Check Point 4400 Appliance
Check Point 4400 Series
Check Point 4400 Security Appliances
4400 Next Generation Firewall Appliance with 7 blades suite
- Including Firewall, VPN, Advanced Networking & Clustering, Identity Awareness, Mobile Access for 5 concurrent users, IPS, and Application Control blades
4400 Next Generation Threat Prevention Appliance with 11 blades suite
- Including Firewall, VPN, Advanced Networking & Clustering, Identity Awareness, Mobile Access for 5 concurrent users, IPS, Application Control blades, URL Filtering, Anti-Virus, Anti Bot and Anti-Spam blades
Check Point 4400 Security Dedicated Appliances
Secure web Gateway 4400 Appliance with 7 blades suite
- Including Firewall, VPN, Advanced Networking & Clustering, Identity Awareness, URL Filtering, AntiViruse, and Application Control blades + SmartEvent
4400 Next Generation Data Protection Appliance with 8 blades suite
- Including Firewall, VPN, Advanced Networking & Clustering, Identity Awareness, Mobile Access for 5 concurrent users, IPS, Application Control and DLP blades
Check Point 4400 Security VS Appliances -
Learn More
4400 NGFW VS appliance
- Include FW, VPN, IA, ADNC, MOB, IPS, APCL and VS-5
4400 NGFW VS appliance bundle (2x4400 VS appliances)
- Include 2 x 4400 VS appliances, one primary and one HA, with FW, VPN, IA, ADNC, MOB, IPS, APCL and VS-5
#CPAP-SG4400-NGFW-VS5-2
המחיר שלנו: הצעת מחיר
סקירה:
דגם ה-4400 של צ'ק פוינט מציע פתרון אבטחה מלא ומאוחד, בעזרת ביצועים מובילים בגורם תצורה 1U.
בנוסף ל- 8 onboard 1 Gigabit copper Ethernet ports, ה-4400 מגיע גם עם expansion slot כדי לאפשר הוספת ארבע 1 Gigabit\ 2-4 fiber Ethernet ports. עם 223 SecurityPower Units, תפוקת פיירוול מקסימלית של 5Gbps throughput ו-3.5 Gbps של IPS, ה-4400 מסוגל לאבטח כל סוג של עסק קטן עד בינוני.
דגם ה-4400 של צ'ק פוינט
כיום ה-Internet gateway הינו יותר מרק פיירוול. זהו מוצר אבטחה אשר יודע להתמודד עם איומי האבטחה המתוחכמים והמתגברים של ימינו. כ-security gateway, עליו להשתמש במספר רב של טכנולוגיות כדי לשלוט בגישה לרשת, לזהות התקפות חשודות ולספק יכולות אבטחה נוספות כמו data loss prevention והגנה ממתקפות מבוססות web. ההצפה במוצרי מובייל כמו סמרטפונים, טאבלטים, שירותי סטרימינג, רשתות חברתיות ואפליקציות P2P, מצריכות קיבולת חיבור רחבה גדולה יותר וטכנולוגיות חדשות לשליטה באפליקציות. לבסוף, המעבר של ארגונים לשירותי ענן ציבוריים ופרטיים, בכל הווריאציות, משנות את הגבולות של הארגונים ומצריכות תפוקה רחבה ופתרונות אבטחה נוספים.
הדגמים החדשים של צ'ק פוינט משלבים טכנולוגיות רשת מהירות עם ביצועים גבוהים ויכולות multi core- ומספקים את הרמה הגבוהה ביותר של אבטחה מבלי להתפשר על מהירות הרשת, כדי לשמור על המידע, הרשת והעובדים שלך מוגנים. כל מכשיר מותאם במיוחד ל- Software Blades Architecture ויכול להריץ כל קומבינציה של מערכת זו- ובך לספק את הגמישות והרמה המדויקת של האבטחה לכל עסק, בכל מיקום רשת ע"י איחוד מספר רב של טכנולוגיות אבטחה לתוך פתרון משולב אחד.
כל מכשיר צ'ק פוינט כזה תומך בחזון אבטחת ה-3D של צ'ק פוינט- שילוב במדיניות, אנשים ואכיפה כדי ליצור אבטחה בלתי ניתנת להכנעה הכוללת את מאפייני ה-Software Blades הבאים: (1) Firewall, (2) VPN, (3) IPS, (4) Application Control, (5) Mobile Access, (6) DLP, (7) URL Filtering, (8) Antivirus, (9) Anti-spam, (10) Identity Awareness and (11) Advanced Networking and Clustering.
