throbber
connections
`connections
`connections
`
`C H E C K
`
`P O I N T
`
`S O F T W A R E
`
`T E C H N O L O G I E S
`
`L T D .
`
`V O L U M E O N E
`
`DearC H E C K
`
`P O I N T C U S T O M E R
`
`TABLE OF CONTENTS
`
`On behalf of Check Point Software Technologies, I would like to welcome you to the
`
`1 Letter to Our
`Customers
`
`2 OPSEC Alliance
`
`3 DHL Protects
`Critical Information
`Resources with
`FireWall-1
`
`4 IBM Resells
`FireWall-1
`
`4 ISPs Rely on
`FireWall-1
`
`5 Xylan Embeds
`FireWall-1 Engine
`
`5 Reference Desk
`
`6 ConnectControl
`Module
`
`7 Tech Tips
`
`8 Calendar
`
`inaugural issue of Check Point Connections, our new quarterly customer newsletter. As the name
`
`implies, this newsletter is intended to keep you, our valued customer, “connected” with Check Point
`
`and our products. Each issue will contain product feature highlights, overviews of key products and
`
`partnerships recently announced by Check Point, technical tips from our outstanding technical team,
`
`and updates on network security issues and references to keep you on top of the latest fast-moving
`
`network security market.
`
`The theme of this issue of Check Point Connections is OPSEC, Check Point’s Open Platform for
`
`Secure Enterprise Connectivity. OPSEC is Check Point’s answer to the evolving network security requirements of today’s enter-
`
`prise, one in which Internet, intranet and extranet computing are critical to the lifeblood of the corporation. With the explosion
`
`and rapid acceptance of the Internet, the physical corporate boundaries that previously defined and governed
`
`corporate networks are irrelevant and obsolete. A new paradigm has evolved, pioneered in part by Check Point, whereby
`
`corporate networks are being defined by enterprise-wide security policies. To be effective, these policies must include a broad
`
`range of security ser vices that govern access to network information resources and protect the privacy and integrity of network
`
`communications, including access control, validation of authorized network users, protection of data privacy,
`
`anti-virus scanning, URL filtering, protection against malicious Java and ActiveX applets...the list is virtually endless.
`
`And because enterprise-wide networking means connectivity to anyone, anywhere, internal or external to the corporate
`
`network, a security policy must also be enterprise-wide, providing policy-based management for an organization’s worldwide
`
`offices, remote and mobile users, business partners and customers. This is the OPSEC vision.
`
`Since its initial unveiling in late 1996, OPSEC has been endorsed by more than 80 leaders in network security and the
`
`general computer and software industries, including 3Com Corporation, Bay Networks, Hewlett-Packard, IBM, Netscape, Oracle,
`
`RSA Data Security, and Security Dynamics. Through OPSEC and our expanding partnerships within the OPSEC Alliance (see
`
`article on page 2), Check Point will be able to broaden the range of security functions supported through its integrated
`
`management console to meet your evolving requirements.
`
`The essence of the OPSEC architecture is to provide a single platform which integrates and manages all aspects of network
`
`security through an open, extensible management framework. Third-party security applications can plug into the OPSEC frame-
`
`work through open, published APIs, industry-standard protocols, as well as INSPECT, Check Point’s high-level scripting
`
`language. As a result of this architecture, you can easily and seamlessly integrate a customized set of security components to
`
`best meet your requirements and later add new security modules as needed. With OPSEC, all facets of network security are
`
`defined and driven by a single enterprise-wide security policy.
`
`Yours Truly,
`
`Deborah Triant, President and CEO
`Check Point Softwar e Technologies, Inc .
`
`Juniper Ex. 1035-p. 1
`Juniper v Implicit
`
`

