Chapter 6

Authenticating Users

Introduction

There are many reasons that your organization may decide to implement user authentication at your firewall. Perhaps you want to allow different departments access to various resources on your DMZ, or maybe you are using DHCP inside your network, and IP addresses are changing every week when their leases expire. If you want to keep track of who is going to what Internet web sites for whatever reason, then you could authenticate your users at the firewall, so that it can accurately log ...

Get Checkpoint Next Generation Security Administration now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.