A device that uses layer-2 connections to handle traffic between networks or systems of equivalent architectures on one logical link. Compare with layer-3 connections that use IP address routing, and with a gateway, that connections networks or systems of different architectures.
A classification of data. The Firewall classifies incoming and outgoing traffic according to Data Types, and enforce the Policy accordingly.
A CLI tool that lets administrators make changes to objects in the Check Point databases (see skI3301). We recommend the GuiDBedit Tool (see sk13009) instead of dbedit when not using scripts.
One Software Blade is enabled on a Security Gateway and the gateway is dedicated to the services of this Software Blade.
See Also: |
Data Loss Prevention. Detects and prevents the unauthorized transmission of confidential information.
Computers and networks that are outside of the protected network.
See also |
A computer or appliance that controls communication between different networks.
See Also |
More than one Software Blade is enabled on a Security Gateway.
See Also |
Computers and resources protected by the Firewall and accessed by authenticated users.
See also |
A set of traffic parameters and other conditions that cause specified actions to be taken for a communication session.
A computer that runs Check Point software to inspect traffic and enforces Security Policies for connected network resources.
A computer that runs Check Point software to manage the objects and policies in Check Point environment.
A collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.
A Check Point GUI application used to manage Security Policies, monitor products and events, install updates, provision new devices and appliances, and manage a multi-domain environment and each domain.
A legacy Check Point GUI client used to create and manage the security policy in R77.30 and below.
The flow of data between network devices.