`

`c o n n e c t i o n s
`
`OPSEC
`
`A L L I A N C E
`
`In suppor t of OPSEC (Open Platform for Secure
`
`OPSEC Alliance Program members to-date include:
`
`Enterprise Connectivity), Check Point’s emerging
`
`I N F R A S T R U C T U R E P A R T N E R S
`
`industry standard for enterprise security, over 80 industry
`
`leaders have joined Check Point’s OPSEC Alliance, an open
`
`industry-wide initiative. The OPSEC Alliance is dedicated to
`
`providing enterprise security solutions and designed to
`
`AST Research
`Bay Networks
`Hewlett-Packard Company
`Ipsilon Networks, Inc.
`TimeStep Corporation
`Sun Microsystems, Inc.
`
`3Com Corporation
`FTP Software, Inc.
`IBM Corporation
`NCR
`U.S. Robotics
`Xylan Corporation
`
`ensure interoperability between best-of-class, leading edge
`
`F R A M E W O R K P A R T N E R S
`
`security products at the policy level. It is open to all vendors
`
`providing the technology building blocks for enterprise
`
`security solutions.
`
`The industry’s only open enterprise security platform enabling
`
`the integration and management of broad range of enterprise
`
`network security technologies through a single, enterprise-
`
`wide security policy, the OPSEC Alliance provides Check Point
`
`customers a comprehensive set of security components
`
`from which to select and easily integrate products already
`
`implemented within the corporation.
`
`All OPSEC Alliance partners have use of
`
`OPSEC
`Alliance
`that their products can plug into the OPSEC framework.
`
`the “OPSEC Alliance” logo, indicating
`
`Additionally, OPSEC Alliance partners can elect to have their
`
`products certified by Check Point, providing a measure of
`
`interoperability assurance for customers. Products passing
`
`Check PointOPSEC
`
`this interoperability testing will receive
`
`the “OPSEC Certified” designation and logo
`
`from Check Point to clearly designate these
`
`C E R T I F I E D
`
`certified products.
`
`OPSEC Alliance Partners are divided into three categories:
`
`Infrastructure, Framework and Passpor t. Infrastructure
`
`Partners embed or bundle Check Point FireWall-1 with their
`
`products deliver ed to their customer base. Framework
`
`Partners are developing or have developed complementary
`
`value-added products that can be certified as compatible with
`
`Content Security
`Computer Associates/
`ASAP Ltd.
`Command Software Systems, Inc. Cheyenne Software
`DataFellows
`Digitivity, Inc.
`Dr. Solomon’s Software
`EliaShim, Inc.
`Finjan Software
`Integralis, Inc.
`McAfee Associates
`Security-7 Ltd.
`NetPartners Internet Solutions, Inc. Symantec Corporation
`
`Authentication and Authorization
`Axent Technologies, Inc.
`ActivCard, Inc.
`Blockade Systems Corp.
`CryptoCard
`Funk Software
`MEMCO Software
`NeTegrity, Inc.
`Secure Computing Corp.
`Security Dynamics
`Vasco Data Security, Inc.
`
`Encryption
`RSA Data Security
`
`Router Security Management
`3Com Corporation
`Bay Networks, Inc.
`
`Intrusion Detection
`AbirNet
`Internet Security Systems
`
`Haystack Labs, Inc.
`Netect
`
`Event Analysis & Repor ting
`Accrue Software, Inc.
`Bellcore
`BGS Systems, Inc.
`Kaspia Systems
`SecureIT, Inc.
`Sequel Technology Corp.
`TELEMATE Software, Inc.
`
`Event Integration
`Hewlett-Packard Company
`The Qualix Group, Inc.
`
`Stonesoft
`
`P A S S P O R T P A R T N E R S
`
`BMC Software, Inc.
`BackWeb Technologies
`Citrix;Connected Corp.
`Campbell Ser vices, Inc.
`FreeTel Communications
`e-motion, Inc.
`Informix Software
`Gradient
`Intel Corporation
`InfoData Systems, Inc.
`Microsoft Corporation
`Liquid Audio, Inc.
`Netscape Communications Corp. OnLive! Technologies
`Oracle Corporation
`OutReach Technologies, Inc.
`PointCast, Inc.
`PictureTel Corporation
`Progressive Networks, Inc.
`Starlight Networks
`Sybase, Inc.
`VDOnet Corporation
`VocalTec
`Vosaic
`Voxware, Inc.
`Vxtreme, Inc.
`White Pine Software, Inc.
`Xing Technology Corp.
`
`Check Point’s OPSEC protocols and APIs. Passport Partners
`
`To stay current on OPSEC-compliant products and for
`
`are application development vendors that ensure secure
`
`assistance in building your enterprise security solution,
`
`computing over the Internet via application compatibility with
`
`visit the OPSEC Alliance Solutions Center at www.check-
`
`the OPSEC platform.
`
`point.com/opsec.
`u
`
`connections connections
`
`connections
`
`2CHECK POINT SOFTWARE TECHNOLOGIES LTD.
`
`Juniper Ex. 1035-p. 2
`Juniper v Implicit
`
`

