E80.71 Check Point Endpoint Security Vpn For Macos

R80.20 servers are designed to utilize available hardware resources efficiently to maximize performance and scalability. We recommend that you leverage this advantage and use the most powerful hardware available to get the best performance.

Component

Security Gateway

VSX Gateway

Security Management Server/Standalone/Endpoint Security

Multi-Domain Server

Processor

Intel Pentium IV, 2 GHz or equivalent

Intel Pentium IV, 2 GHz or equivalent

Intel Pentium IV, 2.6 GHz or equivalent

Dual Socket 2x Xeon E5-2609v2

4 cores, 2.5 GHz or equivalent

Total CPU Cores

2

2

2

8

Memory

4 GB RAM

4 GB RAM

6 GB RAM

32 GB RAM

Free Disk Space

15 GB

12 GB + 1 GB per VS

500 GB (Installation includes OS)

1 TB (Installation includes OS)

Endpoint Security Management Servers do not support on Red Hat Enterprise Linux releases. R80.20 Endpoint Security Management Server can manage: E80.64 and higher versions of Endpoint Security Clients for Windows; E80.64 Endpoint Security Client for Mac; Anti-Malware signature updates: To allow Endpoint clients to get Anti-Malware signature. E80.71 Check Point Endpoint Security VPN for macOS - Disc Image (DMG).

Note - The above numbers do not apply to SmartEvent & SmartLog.

Check Point Product

Physical RAM Limit

Security Management Server, or
Multi-Domain Security Management Server

512 GB

Security Gateway or Cluster Member

256 GB

Check Point Product

Red Hat Enterprise Linux

VMware ESXi

Microsoft Hyper-V**

Security Management Server

7.3 or higher

5.x, 6.x

Windows 2012 R2,
2016 (64-bit only)*

Multi-Domain Security Management Server

7.3 or higher

5.x, 6.x

Windows 2012 R2,
2016 (64-bit only)*

Security Gateway

Not Supported

5.x, 6.x

Windows 2016 (64 bit only)

* For the most up-to-date information about Microsoft Hyper-V, see the Virtual Machines section of the Hardware Compatibility List.

** Check Point CloudGuard IaaS Virtual Edition (VE) is supported with 1 core systems and 4G RAM for a Security Gateway on ESXi, Hyper-V and KVM with Firewall and NGTP.

Software Blade / Product

Build Number

Verifying Build Number

Gaia

OS build 101

show version all

Security Gateway

255

fw ver

Security Management

081

fwm ver

Multi-Domain Server

084

fwm mds ver

SmartConsole

992000164

Menu > About Check Point SmartConsole

R80.20 Management Servers can manage Security Gateways of these versions:

Gateway Type

Release Version

Security Gateway

R75.20, R75.30, R75.40, R75.45, R75.46, R75.47,
R76,
R77, R77.10, R77.20, R77.30,
R80.10

VSX

R76, R77, R77.10, R77.20, R77.30,
R80.10

R80.20 Management Servers can manage appliance Security Gateways that run these versions:

Appliance

Release Version

Security Gateway 80

R75.20.x

1100 Appliances

R75.20.x, R77.20.x

1200R Appliances

R77.20.x

1400 Appliances

R77.20.x

60000/40000 Scalable Platforms

R76SP, R76SP.10, R76SP.20, R76SP.30, R76SP.40 for 61000/41000

R76SP.50 for 61000/41000 and 64000/44000

The maximum number of interfaces supported (physical and virtual) is shown in this table.

Mode

Max # of Interfaces

Notes

Security Gateway

1024

Non-VSX

VSX Gateway

4096

Includes VLANs and Warp Interfaces

Note - This table applies to Check Point Appliances and Open Servers.

Cluster Type

Maximum Supported Number
of Cluster Members

ClusterXL

5

Virtual System Load Sharing

13

Storing Logs

Logs can be stored on:

  • A Security Management Server that collects logs from the Security Gateways. This is the default.
  • A Log Server on a dedicated machine. This is recommended for organizations that generate many logs.

A dedicated Log Server has greater capacity and performance than a Security Management Server with an activated logging service. On dedicated Log Servers, the Log Server must be the same version as the Management Server.

SmartEvent Requirements

You can enable the SmartEvent Blade on a Security Management Server, or install a dedicated SmartEvent Server. SmartEvent R80.20 can connect to a different version of Log Server - R77.xx or lower.

SmartEvent and a SmartEvent Correlation Unit are usually installed on the same server. You can also install them on separate servers, for example, to balance the load in large logging environments. The SmartEvent Correlation Unit must be the same version as SmartEvent Server.

To deploy SmartEvent and to generate reports, a valid license or contract is required.

