What are the three authentication methods for SIC?
Passwords, Users, and standards-based SSL for the creation of security channels
Certificates, standards-based SSL for the creation of secure channels, and 3DES or AES128 for encryption
Packet Filtering, certificates, and 3DES or AES128 for encryption
Certificates, Passwords, and Tokens
Secure Internal Communication (SIC)
Secure Internal Communication (SIC) lets Check Point platforms and products authenticate with each other.
The SIC procedure creates a trusted status between gateways, management servers and other Check Point
components. SIC is required to install polices on gateways and to send logs between gateways and
These security measures make sure of the safety of SIC:
Certificates for authentication
Standards-based SSL for the creation of the secure channel
3DES for encryption