Summary


Authentication is an important part of any security infrastructure. You now know the three methods used by FireWall-1 to provide authentication, the conditions under which you can apply each method, how to configure each method, and how to troubleshoot when things go wrong. You can also integrate FireWall-1 with various external authentication servers.



Essential Check Point FireWall-1 NG
Essential Check Point FireWall-1 NG: An Installation, Configuration, and Troubleshooting Guide
ISBN: 0321180615
EAN: 2147483647
Year: 2004
Pages: 143

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net