Hardware Requirements

This table shows the minimum hardware requirements for SmartConsole applications:

Component

Minimal Requirement

CPU

Intel Pentium Processor E2140, or 2 GHz equivalent processor

Memory

4 GB

Available Disk Space

2 GB

Video Adapter

Minimum resolution: 1024 x 768

Software Requirements

SmartConsole is supported on:

  • Windows 10 (all editions), Windows 8.1 (Pro), and Windows 7 (SP1, Ultimate, Professional, and Enterprise)
  • Windows Server 2016, 2012, 2008 (SP2), and 2008 R2 (SP1)

The Gaia Portal supports these web browsers:

Browser

Supported Versions

Google Chrome

14 and higher

Microsoft Internet Explorer

8 and higher
(If you use Internet Explorer 8, file uploads through the Gaia Portal are limited to 2 GB)

Microsoft Edge

Any

Mozilla Firefox

6 and higher

Apple Safari

5 and higher

The Threat Emulation requirements are different based on the emulation location:

  • ThreatCloud - Gaia operating system (64 or 32-bit)
  • Local or Remote emulation - Threat Emulation Private Cloud Appliance on the Gaia operating system (64-bit only)

OS Compatibility

Endpoint OS Compatibility

Windows

Linux

Mac

iOS

Android

Mobile Access Portal

ü

ü

ü

ü

ü

Clientless access to web applications (Link Translation)

ü

ü

ü

ü

ü

Compliance Scanner

ü

ü

ü

Secure Workspace

ü

SSL Network Extender - Network Mode

ü

ü

ü

SSL Network Extender - Application Mode

ü

Downloaded from Mobile Access applications

ü

ü

ü

Citrix

ü

ü

ü

File Shares - Web-based file viewer (HTML)

ü

ü

ü

ü

ü

Web mail

ü

ü

ü

ü

ü

Browser Compatibility

Endpoint
Browser
Compatibility

Microsoft
Internet
Explorer

Microsoft
Edge

Google
Chrome(1)

Mozilla
Firefox

Apple
Safari

Opera
for
Windows

Mobile Access Portal

ü

ü

ü

ü

ü

ü

Clientless access to web applications (Link Translation)

ü

ü

ü

ü

ü

Compliance Scanner(2)

ü

ü

ü

ü

Secure Workspace(3)

ü

ü

ü

SSL Network Extender - Network Mode

ü

ü

ü

ü

SSL Network Extender - Application Mode(3)

ü

ü

ü

ü

Downloaded from Mobile Access applications

ü

ü

ü

ü

Citrix

ü

ü

ü

File Shares - Web-based file viewer (HTML)

ü

ü

ü

ü

ü

Limited
support

Web mail

ü

ü

ü

ü

ü

  1. Google Chrome support for Mobile Access Portal on-demand clients, such as SSL Network Extender Network Mode, SSL Network Extender Application Mode, Secure Workspace, and Endpoint Security on Demand, requires Java JRE 32-bit installed on the end-user's computer.
  2. Running Compliance Scanner on Windows platforms requires Java Runtime Environment (JRE or JDK) 32-bit installed on the end-user's computer.
  3. Secure Workspace and SSL Network Extender Application Mode are available for Windows platforms only.
  • Identity Agents

    See Clients and Agents Support by Windows Platform and Clients and Agents Support by Mac Platform for:

    • Identity Agent (Light and Full)
    • Identity Agent for Terminal Servers
    • Identity Collector
  • AD Query

    Active Directory for AD Query is supported on:
    Microsoft Windows Server 2008 R2, 2012, 2012 R2, and 2016.

  • Endpoint Security Management Servers are supported on Management-only appliances or open servers. Endpoint Security Management Servers do not support Standalone (Security Gateway + Management Server) and Multi-Domain Security Management deployments.
  • Endpoint Security Management Servers do not support on Red Hat Enterprise Linux releases.
  • R80.20 Endpoint Security Management Server can manage:
    • E80.64 and higher versions of Endpoint Security Clients for Windows
    • E80.64 Endpoint Security Client for Mac

Anti-Malware signature updates:

  • To allow Endpoint clients to get Anti-Malware signature updates from a cleanly installed R80.20 Primary Endpoint Security Management Server or cleanly installed R80.20 Endpoint Policy Server, you must follow sk127074. No additional steps are required, if you upgraded the Primary Endpoint Security Management Server to R80.20.
  • Endpoint Security Clients can still acquire their Anti-Malware signature updates directly from an external Check Point signature server or other external Anti-Malware signature resources, if your organization's Endpoint Anti-Malware policy allows it.

Post-Upgrade Requirement:

If you upgraded the Endpoint Security Management Server to R80.20, then to keep visibility of Endpoint client events in the SmartConsole, you must perform these steps:

  1. Connect with SmartConsole to the Security Management Server.
  2. In the top left corner, click Menu > Install database.
  3. Select all objects.
  4. Click Install.
  5. Click OK.

For more information, see the R80.20 Endpoint Security Management Server Administration Guide.

