Contents

 
Expand Check Point Firewall Security Solution
Expand Creating a Strong Firewall Security Policy
Expand Remote Access to the Network
Expand Creating VPN Policies
Expand Adding Users to the Security Policy
Expand Defining an Internet Access Policy
Expand Threat Prevention Policies
Expand Securing Data
Expand Maximizing Network Performance
Expand Configuring the NAT Policy
Collapse Monitoring and Logging
   Collapse Monitoring Important Events with SmartEvent
       Enabling SmartEvent
       Creating Reports
       Sample Application and URL Filtering Event Analysis
   Expand Monitoring Traffic and Connections with SmartLog
 Index