The Check Point Advanced Networking and Clustering Software Blade simplifies network security deployment and management within complex and highly utilized networks, while maximizing network performance and security in multi-Gbps environments. This combination is ideal for high-end enterprise and datacenter environments where performance and availability are critical.
Advanced networking features for maximum performance and availability
Advanced technologies provide maximum network security and performance
Integrated into Check Point Software Blade Architecture
Organizations looking to implement scalable, fault-tolerant, secure networks can use the Advanced Networking Software Blade to run industry-standard dynamic routing protocols including BGP, OSPF, RIPv1 and RIPv2 on security gateways. OSPF, RIPv1 and RIPv2 enable dynamic routing over a single autonomous system—like a single department, company, or service provider—to avoid network failures. BGP provides dynamic routing support across more complex networks involving multiple autonomous systems—such as when a company uses two service providers or divides a network into multiple areas with different administrators responsible for the performance of each.
Penalty Box quickly blocks, reduces effects of attacks and optimizes processor utilization.
When hockey players break the rules, they are put in the penalty box for a set period of time, giving the opposing team more resources. Check Point’s Penalty Box works in a similar fashion. If suspicious traffic violates policy too frequently, it is dropped for a few minutes. Processing power is not wasted inspecting this unwanted traffic.
Penalty Box In Action:
The Advanced Networking Software Blade also integrates multicast protocol support in IP appliances, including IGMP, PIM-DM and PIM-SM.
Advanced Networking lets you prioritize business-critical traffic such as ERP, database, and Web services traffic over less time-critical traffic. It also allows you to guarantee bandwidth and control latency for streaming applications such as Voice over Internet Protocol (VoIP) and video conferencing. In addition, with highly granular controls, Advanced Networking enables guaranteed or priority access to specific employees—even if they are remotely accessing network resources through a VPN tunnel.
CoreXL is a performance enhancing technology for security gateways on multi-core platforms providing near linear increases in performance as processing cores are added to a single system.
ClusterXL provides high availability and load sharing that keeps businesses running without interruption. ClusterXL distributes traffic between clusters of redundant gateways, combining the computing capacity of multiple machines to increase total throughput. In the event of a gateway or network failure, connections are seamlessly redirected to a designated backup, maintaining business continuity. This enables near-linear scalability for large deployments without the cost of separate load-balancing equipment.
Patented Check Point security acceleration technology, SecureXL, removes latency associated with intense security processing by creating a special device layer that can make security decisions earlier. In both servers and dedicated appliances, performance is affected negatively by memory, system-bus, and CPU speed as traffic passes through a system. By creating a SecureXL device layer, the Check Point security gateway enables security decisions to be made at a lower application level to remove performance bottlenecks.
After the start of a transaction, if a packet is examined using traditional security methods and is determined to be safe, the SecureXL device layer takes over responsibility for examining any remaining packets—cutting out latency caused by hardware design. SecureXL can be implemented at both a hardware layer using network processors, as is done on some “Secured by Check Point” partner appliances, or at a virtual software layer on open servers.
Each connection request is directed to a specific server based on one of five predefined load balancing algorithms. The server load algorithm prevents any server from handling a disproportionately high volume of traffic. Each incoming connection request is directed to the server experiencing the lightest load.
ISP Redundancy assures reliable Internet connectivity by allowing a single or clustered security gateway to connect to the Internet through redundant Internet Service Provider (ISP) links. This feature does not require costly new networking hardware or specialized knowledge to operate. Two modes are available: Load Sharing and Primary/Backup.
The Advanced Network and Clustering Software Blade is fully integrated into the Software Blade architecture, saving time and reducing costs by allowing customers to quickly expand security protections to meet changing requirements.
