3
Performing the Initial Configuration
40
Check Point IP690 Security Platform Installation Guide
For more information about how to access and use the CLI, see the
CLI Reference Guide
for the
version of Check Point IPSO you are using.
Using Check Point Horizon Manager
Check Point Horizon Manager is an extension of the Check Point Network Voyager
management functionality.
While Check Point Network Voyager provides the device administrator access to network
configuration tasks (such as interface configuration and routing configuration) and security
configuration tasks (such as user configuration and access configuration), Check Point Horizon
Manager concentrates on secure software image, inventory, and platform management of Check
Point IP security platforms.
Using Check Point Horizon Manager, an administrator can obtain configuration information,
upgrade (or downgrade) the operating system, perform application installations, and distribute
necessary licensing to multiple platforms simultaneously, thereby reducing potential human
error and improving productivity.
Using Check Point Horizon Manager, a network security professional can manage multiple
devices simultaneously, perform parallel software upgrades, device verifications, device
configuration, file backups, and more.
Check Point Horizon Manager is designed to manage and configure a large number of Check
Point IP security appliances that reside on a corporate enterprise, managed service provider
(MSP), or hosted applications service provider network (ASP).
For information about how to obtain Check Point Horizon Manager or to learn more about the
Check Point Horizon Manager, see the Check Point Web site at
www.checkpoint.com
.
Execute from
To Implement
Purpose
Check Point
IPSO command
line
Enter the following command
to invoke the CLI shell:
clish
The prompt changes, and you
can then enter CLI commands.
Enter any CLI commands in an
interactive mode with help text
and other helpful CLI features.
Check Point
IPSO command
line
Enter
clish -c
“
cli-command
”
Execute a single CLI
command. You must place
double-quotation marks
around the CLI command.
Command files
From inside the CLI shell, enter
load commands
filename
Load commands from a text
file that contains commands.
The argument must be the
name of a regular file.
Summary of Contents for IP690 - Flash Based Sys
Page 6: ...6 Check Point IP690 Security Platform Installation Guide...
Page 8: ...8 Check Point IP690 Security Platform Installation Guide...
Page 10: ...10 Check Point IP690 Security Platform Installation Guide...
Page 26: ...1 Overview 26 Check Point IP690 Security Platform Installation Guide...
Page 110: ...A Technical Specifications 110 Check Point IP690 Security Platform Installation Guide...
Page 118: ...Index 118 Check Point IP690 Security Platform Installation Guide...