Network Security
Check Point network security
solutions are the market-
leading choice for securing the
network infrastructure.
UTM-1 Total Security Key benefits
n Everything you need to secure your
network for up to three years
All-inclusive, all secured n Provides peace of mind with
proven technologies trusted by
the Fortune 500
UTM-1™ Total Security™ appliances are all-inclusive, turnkey solutions with n Protects networks, systems, and
everything you need to secure your network in a simple, cost-effective way.
users from multiple types of attacks
Each solution includes the proven security features you need along with complete
n Streamlines security deployment
security updates, hardware warranty, and reduced support rates for up to three
years. Based on the same Check Point technologies that secure the Fortune 500, and administration
UTM-1 appliances deliver uncompromising security with streamlined deployment
and administration.
Industry-leading application- and
network-layer firewall secures hundreds
Industry-leading firewall of applications and protocols including VoIP,
instant messaging (IM), and peer-to-peer
(P2P) applications
VPN (site-to-site and Feature-rich, easy-to-configure
remote access) IPSec and SSL VPNs
Gateway antivirus/ Signature-based antivirus and
anti-spyware anti-spyware protection
Intrusion prevention with SmartDefense®
Intrusion prevention type-based protections and security updates
Web security with URL filtering and
Web security integrated security for Web applications
Messaging security and anti-spam
including the Check Point six dimensions
Messaging security* of comprehensive messaging security for
protecting the messaging infrastructure
Centralized, multisite Centralized management via a single
console for multiple sites—preinstalled on
management Check Point appliances
* Standard UTM-1 appliances may be upgraded to either the one- or three-year UTM-1 Total Security The NGX platform delivers a unified
models, which include messaging security. security architecture for Check Point.
UTM-1 Total Security
THE SECURITY YOU NEED Secure, flexible remote access
Proven application control and attack protection UTM-1 Total Security appliances can connect employees and
UTM-1 includes the most proven firewall and can examine business partners to your trusted network through flexible
hundreds of applications, protocols, and services out-of-the- IPSec or SSL-based remote access, working seamlessly with
box. Integrated SmartDefense™ IPS utilizes signature- and a variety of VPN agents.
protocol-anomaly-based intrusion prevention to protect
business-critical services like FTP, HTTP, and VoIP from THE SIMPLICITY YOU WANT
known and unknown attacks. Similarly, UTM-1 Total Security All-inclusive turnkey solution
can block nonbusiness applications like IM and P2P. Everything you need in a UTM network security solution is
provided by UTM-1 Total Security appliances—for up to three
Gateway antivirus, anti-spyware
years. This includes:
Gateway antivirus and anti-spyware are core components of
UTM-1, complementing desktop endpoint security. UTM-1 • All security protections
Total Security uses an up-to-date list of antivirus and anti- • All security updates
spyware signatures and anomaly-based protection to stop • Hardware warranty
viruses and other malware at the gateway. To check for threats
hidden inside legitimate content, real-time antivirus scans are Integrated SmartCenter management
performed on POP3, SMTP, FTP, and HTTP services. UTM-1 Total Security appliances come with integrated
SmartCenter™ management, offering the ability to centrally
Comprehensive messaging security with anti-spam
manage multiple appliances and other Check Point products
Messaging Security from Check Point provides comprehen-
from a single console. It centrally stores and distributes
sive protection for an organization's messaging infrastructure.
security policy for the entire infrastructure, eliminating the
The multidimensional approach protects the email infrastruc-
ture, provides highly accurate spam protection, and defends need to maintain each site and gateway separately, reducing
organizations from a wide variety of virus and malware threats administrative burden and errors, ensuring consistency
within email. across the network. Through the intuitive SmartDashboard,
administrators define and manage elements of a security
IP reputation Blocks spam and malware at the con- policy: firewall security, network address translation, Quality
anti-spam nection level by checking the sender's of Service (QoS), VPN agent security, and VPNs.
reputation against a dynamic database Centralized, automatic updates
of known malicious IP addresses SmartDefense Services enable you to configure UTM-1
Content-based Protects against advanced forms of into a preemptive security solution, capable of ensuring
anti-spam spam, including image-based and your networks are safe from new attacks via ongoing and
foreign-language spam, using pattern- automatic defense updates.
