Download Complete PDF Send Feedback Print This Page

Previous

Predefined Reports

This appendix describes the predefined reports available under each subject and specifies the report ID required for command line generation.

In This Section

Anti-Virus & Anti-Malware Blade Reports

Content Inspection Reports

Cross Blade Network Activity Reports

Cross Blade Security Reports

Endpoint Security Blade Reports

Event Management Reports

Firewall Blade - Security Reports

Firewall Blade - Activity Reports

Firewall Network Activity

InterSpect Reports

IPS Blade Reports

IPSEC VPN Blade Reports

My Reports

Network Security Reports

Regulatory Compliance Reports

Mobile Access Blade Reports

System Information Reports

Anti-Virus & Anti-Malware Blade Reports

Standard Reports

  • Scanned File Types — This report presents statistics about file types. It includes the distribution of file types by source, destination, date and time. This report can be used to determine which file types are most common and the top sources and destinations of these file types.

    Report ID — {316AF9AF-1A4E-4D7B-BB35-2B3238FD874D}

  • Viruses — This report presents statistics about detected viruses. It includes the distribution of viruses by source, destination, date and time. This report can be used to determine which viruses are most common and the top sources and destinations of the viruses.

    Report ID — {A4AF4087-2120-454F-849F-641B6F2A1E5A}

Content Inspection Reports

Standard Reports

  • URL Filtering IMPORTANT: Information in this report is sensitive and must only be provided to users on a need-to-know basis.

    This report analyzes URL filtering activity by user, category, source and more. Specific sections include:

    • The top categories of web sites visited
    • Top web sites visited
    • Breakdown of blocked lists to URLs
    • Categories of web sites visited by date and day of week

Express Reports

  • Anti-Spam Activity This report provides an overview of Anti-Spam activity. It includes data regarding:
    • Spam emails that were identified and handled
    • Spam emails categorized by date
    • Spam emails categorized by hour of the day

    Report ID — {B5994073-C220-4CA7-9532-BD453304E67E}

  • Anti-Virus This report provides an overview of the items scanned by the Anti Virus (AV) and handled by the Security Gateway. It provides data about items that were accepted or blocked, projected by gateways, method of enforcement (infection, file type or configured limits) and dates.

    Report ID — {85396AED-6554-4DB9-BBE3-28285E328424}

  • URL Filtering Activity This report provides an overview of Web (URL) filtering handled by the Security Gateways. It provides data about URLs that were accepted or blocked, projected by gateways, method of enforcement (categorization or custom lists) and dates.

    Report ID — {3243E4CB-DAA5-4A08-A9D3-72EEC6C3200E}

Cross Blade Network Activity Reports

Standard Reports

  • Approved Traffic — This report presents data about traffic that was accepted. This report can be used to see network activity to determine effective usage of your resources. Specific sections include information regarding:
    • overall traffic characteristics as well as a breakdown by hour and by date
    • the top network users
    • top services used
    • top sources and top destinations of network traffic

    Report ID — {0C20043C-B8C1-4A20-9CD8-C2FAE589E877}

  • List of all Approved Traffic — This report presents the details of all connections. It can be used for specific security or network behavior inspection. Use this report to collect specific data by filtering only the data you wish to view. This report can generate large amounts of data; select filters and time frames judiciously to create a useful result.

    Report ID — {D7CD8E72-6978-48DB-897A-365ED6B42482}

  • User Activity — This report presents the user's activity as it was logged by the gateway. It includes information about network activity that users performed through the gateway.

    Report ID — {D7CD8E72-6978-48DB-897A-365ED6B42482}

  • Web Traffic — This report presents data about the web traffic through Security Gateways and Mobile Access. Specific sections include:
    • Total web traffic load
    • Top sites visited
    • Top web users
    • Distribution of web traffic by direction
    • Web Traffic by hour and by date

    Filtering data by user can refine the results about individual activity.

    Report ID — {89A57E29-5F58-4E6E-B377-40702631A3A0}

Cross Blade Security Reports

Standard Reports

  • Blocked Traffic — This report presents data regarding events that were blocked. It can be used to determine:
    • The volume of events that were blocked
    • The top sources of blocked events, their destinations and services

    Report ID — {C6F9ED20-E130-40BC-B67C-C37E3BFDD31D}

  • Login Activity — This report presents login activity associated with Endpoint Security VPN, SSL Network Extender and Mobile Access.

