

This particular model has eight wired ports and a wireless access point, and can be configured to support a single flat network or have each of its ports operate on separate virtual LANs. We will focus here on setting up a virtual private network (VPN) using a representative model, the Check Point 620, for which you’ll administer the devices via a web browser. Get started with a virtual private network (VPN). Read on for more on how to set up a Check Point virtual private network (VPN) appliance. This is especially beneficial for small businesses because they can leverage what Check Point puts into making its products secure enough for large enterprises.

Why? Check Point’s product line uses the same protective measures and software code in almost a dozen differently sized UTM appliances. Check Point Software’s unified threat management (UTM) devices are popular for small and large businesses, alike.
