Print Download PDF Send Feedback

Terms

Administrator

A SmartConsole user with permissions to manage Check Point security products and the network environment.

Appliance

A physical computer manufactured and distributed by Check Point.

Clean Install

Installation of a Check Point Operating System from scratch on a computer.

Cluster

Two or more Security Gateways that work together in a redundant configuration - High Availability.

CPUSE

Check Point Upgrade Service Engine for Gaia Operating System. With CPUSE, you can automatically update Check Point products for the Gaia OS, and the Gaia OS itself. For details, see sk92449.

Database Migration

Process of:

  1. Installing the latest Security Management Server or Multi-Domain Server version from the distribution media on a separate computer from the existing Security Management Server or Multi-Domain Server
  2. Exporting the management database from the existing Security Management Server or Multi-Domain Server
  3. Importing the management database to the new Security Management Server or Multi-Domain Server

This upgrade method minimizes upgrade risks for an existing deployment.

Distributed Deployment

The Check Point Security Gateway and Security Management Server products are deployed on different computers.

Domain

A network or a collection of networks related to an entity, such as a company, business unit or geographical location.

Domain Log Server

A Log Server for a specified Domain. It stores and processes logs from Security Gateways that are managed by the corresponding Domain Management Server.

Domain Management Server

A virtual Security Management Server that manages Security Gateways for one Domain, as part of a Multi-Domain Security Management environment.

Full HA Cluster

Deployment and configuration mode of two Check Point computers, each of which runs both a Security Gateway and a Security Management Server software.

The Security Gateways work as ClusterXL in High Availability mode.

The Security Management Servers work in Management High Availability mode.

Global Domain

A Domain on a Multi-Domain Server, on which the Multi-Domain Server administrator creates and manages objects, security policies and settings that apply to the entire Multi-Domain Security Management environment.

Global Policy

All Policies defined in the Global Domain that can be assigned to Domains, or to specified groups of Domains.

ICA

Internal Certificate Authority - A component on Check Point Management Server that issues certificates for authentication.

Log Server

A dedicated Check Point computer that runs Check Point software to store and process logs in Security Management Server or Multi-Domain Security Management environment.

Management High Availability

Deployment and configuration mode of two Check Point Management Servers, in which they automatically synchronize the management databases with each other. In this mode, one Management Server is Active, and the other is Standby.

Migration

Exporting the Check Point configuration database from one Check Point computer and importing it on another Check Point computer.

Multi-Domain Log Server

A computer that runs Check Point software to store and process logs in Multi-Domain Security Management environment. The Multi-Domain Log Server consists of Domain Log Servers that store and process logs from Security Gateways that are managed by the corresponding Domain Management Servers.

Multi-Domain Security Management

A centralized management solution for large-scale, distributed environments with many different Domain networks.

Multi-Domain Server

A computer that runs Check Point software to host virtual Security Management Servers called Domain Management Servers.

Open Server

A physical computer manufactured and distributed by a company, other than Check Point.

Package Repository

A SmartUpdate repository on the Security Management Server that stores uploaded packages. These packages are then used by SmartUpdate to perform upgrades of Check Point Small Office Appliances.

Security Gateway

A computer that runs Check Point software to inspect traffic and enforces Security Policies for connected network resources.

Security Management Server

A computer that runs Check Point software to manage the objects and policies in Check Point environment.

Security Policy

A collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.

SIC

Secure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server.

Small Office Appliance

A Check Point Appliance from one of these series: 1100, 1200R, or 1400.

SmartConsole

A Check Point GUI application used to manage Security Policies, monitor products and events, install updates, provision new devices and appliances, and manage a multi-domain environment and each domain.

Standalone

A Check Point computer, on which both the Security Gateway and Security Management Server products are installed and configured.

Upgrade

Replacing a Check Point product with a newer version of the same Check Point product.