Contents

 
Expand Check Point Firewall Security Solution
Expand Creating a Strong Firewall Security Policy
Expand Remote Access to the Network
Expand Creating VPN Policies
Collapse Adding Users to the Security Policy
   Collapse Using Identity Awareness
      Expand Identity Sources
      Expand Enabling Identity Awareness
       Creating a New AD Object
       Creating Access Roles
       Using Identity Awareness in the Firewall Rule Base
       Redirecting to a Captive Portal
       Sample Identity Awareness Rules
   Expand Using User Directory
   Expand Adding Users to the Rule Base
Expand Defining an Internet Access Policy
Expand Threat Prevention Policies
Expand Securing Data
Expand Maximizing Network Performance
Expand Configuring the NAT Policy
Expand Monitoring and Logging
 Index