Chapter 12: Configuring Site-to-Site and Remote Access VPNs

One of the most common tasks that firewall and gateway administrators must perform is configuring Virtual Private Networks (VPNs) for communicating with peers, data, or service providers, as well as implementing remote access solutions.

It is time for us to cover the introduction to these concepts and their capabilities in Check Point environments, and to implement rudimentary site-to-site and remote access VPNs in our lab.

As we go through the lab exercises, we’ll cover some additional subjects (such as local users, templates, and groups) and their use in the access roles, as well as the changes in gateway certificates necessary to accommodate UserCheck and browser-based authentication ...

Get Check Point Firewall Administration R81.10+ now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.