מאפיינים עיקריים
- 223 SecurityPower™
- 5 Gbps of firewall throughput
- 3.5 Gbps of IPS throughput
- Up to 12 10/100/1000Base-T ports
- Up to 4 1GbE Fiber ports
- 1 rack unit appliance
יתרונות עיקריים
- Entry level, enterprise-grade appliance
- Delivers everything you need to secure your network in one appliance
- Simplifies administration with a single integrated management console
- Ensures data security for remote access and site-to-site communications
- Provides comprehensive security and protects against emerging threats with Extensible Software Blade Architecture
Gateway Software Blades |
Firewall |
|
|
|
|
IPsec VPN |
|
|
|
|
Mobile Access (5 users) |
|
|
|
* |
Advanced Networking & Clustering |
|
|
|
|
Identity Awareness |
|
|
|
|
IPS |
|
|
|
* |
Application Control |
|
|
|
|
Data Loss Prevention |
* |
|
* |
* |
URL Filtering |
* |
* |
|
|
Antivirus |
* |
* |
|
|
Anti-spam |
* |
* |
|
* |
Anti-Bot |
* |
* |
|
* |
* Optional
מאפיינים עיקריים:
SecurityPower™
עד היום, בחירת מוצר אבטחה היתה מבוססת על בסיס הערכת ביצוע ספציפי לכל אפשרות אבטחה, בד"כ תחת תנאי מעבדה אופטימליים ובשימוש במדיניות אבטחה בעלת חוק אחד בלבד. כיום לקוחות יכולים לבחור מכשירי אבטחה בעזרת דירוג ה- SecurityPower™שלהם אשר מבוסס על תנועת אמת של הלקוח, אפשרויות אבטחה מרובות ומדיניות אבטחה טיפוסית.
SecurityPower הינו סימן היכר אשר מודד את היכולות והתפוקה של מכשיר על-מנת לבצע מספר רב של אפשרויות אבטחה מתקדמות (Software Blades) כמו IPS, DLP ושליטה באפליקציות בתנאי תנועה אמיתיים.
פתרון אבטחה "הכל כלול"
דגם ה-4400 של צ'ק פוינט מציע פתרון אבטחה מלא ומאוחד בגורם תצורת 1U אשר מבוסס על ה-Software Blade Architecture של צ'ק פוינט. ה-4400 זמין ב-3 חבילות תוכנה, 7,8,10 blades, בפלטפורמה המספקת אבטחה מורחבת ומעודכנת.
- Next Generation Firewall (NGFW): identify and control applications by user and scan content to stop threats—with IPS and Application Control.
- Secure Web Gateway (SWG): enables secure use of Web 2.0 with real time multi-layered protection against web-borne malware—with Application Control, URL Filtering, Antivirus and SmartEvent.
- Next Generation Data Protection (NGDP): preemptively protect sensitive information from unintentional loss, educate users on proper data handling policies and empower them to remediate incidents in real-time—with IPS, Application Control and DLP.
- Next Generation Threat Prevention (NGTP): apply multiple layers of protection to prevent sophisticated cyber-threats— with IPS, Application Control, Antivirus, Anti-Bot, URL Filtering and Email Security.
ניהול אבטחה משולב
המכשיר יכול להיות מנוהל בצורה מקומית עם יכולות ניהול האבטחה המשולבות שלו או ע"י ניהול מרכזי. בשימוש בניהול מקומי, המכשיר יכול לנהל את עצמו ומכשיר סמוך אחד למטרות זמינות גבוהה.
גישת חיבור מרחוק למכשירי מובייל
כל מכשיר מגיע עם גישת חיבור למכשירי מובייל עבור 5 משתמשים, בעזרת ה-Mobile Access Blade. הרישיונות מספקים אבטחת גישה מרחוק למקורות הארגון ממגוון רחב של מכשירים, הכוללים סמרטפונים, טאבלטים, PC, MAC ו-LINUX.
