博威---云架构决胜云计算

 找回密码
 注册

QQ登录

只需一步,快速开始

搜索
楼主: liuxingyuan

Check Point 发布了基于全新软件Blade架构的最新安全网关和管理产品R70-中文全球首发

[复制链接]
 楼主| 发表于 2009-3-2 20:54:26 | 显示全部楼层
Monitoring Software Blade(监视软件刀片)

Overview(概述)
Show a complete picture of network and security performance, enabling fast response to changes in traffic patterns or security events.
显示一个完整的网络和安全性能视图,能快速响应流量模式的变化或安全事件。
Managing network and security performance today can be a difficult juggling act. Security teams have to deal with many networks and VPN gateways, large numbers of users with different needs, and a fast-growing array of security threats that can quickly congest networks. The Monitoring Software Blade shows the complete picture of network and security performance, enabling fast response to changes in traffic patterns or security activities.
今天,管理网络和安全性能是很难的行为。安全团队不得不处理许多网络和VPN网关,具有不同需求的大量用户。监视软件大片显示了网络和安全性能的完整视图。能对流量模式的改变或安全活动作出快速响应。
Monitoring Software Blade centrally monitors Check Point and OPSEC devices, presenting a complete visual picture of changes to gateways, tunnels, remote users and security activities. This enables administrators to immediately identify changes in network traffic flow patterns that may signify malicious activity.
监视软件刀片集中监视Check PointOPSEC设备,展示了一个完全的虚拟试图,反映了网关,隧道,远程用户和安全活动的变化。使管理员能立即识别网络流量模式的变化包括那些可能的恶意活动。
Key Benefits (主要优点)
² Maintains high network availability(维护网络的高可用)
² Improves efficiency of bandwidth use(提高带宽使用的效率)
² Tracks SLA compliance(跟踪SLA遵从)
² Increases security ROI(增强安全ROI
Responds quickly to network and security changes(对网络和安全的变化快速响应)

