Then join the Security Gateways into a VPN community - collection of VPN tunnels and their attributes. Define the resources that are included in the VPN Domain for each Security Gateway. They use the IPsec protocol to encrypt and decrypt data that is sent between Host 4 and Host 5.Įncrypted data is sent through VPN tunnelĪ VPN Domain is a collection of internal networks that use Security Gateways to send and receive VPN traffic. The Security Gateways perform IKE negotiation and create a VPN tunnel. In this sample VPN deployment, Host 4 and Host 5 securely send data to each other. One Security Gateway can maintain more than one VPN tunnel at the same time. Two Security Gateways negotiate a link and create a VPN tunnel and each tunnel can contain more than one VPN connection. The basis of Site-to-Site VPN is the encrypted VPN tunnel.
VPN Management tools, such as Security Management Server and SmartConsole.The ICA provides certificates for internal Security Gateways and remote access clients which negotiate the VPN link. The ICA is part of the Check Point suite used for creating SIC trusted connection between Security Gateways, authenticating administrators and third party servers. VPN trust entities, such as a Check Point Internal Certificate Authority (ICA).VPN endpoints, such as Security Gateways, Security Gateway clusters, or remote clients (such as laptop computers or mobile phones) that communicate over a VPN.IPsec is protocol that supports secure IP communications that are authenticated and encrypted on private or public networks. IKE (Internet Key Exchange) is a standard key management protocol that is used to create the VPN tunnels. The Check Point VPN solution uses these secure VPN protocols to manage encryption keys, and send encrypted packets. Integrity - Uses industry-standard integrity assurance methods.Authenticity - Uses standard authentication methods.Use SmartConsole to easily configure VPN connections between Security Gateways and remote devices.įor Site-to-Site Communities, you can configure Star and Mesh topologies for VPN networks, and include third-party gateways.
The IPsec VPN solution lets the Security Gateway encrypt and decrypt traffic to and from other gateways and clients.