VPN rules go before the stealth rule - otherwise the uses will not be
authenticated
-----Original Message-----
From: Rodney Lacroix [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, October 11, 2000 8:07 AM
To: [EMAIL PROTECTED]
Subject: [FW1] Stealth rule and VPN
When implementing client-encryption or any authentication scheme, where
should the stealth rule go? I remember something in training regarding
that it cannot be used if you are doing SecuRemote - but it may just be
the location of it in the rulebase that I may be looking for.
Also, does the stealth rule overrule the security policy properties for
GUI client access?
========================================================================
========
To unsubscribe from this mailing list, please see the instructions
at
http://www.checkpoint.com/services/mailing.html
========================================================================
========
smime.p7s