    Report ID — {BCE31986-4FD9-4E67-8F1A-69D28E2F9A7F}

  • Login Failures — This report presents all login failures that were reported by the Security Gateway.

    Report ID — {18912ED2-E6E6-448D-9F5A-FD357AC4AE42}

Endpoint Security Blade Reports

Standard Reports

  • Anti-Malware — This report shows Malware detected on endpoint computers by the Anti-Malware feature. Use this report to identify Malware and the users affected by Malware. You can extend the data to include all results, instead of just the top, by increasing the number of results in the Table Properties for each Table.

    Report ID — {8D555251-0525-4FE4-BDF2-84087B97E024}

  • Blocked Programs — This report shows programs blocked on endpoint computers by your security policies. Use this report to see what programs are being used that are malicious or violate corporate policy and to identify the users that initiate these programs. You can extend the data to include all results, instead of just the top, by increasing the number of results in the Table Properties for each Table.

    Report ID — {65E33008-1764-44B0-A5B3-B0449034D3ED}

  • Compliance — This report shows compliance events at the endpoint detected by the compliance enforcement rules. Use this report to see which endpoints and users are out of compliance with your security policies and to identify frequently violated enforcement rules. You can extend the data to include all results, instead of just the top, by increasing the number of results in the Table Properties for each Table. This report shows compliance events at the endpoint detected by the compliance enforcement rules.

    Report ID — {DCC0DC4D-D8CC-4654-A5EA-4288A24137FB}

  • Endpoint Errors — This report shows errors detected with the Endpoint Security client. It identifies errors such as the inability to upload logs, download a policy, or errors in the policy file. Use this report to identify endpoints to investigate for errors or endpoints that may not have the latest policies. You can extend the data to include all results, instead of just the top, by increasing the number of results in the Table Properties for each Table.

    Report ID — {2C9BA414-30CA-4C24-B9F0-870B4D3FF7D4}

  • Firewall Events — This report shows firewall events that occurred on endpoint computers. Use this report to monitor traffic, check the effectiveness of firewall rules, locate abnormally behaving endpoints, and identify suspicious sources and destinations. You can extend the data to include all results, instead of just the top, by increasing the number of results in the Table Properties for each Table.

    Report ID — {99DB6667-F1BC-43AD-B75A-7A7489148ABB}

  • Summary — This report presents a summary of security activity on endpoint computers. Use this report to see trends in the security of endpoints and the effectiveness of the security policies.

    Report ID — {EBBD4849-5482-47AD-A1DF-005D012E646F}

Event Management Reports

  • Detailed Events— This report presents the events detected by SmartEvent. It includes the distribution of events by severity, date and time, source, destination, service and product.
    This report can be used to determine which SmartEvent events are most common and discover various event trends such as the top sources and destinations of the events.

    Report ID — {CB08FAF2-2EF1-4FA2-8D46-5BF78857C348}

  • List of all Events— This report presents the events detected by SmartEvent in a format similar to the SmartEvent client. This report is commonly used in conjunction with filters to present customized event lists.

    Report ID — {630DBB0B-459A-4650-8957-16BB8EC24EE1}

  • Detailed DLP Incidents

    — This report presents the events detected by SmartEvent Software Blade. It distributes events by severity, date and time, source, destination, service and product. You can use this report to determine which detected events are most common and to understand event trends, such as the top sources and destinations of the events.

    Report ID — {71B8D439-FAE8-4FCF-BC88-AA2C3C75EF04}

  • Applications Activity

    — This report presents applications detected by the SmartEvent Software Blade. The report presents applications by: application name, category, number of sessions, traffic volume (in bytes), and first detection time.

    Report ID — {1DD02E0E-10B1-4A07-9027-7B64EA261BDD}

Firewall Blade - Security Reports

Standard Reports

  • Alerts — This report presents the alerts issued by the gateway. It includes the entire list of alerts issued, as well as the distribution of alerts by source, destination, and service.

    Report ID — {475AD894-2AC0-11D6-A330-0002B3321334}

  • Blocked Connections — This report presents data regarding connections that the blocked by the gateway.

    It can be used to determine:

    • the volume of connections that were blocked
    • the top sources of blocked connections, their destinations and services

    Report ID — {475AD891-2AC0-11D6-A330-0002B3321334}

  • Gateway Traffic — This report provides an overview of the network activity that the Security Gateway handled. It includes distribution of traffic by Firewall action and data about traffic that was originated from or destined to the gateway itself.

