Chapter 6

Authenticating Users

Introduction

There are many reasons that your organization may decide to implement user authentication at your firewall. Perhaps you want to allow different departments access to various resources on your DMZ, or maybe you are using DHCP inside your network, and IP addresses are changing every week when their leases expire. If you want to keep track of who is going to what Internet web sites for whatever reason, then you could authenticate your users at the firewall, so that it can accurately log ...

Get Checkpoint Next Generation Security Administration now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.