Command Line Reference

See the R81.10 CLI Reference Guide.

Below is a limited list of applicable commands.

These terms are used in the CLI commands:

Term

Description

PDP

Identity AwarenessClosed Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA.Policy Decision Point.

This is an Identity AwarenessSecurity GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources., which is responsible to collect and share identities.

PEP

Identity AwarenessPolicy Enforcement Point.

This is an Identity AwarenessSecurity Gateway, which is responsible to enforce network access restrictions.

It makes its decisions based on identity data it collected from the PDP.

ADLOG

The module responsible for the acquisition of identities of entities (users or computers) from the Active Directory.

The adlog runs on:

The adlog is the command line process used to control and monitor the ADLOG feature.

The command line tool helps control users' statuses, as well as troubleshoot and monitor the system.

The PEP and PDP processes are key components of the system. Through them, administrators control user access and network protection.

Important - On Scalable Platforms (Maestro and Chassis), you must run the applicable commands in the Expert mode on the applicable Security Group.