    Report ID - {0A4E3BC7-55C0-11d6-A342-0002B3321334}

  • Policy Installations — This report presents policy installation data for a specific gateway. It includes data regarding the number of policy install and uninstall procedures. The report is designed to produce results for a single gateway. Using this report for multiple gateways may produce misleading results.

    Report ID — {475AD88F-2AC0-11D6-A330-0002B3321334}

  • Rule Base Analysis — This report presents an analysis of gateway rule base for a specific gateway.

    The report can be used to determine which rules are used the most, which rules are used infrequently and which rules are never used. It can also be used to determine which rules are matched by service, source, and destination.

    Rules are presented by their location in the policy at the time of report generation, while their usage data is gathered by their unique ID where possible. If no unique ID data is available, the rules are marked with an asterisk.

    Report ID — {475AD88E-2AC0-11D6-A330-0002B3321334}

Firewall Blade - Activity Reports

Standard Reports

  • FTP Activity — This report presents data about FTP traffic through the gateway. It can be used to determine:
    • Total FTP traffic
    • FTP traffic by hour and by date
    • Top uploaded/downloaded files
    • Top uploaded/downloaded file types

    Report ID — {7B12F482-5DF0-11D6-A343-0002B3321334}

  • List of all Connections - this report presents the details of all connections. It can be used for specific security or network behavior inspection. Use this report to collect specific data by filtering only the data you wish to view.

    Note - this report can generate large amounts of data. Select filters and time frames judiciously to create a useful result.

    Report ID — {9CBEE3F3-DA22-46A8-B13B-3BF4D5E1D2EA}

  • Network Activity — This report presents data about traffic accepted by the Security Gateway. This report can be used to view network activity in order to determine effective usage of resources.

    Specific sections include information regarding:

    • overall traffic characteristics as well as a breakdown by hour and by date
    • the top network users
    • top services used
    • top sources and top destinations of network traffic

    Report ID — {0A4E3BB9-55C0-11D6-A342-0002B3321334}

  • POP3/IMAP Activity — this report presents data about POP3/IMAP traffic through the gateway. It includes data about total POP3/IMAP traffic load and distribution of traffic by direction.

    Report ID — {70D7A36F-B3E1-45B7-BDC9-165E35653538}

  • SMTP Activity — this report presents data about SMTP mail traffic through the gateway. It can be used to determine total mail traffic load as well as top mail senders and top mail recipients.

    Report ID — {7B12F483-5DF0-11D6-A343-0002B3321334}

  • User Activity - this report presents the user's activity as it was logged by the gateway. It includes information about network activity that users performed through the gateway.

    Report ID — {D7CD8E72-6978-48DB-897A-365ED6B42482}

  • Web Activity — this report presents data about the web traffic through the gateway.

    Specific sections include:

    • The total web traffic load
    • Top sites visited
    • Top web users
    • Distribution of web traffic by direction.
    • Web Traffic by hour and by date

    Filtering data by user can refine the results about individual activity.

    Report ID — {7B12F481-5DF0-11D6-A343-0002B3321334}

Firewall Network Activity

Express Reports

  • FTP Activity — This report provides an overview about FTP security server activity. It includes data about:
    • Accepted and rejected FTP sessions
    • Average concurrent FTP sessions
    • FTP sessions over time

    Report ID — {C0D0C34B-F35D-4482-9CF8-631B7ACEEE57}

  • Network Activity — This report provides an overview of the network activity that Security Gateway handled. It includes data about top traffic sources, top destinations and top services in terms of bytes/sec or concurrent connections, as well as the top rules by date.

    Report ID — {DB3CBF73-DC1C-4E0C-8D04-8000EA64FF5F}

  • Selected Services Activity — This report provides an overview about selected services:
    • FTP
    • HTTP
    • HTTPS
    • SMTP
    • TELNET
    • POP3/IMAP

    It includes data about traffic bytes, byte rate and the number of concurrent connections for these services.

    Report ID — {3D7854AB-6118-437F-87A3-71BD392E7DF3}

  • SMTP Activity — This report provides an overview of the SMTP security server activity. It includes data about the number of SMTP emails handled and the number of SMTP connections.

