When implementing client-encryption or any authentication scheme, where should the 
stealth rule go?  I remember something in training regarding that it cannot be used if 
you are doing SecuRemote - but it may just be the location of it in the rulebase that 
I may be looking for.  

Also, does the stealth rule overrule the security policy properties for GUI client 
access?



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to