Before we do the installation of the software to create our security manager, we probably ought to take a moment and talk about what the security manager does. So in our typology right here, we have a PC on this 192.168.1 network. The PC is at .120. And I've got a computer here at .110 that's going to act as our security manager in our Check Point environment.
nd it's going to have the IP address of .110. So regarding planning, that's where we're going to have this device in our topology. Now the second thing we should talk about is, what does this security manager do for us? And that's a good question. What we're going to do is, we are going to interact from PC here with the security manager.
This is where we'll configure policies and change settings. And then the security manager will in turn push those policies out to the firewalls that it is currently managing. And that is referred to as a distributed deployment, where the device being the manager is a separate entity or a separate appliance than the actual firewalls.
It is possible in a small organization to have a standalone deployment, and that's where we have the Security Manager and the firewall all on one appliance or one device. However, in the lab what we're going to do is, we're going to go ahead and use the distributed deployment.
And we'll install the Security Manager software here on this host at .110. So in preparation for that, I've got the machine all ready to go, and I've got a DVD with Check Point, our 80 in that CD/DVD drive for this virtual machine. And what we're going to do is, we're going to boot this machine-- have it boot off the CD.
And then walk through the steps to tell it we want to install the software. So starting here on the computer that's going to be our security manager, we'll go ahead and power on this machine. And here it's booted to the DVD that's in his drive. So we'll go ahead and we're going to click this space, then move the arrow key up to select to install Gaia on this system.
And with that selected, we'll go ahead and press Enter. And to continue with the installation we'll make, sure that OK is selected and we'll press Enter. I'm going to select the US keyboard and press Enter. Let's accept the defaults for the partition information.
And I'm going to supply the lab password. And then press Enter for OK. Now the security manager appliance has two interfaces at the moment. We're just going to use ethernet 0 for a while. So go ahead and we'll tap down to OK and press Enter. And based on the plan, the IP address of this manager is going to 192.168.1.110.
So supply that. We're going to accept the 24-bit mask, and we'll specify a default gateway of whatever the current default gateway is, which in this topology at this moment it's at .1. We'll hit Tab a couple of times and press Enter to continue. Now we have a friendly warning that says, hey, we're about to continue.
We're going to format your drives. So we're going to hit Tab over to OK, and then press Enter to continue. So here it's indicating that we need to go and reboot, so we can press Enter to go and reboot the system. And when it comes back to the initial configuration of the Security Manager by opening up a browser and going to https:// and the IP address we just gave it of 192.168.1.110.
So we'll go ahead and press Enter to continue, and we'll save the actual initial config with the web UI for a separate Nugget. So in this Nugget, we took a look at the basic concept of how the Security Manager fits in to a Check Point topology. We also took a look at the installation of the software on the device that's going to be the security manager.
I hope this has been informative for you and I'd like to thank you for viewing.