[ 本帖最后由 liuxingyuan 于 2009-3-2 20:55 编辑 ]
 楼主| 发表于 2009-3-2 20:56:14 | 显示全部楼层
Features(特性)
Monitoring gateways(监视网关)
Monitoring network traffic(监视网络流量)
Monitoring suspicious activity and alerts(监视可疑活动和告警)
Monitoring VPN tunnels(监视VPN隧道)
Monitoring remote users(监视远程用户)
Cooperative Enforcement monitoring(合作强制监督)
Flexible, graphical reporting(灵活的,图形化报告)
Tight integration with Check Point products(与Check Point产品无缝集成)
Monitoring gateways(监视网关)
The Monitoring Software Blade provides real-time information on Check Point gateways, OPSEC™ gateways, and network objects in the organization. Custom and predefined queries enable administrators to view in-depth information, such as system data, network activity, policy, and license status, about specific gateways.
监视软件刀片提供了Check Point网关,OPSec网关,和组织内的网络对象实时信息。自定义和预定义的查询能使管理员察看更深入的信息,比如系统数据,网络活动,策略和授权状态,特定的网关。
Monitoring network traffic(监视网络流量)
It also delivers a comprehensive view of network usage. And the Monitoring Software Blade can generate detailed or summary graphs and charts for analysis of network traffic patterns, audit and estimate costs of network use, identify departments and users that generate the most traffic, and detect and monitor suspicious activity.
它也提供了完全的网络使用视图。监视软件刀片能产生详细的或汇总的图形化或字符信息,表示了网络流量模式分析,审计和网络使用的估算成本,识别产生大多数流量的部门和用户,检测和监视可疑的活动
Monitoring suspicious activity and alerts(监视可疑的活动和告警)
The Monitoring Software Blade integrates Check Point’s suspicious activity monitoring protocol for modifying access privileges upon detection of any suspicious network activity, such as attempts to gain unauthorized access. Alerts can also be automatically sent to administrators for certain predefined system events such as when free disk space is below an acceptable threshold or if a security policy has been changed. These alerts point to potential system security threats and provide information to assist in avoiding, minimizing, or recovering from damage.
监视软件刀片整合了Check Point可疑活动监视协议,修改访问权限,检测任何可疑的网络活动,比如尝试获取未授权访问。,当中心预定义的事件发生时,告警自动被发送到管理员,这些事件包括当防火墙磁盘空间地域一个可接受的门限或安全策略被更改。这些告警指出了潜在的系统安全威胁,提供了运离,最小化,和从危险中恢复的信息。
Monitoring VPN tunnels(监视VPN隧道)
The Monitoring Software Blade enables system administrators to monitor connectivity between gateways. Permanent tunnels can be set up between Check Point gateways where uninterrupted connectivity is critical to the organization’s business. By constantly monitoring the status of VPN tunnels, including inbound and outbound tunnel traffic, the Monitoring blade enables administrators to track normal tunnel function, so that malfunctions and connectivity problems can be quickly accessed and resolved.
监视软件刀片使系统管理员监视网关之间的连接。在Check Point网关之间的永久的隧道可被建立,那里是组织的关键信息,不可被中断。通过持续监视VPN隧道的状态(包括进入和离开隧道的流量),监视刀片能使管理员跟踪通用隧道功能,因此,故障和连接性问题能被快速的发现和解决。
Monitoring remote users(监视远程用户)
The monitoring of remote users offers valuable information for identifying and troubleshooting remote connectivity issues. The Monitoring Software Blade provides comprehensive information on various aspects of remote user traffic such as current open sessions, overlapping sessions, route traffic, and connection time.
对远程用户的监视提供了有价值的信息,用于识别和排错远程连接问题。监视软件刀片提供了综合的信息,包括各种远程用户的流量特征,比如现在打开的会话,重叠的会话,路由流量,和连接时间。
Cooperative Enforcement monitoring(合作强制监视)
The Cooperative Enforcement® monitoring feature utilizes the Integrity™ server compliance capability to verify connections arriving from internal and remote hosts across the network. The logs generated for authorized and unauthorized hosts can be monitored via the Monitoring Software Blade.
合作强制监视功能实现了集成服务遵从性能力,验证通过网络到达内部和远程主机的连接。授权的和未授权的主机产生的日志在监视软件刀片上被监视。
Flexible, graphical reporting(灵活的,图形化的报告)
Using custom or predefined queries, administrators can drill down on a specific segment of traffic or specific gateways to isolate factors that may be affecting network performance. Multiple views can be displayed within the same window and viewed side-by-side to enable easy diagnoses of traffic or security problems.
使用自定义或预定义的查询,管理员能提炼出特定网段的流量,特定网关,隔离影响网络性能的因素。多个视图可以在同一窗口内显示,并排显示能方便地诊断和流量和安全问题。
Tight integration with Check Point products(与Check Point产品的无缝集成)
The Monitoring Software Blade is part of Check Point’s SmartCenter™ management solutions, a suite of powerful applications for centrally configuring, managing, and monitoring Check Point perimeter, internal, Web, and endpoint security gateways. This integration results in reduced complexity and lowers total cost of ownership.
监视软件刀片是Check Point SmartCenter管理解决方案的一个部分,一个套强大的应用程序,中心化配置,管理和监视Check Point 周边,内部,web和端点安全网关。这种整合减少了复杂性和降低了总体拥有成本。
 楼主| 发表于 2009-3-2 20:56:54 | 显示全部楼层
Management Portal Software Blade(管理入口软件刀片)

