Managing Gateways

This section describes how to create, update, and manage Security Gateways, and to use Secure Internal Communication (SICClosed Secure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server.) methods for Check Point platforms and products to authenticate each other.