`

`customer profile
`customer profile
`
`3
`
`DHLP R O T E C T S C R I T I C A L I N F O R M AT I O N R E S O U R C E S W I T H F I R E WA L L - 1
`
`In today’s competitive international package delivery busi-
`
`use graphical user
`
`ness, only tracking information moves faster than documents
`
`interface that stream-
`
`and packages: where a package may take two to three days
`
`lines maintenance
`
`to reach its destination, tracking data associated with the
`
`activities.”
`
`package must span the globe in minutes in order to meet
`
`customer need and demand for this information.
`
`In 1996, that firewall
`
`was upgraded
`
`to
`
`“Tracking information is a critical element in our business
`
`FireWall-1 Version 2.1 running on a Sun Solaris platform to
`
`because customers want to know where their packages are
`
`meet the increased security requirements associated with
`
`almost as soon as the courier picks them up,” explains
`
`the launch of a new application that empowers customers
`
`Vanessa Lea, Gateway and Internet Services Manager at DHL
`
`to track their own packages from the DHL Web site
`
`Systems, Inc. “If we don’t have this data available when
`
`(www.dhl.com). “By simply entering a package tracking
`
`customers need it, we simply will not be able to compete in
`
`number, this Web-based application accesses our database
`
`the global marketplace.”
`
`hidden from the customer by the firewall and reports back
`
`through the firewall with the package status,” van Reijendam
`
`DHL Systems, a technology service company for the DHL
`
`explains. “We stayed with the Check Point firewall for this
`
`Worldwide Express organization, is charged with providing
`
`new application because of its proven track record in our net-
`
`global network services to the entire enterprise, the world’s
`
`work as well as the fact that it operates between the second
`
`largest and most experienced international air express
`
`and third OSI (Open Systems Interconnect) layer. As a result,
`
`network, linking more than 825,000 destinations in more than
`
`there is no way for data or traffic to circumvent the firewall.”
`
`225 countries.
`
`DHL currently has FireWall-1 installed at both of their Web
`
`DHL Systems realized the potential importance of electronic
`
`servers, one in Burlingame, California, the other in London,
`
`communications in achieving the company’s information
`
`England. “With this configuration,” Lea adds, “we can effec-
`
`needs back in 1988 when they installed their first Internet
`
`tively eliminate over-loading that otherwise might occur at
`
`connection to expedite e-mail communications with
`
`either site at any given time. Furthermore, with replicated
`
`customers and suppliers. “As e-mail and Internet usage
`
`sites and firewalls distributed on either side of the Atlantic,
`
`caught on,” says Johan van Reijendam, Senior Network
`
`we have a high degree of both security and disaster protec-
`
`Engineer, “we soon recognized that if we were going to put
`
`tion: should an earthquake ever impact our California facility,
`
`any value on these services then we would have to protect our
`
`for example, London stands ready with its own FireWall-1 to
`
`investments with a firewall as a precautionary measure.”
`
`carry on.” u
`
`Accordingly, in 1994, DHL Systems implemented the first
`
`DHL firewall, using FireWall-1 from Check Point Software
`
`Technologies Ltd., on a Sun SPARC-2 server. “FireWall-1 was
`
`selected,” Lea says, “because it met our security needs,
`
`was straightforward to implement, and features an easy to
`
`c o n n e c t i o n s
`
`Juniper Ex. 1035-p. 3
`Juniper v Implicit
`
`

