Contents

 
 Copyright Notice
Expand Important Information
 Remote Access VPN Administration Guide
Expand Check Point VPN
Expand Getting Started with Remote Access
Expand Check Point Remote Access Solutions
Expand Configuring the Remote Access Policy
Expand Modifying Encryption
 Internal User Database vs. External User Database
Expand User and Client Authentication for Remote Access
Expand Managing User Certificates
Expand Multiple Login Options for R80.xx Gateways
Expand Office Mode
Expand Desktop Security
Expand Secure Configuration Verification
Collapse Layer Two Tunneling Protocol (L2TP) Clients
    Introduction to L2TP Clients
    Establishing a VPN between a IPsec / L2TP Client and a Gateway
    Behavior of an L2TP Connection
    Security Gateway Requirements for IPsec / L2TP
    L2TP Global Configuration
   Expand Authentication of Users
    User Certificate Purposes
   Collapse Configuring Remote Access for Microsoft IPsec / L2TP Clients
       Configuring a Remote Access Environment
      Expand Defining the Client Machines and their Certificates
      Expand Configuring User Certificate Purposes
       Making the L2TP Connection
       For More Information
Expand VPN Routing - Remote Access
Expand Remote Access Advanced Configuration
Expand Multiple Entry Point for Remote Access VPNs
Expand Secondary Connect
Expand SSL Network Extender
Expand Resolving Connectivity Issues
 VPN CLI Commands