tag:blogger.com,1999:blog-7755136273253085483.post6052021207020532998..comments2024-03-21T15:44:25.378+01:00Comments on CCMA's blog: CPET feedbackValeri Loukinehttp://www.blogger.com/profile/11915389342131738939noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-7755136273253085483.post-59923866435258479572017-05-16T09:39:21.385+02:002017-05-16T09:39:21.385+02:00Told and forgotten.
Check Point's way of secu...Told and forgotten.<br /><br />Check Point's way of securing network traffic is one of the fundamental architectural principles that define technology they use. <br /><br />All further solutions and technologies, such as Performance Pack, CoreXL, kernel streaming, advanced security blades, etc - all that is the result of something Gil Shwed patented in 1993.<br /><br />You cannot start explaining advanced things before touching the basics. And I am not even convinced SI is a basic staff. Because it is not.<br /><br />The bare fact of it to be very much alive and relevant after 24 years gives you a hint.<br /><br />In my advanced troubleshooting class kernel enforcement on of the most interesting and challenging topics. And guess what, it starts with stateful inspection explained and dissected. <br /><br />Some questions for you.<br /><br />Why it takes a significant effort for Checkpoint to utilize effectively multiple cores? <br /><br />Why Check Point is unable to come up with a custom security silicon solution?<br /><br />Why dropping a packet takes much more effort than accepting it? <br /><br />Why FW performs inspection and manipulation on the traffic twice when crossing a security device? <br /><br />Some of the questions seem trivial, but although the answers are simple, many of my students struggle with those. <br /><br />So, the way I see it, advanced topics are all full of basic things, interconnected.Valeri Loukinehttps://www.blogger.com/profile/11915389342131738939noreply@blogger.comtag:blogger.com,1999:blog-7755136273253085483.post-36708685199553587942017-05-16T09:00:00.474+02:002017-05-16T09:00:00.474+02:00What is your target audience?
People who visit thi...What is your target audience?<br />People who visit this blog are interested in Checkpoint. They must be quite skilled with it, right?<br />So why would they want to listen about CP foundation history or "stateful firewall" definition? Those things are told at the very first day of CCSA course.rel1ct0https://www.blogger.com/profile/11053828557087814525noreply@blogger.com