`

`IBMO E M S F I R E W A L L - 1
`
`c o n n e c t i o n s
`
`Adding to Check Point Software Technologies’ strong list
`
`FireWall-1 for AIX will be available in the third quar ter of
`
`of OEM par tners, the company recently announced an
`
`1997 from IBM and its authorized resellers, both as a
`
`agreement with IBM Corporation to OEM the Check Point
`
`stand-alone software product and as part of an RS/6000
`
`FireWall-1 enterprise security solution. As part of the agree-
`
`Internet POWERsolution, ready-to-run Web server systems.
`
`ment, Check Point also announced FireWall-1 for IBM’s
`
`The product will also be available through Check Point
`
`RS/6000 ser ver family running the AIX operating system.
`
`authorized distributors and resellers.u
`
`The addition of FireWall-1 for AIX makes Check Point the only
`
`network security software vendor to support all major
`
`commercial ser ver platforms,
`
`including Sun Solaris,
`
`HP-UX, Microsoft Windows NT and IBM AIX-based systems.
`
`IBM is reselling
`FireWall-1 as part
`of its Internet
`POWERsolutions
`and as a stand-
`alone product.
`
`ISPsR E L Y O N F I R E W A L L - 1
`
`The proliferation of intranets and extranets in corporations has brought with it
`
`the need to secure these networks from unwanted intruders and unauthorized users. Many
`
`companies are choosing to outsource not only the design and management of their intranets and extranets, but also the
`
`security component that goes hand-in-hand with these networks. Internet Service Providers worldwide are responding to this
`
`demand with comprehensive managed service of ferings for their business customers. Check Point FireWall-1 has become the
`
`preferred solution among ISPs for the network security component of the majority of managed service offerings available today.
`
`Two of the most recent ISPs to select FireWall-1 for their managed service offerings are
`
`MCI and UUNET, who together comprise a majority of the total ISP market. As part of their
`
`recent announcement of networkMCI Intranet Builder and networkMCI Intranet Complete,
`
`MCI announced that it is using FireWall-1 for the managed firewall component of their
`
`networkMCI Intranet Services. MCI will provide both on-site and complete, fully-managed
`
`end-to-end solutions to its corporate customers using FireWall-1. Services offered include
`
`installation, super vision, technical management and firewall suppor t.
`
`UUNET, the world’s largest ISP, is integrating FireWall-1 into its ExtraLink secure virtual
`
`private network offering including ExtraLink Remote, which provides integrated remote
`
`dial-in capability over the Internet using UUNET’s dial-up infrastructure. UUNET is incorpo-
`
`rating FireWall-1 SecuRemote, Check Point’s client encr yption software, to provide secure
`
`ExtraLink Remote dial-up links.u
`
`W O R L D W I D E I S P S
`I N C L U D E :
`
`• Concentric Networks
`• Digex
`• CompuServe Network
`Services
`• EUNet Deutschland
`(Germany)
`• Genuity
`• Hitachi
`• Netrex
`• NTT PC (Japan)
`• Quza (UK)
`• Telenor Bedrift AS
`(Norway)
`• UUNET
`• UUNET Pipex (UK)
`• U S West
`• WilTel
`
`CHECK POINT SOFTWARE TECHNOLOGIES LTD.
`
`4
`
`Juniper Ex. 1035-p. 4
`Juniper v Implicit
`
`

