 Important Information
 Firewall R77 Versions Administration Guide
 Terms
 Check Point Firewall Security Solution
 Creating a Strong Firewall Security Policy
 Remote Access to the Network
 Creating VPN Policies
 Adding Users to the Security Policy
 Using Identity Awareness
 Identity Sources
 AD Query
 Browser-Based Authentication
 Enabling Identity Awareness
 Creating a New AD Object
 Working with Access Roles
 Using Identity Awareness in the Firewall Rule Base
 Redirecting to a Captive Portal
 Sample Identity Awareness Rules
 Using User Directory
 Adding Users to the Rule Base
 Defining an Internet Access Policy
 Defending Against Network Intrusions
 Threat Prevention Policies
 Securing Data
 Maximizing Network Performance
 Configuring the NAT Policy
 Monitoring and Logging
 LTE
 Index
|