Print Download PDF Send Feedback

Terms

Bridge

A device that uses layer-2 connections to handle traffic between networks or systems of equivalent architectures on one logical link. Compare with layer-3 connections that use IP address routing, and with a gateway, that connections networks or systems of different architectures.

Data Type

A classification of data. The Firewall classifies incoming and outgoing traffic according to Data Types, and enforce the Policy accordingly.

dbedit

A CLI tool that lets administrators make changes to objects in the Check Point databases (see skI3301). We recommend the GuiDBedit Tool (see sk13009) instead of dbedit when not using scripts.

Dedicated Security Gateway

One Software Blade is enabled on a Security Gateway and the gateway is dedicated to the services of this Software Blade.

See Also:

Integrated Security Gateway

DLP

Data Loss Prevention. Detects and prevents the unauthorized transmission of confidential information.

External Network

Computers and networks that are outside of the protected network.

See also

Internal Network

Gateway

A computer or appliance that controls communication between different networks.

See Also

Security Gateway

Integrated Security Gateway

More than one Software Blade is enabled on a Security Gateway.

See Also

Dedicated Security Gateway

Internal Network

Computers and resources protected by the Firewall and accessed by authenticated users.

See also

External Network

Rule

A set of traffic parameters and other conditions that cause specified actions to be taken for a communication session.

Security Gateway

A computer that runs Check Point software to inspect traffic and enforces Security Policies for connected network resources.

Security Management Server

A computer that runs Check Point software to manage the objects and policies in Check Point environment.

Security Policy

A collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.

SmartConsole

A Check Point GUI application used to manage Security Policies, monitor products and events, install updates, provision new devices and appliances, and manage a multi-domain environment and each domain.

SmartDashboard

A legacy Check Point GUI client used to create and manage the security policy in R77.30 and below.

Traffic

The flow of data between network devices.