NETWORK PRESENCE ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT
 


Search
display results
words begin  exact words  any words part 

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [FW1] Authentication question



Actually Larry,
Client auth with FW1 would be the least intensive as it would require just the one
instance of additional daemon process to be loaded and would then query the local
copy of the user database.  All user auth methods require the use of service
proxies, hence the limitation of services.  Also, https is not supported for user
auth.

Cheers,
CryptoTech

Larry Pingree wrote:

> I'm not sure checkpoint has official numbers reguarding your question, but I
> would imagine that User Auth using only Firewall-1 passwords would be the
> least intensive to the Firewall.
>
> Keep in mind this would not be the most secure, and would only support
> http,https, ftp, rlogin and telnet.
>
> What do you wish to authenticate? And how strong do you want the
> authentication?
>
> -=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-
> Larry Pingree
> Sr. Security Consultant
> Email: [email protected]
>
> SiegeWorks
> Company WebSite: http://www.siegeworks.com/
> Security Installation, Training and Consulting
> -=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-
> ----- Original Message -----
> From: <[email protected]>
> To: <[email protected]>
> Sent: Thursday, February 15, 2001 2:01 AM
> Subject: [FW1] Authentication question
>
> >
> >
> >
> >
> >
> > Just a curiosity, which one is the authentication method Checkpoint
> consider the
> > least resource intensive?
> > Regards,
> >
> > Stefano.
> >
> >
> >
> >
> >
> ============================================================================
> ====
> >      To unsubscribe from this mailing list, please see the instructions at
> >                http://www.checkpoint.com/services/mailing.html
> >
> ============================================================================
> ====
> >
>
> ================================================================================
>      To unsubscribe from this mailing list, please see the instructions at
>                http://www.checkpoint.com/services/mailing.html
> ================================================================================



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================



 
----------------------------------

ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT SITE MAP LEGAL
   All contents © 2004 Network Presence, LLC. All rights reserved.