Summary
In this chapter, we learned about Check Point VPN capabilities. We configured and tested site-to-site VPNs for split tunnel and "to and throughout the center" gateway topologies. Additionally, we covered remote access IPSec VPNs using one of Check Point’s endpoint clients. We were also able to incorporate the creation and use of locally defined users, groups, and access roles based on those in our policies. Additionally, we addressed changes to some of the portals and associated changes to gateway cluster certificates, allowing interaction from either users in remote sites or remote access clients.
In the next chapter, we’ll address logging into a single security domain and go further into SmartEvent’s views, reporting, and policy capabilities.