 Copyright Notice
 Important Information
 Remote Access VPN Administration Guide
 Check Point VPN
 Getting Started with Remote Access
 Check Point Remote Access Solutions
 Configuring the Remote Access Policy
 Modifying Encryption
 Internal User Database vs. External User Database
 User and Client Authentication for Remote Access
 Managing User Certificates
 Multiple Login Options for R80.xx Gateways
 Office Mode
 Desktop Security
 Secure Configuration Verification
 Layer Two Tunneling Protocol (L2TP) Clients
 Introduction to L2TP Clients
 Establishing a VPN between a IPsec / L2TP Client and a Gateway
 Behavior of an L2TP Connection
 Security Gateway Requirements for IPsec / L2TP
 L2TP Global Configuration
 Authentication of Users
 User Certificate Purposes
 Configuring Remote Access for Microsoft IPsec / L2TP Clients
 Configuring a Remote Access Environment
 Defining the Client Machines and their Certificates
 Configuring User Certificate Purposes
 Making the L2TP Connection
 For More Information
 VPN Routing - Remote Access
 Remote Access Advanced Configuration
 Multiple Entry Point for Remote Access VPNs
 Secondary Connect
 SSL Network Extender
 Resolving Connectivity Issues
 VPN CLI Commands
|