Chapter 8. User Authentication

It is unfortunate that some people cannot be trusted to do only what they are supposed to do. If it were not for these people, you would not need to take security measures to protect your networks. Authentication provides a mechanism for validating user identities and also provides different levels of access. FireWall-1 provides several different mechanisms for authenticating users.

In this chapter, I cover the key to all authentication schemes used within FireWall-1 today: passwords. Next, I cover the three methods of authentication supported by FireWall-1 for users, complete with a demonstration of each: User Authentication, Session Authentication, and Client Authentication. I then discuss how to actually set ...

Get Essential Check Point™ FireWall-1® NG: An Installation, Configuration, and Troubleshooting Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.