Overview(概述)
With the Management Portal Software Blade, the security team can extend browser-based management access to outside groups such as technical support staff or auditors yet maintain centralized control of policy enforcement. Management Portal users can view security policies, status of all Check Point products and administrator activity as well as edit, create and/or modify internal users, and manage firewall logs.
使用管理入口软件刀片,安全团队能扩展基于浏览器的管理访问,组织外部例如技术支持人员或维护集中控制的强制策略。管理入口用户能浏览安全策略,状态和所有Check Point产品和管理活动以及编辑,创建和修改内部的用户,和管理防火墙日志。
This extended functionality facilitates team coordination in mitigating attacks or troubleshooting network and security issues. The Management Portal Software Blade allows security administrators to show configuration and log status data to their customers and extend—at their discretion—security policy access to other groups, thereby increasing security visibility within the organization.
这种扩展的功能协调了团队,消除了攻击和排错网络和安全问题。管理入口软件刀片允许安全管理员向他们的客户显示配置和日志状态数据,(更加随意的是)安全策略访问其他组,因此在组织内增强了安全可见性。
Key Benefits (主要优点)
Secure security management view and troubleshooting aid(坚固的安全管理视图和排错援助)
Extends access to network policy settings to outside auditors(对外部审计扩展网络策略设置访问)
Limits security management exposure (限制安全管理漏洞)
 楼主| 发表于 2009-3-2 20:58:23 | 显示全部楼层
Features(特性)
Maintains centralized control(中心控制维护)
Provides secure remote access to managers and auditors(提供安全的远程访问管理和审计)
Read/write access to add users and for log management and gateway status(增加用户可读/可写访问,日志管理和网关状态)
Maintains centralized control(中心控制维护)
The Management Portal Software Blade provides a read-only view of network policy and objects as defined using SmartDashboard roles and permissions.
At the same time full management control is limited to users with access using SmartConsole applications.

管理入口软件刀片提供了只读网络策略和对象的视图,定义了使用SmartDashborad的角色和许可。同一时间内完全的管理控制是限制使用SmartConsole应用程序的用户。
Provides secure remote access to managers and auditors(提供了安全远程访问管理和审计)
Auditors and managers can connect via a secure SSL connection to view network policy, objects, IPS settings and gateway status.
审计者和管理者能通过安全的SSL连接去查看网络策略,对象,IPS设置和网关状态。
Read/write access to add users and for log management and gateway status(增加用户可读/可写访问,日志管理和网关状态)
With the Management Portal Software Blade’s you can edit, create, and/or modify internal users.
Additionally you can view, purge, or switch the active firewall log and audit files.
This along with access to gateway status views provides a valuable tool for remote troubleshooting.

使用管理入口软件刀片你能编辑,创建和/或修改内部用户。另外你能察看,清除或交换活动防火墙日志和审计文件。这除了访问网关状态视图外,提供了用于远程排错的珍贵工具。
 楼主| 发表于 2009-3-2 21:00:05 | 显示全部楼层
User Directory Software Blade(用户目录软件刀片)

Overview(概述)
Consistent user information is critical for proper security. Yet, without a centralized data store, managing user information across multiple applications can be a manual, error-prone process that results in inconsistencies. Check Point’s User Directory Software Blade enables Check Point Security Gateways to leverage LDAP-based user information stores, eliminating the risks associated with manually maintaining and synchronizing redundant data stores.
一致的用户信息是适当安全的关键,然而,没有集中的数据存储,手工跨多个应用管理用户的信息,容易出错的程序导致信息的不一致。Check Point用户目录软件刀片使Check Point安全网关使用基于LDAP的用户信息存储,消除了手工维护同步多余数据存储的风险。
With Check Point's User Directory Software Blade, Check Point Security Gateways become full LDAP clients which communicate with LDAP servers to obtain identification and security information about network users. The User Directory Software Blade leverages the flexibility of the LDAP protocol by extending the schema to include all necessary user-level security elements. This information is then available not only to Check Point Security Gateways to enforce enterprise security policy, but to any LDAP-compliant application, enabling centralized user management throughout the enterprise. Organizational and user LDAP information is available from the following Microsoft Active Directory, Novell eDirectory, Netscape Directory Server and OPSEC certified LDAP servers.
使用Check Point的用户目录软件刀片,Check Point安全网关成为LDAP客户端,与LDAP服务器通信,获得关于网络用户的身份和安全信息。用户目录软件刀片影响了LDAP协议的灵活性,通过扩展架构包括了所有必要的用户级安全元素。这些信息然后被利用于Check Point安全网关强制企业安全策略,也用于LDAP兼容性程序,能够中心化的管理企业的用户。组织和用户LDAP信息与以下集成:Microsooft活动目录,Novell e目录,Netscape的目录服务器和OPSEC认证的LDAP服务器。
Key Benefits(主要优点)
² Enables Check Point Security Gateways to obtain user identification and security information(使Check Point安全网关获取用户的身份和安全信息)
² Extends LDAP schema automatically to include all user security element necessary(自动扩展LDAP架构包括所有必要的用户安全元素)
² Open LDAP interface extends other LDAP-compliant applications to extend security management control throughout the enterprise(开放的LDAP接口扩展了其他LDAP兼用性程序,延伸到整个企业的安全管理控制)
Features(特性)
Leverage LDAP based user information stores(改良基于LDAP的用户信息存储)
Eliminate the risks associated with manually maintaining and synchronizing redundant data stores(消除了手工维护和同步多余数据存储的风险)
Supports leading LDAP solutions including Microsoft Active Directory(支持重要的LDAP解决方案,包括Microsoft活动目录)
Manage LDAP directory within SmartDashboard(在SmartDashboard中管理LDAP目录)

