Checkpoint

Páginas: 93 (23022 palabras) Publicado: 31 de mayo de 2012
Identity Awareness
R75
Administration Guide

17 January 2011

© 2011 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under
licensing restricting their use, copying, distribution, and decompilation. No part of this product or related
documentation may be reproduced in an y form or by any meanswithout prior written authorization of Check
Point. While every precaution has been taken in the preparation of this book, Check Point assumes no
responsibility for errors or omissions. This publication and features described herein are subject to change
without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth insubparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227 -7013 and FAR
52.227-19.
TRADEMARKS:
Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks.
Refer to the Third Party copyright notices (http://www.checkpoint.com/3rd_party_copyright.html) for a list of
relevant copyrights and third-party licenses. Important Information
Latest Documentation
The latest version of this document is at:
http://supportcontent.checkpoint.com/documentation_download?ID=11662
For additional technical information, visit the Check Point Support Center
(http://supportcenter.checkpoint.com ).

Revision History
Date

Description

17 January 2011

Added a new chapter ("Identity Awareness Commands" on page 95)Improved formatting and document layout

30 December 2010

Improved documentation, formatting and document layout

15 December 2010

First release of this document

Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
(mailto:cp_techpub_feedback@checkpoint.com?subject=Feedback on Identity Awareness R75Administration Guide).

Contents
Important Information .............................................................................................3
Getting Started With Identity Awareness ..............................................................7
Introduction ......................................................................................................... 7
AD Query........................................................................................................ 9
Captive Portal ................................................................................................10
Identity Agents ...............................................................................................11
Deployment........................................................................................................13
Identity Awareness Scenarios ............................................................................14
Acquiring Identities for Active Directory Users ...............................................14
Acquiring Identities with the Captive Portal ....................................................16
Acquiring Identities with Identity Agents.........................................................20
Acquiring Identities in Application Control ......................................................22
Configuring Identity Awareness ..........................................................................25
Enabling Identity Awareness on the Security Gateway .......................................25
Results of the Wizard.....................................................................................28
Creating Access Roles .......................................................................................28
Using Identity Awareness in the Firewall Rule Base ...........................................30
Access Role Objects ......................................................................................31
Negate...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Configuracion VPN Checkpoint
  • Manual instalacion checkpoint
  • Checkpoint r65 smartcenter adminguide
  • Enganchar checkpoint a envision
  • Administracion de equipo utm-edge de checkpoint

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS