Check Point Series 80 Appliance

All-inclusive branch office security at the best price/performance
- Out-of-the-box, enterprise-grade firewall and VPN
- Proven 1.5 Gbps firewall performance; comprehensive 720 Mbps IPS throughput
- Options: IPS, Antivirus and Anti-Malware, Anti-Spam and Email Security, and URL Filtering
Easy configuration, deployment and management
- Simple deployment without the need for corporate IT
- Intuitive and fast start-up wizard allows hassle-free deployment
- Centrally managed by SmartCenter and Multi-Domain Security Management
Extensible, on-demand security via modular Software Blade Architecture
- Protect against emerging threats with optional Software Blades
- Extend security to branch offices, small-to-meduim business (SMBs)
- Extensible with: IPS, Antivirus and Anti-Malware, Anti-Spam and Email Security, and URL Filtering
Best-in-class Integrated Firewall and Enterprise-class IPS
Check Point Series 80 Appliance includes the industry's most proven firewall technology, based on the same Check Point technologies that secure the Global 100.
Check Point Series 80 Appliance includes the industry's most proven firewall technology, based on the same Check Point technologies that secure the Global 100.
Comprehensive Network Access Control (NAC) allows blocking of unwanted applications such as IM and P2P, while an advanced Intrusion Prevention System (IPS) ensures protection of remote sites from both known and unknown threats, such as denial-of-service, post scans and buffer overflows.
Comprehensive Functionality
The Check Point Series 80 Appliance provides unmatched functionality to seamlessly secure the entire branch office.
The Check Point Series 80 Appliance provides unmatched functionality to seamlessly secure the entire branch office, including no moving parts, 802.3 bridging, VLAN tags, one-click NAT, dual ISP, DHCP server and relay and active/passive high availability.
| Functionality | Details |
|---|---|
| No moving parts | High hardware mean time between failure |
| 802.3 Bridging | Easily implement changes in the network infrastructure |
| VLAN Tags | Allows seamless deployment in virtual LAN environments |
| One-click NAT | Connects the entire network to the Internet with a single public IP address |
| Dual ISP | Allows DMZ port to be used as a backup WAN port link for reliable Internet access |
| DHCP Server and Relay | Reduces IP address configuration errors and management; prevents address conflicts |
| Active/Passive High Availability | Provides full redundancy when a primary system fails |
Highest Gigabit Ethernet Ports
Series 80 Appliance provides high-port density designed for enhanced performance in large-scale Ethernet network applications.
High-density port appliances allow branch offices to connect front-end routers and back-bone Ethernet switches with 1.5Gbps of firewall throughput, the ultimate choice for protecting branch office information. In most cases it also allows a branch office with limited IT resources to manage all other network connections in a single desktop form-factor minimizing network errors and improving IT staff efficiency.
Simple Configuration and Deployment
The Check Point Series 80 Appliance can be up-and-ready in minutes, offering hassle-free deployment to branch offices with minimal IT staff. Even non-technical staff can easily perform initial setup and configuration via a simple start-up wizard.

Software Blades and Protection Details
Check Point Series 80 Appliance includes the Firewall and IPSec VPN Software Blades, right out-of-the-box. Upgrade branch office security in a single-click to include additional Software Blades.
Check Point Series 80 Appliance includes the Firewall Software Blade and IPSec VPN Software Blade, right out-of-the-box. Upgrade branch office security in a single-click by adding the following Check Point Software Blades: IPS Software Blade, Antivirus and Anti-Malware Software Blade, Anti-Spam and Email Security Software Blade and URL Filtering Software Blade.
| Firewall Software Blade | |
|---|---|
| Protocol/Application Support | Secures more than 200 applications and protocols |
| VoIP Protection | SIP, H.323, MGCP, and SCCP with NAT support |
| Instant Messaging Control | MSN, Yahoo, ICQ, Skype, GoogleTalk, and QQ Instant Messenger |
| Peer-to-peer Blocking | Kazaa, Gnutella, BitTorrent, eMule, DirectConnect, Soulseek, Thunder, and Winny |
| Network Address Translation (NAT) | Static/hide NAT support with manual and automatic rules |
| Layer-2 Bridge Support | Transparently integrates into existing network |
| IPsec VPN Software Blade | |
|---|---|
| Encryption Support | AES 128-256 bit, 3DES 56-168 bit |
|
Authentication Methods
|
only local database |
|
Certificate Authority
|
Integrated certificate authority (X.509) |
| VPN Communities | Automatically sets up site-to-site connections as objects are created |
| Topology Support | Star and mesh |
| IPS Software Blade | |
|---|---|
| Network-layer Protection | Blocks attacks such as DoS, port scanning, IP/ICMP/TCP-related |
| Application-layer Protection | Blocks attacks such as DNS cache poisoning, FTP bounce, improper commands |
| Detection Methods | Signature-based, behavioral and protocol anomaly |
| Antivirus and Anti-malware Software Blade | |
|---|---|
| Antivirus Protection Protocols |
Protects HTTP, FTP, and SMTP
|
| Anti-spyware Blocks |
Pattern-based spyware blocking at the gateway
|
| Antivirus and Anti-spyware Protection Updates |
Centralized, daily updates, automatic and manual updates.
|
| Granular Scanning by File Types |
Scan by more than 70 different file types that are constantly updated
|
| Options |
File-based AV or protocol-based AV
|
| Anti-spam and Email Security Software Blade | |
|---|---|
| IP Reputation Anti-spam | Blocks spam and malware at the connection level by checking the sender's reputation against a dynamic database of known malicious IP addresses |
| URL Filtering Software Blade | |
|---|---|
| URL Filtering Categories | Over 90 categories including: adult, advertisements, arts, chat, computing, criminal, drugs, education, finance, food, gambling, games, glamour & intimate apparel, government, hacking, hate speech, health, hobbies, hosting sites, job search, kids sites, lifestyle & culture, motor vehicles, news, personals & dating, photo searches, real estate, reference, religion, remote proxies, search engines, sex education, shopping, sports, streaming media, travel, Usenet news, violence, weapons, web based e-mail |
| White Listing (allowed sites) | URLs and IPs |
| Black Listing (blocked sites) | URLs and IPs |
| Network Exceptions | Exceptions based on network objects defined |
| Blocking Notification | Custom messages or URL redirection |
Management and Reporting
The Check Point Series 80 Appliance is centrally-managed by either Security Management or Multi-Domain Security Management.
The Check Point Series 80 Appliance is centrally-managed by either Security Management or Multi-Domain Security Management.
Check Point security management solutions are designed as an interoperable system based on a core unified security architecture. This core security architecture enables the central control of security policy across multiple layers of the infrastructure.
| Centralized Management | Managed by Check Point centralized Security Management and Check Point Multi-Domain Security Management |
| Monitoring/Logging | SmartView Tracker and SmartView Monitor provide advanced monitoring and logging |
| Reporting | Fully integrated with SmartReporter and SmartEvent Software Blades |
| Command Line Interface (CLI) | CLI for device and cluster |
Integrated into Flexible Software Blade Architecture
Designed for the Check Point Software Blade Architecture, the Series 80 Appliance deliver flexibility and low total cost of ownership by allowing customers to quickly expand security protections to meet changing requirements.
The Check Point Software Blade architecture is the first and only security architecture that delivers complete, flexible and manageable security to companies of any size. With unprecedented flexibility and expandability, Software Blades deliver lower cost of ownership and cost-efficient protection that meet any need, today and in the future.
Full integration into the modular Software Blade Architecture allows for rapid and easy activation on any Check Point security gateway.
Check Point Series 80 Appliance Hardware Specifications
| Details | |
|---|---|
| 10/100/1000 Ports | 10 |
| Disk- or Flash-Based | Flash |
| Enclosure | Desktop |
| Dimensions (Standard) | 8.75 x 6 x 1.75inches |
| Dimensions (Metric) | 220 x 152.5 x 44 mm |
| Weight | 2.4 lbs (1.085 kg) |
| Operating Environment | 0°C ~ 40°C (5~95%, non condensing) |
| Power Input | 100-240 VAC 50/60Hz, 240W |
| Power Supply | 12V/2A DC 24W |
| Power Consumption (Max) | 16.68W |
| Compliance | EMC: EN55022+24_2007-ITE FCC: FCCP15B+ICES-003-ITE Safety: UL/c-UL 60950-1_2nd_2007(US+CA) IEC 60950_1_2nd_2005-CB |
Check Point Series 80 Appliance Performance
| Details | |
|---|---|
| Firewall Throughput | 1500 Mbps |
| VPN Throughput | 220 Mbps |
| IPS Throughput | 720 Mbps |
| AV Throughput | 100 Mbps |
| Concurrent Sessions | 150,000 |
| VLANs | 1024 |
| Licensed Users | Unlimited |
Check Point Series 80 Appliance Software Specifications
| Check Point Series 80 | |
|---|---|
| Software Edition | R71 |
| Firewall | Yes |
| IPSec VPN | Yes |
| IPS | Optional |
| Anti-Spam and Email Security | Optional |
| Antivirus and Anti-Malware | Optional |
| URL Filtering | Optional |
- Products A-Z
- Appliances
- Appliances Overview
- 2200 Appliances
- 4000 Appliances
- 12000 Appliances
- 21000 Appliance
- 61000 Security System
- DDoS Protector Appliances
- SecurityPower
- Secure Web Gateway Appliance
- Threat Prevention Appliance
- Series 80
- UTM-1 Edge
- IP Appliances
- Virtual Systems
- Safe@Office
- Smart-1
- Smart-1 SmartEvent
- Integrated Appliance Solution
- IAS Bladed Hardware
- Software Blades
- Software Blades Overview
- Security Gateway
- Firewall
- IPSec VPN
- IPS
- Mobile Access
- Application Control
- Identity Awareness
- DLP
- Web Security
- URL Filtering
- Anti-Bot
- Antivirus
- Anti-Spam & Email Security
- Advanced Networking & Clustering
- Voice over IP (VoIP)
- Threat Prevention
- ThreatCloud™
- Security Management
- Compliance
- Network Policy Management
- Endpoint Policy Management
- Logging & Status
- SmartWorkflow
- Monitoring
- Management Portal
- User Directory
- SmartProvisioning
- SmartReporter
- SmartEvent
- Multi-Domain Security Management
- Virtualization Security
- Security Gateway Virtual Edition
- Cloud Security
- Virtual Appliance for Amazon Web Services
- Security Systems
- Security Systems Overview
- Endpoint Security
- Endpoint Security
- Full Disk Encryption
- Media Encryption
- Anti-Malware & Program Control
- Remote Access VPN
- Firewall & Compliance
- Check Point WebCheck
- Check Point GO
- Solutions
- Remote Access
- Consumer Products
- ZoneAlarm Antivirus
- ZoneAlarm ForceField
- ZoneAlarm Internet Security Suite

