
Table of Contents
Check Point Maestro R80.20SP Administration Guide | 20
SIC
Secure Internal Communication. The Check Point proprietary mechanism with which
Check Point computers that run Check Point software authenticate each other over
SSL, for secure communication. This authentication is based on the certificates issued
by the ICA on a Check Point Management Server.
Single Sign-On
A property of access control of multiple related, yet independent, software systems. With
this property, a user logs in with a single ID and password to gain access to a
connected system or systems without using different usernames or passwords, or in
some configurations seamlessly sign on at each system. This is typically accomplished
using the Lightweight Directory Access Protocol (LDAP) and stored LDAP databases
on (directory) servers. Acronym: SSO.
SmartConsole
A Check Point GUI application used to manage Security Policies, monitor products and
events, install updates, provision new devices and appliances, and manage a multi-
domain environment and each domain.
SmartDashboard
A legacy Check Point GUI client used to create and manage the security settings in
R77.30 and lower versions.
SMO
Single Management Object. Single Security Gateway object in SmartConsole that
represents a Security Group configured on Maestro Hyperscale Orchestrator.
SMO Master
The physical Security Appliance in a Security Group that handles management tasks for
all Security Appliances in the Security Group. By default, the Security Appliance with
the lowest Member ID is assigned this role.
Software Blade
A software blade is a security solution based on specific business needs. Each blade is
independent, modular and centrally managed. To extend security, additional blades can
be quickly added.
SSM
Security Switch Module. Role of the Maestro Orchestrator that manages the flow of
network traffic to and from the Security Groups.