Check Point Authentication Methods

Security Manager uses Log Export API (LEA) to connect to the Check Point log server. This connection is authenticated and encrypted using SIC. In Security Manager, the default SIC method for LEA is sslca.

You can select a different SIC method (requires SIC Certificate for the Data Collector). All of the listed SIC methods authenticate and encrypt each connection.

Authentication Methods:

  • sslca for certificate authentication, uncompressed, encrypted using 3DES key.
  • sslca_comp certificate authentication, compressed, encrypted using 3DES key.
  • asym_sslca for asymmetric certificate authentication, uncompressed, encrypted using 3DES key.This is the default SIC method in Security Manager.
  • asym_sslca_comp for asymmetric certificate authentication, compressed, encrypted using a 3DES key.

If you change the SIC method, even if the previous selection was also certificate authentication, you will need to retrieve a SIC Certificate from the Check Point database.