Introduction
Welcome
Congratulations on your new SandBlast
Check Point also delivers worldwide technical services including educational, professional and support services through a network of Authorized Training Centers, Certified Support Partners and Check Point technical support personnel to ensure that you get the most out of your security investment.
For additional information on the Internet Security Product Suite and other security solutions, refer to the Check Point web site, or call Check Point at 1(800) 429-4391. For additional technical information about Check Point products, consult the Check Point Support Center.
Welcome to the Check Point family. We look forward to meeting all of your current and future network, application and management security needs.
TE2000XN Appliances Overview
The SandBlast
The SandBlast TE Appliance may be used to provide emulation and extraction services to Check Point NGTX gateways, to SandBlast Agent on endpoints and to any system via the SandBlast API. The product may also be deployed as a standalone solution when covered by an NGTX license.
Shipping Carton Contents
This section describes the contents of the shipping carton.
Terminology
The following terms are used in this guide:
-
Security Gateway: The security engine that enforces the organization's Security Policy and acts as a security enforcement point.
-
Security Policy: The policy created by the system administrator that regulates the flow of incoming and outgoing communication.
-
Security Management Server: The server used by the system administrator to manage the Security Policy. The organization's databases and Security Policies are stored on the Security Management Server and downloaded to the Security Gateway.
-
SmartConsole: GUI applications that are used to manage various aspects of Security Policy enforcement.
-
SmartDashboard: A Legacy SmartConsole GUI application that is used by the system administrator to create and manage specific settings for some Software Blades.
-
Locally Managed Deployment: When all Check Point components responsible for both the management and enforcement of the Security Policy (the Security Management Server and the Security Gateway) are installed on the same machine.
-
Centrally Managed Deployment: When the Security Gateway and the Security Management Server are installed on separate machines.