Check Point Firewall Security Solution
Creating a Strong Firewall Security Policy
Remote Access to the Network
Creating VPN Policies
Adding Users to the Security Policy
Defining an Internet Access Policy
Threat Prevention Policies
IPS
IPS Protection Profiles
Enabling IPS
Using IPS Profiles
Adding Network Exceptions
Adding an IPS Exception
Browsing IPS Protections
Updating IPS Protections
Configuring Geo Protections
Anti-Bot and Anti-Virus
Anti-Spam
Securing Data
Maximizing Network Performance
Configuring the NAT Policy
Monitoring and Logging
Index
|