Check Point Firewall Security Solution
Creating a Strong Firewall Security Policy
Remote Access to the Network
Creating VPN Policies
Adding Users to the Security Policy
Defining an Internet Access Policy
Threat Prevention Policies
Securing Data
Maximizing Network Performance
Configuring the NAT Policy
Translating IP Addresses
NAT Rule Base
Configuring Static and Hide NAT
Enabling Automatic NAT
Automatic Hide NAT to External Networks
Enabling Manual NAT
Sample Deployment (Static and Hide NAT)
Sample Deployment (Manual Rules for Port Translation)
Advanced NAT Settings
Monitoring and Logging
Index
|