`

`connectionsconnections
`
`connections
`
`5
`
`XylanS W I T C H E S S E C U R E L Y W I T H F I R E W A L L - 1
`
`Xylan Corporation has par tnered with Check
`Point Software Technologies to integrate IP firewalls
`
`same, central Check Point
`
`enterprise management con-
`
`into the OmniSwitch and PizzaSwitch. Xylan already offers
`
`sole that customers use to
`
`the industry’s most sophisticated switching solutions, com-
`
`manage their FireWall-1
`
`bining integrated routing, VLANs and LAN/ATM networking in
`
`installations on UNIX or
`
`a single chassis. By adding IP firewalls to these powerful
`
`Windows NT servers, or the
`
`products, Xylan now offers customers an integrated secure
`
`other router and switch plat-
`
`connectivity solution.
`
`forms in which the FireWall-1 engine is embedded.
`
`Customers can now integrate IP firewalls into their new or
`
`Firewalls Between VLANs. Switching alone creates
`
`existing OmniSwitches and PizzaSwitches to secure the
`
`flat networks that do not allow networks to scale t o
`
`perimeter of their networks from malicious attacks as well
`
`hundreds or thousands of users. VLANs allow large,
`
`as from access by unauthorized external users. The same
`
`switched networks to scale and fit their organization’s needs
`
`firewall capability can also be used to safeguard internal
`
`by carving broadcast domains out of the network. Xylan has
`
`resources from unauthorized access. IP firewalls are ideal for
`
`created the most advanced VLAN architecture in the internet-
`
`controlling traffic between VLANs, giving only authorized
`
`working industry, giving administrators a wide variety of
`
`users access across VLAN boundaries. In particular, a fire-
`
`criteria on which to base their virtual LANs.
`
`wall can ser ve as a security barrier in front of ser vers, main-
`
`frames and other sensitive resources.
`
`Inter-VLAN communications requires the routing function
`
`to take place somewhere within the network. Xylan has
`
`Enterprise-wide Security. Xylan’s firewalls provide an
`
`integrated the routing function to the OmniSwitch and
`
`enterprise-wide security solution that organizations can inte-
`
`PizzaSwitch for inter-VLAN communication. Administrators
`
`grate into the OmniSwitches and into the PizzaSwitches in
`
`can use firewalls to control access to VLANs that contain
`
`use at their remote offices and campus networks. Instead of
`
`sensitive resources and information. By adding firewall capa-
`
`dedicating one piece of hardware for wide area connectivity,
`
`bilities into the OmniSwitch and PizzaSwitch, administrators
`
`another for switching and a third for firewalls, an organiza-
`
`can secure resources within their networks and protect their
`
`tion can integrate all of these features into a Xylan switch
`
`network from unwelcomed users. Administrators can define
`
`and use it as an integrated security solution wherever it is
`
`the access levels of users by the applications used and by
`
`deployed. It is a simple, yet powerful solution that can be
`
`VLAN membership. u
`
`used at remote offices or at the core of a large network.
`
`Most impor tantly, the firewall capabilities built into the
`
`OmniSwitch and PizzaSwitch can be managed from the
`
`ReferenceD E S K
`
`—Antoine Gaessler, Director of Channels Marketing
`Check Point Software Technologies, Inc.
`
`GENERAL SECURITY RESOURCES:
`• Great Cir cle Associates
`http://www.greatcircle.com
`
`JAVA SECURITY RESOURCES:
`• JavaSoft FAQ on Security
`http://www.javasoft.com/sfaq/index.html
`
`• Computer Emergency Response Team (CERT)
`http://www.cert.org
`
`• Official Directory for Java
`http://www.gamelan.com
`
`• Computer Incident Advisory Capability (CIAC)
`http://ciac.llnl.gov
`
`• National Institute of Standards and Technology
`(NIST) Computer Security Resource Clearinghouse
`http://csrc.ncsl.nist.gov
`
`c o n n e c t i o n s
`
`ACTIVE X SECURITY RESOURCES:
`• The Unofficial Active X Guide
`http://www.shorrock.u-net.com/netindex.html
`
`Juniper Ex. 1035-p. 5
`Juniper v Implicit
`
`

