 Copyright Notice
 Important Information
 Next Generation Security Gateway Guide
 Terms
 Check Point Next Generation Security Gateway Solution
 Mirror and Decrypt
 ICAP Client
 Hardware Security Module (HSM)
 Creating an Access Control Policy
 Managing Gateways
 Introducing the Unified Access Control Policy
 Creating a Basic Access Control Policy
 Creating Application Control and URL Filtering Rules
 Ordered Layers and Inline Layers
 The Columns of the Access Control Rule Base
 Unified Rule Base Use Cases
 Rule Matching in the Access Control Policy
 Best Practices for Access Control Rules
 Installing the Access Control Policy
 Analyzing the Rule Base Hit Count
 Preventing IP Spoofing
 Translating IP Addresses
 UserCheck Interactions in the Access Control Policy
 Configuring the Security Gateway for UserCheck
 Blocking Applications and Informing Users
 UserCheck for Access Control Default Messages
 Creating a UserCheck Interaction Object
 Example UserCheck Message Using Field Variables
 Localizing and Customizing the UserCheck Portal
 UserCheck Frequency and Scope
 UserCheck Settings
 UserCheck CLI
 Revoking Incidents
 UserCheck Client
 UserCheck Client Overview
 UserCheck Requirements
 Enabling UserCheck Client
 Client and Gateway Communication
 Getting the MSI File
 Distributing and Connecting Clients
 UserCheck and Check Point Password Authentication
 Helping Users
 Blade Settings
 Creating a Threat Prevention Policy
 Creating Shared Policies
 Adding Users to the Policy
 Logging and Monitoring
 Maximizing Network Performance and Redundancy
 Simplifying Security for Private Clouds
 Securing Data
 ConnectControl - Server Load Balancing
 IPv6 Neighbor Discovery
 Managing Ethernet Protocols
 Deploying a Security Gateway in Monitor Mode
 Configuring Link State Propagation (LSP)
 Troubleshooting Specific Problems
 Security Before Firewall Activation
 Command Line Reference
 Working with Kernel Parameters on Security Gateway
 Kernel Debug on Security Gateway
|