Introduction to Check Point 41000 and 61000 Security Systems
Huge data centers have inflexible needs for performance, uptime and scalability. High end security gateway resolutions must perform network access control within the exclusive requirements of these environments. With the increase in refined attacks, added security layers such as IPS, Application Control, URL Filtering, Antivirus and others are also required.
In addition to their massive performance and security requirements, data center situations are characterized by unbending requirements for high dependability of its various systems.
The Check Point 41000 and 61000 Security Systems were designed to excel in challenging big data center and telco environments. The multi-bladed, chassis-based security systems scale able to 33,000 SPU to support the energetic needs of rising networks while contribution high dependability and performance. All of these necessities drive the need for redundant, serviceable and highly available components and systems.
Fig 1.1- Checkpoint 41000 and 61000 SSM
|
Acquires high requirement networks
- It can deliver supreme security performance up to 120 Gbps throughput
- Customers can add modules, enhancing performance even when those systems are in production
- Protects the most multifarious networks by associate energetic routing protocols
Improves and prolongs security
- Makes it easy to add Security Gateway Modules for more security or greater performance
- Adapts any Software Blades to enhance security protections
- Delivers high port density and high speed connectivity choices with Security Switch module
Innovation security performance
The 41000 and 61000 Security Systems retain a highly adaptable and modular system architecture that drastically boosts security and performance.
Checkpoint 41000 Security System:
- Starts at 3,200 Security Power Units, with 1 Security Gateway Module (SGM)
- Scales to 11,000 SPUs with 4 SGMs
Checkpoint 61000 Security System:
- Scales easily from 2 to 12 SGMs
- Delivers up to 33,000 total Security Power Units, 400 Gbps of firewall throughput, and up to 130 Gbps IPS protection when fully loaded with 12 SGM260s
Reliability and high serviceability
Checkpoint planned both systems to meet the inflexible high accessibility and serviceability standards of modern network requirements
- Hot-swappable redundant power supplies, hard disk drives and fans
- Carrier-grade availability and serviceability in a rugged rack-mount chassis
- Redundant Chassis Management Modules continuously check and monitor chassis health, including fans, power supplies and SGMs
Cohesive with extensible Software Blade Architecture
Each 41000 and 61000 security device is packaged with a collection of preselected form factor software Blades which including Firewall, IPsec VPN, identity focus, advanced Networking, and Acceleration and Clustering with extra software program Blade upgrades are available to equally expand and engrave safety alternatives.
The check factor software Blade architecture is the primary and best security structure that grants complete, bendy and possible protection to organizations of any length. With exceptional flexibility and expandability, software program Blades supply decrease price of possession and fee-efficient protection that meet any need, today and inside the future.
High network capacity
These systems are designed to flexibly scale and support the needs of large, dynamic networks.
Checkpoint 41000 Security System:
- Compact 6u chassis offering
- Up to 4xSGM260, 2xSSM160
- Up to 80 million concurrent connections at 1.1 million connections per second
Checkpoint 61000 Security System:
- Maximum chassis configuration of 10xSGM260 and 4xSSM160
- Supports up to 60 x 10GbE SFP + ports and up to 8 x 40GBase-QSFP ports
- Supports up to 210 million concurrent connections and 3 million sessions per second
Fast deployment and centralized management
Using the available local management console and intuitive configuration wizard, the entire system can be deployed in less than 30 minutes. For secure and centralized administration anywhere in the network, these systems also work with the Check Point Security Management Software Blades.