A SmartConsole user with permissions to manage Check Point security products and the network environment.
A Dynamically Assigned IP (DAIP) Security Gateway is a Security Gateway where the IP address of the external interface is assigned dynamically by the ISP.
The Check Point database includes all objects, including network objects, users, services, servers, and protection profiles.
Users defined on external servers. External users are not defined in the Security Management Server database or on an LDAP server. External user profiles tell the system how to identify and authenticate externally defined users.
Lets you enforce network access and audit data based on network location, the identity of the user, and the identity of the computer.
Lightweight Directory Access Protocol. An open industry standard for user and device data storage and directory-access.
Groups of users defined on an LDAP account unit.
Physical server that hosts Check Point product log files.
A Check Point Security Management Server or a Multi-Domain Server.
Group of files, and data about those files, delivered as one software archive (usually TGZ or RPM), for distribution and installation.
A set of access, and feature-based roles for SmartConsole administrators.
A collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.
The database that contains the rules in a security policy and defines the sequence, in which they are enforced.
A computer that runs Check Point software to inspect traffic and enforces Security Policies for connected network resources.
A computer that runs Check Point software to manage the objects and policies in Check Point environment.
Secure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server.
A Check Point GUI application used to manage Security Policies, monitor products and events, install updates, provision new devices and appliances, and manage a multi-domain environment and each domain.
A legacy Check Point GUI client used to create and manage the security policy in R77.30 and below.
A software blade is a security solution based on specific business needs.
Each blade is independent, modular and centrally managed. To extend security, additional blades can be quickly added.
Check Point internal database that contains all users defined and managed in SmartConsole.
Named groups of users with related responsibilities.
Property set that defines a type of user on which a security policy will be enforced.
Personnel authorized to use network resources and applications.