A SmartConsole user with permissions to manage Check Point security products and the network environment.
A physical computer manufactured and distributed by Check Point.
Installation of a Check Point Operating System from scratch on a computer.
Two or more Security Gateways that work together in a redundant configuration - High Availability.
Check Point Upgrade Service Engine for Gaia Operating System. With CPUSE, you can automatically update Check Point products for the Gaia OS, and the Gaia OS itself. For details, see sk92449.
Process of:
This upgrade method minimizes upgrade risks for an existing deployment.
The Check Point Security Gateway and Security Management Server products are deployed on different computers.
A network or a collection of networks related to an entity, such as a company, business unit or geographical location.
A Log Server for a specified Domain. It stores and processes logs from Security Gateways that are managed by the corresponding Domain Management Server.
A virtual Security Management Server that manages Security Gateways for one Domain, as part of a Multi-Domain Security Management environment.
Deployment and configuration mode of two Check Point computers, each of which runs both a Security Gateway and a Security Management Server software.
The Security Gateways work as ClusterXL in High Availability mode.
The Security Management Servers work in Management High Availability mode.
A Domain on a Multi-Domain Server, on which the Multi-Domain Server administrator creates and manages objects, security policies and settings that apply to the entire Multi-Domain Security Management environment.
All Policies defined in the Global Domain that can be assigned to Domains, or to specified groups of Domains.
Internal Certificate Authority - A component on Check Point Management Server that issues certificates for authentication.
A dedicated Check Point computer that runs Check Point software to store and process logs in Security Management Server or Multi-Domain Security Management environment.
Deployment and configuration mode of two Check Point Management Servers, in which they automatically synchronize the management databases with each other. In this mode, one Management Server is Active, and the other is Standby.
Exporting the Check Point configuration database from one Check Point computer and importing it on another Check Point computer.
A computer that runs Check Point software to store and process logs in Multi-Domain Security Management environment. The Multi-Domain Log Server consists of Domain Log Servers that store and process logs from Security Gateways that are managed by the corresponding Domain Management Servers.
A centralized management solution for large-scale, distributed environments with many different Domain networks.
A computer that runs Check Point software to host virtual Security Management Servers called Domain Management Servers.
A physical computer manufactured and distributed by a company, other than Check Point.
A SmartUpdate repository on the Security Management Server that stores uploaded packages. These packages are then used by SmartUpdate to perform upgrades of Check Point Small Office Appliances.
A computer that runs Check Point software to inspect traffic and enforces Security Policies for connected network resources.
A computer that runs Check Point software to manage the objects and policies in Check Point environment.
A collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.
Secure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server.
A Check Point Appliance from one of these series: 1100, 1200R, or 1400.
A Check Point GUI application used to manage Security Policies, monitor products and events, install updates, provision new devices and appliances, and manage a multi-domain environment and each domain.
A Check Point computer, on which both the Security Gateway and Security Management Server products are installed and configured.
Replacing a Check Point product with a newer version of the same Check Point product.