

Software Blade Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. Note - If the Mobile Access Check Point Software Blade on a Security Gateway that provides a Remote Access VPN access for managed and unmanaged clients. It is much easier to deploy a new version of the SSL Network Extender client than it is to deploy a new version of other conventional clients. Once the end user has connected to a server, the thin client is downloaded as an ActiveX component, installed, and then used to connect to the corporate network using the SSL protocol. The SSL Network Extender requires a server side configuration only, unlike other remote access clients. In versions R80.X and higher is still used to configure specific legacy settings., thus enabling full secure IP connectivity over SSL. It is activated by using the SmartDashboard Legacy Check Point GUI client used to create and manage the security settings in versions R77.30 and lower. By default, the SSL enabled web server is disabled. (The SSL Network Extender client has a much smaller size than other clients.) It is connected to an SSL enabled web server that is part of the Enforcement Module. A thin client is installed on the user's machine. The SSL (Secure Socket Layer) Network Extender is a simple-to-implement remote access solution. To resolve these issues, a secure connectivity framework is needed to ensure that remote access to the corporate network is securely enabled. The given solution should be seamless for the connecting user. No configuration should be required as a result of network modification. Secure connectivity: Guaranteed by the combination of authentication, confidentiality and data integrity for every connection. The range of applications available must include web applications, mail, file shares, and other more specialized applications required to meet corporate needs. These requirements include:Ĭonnectivity: The remote client must be able to access the organization from various locations, even if behind a NATing device, Proxy or Firewall. Whenever users access the organization from remote locations, it is essential that not only the usual requirements of secure connectivity be met but also the special demands of remote clients. SSL Network Extender Introduction to the SSL Network Extender