[ 本帖最后由 liuxingyuan 于 2009-3-2 21:02 编辑 ]
 楼主| 发表于 2009-3-2 21:03:13 | 显示全部楼层
IPS Event Analysis Software BladeIPS事件分析软件刀片)

Overview(概述)
The IPS Event Analysis Software Blade is a complete IPS event management system providing situational visibility, easy to use forensic tools, and reporting. IPS events are presented in Timeline view so that administrators can immediately focus on their high priority assets and see quickly any changes in attacks against those assets. With the alert viewer administrators can easily and quickly dissect and analyze an attack. With the reporting in the IPS Event Analysis Software Blade it is easy to spot overall trends in attacks and the effectiveness of the current IPS policy.
IPS事件分析软件刀片是一个完全的IPS事件管理系统,提供了工作可见性,易于使用的取证工具,和报告。IPS事件表现为实时视图,因此管理员能立即集中在他们高优先级的资产上和立即看到对那些资产的攻击和改变。使用告警视图,管理员能容易并快速的剖解和分析攻击。使用IPS事件分析软件刀片容易地看出攻击的总体趋势,和当前IPS策略的效果。
Key Benefits(主要优点)
² Overcome data overload(克服了数据过载)
² Focus on what's critical(集中关键)
² Track compliance issues(跟踪遵从性问题)

[ 本帖最后由 liuxingyuan 于 2009-3-2 21:04 编辑 ]
 楼主| 发表于 2009-3-2 21:04:48 | 显示全部楼层
Features(特性)
Situational visibility(形势可见性)
Easy to use forensic tools(易于使用取证工具)
Reporting for trend analysis and viewing the effectiveness of IPS policy(报告趋势分析和浏览IPS策略效果)
Situational visibility(形势可见性)
IPS events are presented in Timeline view so administrators can immediately focus on their high priority assets and see quickly any changes in attacks against those assets.
IPS事件表现为实时的视图,因此管理员能立即集中在他们高优先级的资产上,并能快速看到那些资产的变化和针对于他们的攻击。
Easy to use forensic tools(易于使用的取证工具)
With the alert viewer administrators can easily and quickly dissect and analyze an attack by grouping events by source, destination, attack used, and other fields. This includes viewing a packet capture. Easily move from an event to the protection to get more details on the attack, modify the protection, or create network exceptions. Create a ticket so that the event can be tracked and followed.
使用警报视图管理器能容易并快速地剖解和分析攻击,将事件归类为,源,目的,攻击使用,和其他字段。这里包括了一个抓包视图。容易地从事件的保护移动到攻击更详细的数据,编辑这些保护或创建网络例外。创建一个标签,从而使时间被回溯和跟踪
Reporting for trend analysis and viewing the effectiveness of IPS policy(报告分析趋势和IPS策略效果视图)
With the reporting in the IPS Event Analysis Software Blade it is easy to spot overall trends in attacks and the effectiveness of the current IPS policy. Dynamically create time-based dispersion graphs and summarize the Top-N events
使用IPS事件分析软件刀片中的报告,容易地看出整个攻击的趋势和当前IPS策略的效果。动态创建基于时间的分布图表和总结Top-N事件
 楼主| 发表于 2009-3-2 21:05:36 | 显示全部楼层
Provisioning Software Blade(供应软件刀片)