GAiA - The Unified Security OS
ה-GAiA של צ'ק פוינט הינו הדור הבא של מערכת הפעלה מאובטחת לכל מכשירי צ'ק פוינט, סרברים ו-gateways וירטואליים. ה-GAiA משלב את המאפיינים הטובים ביותר מ-IPSO ו- SecurePlatform לתוך ה-OS ומספק ביצועים יעילים ומשופרים יותר. ה-GAiA מאבטח IPv4 ו –Ipv6 ותומך ברשתות מורכבות ע"י פרוטוקולים דינמיים כמו RIP, OSPF, BGP, PIM (sparse and dense mode) and IGMP.
ה-GAiA מפשטת את הניהול בעזרת הפרדת תפקידים כך שהיא מאפשרת גישה ניהולית המבוסס על התפקיד. יתרה על כך, ה-GAiA מאיצה את יעילות הפעילות ע"י עדכוני תוכנה אוטומטיים. תשתית ה-web עתירת המאפיינים מאפשרת חיפוש מידי מכל סוג של פקודה או מאפיינים. GAiA מציעה התאמה מלאה עם IPSO ושורת הפקודה של ה-SecurePlatform והופכת את המעבר לפשוט יותר עבור לקוחות צ'ק פוינט קיימים.
Product Comparison:
Hardware Specifications
|
4200 |
4400 |
4600 |
4800 |
SecurityPower1 |
114 |
223 |
374 |
623 |
Firewall Throughput |
3Gbps |
5Gbps |
9Gbps |
11Gbps |
VPN Throughput |
0.4Gbps |
1.2Gbps |
1.5Gbps |
2Gbps |
IPS Throughput (Default / Recommended Profile) |
2Gbps / 0.3Gbps |
3.5Gbps / 0.7Gbps |
4Gbps / 1Gbps |
6Gbps / 1.5Gbps |
Concurrent Sessions |
1.2M |
1.2M |
1.2M |
3.3M2 |
Connections per Second |
25K |
40K |
50K |
70K |
VLANS |
1024 |
1024 |
1024 |
1024 |
Max VS Supported (Default/Max) |
3 / 3 |
10 / 10 |
10 / 10 |
25 / 25 |
10/100/1000Base-T Ports |
4 to 8 |
8 to 12 |
8 to 12 |
8 to 16 |
1000Base-F SFP Ports |
0 to 4 |
0 to 4 |
0 to 4 |
0 to 4 |
10GBase-F SFP+ Ports |
NA |
NA |
NA |
0 to 2 |
Memory |
4GB |
4GB |
4GB |
4GB / 8GB |
Storage |
250GB |
LOM |
NA |
NA |
NA |
Included |
Enclosure |
1U |
Dimensions WxDxH (standard) |
17.25 x 12.56 x 1.73 in. |
17.25 x 16.14 x 1.73 in. |
Dimensions WxDxH (metric) |
438 x 319 x 44 mm |
438 x 410 x 44 mm |
Weight |
4.0 kg (8.82 lbs.) |
7.5 kg (16.53 lbs.) |
7.6 kg (16.76 lbs.) |
Operating Environment |
Temperature: 32° to 104°F / 0° to 40°C; Relative Humidity 20% to 90% (non-condensing) |
Non-Operating Environment |
Temperature: 14° to 158°F / -20° to 70°C; Relative Humidity 5% to 95% (non-condensing) |
Redundant Hot-Swap Power Supply |
NA |
NA |
NA |
Optional |
Power Input |
100~240V, 50~60Hz |
Power Supply Spec (Max) |
100W |
250W |
275W |
Power Consumption (Max) |
57W |
90W |
140W |
Compliance |
CB/UL/cUL/CE/FCC/TUV/VCCI/C-Tick |
1 Check Point's SecurityPower is a new benchmark metric that allows customers to select security appliances by their capacity to handle real-world network traffic, multiple security functions and a typical security policy. 2With memory upgrade and GAiA OS
Software Specifications
|
4205 |
NGFW |
NGDP |
NGTP |
SWG1 |
Software Version |
R71.x, R75.x, R76.x |
Firewall |
|
|
|
|
|
Identity Awareness |
|
|
|
|
|
IPSec VPN |
|
|
|
|
|
Advanced Networking & Clustering |
|
|
|
|
|
Mobile Access2 |
|
|
|
|
* |
IPS |
* |
|
|
|
* |
Application Control |
* |
|
|
|
|
DLP |
* |
* |
|
* |
* |
URL Filtering |
* |
* |
* |
|
|
Antivirus |
* |
* |
* |
|
|
Anti-Spam & Email Security |
* |
* |
* |
|
* |
Anti-Bot |
* |
* |
* |
|
* |
Network Policy Management |
|
|
|
|
|
Logging and Status |
|
|
|
|
|
SmartEvent |
* |
* |
* |
* |
|
SmartWorkflow |
* |
* |
* |
* |
* |
Monitoring |
* |
* |
* |
* |
* |
Management Portal |
* |
* |
* |
* |
* |
User Directory |
* |
* |
* |
* |
* |
SmartProvisioning |
