Summary

Authentication is an important part of any security infrastructure. You now know the three methods used by FireWall-1 to provide authentication, the conditions under which you can apply each method, how to configure each method, and how to troubleshoot when things go wrong. You can also integrate FireWall-1 with various external authentication servers.

Get Essential Check Point™ FireWall-1® NG: An Installation, Configuration, and Troubleshooting Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.