The Check Point VPN solution uses these secure VPN protocols to manage encryption keys, and send encrypted packets. Integrity - Uses industry-standard integrity assurance methods to easily configure VPN connections between Security Gateways and remote devices.įor Site to Site Communities, you can configure Star and Mesh topologies for VPN networks, and include third-party gateways.Īuthenticity - Uses standard authentication methods Use SmartConsole Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. encrypt and decrypt traffic to and from other gateways and clients. solution lets the Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. The IPsec VPN Check Point Software Blade on a Security Gateway that provides a Site to Site VPN and Remote Access VPN access.