Checkpoint
R75
Administration Guide
17 January 2011
© 2011 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under
licensing restricting their use, copying, distribution, and decompilation. No part of this product or related
documentation may be reproduced in an y form or by any meanswithout prior written authorization of Check
Point. While every precaution has been taken in the preparation of this book, Check Point assumes no
responsibility for errors or omissions. This publication and features described herein are subject to change
without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth insubparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227 -7013 and FAR
52.227-19.
TRADEMARKS:
Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks.
Refer to the Third Party copyright notices (http://www.checkpoint.com/3rd_party_copyright.html) for a list of
relevant copyrights and third-party licenses.Important Information
Latest Documentation
The latest version of this document is at:
http://supportcontent.checkpoint.com/documentation_download?ID=11662
For additional technical information, visit the Check Point Support Center
(http://supportcenter.checkpoint.com ).
Revision History
Date
Description
17 January 2011
Added a new chapter ("Identity Awareness Commands" on page 95)Improved formatting and document layout
30 December 2010
Improved documentation, formatting and document layout
15 December 2010
First release of this document
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
(mailto:cp_techpub_feedback@checkpoint.com?subject=Feedback on Identity Awareness R75Administration Guide).
Contents
Important Information .............................................................................................3
Getting Started With Identity Awareness ..............................................................7
Introduction ......................................................................................................... 7
AD Query........................................................................................................ 9
Captive Portal ................................................................................................10
Identity Agents ...............................................................................................11
Deployment........................................................................................................13
Identity Awareness Scenarios ............................................................................14
Acquiring Identities for Active Directory Users ...............................................14
Acquiring Identities with the Captive Portal ....................................................16
Acquiring Identities with Identity Agents.........................................................20
Acquiring Identities in Application Control ......................................................22
Configuring Identity Awareness ..........................................................................25
Enabling Identity Awareness on the Security Gateway .......................................25
Results of the Wizard.....................................................................................28
Creating Access Roles .......................................................................................28
Using Identity Awareness in the Firewall Rule Base ...........................................30
Access Role Objects ......................................................................................31
Negate...
Regístrate para leer el documento completo.