Check Point Integrated Appliance Solutions (IAS) offer flexibility and choice in security appliance selection. Powered by Fujitsu, the IAS R-Series of appliances provide integrated software and hardware bundles and direct support that are customized to organizations’ exact specifications, enabling the provisioning of security services based on exact corporate needs.

Benefits

Integrated, customizable, high-performance solution meets exact needs
  • Delivers scalable performance and port density based on customer needs
  • Protects against emerging threats with Check Point Update Services
  • Choose from Software Blades, Virtual Systems and Multi-Domain Security Management
Reduced hardware and operational costs with software/hardware solution
  • Trusted by the largest organizations in the world, including the Global 100
  • Single point of contact for hardware, software and technical support
  • Reduces complexity by ensuring compatibility of the latest certified components and servers
Extensible, on-demand security via Software Blade Architecture
  • Extensible to include firewall, IPSec, VPN, IPS, advanced networking and more
  • Protect against emerging threats with optional Software Blades

Features

With Check Point IAS R-Series appliances, organizations can choose from Security Gateways with predefined Software Blades, Virtual Systems, as well as Multi-Domain Security Management® for large deployments with separate security domains.

Organizations start by defining what type of security they need from Check Point solutions as well as a desired level of performance. Organizations can choose from Security Gateways with predefined Software Blades, Virtual Systems, as well as Multi-Domain Security Management® for large deployments with separate security domains.

Check Point then integrates the software onto a server or Software Blade-based chassis to provide a comprehensive solution that includes direct technical support from Check Point.

With Integrated Appliance Solutions (IAS) R-Series appliances, you can take advantage of the benefits of customization and standardization. You work with Check Point to tailor Check Point applications on a powerful HP hardware server and then finalize them into a standard corporate security platform.

Then, create a single support and procurement methodology that significantly simplifies management overhead. This allows your customer engineering teams the ability to save certification time and work on new projects, procurement to build economies of scale that reduce costs, and management to develop standard operating procedures that improve service quality and compliance.

Because IAS R-Series appliances are built around the latest hardware innovations such as multi-core processors, you can deploy to a higher level of security. Organizations can activate strict intrusion prevention policies with multi-gigabit performance levels. And, as Check Point updates its software, expect to see performance improve without requiring hardware upgrades.

Check Point provides total support for the Integrated Appliance Solutions, including three levels of global advance replacement determined by support level and location. Update Services, an optional subscription, provides the latest updates for integrated intrusion prevention capabilities, delivering threat mitigation that is always up-to-date.

Ensure availability of business-critical applications with up to 30 Gbps of firewall throughput and 8.6 Gbps for both firewall and IPS.

With IAS, you can ensure availability of business-critical applications with up to 30 Gbps of firewall and 8.6 Gbps for both firewall and Intrusion Prevention System (IPS). With Check Point Virtual Systems, hundreds of high performance virtualized firewalls can be consolidated on a single chassis. IAS reduces complexity by consolidating network functions and security applications in a single platform, while preserving application choice.

Virtual Systems enables the creation of hundreds of security systems on a single hardware platform, delivering deep cost savings and infrastructure consolidation. Based on proven security, Virtual Systems provides best-in-class firewall, VPN, URL filtering and intrusion prevention technology to multiple networks, securely connecting them to each other and shared resources, such as the Internet and DMZs. All security systems, virtual and real, are centrally managed through Check Point Security Management or MultiDomain Security Management consoles.

The Check Point Software Blade architecture is the first and only security architecture that delivers complete, flexible and manageable security to companies of any size. With unprecedented flexibility and expandability, Software Blades deliver lower cost of ownership and cost-efficient protection that meet any need, today and in the future.

Specifications

Appliance

IAS R1

IAS R2

IAS R6

IAS R8

1: Check Point's SecurityPower is a new benchmark metric that allows customers to select security appliances by their capacity to handle real-world network traffic, multiple security functions and a typical security policy
2: Raw throughput is based on RFC 3511 with 1518 bytes UDP packets
3: Recommended IPS profile, IMIX traffic blend
4: Assumes maximum production throughput environment with real-world traffic blend, a typical rule-base size, NAT and logging enabled and the most secure threat prevention protection
Performance
SecurityPower1

230

795

1185

2050

Firewall Throughput (Gbps)
 Raw2

5

11

25

30

 Production4

2.2

5.8

9.1

14

VPN AES-128 (Gbps)

1.2

2

3.5

7

IPS Throughput (Gbps)
 Recommended3

0.7

1.5

3.5

6

 Production4

0.36

1.1

2.11

3.58

Concurrent Connections (M)

1.2

3

5

5

 Connections per Second

40,000

90,000

110,000

130,000

Virtual Systems
Virtual System Support

Yes

Yes

Yes

Yes

Hardware Specifications
10/100/1000Base-T Ports / Max

6/10

6/14

10/14

14/26

1000Base-F SFP Ports / Max

0/4

0/6

0/6

0/12

10GBase-F SFP+  Ports / Max

0/0-

0/6

0/6

0/12

Memory / Max (GB)

8/8

8/16

16/32

32/64

Storage

2 x 250 GB (4 Max)

2 x 146 GB (6 Max)

2 x 146 GB (6 Max)

2 x 146 GB (12 Max)

I/O Expansion Slots

2

3

3

6

Dimensions
Enclosure

1U

1U

1U

2U

Dimensions (standard)

16.78" W x 27.25" D x 1.7" H

16.78" W x 27.25" D x 1.7" H

16.78" W x 27.25" D x 1.7" H

17.5" W x 27.25" D x 3.38" H

Dimensions (metric)

426 mm W x 692 mm D x 43 mm H

426 mm W x 692 mm D x 43 mm H

426 mm W x 692 mm D x 43 mm H

446 mm W x 743 mm D x 86 mm H

Weight

14 kg (31 lbs.)

17 kg (37.5 lbs.)

17.92 kg (39.5 lbs.)

25.3kg (55 lbs)

Environment
Operating Environment

Temperature: 68° to 113°F / 20° to 45°C; Relative Humidity 10% to 90% (non-condensing) Altitude: 3050m / 10,000ft

Non-Operating Environment

Temperature: -22° to 140°F / -30° to -60°C; Relative Humidity 5% - 95% (non-condensing)

Power
Redundant Hot-Swap Power Supply

Included

Included

Included

Included

Power Input

100~240VAC, 50~60Hz

Power Supply Spec (Max)

300W

450W

450W

730W

Power Consumption (Max)

195W

178W

178W

504W

Certifications
Compliance

CISPR 22; EN55022; EN55024; FCC CFR 47, Pt 15; ICES-003; CNS13438; GB9254; K22; K24; EN 61000-3-2; EN 61000-3-3; EN 60950-1; IEC 60950-1