

Specify which subnets, servers, applications, or servers users can access when they connect to the VPN Gateway.įor more information, see the Remote Access VPN Administration Guide for your version.

To offer simple and flexible security administration, Check Point’s entire endpoint security suite can be managed centrally using a single. Network Access Permissions: Define the network resources and permissions available to users connected through VPN. Check Point endpoint security includes data security, network security, advanced threat prevention, forensics, endpoint detection and response (EDR), and remote access VPN solutions. Examples of settings you can predefine in the configuration file: Users can import this file into the Remote Access VPN client to make configuration easier. Authentication Method: Specify the authentication method for the Remote Access. Users need this information to connect to the correct VPN Gateway. VPN Server Address: Provide the server address or hostname of the VPN Gateway to users. VPN Client Configuration File: You can preconfigure Remote Access VPN client settings in a configuration file that you provide to users. Configure the necessary VPN policies, authentication methods, and access control rules for the Security Gateway. Give users the necessary credentials or certificates. Users need this information to connect to the correct VPN Gateway.Īuthentication Method: Specify the authentication method for the Remote Access VPN client to use. Configure the necessary VPN policies, authentication methods, and access control rules for the Security Gateway. Security Gateway Configuration: Configure the Security Gateway to allow Remote Access VPN connections. Before a user can connect to the Security Gateway with a Check Point Remote Access VPN client, the system administrator must configure these settings:
