Configuring SecuRemote on FireWall-1
The general steps for configuring FireWall-1 to use SecuRemote are listed below and described in the subsections that follow.
1. | Configure the gateway object for SecuRemote. |
2. | Create SecuRemote users. |
3. | Define the client encryption rules and Remote Access community rules. |
4. | Configure the global properties. |
5. | Configure the Desktop Security policy and other relevant options. |
6. | Install the security policy. |
Configuring the Gateway Object for SecuRemote
Several areas of the FireWall-1 configuration relate to SecuRemote. At this time, I am going to touch on only what is necessary for basic SecuRemote functionality.
Similar to site-to-site encryption, you must configure the firewall object with the appropriate encryption ...
Get Essential Check Point™ FireWall-1® NG: An Installation, Configuration, and Troubleshooting Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.