
Check Point has developed a Unified Security Architecture that is implemented throughout all of its
security products. This Unified Security Architecture enables all Check Point products to be managed and
monitored from a single administrative console, and provides a consistent level of security.
The Check Point Unified Security Architecture is comprised of four main components:
Core Technologies: - Check Point uses a common set of core technologies, such as INSPECT for security
inspection, across multiple layers of security.
Central Management: - All Check Point products can be managed and monitored from a single
administrative console.
Open Architecture: - Check Point has built its security architecture to be open and interoperable in a
heterogeneous environment. For example, Check Point products can interoperate with other network
and security equipment from third-party vendors to enable cooperative enforcement of Security Policies.
Universal-update Ability: - Check Point has consolidated multiple security-alert and update functions to
ease update procedures and help Administrators ensure that security is always up-to-date.
Q.2 How Checkpoint Component communicate and Syns with each other?
Ans.
Secure Internal Communications (SIC) is the Check Point feature that ensures components, such as
Security Gateways, SmartCenter Server, SmartConsole, etc. can communicate with each other freely and
securely using a simple communication-initialization process.
Q.3 What are the major differences between SPLAT and GAIA?
Ans.
Gaia is the latest version of Checkpoint which is a combination of SPLAT and IPSO. Here are some
benefits of Gaia as compare to SPLAT/IPSO.
For more information you can checkpoint official page on this topic:
http://www.checkpoint.com/products/check-point-gaia/
Q.4 What are the different different Checkpoint Ports and purpose of these ports?
Ans.
PORT TYPE SERVICE DESCRIPTION
265 TCP FW1_key Check Point VPN-1 Public key transfer protocol
1247
10001 TCP Default CPRSM listener port for coms with RealSecure Console
18183 TCP FW1_sam Check Point OPSEC Suspicious Activity monitoring Proto (SAM API)
18186 TCP FW1_omi-sic Check Point OPSEC Objects management Interface with Secure Internal
Communication
18264 TCP FW1_ica_services Check Point Internal CA Fetch CRL and User Registration Services
19190 TCP FW1_netso Check Point OPSEC User Authority Simple Protocol
65524 FW1_sds_logon_NG Secure Client Distribution Server Protocol (VC and Higher)
Q.5 How SIC work? What are the different ports of SIC?
Ans.
Secure Internal Communication (SIC) lets Check Point platforms and products authenticate with each
other. The SIC procedure creates a trusted status between gateways, management servers and other
Check Point components. SIC is required to install polices on gateways and to send logs between
gateways and management servers.
Communication Initialization establishes a trust between the Security Management server and the Check
Point gateways. This trust lets Check Point components communicate securely. Trust can only be
established when the gateways and the server have SIC certificates.
Note - For SIC to succeed, the clocks of the gateways and servers must be synchronized.
The Internal Certificate Authority (ICA) is created when the Security Management server is installed. The
ICA issues and delivers a certificate to the Security Management server.
To initialize SIC:
2. In SmartDashboard, open the gateway network object. In the General Properties page of the gateway,
click Communication to initialize the SIC procedure.
3. In the Communication window of the object, enter the Activation Key that you created in step 2.
4. Click Initialize.
The ICA signs and issues a certificate to the gateway. Trust state is Initialized but not trusted. The
certificate is issued for the gateway, but not yet delivered.
SSL negotiation takes place. The two communicating peers are authenticated with their Activation Key.
18211 tcp Used by the cpd daemon (on the gateway) to receive Certificates.
Ans.
In case of SNAT
Antispoofing
Session lookup
Policy lookup
Routing
Netting
In case of DNAT
Antispoofing
Session lookup
Policy lookup
Netting
Routing
Ans.
Using cpstop and then cpstart will restart all Check Point components, including the SVN foundation.
Using fwstop and then fwstart will only restart VPN-1/FireWall-1.
Q.8 What are the functions of CPD, FWM, and FWD processes?
Ans.
CPD CPD is a high in the hierarchical chain and helps to execute many services, such as Secure Internal
Communication (SIC), Licensing and status report.
FWM The FWM process is responsible for the execution of the database activities of the SmartCenter
server. It is; therefore, responsible for Policy installation, Management High Availability (HA)
Synchronization, saving the Policy, Database Read/Write action, Log Display, etc.
FWD The FWD process is responsible for logging. It is executed in relation to logging, Security Servers
and communication with OPSEC applications.
Q.12 What are the services which impacted during cpstop and spstart?
Q.19 How to configure perform DNAT before routing via Global Properties?
CHECKPOINT CLUSTER
CHECKPOINT VPN
Q.3 What are the protocols of IPSec? And what are the Protocol numbers of IPSec Protocols.?
Ans. IPSec use two Protocols AH (Authentication Header) and ESP (Encapsulated Security Payload). AH
works on Protocol number 51 and ESP works on Protocol number 50.
Q.7 What the Phases of IPSec VPN? And many messages being exchanged in MAIN and QUICK Mode?
What are these messages?
Ans. IP Layer (Network Layer and provide security services Network Layer and above).
JUNIPER SCREENOS
Q.2 Different between AD Value and Metric? And what is the AD value of EIGRP, OSPF, RIP and BGP?
Ans.
AD: - The administrative distance is helpful to select best between two or more routing Protocols. For
example best route selection between OSPF and RIP.
Metric: - Metrics are only helpful to select route inside a routing protocol. For example best route inside
the RIP.
Connected Interface = 0
Static Route = 1
External BGP = 20
Internal EIGRP = 90
IGRP = 100
OSPF = 110
IS-IS = 115
RIP = 120
EGP = 140
Unknown = 255
SWITCHING
Q.4 What is Transparent Mode in VTP and how it works? If we create new VLAN on Transparent Switch
that will be advertise or not?
PROTOCOLS
Q.1 What are different ports of FTP? What is the use of FTP different ports?
Ans. A Client makes a TCP connection to the server port 21. This connection remains open for the
duration of the session and thus it is called a control session. Then another connection is opened on Port
20 and it is called the data connection. The control connection is used for authenticating, command and
administrating exchanged between the client and the server.
Q.2 What are the modes of FTP?
Passive FTP: - In passive mode, the client establishes both channels (Data and control). In that case, the
server tells the client which port should be used for the data channel.
Active FTP: - In active mode, the client establishes the control channel but the server establishes the
data channel.
Ans. UDP/53 is used when a host or a router wants to resolve a domain name to an IP address (or vice
versa).
TCP/53 is used between two DNS servers when they want to sync or share their databases. Or If
the size of the response message is more than 512 bytes, a TCP connection is used.
MCAFEE
Q.2 How to install and configure RSA Agent in Firewall or Windows Server?
MISC QUESTION