Chapter 6. Authentication

Introduction

Using Check Point NGX, you can control the traffic coming into or going out of your networks. A good definition of your networks, hosts, gateways, and services allows you to have granular control of traffic through the Security Gateway. However, there are times when you will need or want to authenticate specific users that are accessing your resources.

For example, an administrator might have to download privileged files using a restricted user’s workstation, and would ...

Get The Best Damn Firewall Book Period, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.