Configuring SecuRemote on FireWall-1

The general steps for configuring FireWall-1 to use SecuRemote are listed below and described in the subsections that follow.

1.
Configure the gateway object for SecuRemote.
2.
Create SecuRemote users.
3.
Define the client encryption rules and Remote Access community rules.
4.
Configure the global properties.
5.
Configure the Desktop Security policy and other relevant options.
6.
Install the security policy.

Configuring the Gateway Object for SecuRemote

Several areas of the FireWall-1 configuration relate to SecuRemote. At this time, I am going to touch on only what is necessary for basic SecuRemote functionality.

Similar to site-to-site encryption, you must configure the firewall object with the appropriate encryption ...

Get Essential Check Point™ FireWall-1® NG: An Installation, Configuration, and Troubleshooting Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.