* |
* |
* |
* |
* |
SmartReporter |
* |
* |
* |
* |
* |
Endpoint Policy Management |
* |
* |
* |
* |
* |
NGFW = Next Generation Firewall;NGDP = Next Generation Data Protection;
NGTP = Next Generation Threat Prevention;SWG = Secure Web Gateway
- Included
* - Optional
1 Not available on 4200
2 Five users are included in default package
Technical Specifications:
Base Configuration
- 8 x 10/100/1000Base-T RJ45 ports
- 250 GB hard disk drive
- One AC power supply
- Standard rack mount
Network Expansion Slot Options (1 slot)
- 4 x 10/100/1000Base-T RJ45 ports
- 2 x 1000Base-F SFP ports 1
- 4 x 1000Base-F SFP ports
- 4 x 10/100/1000Base-T Fail-Open NIC
- 4 x 1000Base-F SX or LX Fail-Open NIC
Max Configuration
- 12 x 10/100/1000Base-T RJ45 ports
- 8 x 10/100/1000Base-T RJ45 + 4 x 1000Base-F SFP ports
Production Performance1
- 223 SecurityPower
- 2.2 Gbps firewall throughput
- 300 Mbps firewall and IPS throughput
RFC 3511, 2544, 2647, 1242 Performance Tests (LAB)
- 5 Gbps of firewall throughput, 1518 byte UDP
- 1.2 Gbps of VPN throughput, AES-128
- 3.5 Gbps of IPS throughput, Default IPS profile, IMIX traffic blend
- 700 Mbps of IPS throughput, Recommended IPS profile, IMIX traffic blend
- 1.2 million concurrent connections, 64 byte HTTP response
- 40,000 connections per second, 64 byte HTTP response
Network Connectivity
- IPv4 and IPv6
- 1024 VLANs
- 256 VLANs per interface
- 802.3ad passive and active link aggregation
- Layer 2 (transparent) and Layer 3 (routing) mode
|
High Availability
- Active/Active - L3 mode
- Active/Passive - L3 mode
- Session synchronization for firewall and VPN
- Session failover for routing change
- Device failure detection
- Link failure detection
- ClusterXL or VRRP
Virtual Systems
Dimensions
- Enclosure: 1U
- Standard (W x D x H): 17.25 x 12.56 x 1.73 in.
- Metric (W x D x H): 438 x 320 x 44 mm
- Weight: 7.5 kg (16.53 lbs.)
Power Requirements
- AC Input Voltage: 100 - 240V
- Frequency: 50 - 60 Hz
- Single Power Supply Rating: 250 W
- Power Consum ption Maximum: 90 W
- Maximum thermal output: 240.1 BTU
Operating Environmental Conditions
- Temperature: 32° to 104°F / 0° to 40°C
- Humidity: 20% to 90% (non-condensing)
Storage Conditions
- Temperature: –4° to 158°F / –20° to 70°C
- Humidity: 5% - 95% @ 60°C (non-condensing)
Certifications
- Safety: CB, UL/cUL, CSA, TUV, NOM, CCC, IRAM, PCT/GoST
- Emissions: FCC, CE, VCCI, C-Tick, CCC, ANATEL, KCC
- Environmental: RoHS
|
1Maximum production performance based upon the SecurityPower benchmark. Real-world traffic, Multiple Software Blades, Typical rule-base, NAT and Logging enabled. Check Point recommends 50% SPU utilization to provide room for additional Software Blades and future traffic growth. Find the right appliance for your performance and security requirements using the Appliance Selection Tool.
Virtual Systems:
Check Point Virtual Systems taps the power of virtualization to consolidate and simplify security for private clouds while delivering a lower total cost of ownership. It enables customized security against evolving network threats with the extensible Software Blade Architecture. Virtual Systems is supported on Check Point Appliances, including the 61000 Security System as well as open servers.
