After the installation is complete, and you rebooted the Check Point computer:
The Check Point Configuration Tool lets you configure these settings:
Check Point computer |
Commands |
Available Configuration Options |
---|---|---|
Security Management Server, Dedicated Log Server, Dedicated SmartEvent Server |
|
|
Multi-Domain Server, Multi-Domain Log Server |
1. 2. |
|
Security Gateway, Cluster Member |
|
|
Explanation about the Configuration Options on a Security Management Server, dedicated Log Server or SmartEvent Server:
For more information, see the R80.20 Security Management Administration Guide.
Configuration Options |
Description |
---|---|
|
Add or delete licenses and contracts for this server. |
|
Configure administrators for this server. These administrators must have Read/Write permissions to create the first Security Policy |
|
Configure the computers that are allowed to connect with the SmartConsole to this server. |
|
Obsolete. Do not use this option. |
|
Configure the random data to be used for various cryptographic operations on this server. |
|
Reset SIC on this server. |
|
Show the SIC certificate's fingerprint for this server. This fingerprint verifies the identity of this server when you connect to it with SmartConsole for the first time. |
|
Select which of the installed Check Point products start automatically during boot. This option is for Check Point Support use. |
|
Exit from the Check Point Configuration Tool. |
Explanation about the Configuration Options on a Multi-Domain Server or Multi-Domain Log Server:
For more information, see the R80.20 Multi-Domain Security Management Administration Guide.
Configuration Options |
Description |
---|---|
|
Configure the Leading VIP Interfaces on this server. |
|
Add or delete licenses for this server. |
|
Configure the random data to be used for various cryptographic operations on this server. |
|
Configure whether to remove group permissions for access and execution on this server. |
|
Show the SIC certificate's fingerprint for this server. This fingerprint verifies the identity of this server when you connect to it with SmartConsole for the first time. |
|
Configure administrators for this server. These administrators must have Read/Write permissions to create the first Security Policy. |
|
Configure the computers that are allowed to connect with the SmartConsole to this server. |
|
Select whether to start the Multi-Domain Server product automatically during boot. This option is for Check Point Support use. |
|
Enable or disable P1shell. |
|
Configure the |
|
R80.20 Multi-Domain Server does not support IPv6. Do not use this option (Known Limitation PMTR-14989). |
|
R80.20 Multi-Domain Server does not support IPv6. Do not use this option (Known Limitation PMTR-14989). |
|
Exit from the Check Point Configuration Tool. |
Explanation about the Configuration Options on a Security Gateway or Cluster Member:
Configuration Options |
Description |
---|---|
|
Add or delete licenses and contracts for this computer. |
|
Obsolete. Do not use this option. |
|
Configure a PKCS#11 Token for a VPN cryptographic device. |
|
Configure the random data to be used for various cryptographic operations on this server. |
|
Reset and configure the one-time activation key (between 4 and 127 characters long) for Secure Internal Communication (SIC) with a Management Server. For more information, see the R80.20 Security Management Administration Guide. |
|
Configure this Security Gateway as part of a Check Point cluster. For more information, see the R80.20 ClusterXL Administration Guide. |
|
Configure the VSX Virtual System Load Sharing on this VSX Gateway. For more information, see the R80.20 VSX Administration Guide |
|
Configure this Security Gateway as part of a ClusterXL in Bridge Mode. For more information, see the R80.20 ClusterXL Administration Guide. |
|
Configure the CoreXL. For more information, see the R80.20 Performance Tuning Administration Guide. |
|
Select which of the installed Check Point products start automatically during boot. This option is for Check Point Support use. |
|
Exit from the Check Point Configuration Tool. |