    Report ID — {9BE87F3D-AADC-425D-B59E-E4B221564FAD}

InterSpect Reports

Standard Reports

  • List of Added Dynamic Rules — This report provides detailed information about the dynamic rules added to the system. This report can be filtered to reduce the size of its output.

    Report ID — {9CD89E76-EFE1-458B-91B4-A9043DBCB777}

  • Quarantined Machines — This report provides an overview about the hosts that were quarantined.

    Report ID — {809E625A-FB21-4EAD-8CB4-7AA3769F9790}

Express Reports

  • InterSpect Activity — This report provides an overview of the network activity that InterSpect handled. It includes data about total traffic connections and total numbers of accepted and denied packets.

    Report ID — {2CFA72AF-47D1-4374-B542-9FE7181813F6}

  • InterSpect Network Activity — This report provides an overview of the network activity that InterSpect handled. It includes data about traffic sources, destinations and services.

    Report ID — {B483F96A-E911-4F45-940C-A3F5E0AAD2FA}

  • InterSpect System Information — This report provides data about the system's CPU, memory and free disk space.

    Report ID — {2320E7D8-3047-4D88-99E4-437A8AC0C063}

IPS Blade Reports

Standard Reports

  • IPS Attacks — This report presents the security attacks detected by IPS. It includes the distribution of attacks by source, destination, date and time. This report can be used to determine which IPS attacks are most common and the top sources and destinations of the attacks.

    Report ID — {F76CEB9F-6718-4875-8273-54A0F420BC13}

  • IPS Detailed Attacks — This report presents detailed security attacks detected by IPS (for example, Kazaa and eMule will appear instead of simply Peer to Peer). It includes the distribution of attacks by source, destination, date and time. This report can be used to determine which IPS attacks are most common and the top sources and destinations of the attacks.

    Report ID — {082444B7-1739-4CCA-87DF-A0A67C863067}

IPSEC VPN Blade Reports

Standard Reports

  • Encrypted Network Activity — This report presents data about network traffic that the gateway encrypted. It includes data about total encrypted traffic load, distribution of encrypted traffic by services and by traffic direction.

    Report ID — {0A4E3BC6-55C0-11d6-A342-0002B3321334}

  • Endpoint Security VPN Users Activity — This report presents Endpoint Security VPN activity as it was logged by the alerts uploaded from the desktops. It includes sections on:
    • Policy server logins
    • Top users by login duration
    • Top Servers by login

    The report also shows Policy Server activity information.

    Report ID — {E387C01B-0373-406a-84BC-DAF15A3E5759}

  • VPN Community — This report provides data about VPN community activity. The report can also be used for any set of multiple gateways and provides data about:
    • Security Gateway encrypted traffic
    • VPN tunnel creation and its distribution throughout the day.

    Report ID — {BD534B0B-C4CA-41c4-A996-76D3317FF2D2}

  • VPN Tunnel for Specific Gateway — This report provides data about specific gateway connections. The report shows the level of activity between a gateway and its peers, VPN traffic distribution and VPN tunnel creation. The report is designed to produce results for a single gateway. Using this report for multiple gateways may produce misleading results. To obtain data regarding multiple gateways use the 'VPN Community' report.

    Report ID — {E74B0FA9-7617-11D6-A351-0002B3321334}

Express Reports

  • VPN Activity — This report provides an overview of the traffic handled by Security Gateways. It includes data about traffic encrypted and decrypted by the Security Gateways.

    Report ID — {E276053F-19B2-429C-9FB2-21BA0DE5B6B2}

  • VPN Tunnels — This report provides data on the process of tunnel creation by Security Gateways. It includes data on VPN and remote access tunnels, as well as on IKE negotiations.

    Report ID — {B640C862-DF0E-485E-A0B0-086E0D35EC76}

My Reports

Standard Reports

This category includes predefined reports as well as reports you have customized to better address your specific needs.

The following reports present the events detected by Event Analysis blades. They include the distribution of events by severity, date and time, source, destination, service and product. These reports can be used to determine which Analyzer events are most common and to discover various event trends, such as the top sources and destinations of the events.