Benefits
Simplify and consolidate network security with Virtual Systems
- Add Virtual Systems to any gateway or leverage pre-configured Virtual System Appliances to secure multiple network segments
- Simplify enterprise-wide policy by creating tailored policies for each Virtual System
- Resource monitoring for each Virtual System; easily add, provision and upgrade without downtime
Deploy any Software Blades on any virtual system for customized protection
- Advanced protections now include: Firewall, VPN, IPS, Application Control, URL Filtering, Antivirus, Anti-Bot, Identity Awareness and Mobile Access
- Flexibility to enable Software Blades uniquely for each Virtual System with customized protections
- Enable separation of IT duties with dedicated Virtual Systems for Web Security, Threat Prevention, Firewall and Remote Access
Boost performance using the latest Check Point technologies
- Over eight times more concurrent connections with 64-Bit GAiA OS
- Increased throughput by utilizing multi-core processors with CoreXL technology
- Cluster up to eight gateways using patented VSLS technology for unmatched scalability
Features
Security Consolidation
For years, Check Point’s Virtual Systems technology has been providing value and protection for enterprises and service providers. This proven technology enables organizations to consolidate up to 250 gateways into a hardware platform providing savings on both capital equipment investments and ongoing support and maintenance. The streamlined management of the virtualized gateways further improves the operational efficiency of a resource-challenged IT department, bringing the needed simplicity to network security.
Flexible Software Blade Security
Supporting the latest Check Point Software Blade Architecture on every Virtual System, this solution delivers comprehensive and customized protection to multiple networks or virtual LANs (VLANs) within complex network infrastructures. Supporting Software Blades including Firewall, VPN, Intrusion Prevention (IPS), Identity Awareness, Application Control, URL Filtering, Antivirus and Anti-bot, administrators have the flexibility to configure any Software Blades with any security policy to any Virtual System.
Customizable Security Policies per Virtual System
The ability to tailor security policies for each Virtual System enable administrators to break down large complex network security policies into smaller more granular and more manageable policies. Customizing security policy base on business requirements minimize the complexity and create better security practice to meet the business needs.
Simple Deployment and Streamlined Central Management
Easily deploy Virtual Systems with pre-configured appliances or upgrading existing gateways using One-Click Conversion, effectively manage these Virtual Systems with simplified and central management using Check Point Security Management and Multi-Domain Security Management.
- One-Click Conversion
Enabling Virtual Systems from a physical system is simple and fast with a single click to launch the Virtual System Conversion Wizard.
- Centralized Management and Provisioning
- Integration with Check Point Security Management and Multi-Domain Security Management solutions
- One-click conversion with Virtual SystemsWizard
- Simple provisioning using the creation templates
- Separate per virtual system management and data segregation enable cloud-based security-as-a-service offerings
High Performance Security
Combining the latest security solutions with the patented CoreXL technology and the 64-bit GAiA OS, performance for virtualized security deployments is greatly enhanced. Up to eight times more concurrent connection capacity and the multi-gigabit-per-second performance for firewall and IPS throughputs are just a few examples of the outstanding performance the solution will deliver. The new Check Point Virtual Systems are designed to meet the requirements for the most demanding network environments.
Linear Scalability
Today’s networks require flexibility and expandability to support the fast-evolving business needs. To meet this demanding business environment, Virtual Systems can be deployed on multiple gateways using Check Point’ high-performance technologies, ensuring secure, resilient, multi-gigabit throughput. Virtual Systems leverage the following features and technologies to maximize performance, capacity and system scalability:
- Virtual System Load Sharing (VSLS) distributes traffic load within a cluster, providing the ability to distribute virtual systems across multiple cluster members. Additional cluster members effectively share the virtual system traffic loads within the cluster, providing improved throughputs, connection capacity, high availability, simplified management and linear scalability
- Resource Control allows administrators to manage the processing load by guaranteeing that each virtual system will receive only the memory and CPU allocation it needs to deliver its functions. Resources not needed by one virtual system are automatically made available to other virtual systems. Administrators can also limit the CPU resource available to a lower-priority virtual system and assign more capacity to mission-critical virtual systems.
Integrated Virtual Routers and Switches
Simplify deployment, configuration and save costs of external network routers and switches. The integrated virtual routers and switches direct inter-Virtual System traffics to their intended destinations with higher efficiency.
Per Virtual System Resource Utilization Monitoring
Need to understand how your Virtual Systems are used to better plan your security resources, or want to create billable customer services based on their usage? Granular resource monitoring of CPU and memory for each virtual system gives you the necessary insights to effectively plan for your network security resources, or to provide usage-based services to your customers.
