[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [FW1] Stealth rule and VPN
All the encryption rules and authentication rules must be placed above the stealth rule. I don't remember the reason for this, but it works. "Rodney Lacroix" <[email protected]> Para: Enviado por: <[email protected]> [email protected] cc: kpoint.com Asunto: [FW1] Stealth rule and VPN 11/10/2000 09:06 When implementing client-encryption or any authentication scheme, where should the stealth rule go? I remember something in training regarding that it cannot be used if you are doing SecuRemote - but it may just be the location of it in the rulebase that I may be looking for. Also, does the stealth rule overrule the security policy properties for GUI client access? ================================================================================ To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ================================================================================ ================================================================================ To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ================================================================================
|