  • Daily Domain Detailed Events (Multi-Domain Security Management Deployment)

    Report ID — {7395F2D0-03A0-412E-8C04-ECF44E32681C}

  • Daily Detailed Events

    Report ID — {9974A621-1470-4964-9180-14F62FB2DAD1}

  • Hourly Domain Detailed Events (Multi-Domain Security Management Deployment)

    Report ID — {28A841C5-5043-47A3-92C4-7CF2F7F3D054}

  • Hourly Detailed Events

    Report ID — {A0F8AF8B-DAED-4844-B6CE-76C2B7F2FDA6}

  • Monthly Domain Detailed Events (Multi-Domain Security Management Deployment)

    Report ID — {26E5139C-1D2E-458E-AE98-92EE2635FF33}

  • Monthly Detailed Events

    Report ID — {3C3D7646-9FF8-4B03-B69D-1B0B9712AC97}

  • Weekly Domain Detailed Events (Multi-Domain Security Management Deployment)

    Report ID — {38AE5F1A-6079-49BD-B37A-E5A8E799C109}

  • Weekly Detailed Events

    Report ID — {4A1234B8-11EE-456D-BC37-F8A32E3CB9B6}

Network Security Reports

Express Reports

  • Firewall Activity — This report provides an overview about the network activity that a gateway handled. It includes sections on:
    • Top gateways by concurrent connections
    • Top gateways by accepted and denied packets
    • Accepted and denied packets over time
    • Total activity by day of the week and by hour of the day.

    Report ID — {F9504B51-4E93-484E-BA9B-747632278B65}

  • Peer To Peer Activity — This report provides information about Peer To Peer Activity. It includes data about traffic of services such as Kazaa, eMule, Gnutella, BitTorrent, Skype, ICQ and Yahoo! Messenger.

    Report ID — {60F6FCDA-0F66-43A6-B8E6-271247207F5B}

  • Port Scan Attacks — This report provides an overview of Port Scan attacks detected by InterSpect.

    Report ID — {C93FF2C0-9F72-44C1-9734-38ED64FF96BD}

  • SYN Attacks — This report provides an overview of SYN attacks detected by InterSpect.

    Report ID — {F0EFADA3-C79B-4E06-958A-E0365194CC83}

Regulatory Compliance Reports

Important - Information in these reports is sensitive and must only be provided to users on a need-to-know basis.

Compliance Reporting and Disclaimer:

The Regulatory Compliance reports provide “Compliance Source Information“ for use in regulations and standards reporting requirements. Check Point is not providing legal and/or compliance advice and makes no warranties, express or implied, that this information meets compliance regulations. Always consult your legal advisors for compliance regulations and requirements which may be applicable to you.

The following reports meet ISO 17799, COBIT, PCI-DSS, SOX and HIPAA compliance Source requirements.

Standard Reports

  • Alert Risks — This report presents the alerts issued by Firewall. It includes the entire list of alerts issued and the distribution of alerts by source, destination and service.

    Report ID — {F036E9AD-90F5-4EC5-BE5E-5C26FDCEBC2F}

  • Attacks — It includes the distribution of attacks by source, destination, date and time. This report can be used to determine which IPS attacks are most common and the top sources and destinations of these attacks.

    Report ID — {FDEBC97B-B148-4F56-BC66-FB8439760C8D}

  • Blocked Connections — This report presents data regarding connections that the Security Gateway blocked. It can be used to determine:
    • The volume of connections that were blocked
    • The top sources of blocked connections, their destinations and services

    Report ID — {81FC797B-8862-4CF1-BBD7-BEA504F31C15}

  • Blocked Programs Endpoint — This report shows programs that were blocked on endpoint computers by your security policies. You can use this report to see what programs are being used that are malicious or violate corporate policy, and to identify the users that initiate these programs. You can extend the data to include all results, instead of just the top, by increasing the number of results in the Table Properties for each Table.

    Report ID — {95E1B452-E154-4421-8C9C-2B90CCBE73DC}

  • Endpoint Security Compliance — This report shows compliance events at the endpoint computer that were detected by the compliance enforcement rules. You can use this report to see which endpoint computers and users are out of compliance with your security policies and to identify frequently violated enforcement rules. You can extend the data to include all results, instead of just the top, by increasing the number of results in the Table Properties for each Table.

    Report ID — {A2C90031-B4AD-4643-B2CC-F699489388FB}

  • Failed Logins — This report presents all login failures that were reported by Security Gateway.