Flexible Packaging Options
Check Point Virtual Systems are offered either as a software-only option or in pre-configured bundles with Check Point Security Appliances and Software Blades, providing the flexibility and convenience for different deployment situations.The software only option allows customers to upgrade their existing Check Point Appliances and open servers to a Virtual System environment, or to build a customized Virtual System for their specific network security needs. The pre-configured bundles offer a quick turn-key solution that is easy to purchase and deploy.
Specifications
Operating System Release |
GAiA (R75.40VS) or later |
Supported Gateways |
Check Point Appliances and Open Servers |
Minimum Memory |
2GB |
Supported Technologies |
ClusterXL, CoreXL, SSL inspection |
Monitoring |
Resource monitoring (CPU & Memory), per Virtual System SNMP monitoring |
Maximum Virtual Systems |
2200 |
2 / 2 GB |
3 / 3 |
4200 |
4 / 4 GB |
3 / 3 |
4400 |
4 / 4 GB |
10 / 10 |
4600 |
4 / 4 GB |
10 / 10 |
4800 |
4 / 8 GB |
20 / 25 |
12200 |
4 / 12 GB |
20 / 50 |
12400 |
4 / 12 GB |
25 / 75 |
12600 |
6 / 12 GB |
75 / 150 |
13500 |
16 / 32 GB |
150 / 250 |
21400 |
12 / 24 GB |
125 / 250 |
21600 |
16 / 32 GB |
150 / 250 |
21700 |
16 / 32 GB |
150 / 250 |
41000 |
64 / 64 GB |
250 / 250 |
61000 |
12 / 64 GB |
125 / 250 |
UTM-1 3070 |
4 / 4 GB |
10 / 10 |
Power-1 9070 |
4 / 8 GB |
50 / 75 |
Power-1 11000 |
6 / 12 GB |
75 / 125 |
IP 1280 |
4 / 8 GB |
10 / 50 |
IP 2450 |
4 / 8 GB |
50 / 75 |
Virtual System Appliances
Pre-configured Virtual Systems bundled with Check Point Security Appliance, Virtual Systems and Software Blades. The Virtual System Appliances are available in single system and high-availability (VSLS) configurations.
Performance |
Firewall Throughput (Gbps) |
5 | 9 |
9 | 16 |
11 | 20 |
15 | 27 |
25 | 45 |
VPN Throughput (Gbps) |
1.2 | 2.1 |
1.5 | 2.7 |
2 | 3.6 |
2.5 | 4.5 |
3.5 | 6 |
Concurrent Sessions (M) |
1.2 | 1.4 |
1.2 | 1.4 |
3.31 | 41 |
51 | 61 |
51 | 61 |
Network |
10/100/1000Base-T Ports (Def/Max) |
8/12 | 16/24 |
8/12 | 16/24 |
8/16 | 16/32 |
8/16 | 16/32 |
10/26 | 20/52 |
1000Base-F SFP Ports (Def/Max) |
0/4 | 0/8 |
0/4 | 0/8 |
0/4 | 0/8 |
0/4 | 0/8 |
0/12 | 0/24 |
10GBase-F SFP+ Ports (Def/Max) |
N/A |
N/A |
0/2 | 0/4 |
0/4 | 0/8 |
0/12 | 0/24 |
Expansion Slots |
1 | 2 |
1 | 2 |
1 | 2 |
1 | 2 |
3 | 6 |
Additional Features |
R67 VSX Option |
No |
No |
No |
Yes |
Yes |
Virtual Systems (Included/Maximum) |
5/10 |
5/10 |
10/25 |
10/50 |
10/75 |
Physical |
Enclosure |
1U | 2U |
1U | 2U |
1U | 2U |
1U | 2U |
2U | 4U |
Weight (lb) |
16.5 | 33.1 |
16.5 | 33.1 |
16.8 | 33.5 |
16.8 | 33.5 |
51.6 | 103.2 |
Power |
Dual, Hot-Swap PSU |
No |
No |
Optional |
Yes |
Yes |
Power Input |
110-240VAC, 47-63Hz |
Max Power Consumption (W) |
90 | 180 |
90 | 180 |
140 | 280 |
121 | 242 |
132 | 264 |
DC Power Option2 |
No |
Yes |
Yes |
Yes |
Yes |
Software Blade |
Software Blades (Included) |
Firewall, VPN, Identity Awareness, Advanced Networking & Clustering, Mobile Access, IPS, Application Control |
Performance |
Firewall Throughput (Gbps) |
30 | 54 |
77 | 138.6 |
