This chapter is designed to be a practical guide to planning and configuring client-to-site VPNs in FireWall-1. A few key terms and concepts are discussed throughout the chapter. It is not meant to comprehensively cover encryption or encryption technologies. By the end of this chapter, you should be able to:
|