All the encryption rules and authentication rules must be placed above the
stealth rule. I don't remember the reason for this, but it works.
"Rodney Lacroix"
<[EMAIL PROTECTED]> Para:
Enviado por:
<[EMAIL PROTECTED]>
[EMAIL PROTECTED] cc:
kpoint.com Asunto: [FW1]
Stealth rule and VPN
11/10/2000 09:06
When implementing client-encryption or any authentication scheme, where
should the stealth rule go? I remember something in training regarding
that it cannot be used if you are doing SecuRemote - but it may just be the
location of it in the rulebase that I may be looking for.
Also, does the stealth rule overrule the security policy properties for GUI
client access?
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================
- [FW1] Stealth rule and VPN Rodney Lacroix
- RE: [FW1] Stealth rule and VPN Steven Thomason
- pdiez
