 Copyright Notice
 Important Information
 Remote Access VPN Administration Guide
 Check Point VPN
 Getting Started with Remote Access
 Check Point Remote Access Solutions
 Configuring the Remote Access Policy
 Modifying Encryption
 Internal User Database vs. External User Database
 User and Client Authentication for Remote Access
 Managing User Certificates
 Multiple Login Options for R80.xx Gateways
 Office Mode
 Desktop Security
 Secure Configuration Verification
 The Need to Verify Remote Client's Security Status
 The Secure Configuration Verification Solution
 Overview of the SCV Workflow
 Installing SCV Plugins on the Client
 Configuring an SCV Policy on the Security Management Server
 Downloading the SCV Policy to the Client
 Verifying the SCV Policy
 Runtime SCV Checks
 Making the Organizational Security Policy SCV-Aware
 SCV Checks
 Considerations regarding SCV
 Configuring SCV
 Layer Two Tunneling Protocol (L2TP) Clients
 VPN Routing - Remote Access
 Remote Access Advanced Configuration
 Multiple Entry Point for Remote Access VPNs
 Secondary Connect
 SSL Network Extender
 Resolving Connectivity Issues
 VPN CLI Commands
|