Check Point Firewall Security Solution
Creating a Strong Firewall Security Policy
Remote Access to the Network
Overview
Check Point Mobile Access Solutions
Configuring Remote Access to Network Resources
Connecting to a Citrix Server
Citrix Services
Sample Deployment with Citrix Server
Configuring Citrix Services for Mobile Access
Endpoint Compliance Check
Creating VPN Policies
Adding Users to the Security Policy
Defining an Internet Access Policy
Threat Prevention Policies
Securing Data
Maximizing Network Performance
Configuring the NAT Policy
Monitoring and Logging
Index
|