[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [FW1] Stealth rule and VPN
VPN rules go before the stealth rule - otherwise the uses will not be authenticated -----Original Message----- From: Rodney Lacroix [mailto:[email protected]] Sent: Wednesday, October 11, 2000 8:07 AM To: [email protected] Subject: [FW1] Stealth rule and VPN When implementing client-encryption or any authentication scheme, where should the stealth rule go? I remember something in training regarding that it cannot be used if you are doing SecuRemote - but it may just be the location of it in the rulebase that I may be looking for. Also, does the stealth rule overrule the security policy properties for GUI client access? ======================================================================== ======== To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ======================================================================== ======== Attachment:
smime.p7s
|