    Report ID — {BA92DEC2-D7C6-4CEE-B828-12FBE5B0E964}

  • GTP Firewall Security Alerts — This report provides information regarding GTP signaling messages or GTP data packets that where dropped because they did not meet the necessary security requirements.

    Report ID — {8CC905F9-59F5-473C-AA86-42BB8763B7FD}

  • List of Added Dynamic Rules — This report provides detailed information about the dynamic rules added to the system. This report can be filtered to reduce the size of its output.

    Report ID — {6CA37FB0-B322-44AC-9CCC-4EB80EF0CE2A}

  • MailSafe Endpoint — This report shows email extensions that were quarantined on endpoint computers using the MailSafe feature. You can use this report to identify the use of attachments that could be malicious or may violate policy. You can extend the data to include all results, instead of just the top, by increasing the number of results in the Table Properties for each Table.

    Report ID — {0CB2D174-7B5B-47BD-B781-81C117E07344}

  • Policy Installations — This report presents policy installation data for a specific gateway. It includes data regarding the number of policy install and uninstall procedures. The report is designed to produce results for a single gateway. If you use this report for multiple gateways, it may produce misleading results.

    Report ID — {E11B11B8-2311-4179-B58C-9F7C4498EA45}

  • Quarantined Hosts — This report provides an overview about the host addresses that were quarantined.

    Report ID — {44C03345-4FE0-4AE2-A820-7C84FA9713EA}

  • Risk Summary — This report presents data regarding connections that Firewall blocked. It can be used to determine:
    • The volume of connections that were blocked.
    • The top sources of blocked connections, their destinations and services.

    Report ID — {93803268-840C-476D-A859-1BF3D73EBBCD}

  • Spyware Endpoint — This report shows spyware that is detected on endpoint computers by the Anti-Spyware feature. You should use this report to identify spyware programs and the users affected by spyware. You can extend the data to include all results, instead of just the top, by increasing the number of results in the Table Properties for each Table.

    Report ID — {BE003478-3AD7-46BD-A805-7E9584AB19D9}

  • Successful Logins — This report presents login activity associated with Endpoint Security VPN, SSL Network Extender and Mobile Access.

    Report ID — {3968DFE8-403E-4A7A-9636-9B46188C2654}

  • Viruses — This report presents statistics about detected viruses. It includes the distribution of viruses by source, destination, date and time. This report can be used to determine which viruses are the most common and the top sources and destinations of the viruses.

    Report ID — {DA589319-3268-4A4B-8569-11F45B397947}

Express Reports

  • Application Layer — The report provides information about Application Layer defenses. It contains a summary of all the traffic that was classified as Application Layer attacks. Such attacks attempt to target the web application layer such as the database layer, server side scripts and various components used in the application. The attacks are divided into several categories: cross site scripting, command injection, SQL injection etc.

    Report ID — {865417E0-048A-404B-8E9F-777EB4F85D45}

  • Firewall Memory Information — This report provides data about memory allocations that the Firewall made. It includes data about various types of memory allocations used by the Firewall.

    Report ID — {7762B74C-329D-49C2-A7AD-2466AFE7A0CC}

  • System Information — This report provides data about the Security Gateways' system status, including data about CPU, memory and disk space. This report can be used to see the load on the Security Gateway over time.

    Report ID — {ABF8BF25-DBC0-46F0-A2D5-3C0C5086DDB6}

Mobile Access Blade Reports

Standard Reports

  • Mobile Access Events — This report provides general data about Mobile Access events. This report offers a general impression of Mobile Access activity and can be filtered more specifically.

    Report ID — {C877E51F-3D84-42D9-BE31-2A6D53C4AC84}

  • Mobile Access File Shares Activity — This report provides data about the file share activity through Mobile Access.

    Report ID — {D29B7BB1-9D18-4A60-8F97-57D883AFFE39}

System Information Reports

Express Reports

  • System Information — This report provides data about gateway system status, including data about CPU, memory and disk space. This report can be used to see the load on gateway over time.

    Report ID — {26450EBC-37B4-4465-A9E0-F3FFA61917E6}

  • Security Gateway Memory — This report provides data about memory allocations that the Security Gateways made. It includes data about various types of memory allocations used by Security Gateways.

    Report ID{F896C74F-72F0-47A8-A54D-0974B518E9CD}

 
Top of Page ©2013 Check Point Software Technologies Ltd. All rights reserved. Download Complete PDF Send Feedback Print