134
C
HAPTER
9: C
ONFIGURING
V
IRTUAL
P
RIVATE
N
ETWORK
S
ERVICES
Enter the shared secret or administrative password of your RADIUS server
in the Shared Secret Field.
Click the
Update
button to save your changes.
When configured for a RADIUS server the Firewall will record both
successful and failed User Logins using XAUTH/RADIUS.
Using the Firewall
with Check Point
Firewall-1
The most common solution to date for preventing unwanted Internet
access has been by fortifying the enterprise network against hackers.
Often a Firewall is used at the main entrance of the enterprise network,
but that is not always enough. Although the “front door” may be secure
and monitored, other portals may not be protected as well. Remote
offices are often susceptible and place their data and application
availability at risk by providing an unguarded “back door” into the
network.
Similar technologies are used to protect alternative portals on an
enterprise network, remote networks, and to isolate internal segments of
a large network from internal threats. Thus it is possible to have firewalls
as portals and use Virtual Private Networks (VPNs) between the enterprise
network and remote offices.
A VPN provides a secure, encrypted path over the Internet. A VPN should
be required for accessing any non-public information over the Internet.
Since VPN standards are still evolving, different vendor's implementations
are not always fully interoperable. Ideally, a firewall should be adaptable
to support all of the VPN products it may encounter, but not all do.
The VPN features of the Firewall provide interoperability with many
different vendors. However, a common VPN firewall solution is provided
by Check Point Firewall-1. This section details the steps required to
configure the IRE VPN Client and the Firewall to work with Check Point
Firewall-1.
Configuring the IRE
VPN Client
Launch and log into the SafeNet Soft-PK Security Policy Editor
application.
1
Check an existing Firewall object and make sure the Encryption Domain
includes all objects for any encryption methods in use. Go to the
Encryption
tab and make sure the
Manual IPSEC
encryption algorithm is
DUA1611-0AAA02.book Page 134 Thursday, August 2, 2001 4:01 PM
Summary of Contents for SUPERSTACK 3CR16110-95
Page 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM...
Page 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM...
Page 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM...
Page 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM...
Page 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM...
Page 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM...
Page 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM...
Page 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM...
Page 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM...
Page 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM...