Summary
In this chapter, we have learned how to work with objects and discovered different categories of objects. We have learned about ICA and SIC. Using that, we were able to create our first Check Point cluster and configured objects for the rest of the components in our lab environment. In addition, we have learned about several types of variable objects and how to work with some of them.
In the next chapter, we'll be learning about Network Address Translation (NAT) and how it can be used by Check Point administrators to achieve a variety of goals.