 Check Point Firewall Security Solution
 Creating a Strong Firewall Security Policy
 Remote Access to the Network
 Creating VPN Policies
 Adding Users to the Security Policy
 Defining an Internet Access Policy
 Threat Prevention Policies
 Securing Data
 Maximizing Network Performance
 Configuring the NAT Policy
 Translating IP Addresses
 NAT Rule Base
 Configuring Static and Hide NAT
 Enabling Automatic NAT
 Automatic Hide NAT to External Networks
 Enabling Manual NAT
 Sample Deployment (Static and Hide NAT)
 Sample Deployment (Manual Rules for Port Translation)
 Advanced NAT Settings
 Monitoring and Logging
 Index
|