Chapter 12: Configuring Site-to-Site and Remote Access VPNs
One of the most common tasks that firewall and gateway administrators must perform is configuring Virtual Private Networks (VPNs) for communicating with peers, data, or service providers, as well as implementing remote access solutions.
It is time for us to cover the introduction to these concepts and their capabilities in Check Point environments, and to implement rudimentary site-to-site and remote access VPNs in our lab.
As we go through the lab exercises, we’ll cover some additional subjects (such as local users, templates, and groups) and their use in the access roles, as well as the changes in gateway certificates necessary to accommodate UserCheck and browser-based authentication for remote users.
In this chapter, we are going to cover the following main topics:
- An introduction to site-to-site VPN capabilities
- Configuring a remote gateway and creating its policy
- Building site-to-site...