Here a small picture for "Secure Internal Communication" between Security Management Server and Security Gateway.
SIC is used for the following policy install, get topology,...
More read here: R80.x - Ports Used for Communication by Various Check Point Modules
Check Point components communicate with each other using SIC. SIC is based on SSL with digital Certificates. When a Security Management Server is installed, a Certificate Authority (CA) is created. The CA issues Certificates for all components that need to communicate with one another.
For example, a remote Security Gateway needs a Certificate from the Security Management Server before a Security Policy is installed, or before a license can be attached to the Security Gateway. Whenever any two entities in a site (Security Management Server, Security Gateway) need to communicate, the sic_policy.conf file is referenced.
Communication takes place over the Check Point communication layer. This channel is encrypted in various ways. This layer can be called the SIC layer. The SIC ports used are:
- Port 18209, which is used for communication between the Security Gateway and the CA for status, to issue, and revoke.
- Port 18210, which is used to pull certificates from the CA.
- Port 18211, which is the port used by the cpd daemon on the Security Gateway to receive the Certificate (by clicking "Initialize" in SmartDashboard).
- Port 18191, which is used for policy install,... ( More read here: R80.x - Policy Installation Flowchart )
- Port 18192, which is used for get topology,...
- Other ports...
PS:
There is no keep-alive mechanism involved.
➜ CCSM Elite, CCME, CCTE ➜ www.checkpoint.tips