based detection
Quick setup
Block/allow list Utilizes block or allow lists to deny UTM-1 Total Security appliances can be easily set up with the
anti-spam obvious email offenders and allow first-time configuration wizard. This truly simple deployment
trusted senders process is as easy as:
Mail antivirus Protects against a wide range of viruses
and malware, including scans of • Plugging in and turning on the appliance
message content and attachments • Following the onscreen wizard
• Launching the SmartCenter management interface
Zero-hour Defends against new spam and
outbreak malware outbreaks by using advanced
protection pattern matching and distribution
analysis engine
SmartDefense Protects against a broad range of
email IPS threats, including DoS and buffer over-
flow attacks, that target the messaging
infrastructure itself
Web filtering
UTM-1 Total Security appliances stop inappropriate Web
surfing with best-of-breed Web filtering that covers 20-
million-plus URLs, so you can define an online
acceptable-use policy for your organization.
Simple site-to-site connectivity
With UTM-1 Total Security appliances, you can simplify the
setup of site-to-site VPNs and remote access. Manual setup
of node-to-node VPN tunnels and security for an entire VPN
is replaced by a One-Click process, where new sites and The first-time configuration wizard makes configuring UTM-1 Total
remote users are added automatically. Security appliances easy.
All-inclusive, all secured
Support Options
Check Point offers many technical support options for customers. These range from the Standard support plan that provides
telephone assistance during normal business hours with next-day shipment of replacement appliances, to the Premium support
plan providing 24/7 assistance with same-day replacement shipment, up to the Premium+4H plan that provides a qualified engineer
on-site within four hours to solve any appliance-related issues. For more information on these or other service and support offerings
available in your geography, please contact your Check Point representative or visit the Support section of the Check Point Web site.
UTM-1 Total Security SPECIFICATIONS
Protection Details
Firewall
Protocol/application support 200-plus
VoIP protection SIP, H.323, MGCP, and SCCP with NAT support
Instant messaging control MSN, Yahoo, ICQ, and Skype
Peer-to-peer blocking Kazaa, Gnutella, BitTorrent
Network address translation Static/hide NAT support with manual and automatic rules
IPSec VPN
Encryption support AES 128-256 bit, 3DES 56-168 bit
Authentication methods Password, RADIUS, TACACS, X.509, SecurID
Certificate authority Integrated certificate authority (X.509)
VPN communities Automatically sets up site-to-site connections as objects are created
Topology support Star and mesh
Route-based VPN Utilizes virtual tunnel interfaces; numbered/unnumbered interfaces
VPN agent support Complete endpoint security with VPN, desktop firewall
SSL VPN
SSL-based remote access Fully integrated SSL VPN gateway provides on-demand SSL-based access
SSL-based endpoint scanning Scans endpoint for compliance/malware prior to admission to the network
Intrusion prevention
Network-layer protection Blocks attacks such as DoS, port scanning, IP/ICMP/TCP-related
Application-layer protection Blocks attacks such as DNS cache poisoning, FTP bounce, improper commands
Detection methods Signature-based and protocol anomaly
Antivirus/anti-spyware
Antivirus protection Protects HTTP, FTP, POP3, and SMTP protocols
Anti-spyware blocks Pattern-based spyware blocking at the gateway
Updates Centralized, daily updates
Web filtering
URL database 20 million-plus URLs covering 3 billion-plus Web pages
Language support More than 70 languages spanning 200 countries
Updates Centralized, daily updates (100,000-plus new sites a week)
Messaging security
Email IPS SMTP, POP3, and IMAP attack protection
Pattern-based anti-spam Detects spam based on dynamic database of signatures
IP reputation checking Blocks spam and malware by sender
Signature-based antivirus First layer of protection from viruses and malware
Zero-hour outbreak protection Complements signature-based protection to block new outbreaks
