Configuring SecuRemote on FireWall-1

The general steps for configuring FireWall-1 to use SecuRemote are listed below and described in the subsections that follow.

1.
Configure the gateway object for SecuRemote.
2.
Create SecuRemote users.
3.
Define the client encryption rules and Remote Access community rules.
4.
Configure the global properties.
5.
Configure the Desktop Security policy and other relevant options.
6.
Install the security policy.

Configuring the Gateway Object for SecuRemote

Several areas of the FireWall-1 configuration relate to SecuRemote. At this time, I am going to touch on only what is necessary for basic SecuRemote functionality.

Similar to site-to-site encryption, you must configure the firewall object with the appropriate encryption ...

Get Essential Check Point™ FireWall-1® NG: An Installation, Configuration, and Troubleshooting Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.