The Advanced Networking and Clustering Software Blade, which is available on many Check Point appliances, combines the features and functionality of two earlier Software Blades—Advanced Networking and Acceleration & Clustering, which are still available for other appliances. The following tables describe the supported protocols and capabilities, as well as which Software Blades should be ordered for each type of appliance.
|Supported Internet Protocols||IPv4 RFC 791 ICMP RFC 792 ARP RFC 826 ICMP router discovery (server) RFC 1256 Router discovery v6 (ICMP v6) RFC 24661 CIDR RFC 1519 Static routes Multicast tunnels IPv6 core RFCs VRRPv2 RFC 3768 VRRPv3 (IPv6) draft-ietf-vrrp-ipv6-spec-08.txt Requirements for IPv4 routers RFC 1812 Quality of service RFC 2474 (general diffserv PHB information) RFC 3246 (EF behavior description) RFC 2597 (AF behavior description) Bootp/DHCP relay RFCs 951, 2131 Route aggregation and redistribution Unnumbered interfaces Link negotiation IEEE 802.3ad Flow control IEEE 802.3x Private (RFC 1918) and public IP routing VLAN 802.1Q transparent mode|
|Dynamic Routing Protocols||RIP RFC 1058 RIP version 2 (with authentication) RFC 1723 RIPng (IPv6) RFC 20801 OSPFv2 RFC 2328 OSPF NSSA RFC 3101 OSPFv3 (IPv6) RFC 2740 BGP4 RFCs 1771, 1963, 1966, 1997, 2918 BGP4++ RFC 2545, 2858 (unicast IPv6)|
|Multicast Protocols||IGMPv2 RFC 2236 IGMPv3 RFC 3376 PIM-SM RFC 4601 PIM-SSM RFC 4601 PIM-DM RFC 3973 PIM-DM state refresh draft-ietf-pim-refresh-02.txt DVMRP (multicast) RFC 10751|
|Quality of Service (QoS)|
|Minimum Bandwidth Allocation||Weighted Fair Queuing (WFQ) algorithm. Guarantees can be set for a group of connections in aggregate or on a per-connection basis|
|Weighted Priorities||Allocates bandwidth according to relative merit as defined by business requirements|
|Bandwidth Limits||Sets bandwidth restrictions for non-critical network applications|
|Low Latency Queuing (LLQ)||Reduces delay for latency-sensitive traffic|
|Server Load Balancing||Distributes network traffic among a number of servers. Supports various load-balancing methods (including server load, round trip, round robin, random, and domain) and server availability checks|
|Integrated Differentiated Services (DiffServ)||Enables service providers to offer end-to-end QoS for VPN and unencrypted traffic on IP WANs|
|Multiple modes||Load sharing or primary/backup|
|1 Available on IPSO releases See SecureKnowledge sk98226 for the latest information on dynamic routing support in the GAiA OS|
|SecureXL Firewall Product Support (Performance Pack) 2||Access control, encryption, NAT, accounting and logging, connection/session rate, general security checks, IPS features, CIFs resources, TCP sequence verification, dynamic VPN|
|Connection Templates||Connection acceleration|
|Drop Templates||Optimizes resources|
|High Availability Modes Supported||Active/Passive and Active/Active|
|Active/Active Modes Supported||Multicast and Unicast|
|Cluster Control Protocol Port||UDP 8116|
|State Synchronization||Supports ClusterXL and OPSEC third party High Availability (HA) solutions|
|Sticky Decision Function||Ensures asynchronous connection support|
|WAN Synchronization||Supported on synch networks with less than 100 ms latency|
|Duration Limited Synchronization||Preserves resources from synchronizing connections of short durations|
|Sync Members Supported||Up to 5 members|
|ClusterXL Firewall Product Support 2||Authentication/security servers, ACE servers and SecurID, IPS, sequence verifier, UDP encapsulation, SAM, ISP redundancy, third-party VPN peers, IP per user in office mode|
|Anti-spoofing Support||Prevent spoofing of internal networks|
|ClusterXL API||Check Point and third-party ClusterXL status support|
|Critical Device Configuration||Interfaces, synchronization status, firewall policy status, ClusterXL process status and firewall process status|
|Full ClusterXL Management and Status||Included in Check Point management|
|2 See the Release Notes and User Guide for specific details|