O'Reilly logo

Essential Check Point™ FireWall-1® NG: An Installation, Configuration, and Troubleshooting Guide by Dameon D. Welch-Abernathy

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Configuring SecuRemote on FireWall-1

The general steps for configuring FireWall-1 to use SecuRemote are listed below and described in the subsections that follow.

1.
Configure the gateway object for SecuRemote.
2.
Create SecuRemote users.
3.
Define the client encryption rules and Remote Access community rules.
4.
Configure the global properties.
5.
Configure the Desktop Security policy and other relevant options.
6.
Install the security policy.

Configuring the Gateway Object for SecuRemote

Several areas of the FireWall-1 configuration relate to SecuRemote. At this time, I am going to touch on only what is necessary for basic SecuRemote functionality.

Similar to site-to-site encryption, you must configure the firewall object with the appropriate encryption ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required