Overview(概述)
Network security administrators constantly need to provide routine maintenance on security devices dispersed across their company network. Performing network maintenance one device at a time is labor intensive, creates inconsistencies in policies and increases the likelihood of errors introduced into the system.
网络安全管理员持续不断的需要提供分散到他们公司网络内的网络设备的定期维护。一次一台设备的网络维护是很费力的,在系统内制造了策略矛盾,和增加了错误可能性。
Check Point’s Provisioning Management Software Blade provides centralized administration and provisioning of Check Point security devices via a single management console. Using profiles, a network administrator can easily deploy security policy or configuration settings to multiple, geographically distributed devices. Check Point’s Provisioning Software Blade also provides centralized backup management and a repository of device configurations so administrators can easily apply existing configurations to new devices. By automating device configuration, the Provisioning Software Blade reduces administrative overhead, reduces errors and ensures security consistency across the network.
Check Point供应管理软件刀片提供集中化的管理和供应Check Point安全网关,通过一个单一的控制台。使用伦廓,网络管理员能够容易的部署安全策略或配置分散在各地的设备设置。Check Point供应软件刀片也提供了集中的备份管理和设备配置的恢复,因此管理员能容易的向新设备应用已经存在的配置。通过自动化的设备配置,供应软件刀片降低了管理开销,减少了错误,确保整个网络安全的统一。
Key Benefits(主要优点)
² Reduces administrative overhead(减少管理开销)
² Rapid deployment and replacement of devices(快速部署和替换设备)
² Automates tasks, reduces errors and improves security(自动任务,减少了错误和提高了安全)
² Centralizes control over appliance deployment, maintenance and recovery(设备部署,维护和恢复的集中控制)
Scales to manage thousands of devices across multiple, disparate networks(灵活的管理上千种多样,分散的网络设备)

[ 本帖最后由 liuxingyuan 于 2009-3-2 21:06 编辑 ]
 楼主| 发表于 2009-3-2 21:08:25 | 显示全部楼层
Features(特性)
Centralized Device Configuration(集中设备配置)
System Overview(系统概览)
Device View(设备视图)
Profile View(轮廓视图)
Profile-Based Management(基于策略的管理)
Centralized Provisioning Wizard(集中的供应向导)
Scheduled Actions(调度活动)
Centralized Device Configuration(集中的设备配置)
Check Point’s Provisioning Software Blade provides an intuitive and easy interface to centrally manage device configurations such as operating system and network settings. Networking configurations include DNS, hosts, domain, routing and interfaces settings.
Check Point的供应软件刀片提供了感知且容易的接口,集中管理设备的配置,比如操作系统和网络设置。网络配置包括:DNS,主机,域,路由和接口设置。
The Provisioning interface makes it easy to navigate between the system overview, profile configuration and device configuration panes. The System Overview pane provides a quick snapshot of device statuses, critical notifications and action statuses. The Profiles pane is the interface for managing provisioning profiles, and the Devices pane allows for the easy management of gateways and other device objects.
供应接口使在系统概览,策略配置和设备配置窗格中导航变得容易。系统概览窗格提供了设备状态,关键提醒和活动状态的一个快照。策略窗格时管理供应策略的接口,设备窗格允许容易的管理网关和其他设备对象。
System Overview(系统概览)

Device View(设备视图)

Profile View(策略视图)


