Check Point Firewall Security Solution
Creating a Strong Firewall Security Policy
Remote Access to the Network
Creating VPN Policies
Adding Users to the Security Policy
Using Identity Awareness
Identity Sources
Enabling Identity Awareness
Creating a New AD Object
Creating Access Roles
Using Identity Awareness in the Firewall Rule Base
Redirecting to a Captive Portal
Sample Identity Awareness Rules
Using User Directory
Adding Users to the Rule Base
Defining an Internet Access Policy
Threat Prevention Policies
Securing Data
Maximizing Network Performance
Configuring the NAT Policy
Monitoring and Logging
Index
|