134
C
HAPTER
9: C
ONFIGURING
V
IRTUAL
P
RIVATE
N
ETWORK
S
ERVICES
Enter the shared secret or administrative password of your RADIUS server
in the Shared Secret Field.
Click the
Update
button to save your changes.
When configured for a RADIUS server the Firewall will record both
successful and failed User Logins using XAUTH/RADIUS.
Using the Firewall
with Check Point
Firewall-1
The most common solution to date for preventing unwanted Internet
access has been by fortifying the enterprise network against hackers.
Often a Firewall is used at the main entrance of the enterprise network,
but that is not always enough. Although the “front door” may be secure
and monitored, other portals may not be protected as well. Remote
offices are often susceptible and place their data and application
availability at risk by providing an unguarded “back door” into the
network.
Similar technologies are used to protect alternative portals on an
enterprise network, remote networks, and to isolate internal segments of
a large network from internal threats. Thus it is possible to have firewalls
as portals and use Virtual Private Networks (VPNs) between the enterprise
network and remote offices.
A VPN provides a secure, encrypted path over the Internet. A VPN should
be required for accessing any non-public information over the Internet.
Since VPN standards are still evolving, different vendor's implementations
are not always fully interoperable. Ideally, a firewall should be adaptable
to support all of the VPN products it may encounter, but not all do.
The VPN features of the Firewall provide interoperability with many
different vendors. However, a common VPN firewall solution is provided
by Check Point Firewall-1. This section details the steps required to
configure the IRE VPN Client and the Firewall to work with Check Point
Firewall-1.
Configuring the IRE
VPN Client
Launch and log into the SafeNet Soft-PK Security Policy Editor
application.
1
Check an existing Firewall object and make sure the Encryption Domain
includes all objects for any encryption methods in use. Go to the
Encryption
tab and make sure the
Manual IPSEC
encryption algorithm is
DUA1611-0AAA02.book Page 134 Thursday, August 2, 2001 4:01 PM
Содержание 3C16111 - SuperStack 3 Firewall Web Site Filter
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM ...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM ...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM ...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM ...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM ...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM ...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM ...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM ...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM ...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM ...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM ...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM ...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM ...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM ...