Manual instalacion checkpoint
Guide
R75.20
24 July 2011
© 2011 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under
licensing restricting their use, copying, distribution, and decompilation. No part of this product or related
documentation may be reproduced in an y form or by any meanswithout prior written authorization of Check
Point. While every precaution has been taken in the preparation of this book, Check Point assumes no
responsibility for errors or omissions. This publication and features described herein are subject to change
without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forthin subparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227 -7013 and FAR
52.227-19.
TRADEMARKS:
Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks.
Refer to the Third Party copyright notices (http://www.checkpoint.com/3rd_party_copyright.html) for a list of
relevant copyrights andthird-party licenses.
Important Information
Latest Software
W e recommend that you install the most recent software release to stay up -to-date with the latest functional
improvements, stability fixes, security enhancements and protection against new and evolving attacks.
Latest Documentation
The latest version of this document is at:http://supportcontent.checkpoint.com/documentation_download?ID=12269
For additional technical information, visit the Check Point Support Center
(http://supportcenter.checkpoint.com ).
Revision History
Date
Description
24 July 2011
Improvements made since first release
19 July 2011
First release of this document
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us bysending your comments
(mailto:cp_techpub_feedback@checkpoint.com?subject=Feedback on Installation and Upgrade Guide
R75.20 ).
Contents
Important Information .............................................................................................3
Introduction .............................................................................................................9Welcome ............................................................................................................. 9
R75.20 Documentation ........................................................................................ 9
For New Check Point Customers......................................................................... 9
Getting Started......................................................................................................10
Downloading R75.20 ..........................................................................................10
Terminology........................................................................................................10
Multi-Domain Security Management Glossary....................................................11
Compatibility Tables ...........................................................................................12
Licensing ............................................................................................................12
Software Licensing ........................................................................................12
Licensing Multi-Domain SecurityManagement ..............................................13
Licensing SmartEvent ....................................................................................13
Installing .......................................................................................................... 14
Installing Security Gateways, Security Management and Endpoint Security ...15
Introduction...
Regístrate para leer el documento completo.