Professional Documents
Culture Documents
SBT - Chapter 4 - Check Point Licensing
SBT - Chapter 4 - Check Point Licensing
SBT - Chapter 4 - Check Point Licensing
TRAINING
Chapter 4:
CHECK POINT LICENSING
• All Check Point appliances and software products must be properly licensed and activated before use.
• A license contains the features and functionality of the purchased product and specifies its terms of use.
It also contains other information, such as the maximum number of users, devices, and IP addresses
allotted for the product as well as a signature key, certification key, and Service Contract data.
• Check Point licensing is designed to be both scalable and modular to accommodate all-inclusive
software packages and custom solutions tailored to meet the needs of the organization
• Check Point Software Blade Architecture quickly & flexibility extends security services on-demand –
without the addition of new hardware or management complexity.
+ =
Gen 5: SandBlast Threat Emulation, Threat Extraction and AI Engines
• Central License
• Preferred and recommended method of licensing
• Ties the license package to the IP of MGMT server and has no dependency
on the gateway IP
• Local License
• Tied to the IP address of a specific Security Gateway
• Attach / Detach Licenses through Smart Update, CLI, or
Smart Console