`

`ConnectControlM O D U L E
`
`c o n n e c t i o n s
`
`W I T H T H E R A P I D E X P L O I TAT I O N O F
`T H E I N T E R N E T to provide instantaneous information
`
`to employees and customers alike, or ganizations are
`
`Five different pre-defined balance algorithms are available to
`
`meet the specific needs of an organization.
`
`often forced to provide ever more powerful servers to meet
`
`One popular means of balancing incoming connection
`
`the burgeoning demand for connectivity. If a company’s
`
`attempts is to distribute traffic to the server experiencing the
`
`Web ser ver is over whelmed with connection requests,
`
`lightest load. For example, all incoming HTTP requests to a
`
`customers may experience poor response times or
`
`particular IP address can be efficiently balanced among
`
`even connection timeouts. Now, Check Point Software
`
`multiple ser vers which share this single address. This
`
`Technologies Ltd. provides the ideal solution for organiza-
`
`method evenly balances the load on all the servers in a
`
`tions whose servers are straining under the growing number
`
`logical pool that provides support for the same Internet
`
`of connection requests.
`
`service. By utilizing existing servers, organizations avoid the
`
`expensive proposition of upgrading their network servers
`
`Check Point FireWall-1 version 3.0 includes the
`
`whenever incoming traf fic increases.
`
`ConnectControl module, incorporating advanced connection
`
`control functionality to ensure the highest degree of network
`
`In addition, Check Point has designed the FireWall-1 load
`
`connectivity and optimal server response times. FireWall-1
`
`balancing feature with enterprise connectivity in mind. The
`
`provides the ability to allocate connection attempts among
`
`individual servers comprising the logical server pool do not
`
`multiple physical servers. While companies are relieved of
`
`have to reside behind the firewall, or even on the same
`
`the need to upgrade to more expensive network servers,
`
`network. By using the Domain load balancing algorithm,
`
`users benefit by realizing improved response times.
`
`companies can direct requests to the closest server based
`
`on domain names. Check Point has recognized that because
`
`FireWall-1 customers can replace a single server providing
`
`not all users are located in proximity to one another, it makes
`
`HTTP, or other service, with a logical pool of servers sharing
`
`sense to disperse an organization’s servers throughout the
`
`a common IP address. An incoming connection request is
`
`network and utilize load balancing to optimize response
`
`directed to a particular server based on the load balancing
`
`times. Other FireWall-1 load balancing algorithms enable
`
`algorithm selected from the FireWall-1 configuration options.
`
`incoming connection attempts to be distributed to individual
`
`servers based on round trip delays, round robin schemes, or
`
`random ser ver assignment.
`
`The load balancing functionality of FireWall-1 proactively
`
`addresses the needs of corporations to utilize existing hard-
`
`ware to provide optimal user response times. Organizations
`
`can provide complete network connectivity while maintaining
`
`the integrity of their enterprise-wide network security policy.u
`
`— Greg Smith, Product Marketing Manager
`Check Point Software Technologies, Inc.
`
`Five server load balancing methods are defined allowing
`customers to choose how connection requests will be
`directed for optional performance.
`
`product highlight
`product highligh
`
`6CHECK POINT SOFTWARE TECHNOLOGIES LTD.
`
`Juniper Ex. 1035-p. 6
`Juniper v Implicit
`
`

`

`technical tiptechnical tip
`
`7
`
`FireWall-1
`
`S Y N C H R O N I Z A T I O N A N D T H E B O O T P P R O T O C O L
`
`FIREWALL SYNCHRONIZATION IS A NEW FEA-
`TURE IN FIREWALL-1 VERSION 3.0 that allows
`FireWall modules running on different machines to share
`
`When designing the rule base for a dual-homed implementa-
`
`tion, it is important to consider the refresh rate of the
`
`table synchronization. It is possible that near the start of a
`
`information about connection states. Because each FireWall
`
`connection, packets will flow to a second module before that
`
`module is kept aware of the connections going through the
`
`module has been made aware of the new connection. If the
`
`other modules in the synchronization, a module can correctly
`
`second module is configured to reject unknown packets, it
`
`process a connection that did not initiate through it. This
`
`will send a connection reset packet to the sender, aborting
`
`loosens the restrictions on traffic flow by removing the
`
`the connection. If the module is instead configured to drop
`
`firewall as a bottleneck, making dual-homed networks and
`
`the packet, the sender will retransmit after a delay. During
`
`highly-available firewalls much easier to implement.
`
`this delay, the modules will have synchronized, and the
`
`connection will continue normally. The dropped packets will
`
`In earlier versions of FireWall-1, the network manager was
`
`be logged if the ‘Log Established TCP Packets’ option is
`
`required to design traffic flow so that all packets entering and
`
`turned on, but they should be considered a normal part of
`
`leaving the protected network were seen by a single FireWall
`
`establishing a connection through synchronized modules.
`
`module. This limited the manager’s ability to implement
`
`redundant firewalls and dual homed networks.
`
`Setting up FireWall Synchronization is a very simple process.
`
`On each of the modules participating in the synchronization,
`
`do the following:
`
`STEP ONE - Place the names of the other FireWall modules
`
`in the file '$FWDIR/conf/sync.conf'.
`
`STEP TWO - Stop the firewall by typing ‘fwstop’.
`
`STEP THREE - If a control path does not already exist
`
`between the modules, use the ‘fw putkey’ command to
`
`establish one. (See page 253 of the FireWall-1 Achritecture
`
`BOOTP AND FIREWALL-1. The bootp protocol
`consists of two simple UDP protocols: bootpc (from the client
`
`which boots to the server where the boot image is help) on
`
`port 67, and bootps (the other way around) on por t 68.
`
`It is easy to define those two as UDP services in the GUI.
`
`T h e s e r v i c e s n o r m a l l y u s e t h e b r o a d c a s t a d d re s s
`
`(255.255.255.255) as the client’s address. Additional
`
`information is available in RFCs 951 and 1340.
`
`In order to allow BOOTP, there are several things you should
`
`and Administration User Guide Version 3.0 for more details
`
`take care of:
`
`on this command).
`
`STEP FOUR - Verify that the system clock is correct with
`
`ONE - Find out which address bootp clients use (normally
`
`it would be 255.255.255.255) and create a machine with
`
`regard to the other modules. If the module clocks are out of
`
`this IP.
`
`synch by more than a few seconds, the synchronization
`
`TWO - Use this machine as the source for the port 67
`
`will fail.
`
`STEP FIVE - Start the firewall by typing ‘fwstart’.
`
`There are some restrictions that the network manager needs
`
`to be aware of when implementing FireWall Synchronization.
`
`FireWall-1 Security Servers are implemented as a combina-
`
`tion of processes and state tables.
`
`Because processes can not be synchronized between mod-
`
`ules, authenticated connections will not work in a dual-homed
`
`environment. For similar reasons, encr ypted sessions should
`
`only flow through a single module.
`
`service and destination for the port 68 ser vice.
`
`THREE - Since bootp uses the IP broadcast address
`
`255.255.255.255, you need to add it to the anti-spoofing
`
`group for the interface of the server, so that IP packets
`
`destined to it will be passed. Since the IP source address
`
`is often 0.0.0.0, you might also need that address to be
`
`part of the anti-spoofing group for the interface of the client
`
`(the device which attempts to boot). To do these things, you
`
`need to create a network object which will contain this
`
`address, so you'll be able to add it to the anti-spoofing group.
`
`c o n n e c t i o n s
`
`Juniper Ex. 1035-p. 7
`Juniper v Implicit
`
`

`

`c o n n e c t i o n s
`EventsC H E C K P O I N T S O F T W A R E T E C H N O L O G I E S L T D .
`
`Networks 97
`Product Demonstrations - Booth # HOS7
`June 24-26, 1997
`Birmingham, UK
`
`Network Security Asia 97 Conference
`and Exhibition
`Firewalls and Network Security
`August 12, 1997
`Singapore
`
`Internet Expo
`Product Demonstrations - Booth #2636
`in the Triumph Technologies Booth
`August 12-14, 1997
`Boston, MA
`
`ICE Los Angeles
`Internet Town Hall
`September 9, 1997
`Los Angeles, CA
`
`Gar tner Intanet+Extranet Expo
`Firewalling Intranets and Extranets
`September 24, 1997
`San Francisco, CA
`
`NetWorld + Inter op
`The Future of Internet Security:
`A View from Behind the Firewall
`Product Demonstrations
`October 9, 1997
`Atlanta, GA
`
`ICE Japan
`Keynote Panel
`December 5, 1997
`Tokyo, Japan
`
`Check Point Connections is published quarterly and is free to all qualified sub-
`scribers. Check Point, the Check Point logo, Check Point FireWall-1, FireWall-1,
`FireWall-1 SecuRemote, FireWall-First!, OPSEC and INSPECT are trademarks of
`Check Point Software Technologies Ltd. All other trademarks are the property of
`their respective owners.
`
`© Check Point Software Technologies Ltd. All rights reserved. No part of this
`publication may be reprinted or otherwise reproduced without written permission
`from the editor. Emily Cohen, Director of Corporate Communications
`Check Point Softwar e Technologies, Inc.
`400 Seapor t Cour t, Suite 105, Redwood City, CA 94063
`Tel: 415-562-0400 x228, Fax: 415-562-0410, www.checkpoint.com
`
`Presorted
`First-Class Mail
`US Postage Paid
`Santa Rosa, CA
`Permit No. 191
`
`Check Point Software Technologies Ltd. •3A Jabotinsky Street, 24th Floor • Ramat-Gan 52520, Israel
`Check Point Software Technologies, Inc. •400 Seaport Court, Suite 105 • Redwood City, CA 94063
`
`connections
`
`connections
`
`connections
`
`Juniper Ex. 1035-p. 8
`Juniper v Implicit
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket