H
hardening operating systems, 21
hardware, upgrading to improve performance, 386
hash functions and digital signatures, 438 “439
hash size , optimization procedures, 385
help, Check Point online, 548
hiding
LAN networks, 272 “273
network objects, 260 “264
OS information, 558
rules, 244
high availability (HA)
Check Point, 516
configuring on Solaris platform, 128
enabling, 516 “521
Management High Availability, security policy option, 249
new mode, 520
on Nokia, 147
other methods , 543 “545
Meta IP and, 17
host files, using to optimize performance, 373
hostnames, Source field, rule creation, 196
Hot Standby Routing Protocol (HSRP), 520
hotfixes
Check Point Express Supplement, 52
downloading, 389
HSRP (Hot Standby Routing Protocol), 520
HTML weeding , options described, 345 “346
HTTP (Hypertext Transfer Protocol)
described, 514
Protocol Inspection tab, SmartDefense, 561 “562
security policy rule, 240 “241
security servers, improving performance on, 381
user authentication, 299
viruses that exploit, 38
HTTP Worm Catcher, 560 “561
HTTPS (Hypertext Transfer Protocol Secure), 203
described, 203
security policy rule, 240
user authentication, 299
Hypertext Transfer Protocol. See HTTP