Multiple Login Option Support

Version R80.10 introduced multiple login options per gateway with multi-factor authentication schemes, for users of different clients and the Mobile Access portal. For example, configure an option to authenticate with Personal Certificate and Password, or Password and DynamicID for SMS or email.

These features are supported when connected to an R80.20 gateway that has IPsec VPN or Mobile Access enabled.

E80.71 Check Point Endpoint Security Vpn For Macos Update

Supported Client or Portal

Lowest Supported Version

Mobile Access Portal

R80.10

Capsule Workspace for iOS

1002.2

Capsule Workspace for Android

7.1

Remote Access clients for Windows - Standalone clients

E80.65

Remote Access VPN Blade of the Endpoint Security Suite for Windows

E80.65

See the R80.20 Mobile Access Administration Guide or the R80.20 Remote Access VPN Administration Guide for details.

Clients and Agents Support by Windows Platform

Microsoft Windows

E80.71 Check Point Endpoint Security Vpn For Macos Download

In this table, Windows 7 support is true for Ultimate, Professional, and Enterprise editions. Windows 8 support is true for Pro and Enterprise editions. All the marked consoles and clients support Windows 32-bit and 64-bit.

Check Point Product

Windows 7 (+SP1)

Windows 8.1

Windows 10 *

Remote Access clients E80.x

ü

ü
(with 8.1
Update 1)

ü
(E80.62
and higher)

Capsule VPN Plug-in

ü

ü

SSL Network Extender

ü

ü

ü

UserCheck Client

ü

ü

ü

Identity Agent (Light and Full)

ü

ü

ü

Identity Agent for Terminal Servers

ü

* Supported Windows 10 versions: 1703, 1709, 1803 for more information see the Detailed Client Releases Information section in sk117536.

Microsoft Windows Server

Check Point Product

Server
2008R2
(+SP1)

Server
2012

Server
2012 R2
64-bit

Server
2016

UserCheck Client

ü

ü

ü

Identity Agent for Terminal Servers

ü

ü

ü

ü

Identity Collector

ü

ü

ü

ü

Note - Identity Agent for Terminal Servers is also supported on XenApp 6.

Clients and Agents Support by Mac Platform

All support is for Macintosh OS 64-bit.

Check Point Product

OS X 10.11

macOS 10.12

OS X 10.13

Identity Agent

ü

ü

ü

SSL Network Extender

ü

ü

ü

Endpoint Security VPN E80.x or higher

ü
(E80.62
and higher)

ü
(E80.64
and higher)

ü

DLP Exchange Agent Support

The R80.20 DLP Exchange Agent is supported on:

Windows Server

Exchange Server

2012 R2 64-bit

2010, 2013

2016 64-bit

2016

For earlier server versions, use the R77.30 DLP Exchange Agent.

How To Free Download and Guide To Install Check Point Capsule VPN App on Windows PC 32/64bi & macOS

Here is the proper guide to free download Check Point Capsule VPN software for PC as an alternative to EXE/DMG. Also, the installation method with the best Android engine like Bluestacks mobile emulator or Nox Android APK App player. These engines are highly recommended to run the APK of Check Point Capsule VPN on Windows 10, 8, 7 (all edition), computers, desktops, laptops, and Mac.

  1. Download any emulator below. The official landing pages are below.
  2. Best free mobile emulators are here: BlueStacks.com and BigNox.com
  3. Download & open any on above and use Google ID as an Android device.
  4. Play Store contains Check Point Capsule VPN app. So easily took it
  5. Tap via the mouse on the install point below the Check Point Capsule VPN logo to start download

Q & A Of Check Point Capsule VPN With Features & Using Method

PointSecurely Access all your corporate resources from your device through a Virtual Private Network (VPN) tunnel.

As you launch business applications such as RDP, VoIP or any other app on your mobile device, all transmitted data to corporate is encrypted, without any additional actions required by you.

This application connects to a Check Point Security Gateway. Please contact your security Administrator for first-time setup. For an SSL VPN Portal application please download the “Check Point Capsule Workspace” application.

Administrators: Deployment details are available on the support site: http://supportcontent.checkpoint.com/solutions?id=sk84141

Application Features
• Securely connect to corporate resources from your Android device with a full layer-3 VPN tunnel
• Supports SSL and IPSec (including visitor mode)
• Authentication methods: user/password, user certificate, challenge/response, one time password tokens
• VPN Connection persistency upon device roaming
• Always attempt to connect after session expires or device reboot
• Scan a QR code or click a URL for a 1-step first-time-configuration
• API for external applications

Checkpoint endpoint security vpn for mac

To learn more about Check Point Capsule visit http://www.checkpoint.com/capsule/

About Check Point Software Technologies
Check Point Software Technologies, Ltd. is a world-wide leader in Network and Endpoint Security.
Visit www.checkpoint.com

What’s New Added On The Latest Edition Of Check Point Capsule VPN Software