NETWORK PRESENCE ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT
 


Search
display results
words begin  exact words  any words part 

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [FW1] Stealth rule and VPN




All the encryption rules and authentication rules must be placed above the
stealth rule.  I don't remember the reason for this, but it works.





                                                                                                                  
                    "Rodney Lacroix"                                                                              
                    <[email protected]>                       Para:                                             
                    Enviado por:                                <[email protected]>        
                    [email protected]        cc:                                               
                    kpoint.com                                  Asunto:      [FW1] Stealth rule and VPN           
                                                                                                                  
                                                                                                                  
                    11/10/2000 09:06                                                                              
                                                                                                                  
                                                                                                                  




When implementing client-encryption or any authentication scheme, where
should the stealth rule go?  I remember something in training regarding
that it cannot be used if you are doing SecuRemote - but it may just be the
location of it in the rulebase that I may be looking for.

Also, does the stealth rule overrule the security policy properties for GUI
client access?



================================================================================

     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================







================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================



 
----------------------------------

ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT SITE MAP LEGAL
   All contents © 2004 Network Presence, LLC. All rights reserved.