tailieunhanh - Security Management Server R75 Administration Guide

The Security Management server is installed in the LAN, so that it is protected by a Security Gateway. The Security Management server manages the gateways and allows remote users to connect securely to the corporate network. SmartDashboard may be installed on the Security Management server or on any other machine. | Security Management Server R75 Administration Guide 15 December 2010 softwareblades Check Point SOFTWARE TECHNOLOGIES LTD. We Secure the Internet 2010 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use copying distribution and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. RESTRICTED RIGHTS LEGEND Use duplication or disclosure by the government is subject to restrictions as set forth in subparagraph c 1 ii of the Rights in Technical Data and Computer Software clause at DFARS and FAR . TRADEMARKS Refer to the Copyright page http for a list of our trademarks. Refer to the Third Party copyright notices http for a list of relevant copyrights and third-party licenses. Important Information Latest Software We recommend that you install the most recent software release to stay up-to-date with the latest functional improvements stability fixes security enhancements and protection against new and evolving attacks. Latest Documentation The latest version of this document is at http documentation_download ID 11667 For additional technical information visit the Check Point Support Center http . Revision History Date Description 15 December 2010 First release of this document Feedback Check Point is engaged in a continuous effort to improve its documentation. Please help us by sending your comments mailto cp_techpub_feedback@ subject Feedback on Security