50 | 90 |
75 | 135 |
78 | 141 |
VPN Throughput (Gbps) |
6 | 10.5 |
17 | 30.6 |
7 | 12.5 |
8.5 | 15 |
11 | 27 |
Concurrent Sessions (M) |
51 | 61 |
281 | 33.61 |
101 | 121 |
131 | 15.61 |
131 | 15.61 |
Network |
10/100/1000Base-T Ports (Def/Max) |
14/26 | 28/52 |
14/26 | 28/52 |
13/37 | 26/74 |
13/37 | 26/74 |
13/37 | 26/74 |
1000Base-F SFP Ports (Def/Max) |
0/12 | 0/24 |
0/12 | 0/24 |
0/36 | 0/72 |
0/36 | 0/72 |
0/36 | 0/72 |
10GBase-F SFP+ Ports (Def/Max) |
0/12 | 0/24 |
0/12 | 0/24 |
0/12 | 0/24 |
0/13 | 0/26 |
0/13 | 0/26 |
Expansion Slots |
3 | 6 |
3 | 6 |
3 | 6 |
3 | 6 |
3 | 6 |
Additional Features |
R67 VSX Option |
Yes |
No |
Yes |
No |
No |
Virtual Systems (Included/Maximum) |
20/150 |
20/250 |
20/250 |
20/250 |
20/250 |
Physical |
Enclosure |
2U | 4U |
2U | 4U |
2U | 4U |
2U | 4U |
2U | 4U |
Weight (lb) |
51.6 | 103.2 |
38.6 | 77.2 |
57.4 | 114.8 |
57.4 | 114.8 |
57.4 | 114.8 |
Power |
Dual, Hot-Swap PSU |
Yes |
Yes |
Yes |
Yes |
Yes |
Power Input |
110-240VAC, 47-63Hz |
Max Power Consumption (W) |
220 | 440 |
431 | 862 |
449 | 898 |
449 | 898 |
489 | 978 |
DC Power Option2 |
Yes |
Yes |
Yes |
Yes |
Yes |
Software Blade |
Software Blades (Included) |
Firewall, VPN, Identity Awareness, Advanced Networking & Clustering, Mobile Access, IPS, Application Control |
1 With memory upgrade and GAiA OS
2 Via a Solution Center Request
Support Options:
Check Point UTM-1 Total Security 1-Year Model Support Options:
- Standard Support available at 12% of list per year
- Premium Supportavailable at 17% of list per year
Support Time |
9 x 5 Business Day |
24 x 7 Every Day |
24 x 7 Every Day |
24 x 7 Every Day |
Latest Hot Fixes & Service Packs |
Yes |
Yes |
Yes |
Yes |
Major Upgrades & Enhancements |
Yes |
Yes |
Yes |
Yes |
Access to Online Support Knowledgebase |
Advanced |
Advanced |
Expert |
Advanced |
Unlimited Service Requests |
Yes |
Yes |
Yes |
Yes |
Hardware Warranty |
3 Years |
3 Years |
3 Years |
3 Years |
Committed Response time to Severity-1 issues |
4 Hours |
30 Minutes |
30 Minutes |
30 Minutes |
Committed Response time to Severity 2,3,4 issues |
4 Hours |
4 Hours |
4 Hours |
4 Hours |
Issues open with |
Standard Support Desk |
Premium Support Desk |
Designated Engineer |
Premium Support Desk |
RMA Determination |
Support Engineer |
Support Engineer |
Customer |
Support Engineer |
Shipment & Delivery SLA |
Next business day shipment, delivery usually within 2-3 business days |
Same business day shipment, Next business day delivery target* |
As in Premium/Premium 4hrs (if purchased) |
24x7; Qualified engineer will arrive on-site within 4 hours to handle RMA |
* For RMA (Return Material Authorization) determination completed by 15:00 regional hub time, otherwise shipment will occur next business day with delivery target extended by one day. There are four regional hubs, one located in each of the following: U.S., APAC, Europe and Israel. Next day delivery during weekends is possible at no extra charge upon request.
** This service is available at selected locations. Please verify availability for your location before purchasing this service level. |