NETWORK PRESENCE ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT
 


Search
display results
words begin  exact words  any words part 

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [FW1] Stealth rule and VPN



 VPN rules go before the stealth rule - otherwise the uses will not be
authenticated

 -----Original Message-----
From: 	Rodney Lacroix [mailto:[email protected]] 
Sent:	Wednesday, October 11, 2000 8:07 AM
To:	[email protected]
Subject:	[FW1] Stealth rule and VPN


When implementing client-encryption or any authentication scheme, where
should the stealth rule go?  I remember something in training regarding
that it cannot be used if you are doing SecuRemote - but it may just be
the location of it in the rulebase that I may be looking for.  

Also, does the stealth rule overrule the security policy properties for
GUI client access?



========================================================================
========
     To unsubscribe from this mailing list, please see the instructions
at
               http://www.checkpoint.com/services/mailing.html
========================================================================
========

Attachment: smime.p7s
Description: S/MIME cryptographic signature



 
----------------------------------

ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT SITE MAP LEGAL
   All contents © 2004 Network Presence, LLC. All rights reserved.