The general steps for configuring FireWall-1 to use SecuRemote are listed below and described in the subsections that follow.
Configure the gateway object for SecuRemote.
Create SecuRemote users.
Define the client encryption rules and Remote Access community rules.
Configure the global properties.
Configure the Desktop Security policy and other relevant options.
Install the security policy.
Several areas of the FireWall-1 configuration relate to SecuRemote. At this time, I am going to touch on only what is necessary for basic SecuRemote functionality.
Similar to site-to-site encryption, you must configure the firewall object with the appropriate encryption ...