4-22
User Guide for Cisco Security MARS Local Controller
78-17020-01
Chapter 4 Configuring Firewall Devices
Check Point Devices
Check Point Devices
The Check Point security product family can be distributed and tiered. As such, you must understand the
deployment method, components, and release versions of this product family, their relationships, and
how MARS interacts with them. You must also understand the many acronyms and abbreviations
associated with this product family.
Table 4-1
lists the abbreviations and acronyms used in the topics that
follow.
Table 4-1
Check Point Abbreviations and Acronyms
Abbreviation
Expansion
Additional Information
ASYMSSLCA
Secure Sockets Layer Certificate
Authority using an asymmetric key
cipher
Communications protocol used for
establishing secure sessions.
CLM
Customer Log Modules
Standalone log server for collecting log
data from the Check Point enforcement
modules.
CMA
Customer Management Add-ons
A a virtual instance of SmartCenter and
only exists within the context of a
Provide-1/SiteManager-1 infrastructure.
CPMI
Check Point Management Interface
Communications protocol used for
configuration discovery.
LEA
Log Export API
Communications protocol used for
retrieving audit and firewall logs.
MDG
Multi Domain GUI
GUI used for managing Provider-1/
SiteManager-1 deployments. The MDG
is the parent GUI that can launch specific
SmartDashboard GUIs for a CMA.
MDS
Multi Domain Server
Is the umbrella manager for the CMA
instances in a Provider-1/SiteManager-1
deployment.
MLM
Multi Domain Log Module
Usually found in Provider-1/
SiteManager-1 deployments and provides
the ability to create multiple instances of
a CLM on a single logging server.
NG AI
Next Generation with Application
Intelligence
All current trains of Check Point are
released under the NG AI umbrella with
specific release numbers, such as NG AI
R55 and NG AI R60.
NG FP3
Next Generation Feature Pack 3
—
NGX
Next Generation eXtension
NGX is also NG AI R60
OPSEC
Open Platform for Security
An alliance, certification and integration
methodology for products and solutions
that integrate into a Check Point
infrastructure.
P-1
Check Point Provider-1
—