[ 本帖最后由 liuxingyuan 于 2009-3-2 21:11 编辑 ]
 楼主| 发表于 2009-3-2 21:12:08 | 显示全部楼层
Profile-Based Management(基于策略的管理)
Check Point’s Provisioning Management Software Blade is based on profiles which enable an administrator to manage large scale deployments that benefit from common security policies and device settings. Each profile defines the gateway properties per profile object - which represents multiple, unlimited gateways with similar properties and policies – rather than per physical gateway. This means that time invested in each device can be minimized and batch operations performed, thereby reducing administrative overhead.
Check Point供应管理软件刀片是基于轮廓的,使管理员通过普通的安全策略和设备设置,能够管理大型的部署。每一个轮廓定义了网关属性,每轮廓对象(表现为多样,不受限制的网关,使用相似的属性和策略)与每物理网关对象相比。这意味着在每个设备上的时间花费被最小化,并且成批操作可被提供,因而减少了管理开销。
Check Point’s Provisioning Software Blade uses different types of profiles to manage and provision security gateways.
Check Point的供应软件刀片适用不同类型的轮廓管理和供应安全网关。
Security Profiles: A security profile defines a Check Point security policy and other security-based settings for a set of gateways. These gateways can be corporate or branch office gateways. Each security profile can hold the configuration of any number of actual gateways, enabling large scale policy management of branch sites and gateways that have similar properties. Examples of such sites can include worldwide retail chain stores, bank ATM machines or car manufacturer dealerships.
安全轮廓:一个安全轮廓定义了Check Point安全策略和其他基于安全的设置等网关的设置。这些网关可能是总部或分支机构办公室网关。每一个安全轮廓能保持任意数量的实际网关的配置,使巨大的策略去管理具有相似属性的分支站点和网关。例如这样的站点能包括世界范围的零售店,银行ATM机,或汽车授权代理。
Provisioning Profiles: In order to facilitate the management of a large number of similarly configured devices, common settings can be configured on an object called the provisioning profile. Each provisioned device is associated with a provisioning profile, and thus inherits all of the profile's settings. A provisioning profile can define specific settings for networking, device management, and the operating system. Common device settings include DNS, time zones, domain names and routing data. Provisioning profiles can be applied to UTM-1, Power-1, SecurePlatform or UTM-1 Edge appliances. There are specific provisioning profiles for the different appliance products; so for example, UTM-1 Edge appliances will have provisioning profiles unique and different from Power-1 appliances.
供应轮廓:以减轻巨大数量相似配置设备的管理量为目的,在一个对象上的普通设置叫做供应轮廓。每一个供应设备与一个供应轮廓关联,因而继承了轮廓的设置。一个供应轮廓能定义特定的设置,如网络,设备管理和操作系统。普通设备设置包括DNA,时区,域名和路由数据。供应轮廓可被用于UTM-1Power-1,安全品品平台或UTM-1边缘设备。为不同的设备产品存在一些特定供应轮廓;比如,UTM-1边缘设备具有和Power-1设备不同的轮廓。
All devices managed fetch their assigned profiles from the centralized management server. If the fetched profile differs from the previous profile, the device is updated with the changes. Thus, one profile is able to update potentially hundreds and thousands of devices, each acquiring the new common properties, while maintaining its own local settings.
所有被管理的设备从中心管理服务器上下载他们相关的轮廓。如果下载的轮廓不同于以前的轮廓,设备进行升级。因此,一个轮廓能升级潜在的成千上百的设备,每一个获取最新的公共属性,而且维护自己本地的设置。
Centralized Provisioning Wizard(集中的供应向导)
A provisioning wizard enables you to configure large scale deployments of devices. The wizard enables an administrator to quickly choose the devices to be configured, fetch current configuration settings and associate devices with a provisioning profile. Each device can be associated to a profile separately, or multiple devices to the same profile at once.
一个供应向导能使你配置大型部署的设备。该想到使管理员快速的选择被配置的设备,下载当前的配置设置和关联了一个供应轮廓的设备。每一个设备能单独的关联一个轮廓,或多个设备关联同一轮廓。


Scheduled Actions(调度活动)
Sometimes, administrators need to perform operations that are not part of a device’s configuration. Check Point’s Provisioning Software Blade supports these one time operations or actions on a device or group of gateways which can include running scripts, installing software packages, creating backup images, rebooting, pushing policy, pushing objects, etc. The progress and status of the action can be easily viewed on the action pane.
有时,管理员需要执行那些不是一个设备配置部分的操作。Check Point的软件刀片支持这些一次性的操作或一组网关或设备的活动(包括可运行的脚本),安装软件包,创建备份影响,重启,推送策略,推送对象等等。这些进展和活动的状态能在活动窗格中容易的浏览。

[ 本帖最后由 liuxingyuan 于 2009-3-2 21:14 编辑 ]
您需要登录后才可以回帖 登录 | 注册

本版积分规则

小黑屋|手机版|Archiver|boway Inc. ( 冀ICP备10011147号 )

GMT+8, 2024-11-22 08:51 , Processed in 0.105456 second(s), 14 queries .

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表