How to Configure Encryption

As you will find, the steps in configuring encryption are very similar regardless of which encryption scheme you use. Throughout this section, I refer to the proposed VPN setup in Figure 11.1.

Figure 11.1. Sample VPN configuration

NOTE!

As noted previously in the book, I treat 192.168.x.x as routable address space even though it is generally not considered routable per RFC1918.

Planning Your Deployment

You need the following information when planning a VPN based in FireWall-1:

  • Which hosts and/or networks the remote site ...

Get Essential Check Point™ FireWall-1® NG: An Installation, Configuration, and Troubleshooting Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.