O'Reilly logo

Essential Check Point™ FireWall-1® NG: An Installation, Configuration, and Troubleshooting Guide by Dameon D. Welch-Abernathy

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Setting Up User Authentication

Set up User Authentication by following these steps.

1.
Create the necessary users and groups required for authentication, then install the user database.
2.
Ensure that the appropriate Security Servers are enabled in $FWDIR/conf/fwauthd.conf.
3.
Create the appropriate rule(s) in the rulebase.
4.
Configure the User Authentication action properties.
5.
Configure the Rulebase Properties Authentication frame.
6.
Verify and install the policy.

After creating your users, verify that the appropriate Security Servers are enabled in $FWDIR/conf/fwauthd.conf. By default, they should be enabled, but it never hurts to check. The lines for the servers you want to enable should be present and not commented out (i.e., the line should ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required