est-in-class Integrated Firewall and Enterprise-class IPS
Check Point Series 80 Appliance includes the industry's most proven firewall technology, based on the same Check Point technologies that secure the Global 100.
Comprehensive Network Access Control (NAC) allows blocking of unwanted applications such as IM and P2P, while an advanced Intrusion Prevention System (IPS) ensures protection of remote sites from both known and unknown threats, such as denial-of-service, post scans and buffer overflows.
Comprehensive Functionality
The Check Point Series 80 Appliance provides unmatched functionality to seamlessly secure the entire branch office, including no moving parts, 802.3 bridging, VLAN tags, one-click NAT, dual ISP, DHCP server and relay and active/passive high availability.
Functionality |
Details |
No moving parts |
High hardware mean time between failure |
802.3 Bridging |
Easily implement changes in the network infrastructure |
VLAN Tags |
Allows seamless deployment in virtual LAN environments |
One-click NAT |
Connects the entire network to the Internet with a single public IP address |
Dual ISP |
Allows DMZ port to be used as a backup WAN port link for reliable Internet access |
DHCP Server and Relay |
Reduces IP address configuration errors and management; prevents address conflicts |
Active/Passive High Availability |
Provides full redundancy when a primary system fails |
Highest Gigabit Ethernet Ports
 Series 80 Appliance provides high-port density designed for enhanced performance in large-scale Ethernet network applications.
High-density port appliances allow branch offices to connect front-end routers and back-bone Ethernet switches with 1.5Gbps of firewall throughput, the ultimate choice for protecting branch office information. In most cases it also allows a branch office with limited IT resources to manage all other network connections in a single desktop form-factor minimizing network errors and improving IT staff efficiency.
Simple Configuration and Deployment
The Check Point Series 80 Appliance can be up-and-ready in minutes, offering hassle-free deployment to branch offices with minimal IT support staff. Even non-technical staff can easily perform initial setup and configuration via a simple start-up wizard, without the need of corporate IT staff.

Software Blades and Protection Details
Check Point Series 80 Appliance includes the Firewall Software Blade and IPSec VPN Software Blade, right out-of-the-box. Upgrade branch office security in a single-click by adding the following Check Point Software Blades: IPS Software Blade, Antivirus and Anti-Malware Software Blade, Anti-Spam and Email Security Software Blade and URL Filtering Software Blade.
Firewall Software Blade |
Protocol/Application Support |
Secures more than 200 applications and protocols |
VoIP Protection |
SIP, H.323, MGCP, and SCCP with NAT support |
Instant Messaging Control |
MSN, Yahoo, ICQ, Skype, GoogleTalk, and QQ Instant Messenger |
Peer-to-peer Blocking |
Kazaa, Gnutella, BitTorrent, eMule, DirectConnect, Soulseek, Thunder, and Winny |
Network Address Translation (NAT) |
Static/hide NAT support with manual and automatic rules |
Layer-2 Bridge Support |
Transparently integrates into existing network |
IPsec VPN Software Blade |
Encryption Support |
AES 128-256 bit, 3DES 56-168 bit |
Authentication Methods |
only local database |
Certificate Authority |
Integrated certificate authority (X.509) |
VPN Communities |
Automatically sets up site-to-site connections as objects are created |
Topology Support |
Star and mesh |
IPS Software Blade |
Network-layer Protection |
Blocks attacks such as DoS, port scanning, IP/ICMP/TCP-related |
Application-layer Protection |
Blocks attacks such as DNS cache poisoning, FTP bounce, improper commands |
Detection Methods |
Signature-based, behavioral and protocol anomaly |
Antivirus and Anti-malware Software Blade |
Antivirus Protection Protocols |
Protects HTTP, FTP, and SMTP |
Anti-spyware Blocks |
Pattern-based spyware blocking at the gateway |
Antivirus and Anti-spyware Protection Updates |
Centralized, daily updates, automatic and manual updates. |
Granular Scanning by File Types |
Scan by more than 70 different file types that are constantly updated |
Options |
File-based AV or protocol-based AV |
Anti-spam and Email Security Software Blade |
IP Reputation Anti-spam |
Blocks spam and malware at the connection level by checking the sender's reputation against a dynamic database of known malicious IP addresses |
URL Filtering Software Blade |
URL Filtering Categories |
Over 90 categories including: adult, advertisements, arts, chat, computing, criminal, drugs, education, finance, food, gambling, games, glamour & intimate apparel, government, hacking, hate speech, health, hobbies, hosting sites, job search, kids sites, lifestyle & culture, motor vehicles, news, personals & dating, photo searches, real estate, reference, religion, remote proxies, search engines, sex education, shopping, sports, streaming media, travel, Usenet news, violence, weapons, web based e-mail |
White Listing (allowed sites) |
URLs and IPs |
Black Listing (blocked sites) |
URLs and IPs |
Network Exceptions |
Exceptions based on network objects defined |
Blocking Notification |
Custom messages or URL redirection |
Management and Reporting
The Check Point Series 80 Appliance is centrally-managed by either Security Management or Multi-Domain Security Management.
Check Point security management solutions are designed as an interoperable system based on a core unified security architecture. This core security architecture enables the central control of security policy across multiple layers of the infrastructure.
Centralized Management |
Managed by Check Point centralized Security Management and Check Point Multi-Domain Security Management |
Monitoring/Logging |
SmartView Tracker and SmartView Monitor provide advanced monitoring and logging |
Reporting |
Fully integrated with SmartReporter and SmartEvent Software Blades |
Command Line Interface (CLI) |
CLI for device and cluster |
Integrated into Flexible Software Blade Architecture
The Check Point Software Blade architecture is the first and only security architecture that delivers complete, flexible and manageable security to companies of any size. With unprecedented flexibility and expandability, Software Blades deliver lower cost of ownership and cost-efficient protection that meet any need, today and in the future.
Full integration into the modular Software Blade Architecture allows for rapid and easy activation on any Check Point security gateway.
|