 Check Point Firewall Security Solution
 Creating a Strong Firewall Security Policy
 Remote Access to the Network
 Creating VPN Policies
 Adding Users to the Security Policy
 Using Identity Awareness
 Using User Directory
 User Directory Features
 Deploying User Directory
 Creating an Account Unit
 Editing an Account Unit
 Enabling User Directory
 Managing LDAP Information
 Adding Users to the Rule Base
 Defining an Internet Access Policy
 Threat Prevention Policies
 Securing Data
 Maximizing Network Performance
 Configuring the NAT Policy
 Monitoring and Logging
 Index
|