
Enter the information in the SmartConsole user database.


Create and configure an LDAP Account Unit.Add the remote user information to the Security Management Server:.Use SmartConsole to enable Remote Access VPN on the Security Gateway.Here is an example of a Remote Access VPN workflow: Visitor Mode lets these users tunnel all protocols through regular TCP connections on port 443. Remote users can be restricted to using only HTTP and HTTPS protocols. Remote users can send traffic as if they are in the office and avoid VPN routing problems. Office Mode solves these routing problems and encapsulates the IP packets with an available IP address from the internal network. Remote users can be assigned the same or non-routable IP addresses from the local ISP. The Check Point IPsec VPN Software Blade provides these VPN connectivity modes to help organizations resolve those challenges: It is necessary for the remote client to use protocols that are not supported.The remote access client can be connected to a LAN with internal IP addresses (such as, at hotels).The IP addresses of a remote access client might be unknown.

When securely connecting remote clients with the internal resources, organizations face connectivity challenges, such as these: The Mobile Access Software Blade extends the functionality of Remote Access solutions to include many clients and deployments. Check Point's Remote Access VPN solutions let you create a VPN tunnel between a remote user and the internal network. If employees remotely access sensitive information from different locations and devices, system administrators must make sure that this access does not become a security vulnerability. IPsec is protocol that supports secure IP communications that are authenticated and encrypted on private or public networks. IKE (Internet Key Exchange) is a standard key management protocol that is used to create the VPN tunnels. The Check Point VPN solution uses these secure VPN protocols to manage encryption keys, and send encrypted packets. Integrity - Uses industry-standard integrity assurance methods.Authenticity - Uses standard authentication methods.Use SmartConsole to easily configure VPN connections between Security Gateways and remote devices.įor Site-to-Site Communities, you can configure Star and Mesh topologies for VPN networks, and include third-party gateways. The IPsec VPN solution lets the Security Gateway encrypt and decrypt traffic to and from other gateways and clients.

Establishing a Connection between a Remote User and a Security Gateway