Block/allow lists Provides granular control over specific domains and users
Management and reporting
Centralized management Includes centralized management
Monitoring/logging SmartView Tracker™ provides advanced monitoring and logging
Reporting Express reports
Command line interface Telnet, SSH
Networking
DHCP support SecurePlatform™ DHCP server and relay
ISP redundancy Protocol-based, source/destination and port route decisions
Routing support OSPF, BGP, RIP v1/2, Multicast
Layer-2 bridge support Transparently integrates into existing network
Performance and availability
High availability Active/passive and active/active failover options
Load balancing ClusterXL® provides near linear scaling
Quality of Service Floodgate-1® provides granular QoS control
ISP redundancy Automatically reroutes traffic to second interface
puresecurity™
UTM-1 Total Security appliance SPECIFICATIONS
UTM-1 270 UTM-1 450 UTM-1 570 UTM-1 1050 UTM-1 2050 UTM-1 3070
Software edition NGX R65 NGX R65 NGX R65 NGX R65 NGX R65 NGX R65
10/100 ports — — — 4 4 N/A
10/100/1000 ports 4 4 4 4 4 10
Firewall throughput 400 Mbps 400 Mbps 1.1 Gbps 1.2 Gbps 2.4 Gbps 4.5 Gpbs
VPN throughput 100 Mbps 200 Mbps 250 Mbps 220 Mbps 380 Mbps 1.1 Gbps
Concurrent sessions 400,000 700,000 500,000 800,000 1.1 million 1.1 million
Users supported Unlimited Unlimited Unlimited Unlimited Unlimited Unlimited
VLANs 256 256 256 256 256 256
Storage 160 Gb 80 Gb 160 Gb 80 Gb 80 Gb 160 Gb
Enclosure 1U 1U 1U 1U 1U 1U
Dimensions 16.8 x 10 16.77 x 14.31 16.8 x 10 16.77 x 17 16.77 x 17 17.4 x 15
(standard) x 1.73 in. x 1.71 in. x 1.73 in. x 1.71 in. x 1.71 in. x 1.73 in.
429 x 255 426 x 365 429 x 255 426 x 431.8 x 426 x 426 443 x 381
Dimensions (metric)
x 44mm x 43.5mm x 44mm 43.5mm x 431.8mm x 44mm
Weight 3.7kg (8.1lbs) 5.0kg (11lbs) 3.7kg (8.1lbs) 7.4kg (16.3lbs) 7.4kg (16.3lbs) 6.5kg (14.3lbs)
Operating environment Temperature: 5° to 40° C, Humidity: 10%-85% non-condensing, Altitude: 2,500m
100~240V, 100~240V 100~240V, 100~240V 100~240V 100~240V,
Power input
50~60Hz 50~60Hz 50~60Hz 50~60Hz 50~60Hz 50~60Hz
Power consumption 65W (max.) 81W (max.) 65W (max.) 186W (max.) 188W (max.) 250W (max.)
UL 60950; FCC Part 15, Subpart B, Class A; EN 55024; EN 55022; VCCI V-3;
Compliance AS/NZS 3548:1995; CNS 13438 Class A (test passed; country approval pending);
KN22, KN61000-4 Series, TTA; IC-950; ROHS
Note: All UTM-1 models come with a 3-year hardware warranty.
Worldwide Headquarters
5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: info@[Link]
contact check point U.S. Headquarters
800 Bridge Parkway, Redwood City, CA 94065 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | [Link]
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point Endpoint Security, Check Point Endpoint Security On
Demand, Check Point Express, Check Point Express CI, the Check Point logo, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement,
Cooperative Security Alliance, CoreXL, CoSa, DefenseNet, Dynamic Shielding Architecture, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer,
FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, NGX, Open
Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle Management, Provider-1, PureAdvantage, PURE Security, the puresecurity logo,
Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard,
Security Management Portal, Sentivist, SiteManager-1, SmartCenter, SmartCenter Express, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense,
SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SMP, SMP
On-Demand, SofaWare, SSL Network Extender, Stateful Clustering, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, UTM-1, UTM-1 Edge, UTM-1 Edge Industrial, UTM-1
Total Security, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN-1 Power, VPN-1 Power Multi-core, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1
SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm ForceField, ZoneAlarm
Internet Security Suite, ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd.
or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The
products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, and 7,165,076 and may be protected by other U.S. Patents,
foreign patents, or pending applications.
April 18, 2008 P/N 502887