- CheckMates
- :
- Educational Resources
- :
- Training and Certification
- :
- Re: SIC
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
SIC
I don't understand how the 3-component architecture works and how the certification(SIC) process works?
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
There are three main pieces: Gateway, Management, and SmartConsole/API.
- Gateways do the enforcement of the Access Policy and Threat Prevention
- Management is where the policy and logs are defined/stored as well as the Internal Certificate Authority (ICA)
- SmartConsole/API is the front end used to create/update the various elements of your access policy
Gateways and Management run on physical appliances or virtual machines that run a purpose-built operating system.
SmartConsole runs on a Windows machine, but you can also use a web browser and/or REST API to manage many functions.
SIC (Secure Internal Communication) secures communication between all components (SmartConsole/API to Management, and Management/Gateway communication).
As gateways are onboarded to management, they are issued a certificate from the ICA, which is used to authenticate and encrypt all communications.
This is done through industry-standard TLS.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
There are three main pieces: Gateway, Management, and SmartConsole/API.
- Gateways do the enforcement of the Access Policy and Threat Prevention
- Management is where the policy and logs are defined/stored as well as the Internal Certificate Authority (ICA)
- SmartConsole/API is the front end used to create/update the various elements of your access policy
Gateways and Management run on physical appliances or virtual machines that run a purpose-built operating system.
SmartConsole runs on a Windows machine, but you can also use a web browser and/or REST API to manage many functions.
SIC (Secure Internal Communication) secures communication between all components (SmartConsole/API to Management, and Management/Gateway communication).
As gateways are onboarded to management, they are issued a certificate from the ICA, which is used to authenticate and encrypt all communications.
This is done through industry-standard TLS.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Also when I deploy standalone how are the CPU resources shared, 50-50?
and Can the admin port assign data ports to access the admin? If so, can other ports be blocked from accessing the admin?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The resources are shared, but not exactly 50/50.
You can restrict access to the administrative functions, yes.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
To add on top what @PhoneBoy said, I would ensure you allow all communication between mgmt and gateways.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You can use these commands to see the ICA database on the Security Management Server and the SIC trust state on the Security Gateway:
cpca_client lscert
cp_conf sic state
