Can a pair of clustered checkpoint firewalls running active/active function correctly when spanned across two different sites with either a layer 2 or 3 fibre link between. Does the same apply when using a pair of ASA 5540s.
Answer Question | March 12, 2011 11:01 PM
Check Point, Cisco ASA 5540, Cisco Firewall, Firewalls
Hi There I’ve removed the anti-spoofing on one of the interfaces to a firewall, but when I go to install the policy I get the error message below: The Topology information must be configured for object *****, interface eth-s*p*c*, in order to use the Anti-Spoofing feature. Can anyone assitt? Many Thanks Amanda
Answer Question | December 30, 2009 10:22 AM
Anti-spoofing, Check Point, Check Point NGX R60, Firewalls, R60
This vulnerability showed up on our network during PCI scanning. This function is necessary for our VPN connectivity. How do we configure this issue to adhere to PCI compliance?
Answer Question | November 19, 2008 11:43 PM
Check Point, Firewalls, PCI scan, VPN connection sharing, VPN connectivity, VPN security
please let me knew which ports should be opened in checkpoint firewall to communicate with lotus note web mail.
Answer Question | December 30, 2009 8:06 AM
Check Point, Firewalls, Lotus email, Lotus Notes
Our branch office uses Cisco VPN to connect to our corporate office – and our corporate office uses Check Point VPN to connect to our branch office. Can I have an automated VPN connection while being at either location? Thanks.
Answer Question | June 21, 2012 6:44 PM
Check Point, Cisco, Network connectivity, VPN
My question is related to checkpoint vpn client vista and exchange server. I can connect to the network using the vpn client, map drives remotely connect to machines but i cannot receive mail through the exchange server. I did a search on the web for similar problems and i found out that this is a [...]
Answer Question | May 12, 2009 7:37 AM
Check Point, Exchange, Outlook, Outlook 2007, Vista compatibility, VPN, Windows Vista
Who should be responsible for the upgrades to the firewall UNIX operating system and the upgrades to the Checkpoint application Network Operations or Information Security?
Answer Question | May 8, 2008 2:29 PM
Check Point, Firewalls, Information security, Network operations, Security, Unix
I need to remove the anti spoofing feature from my checkpoint /….what to do for it
Answer Question | December 30, 2009 5:09 PM
Check Point, Check Point NGX R60, Firewalls, Security
Hi all, I need to allow an outside service engineer connect to a machine tool (PC attached) to run diagnostics on my network. What’s the best way to allow him temperorily access to this internal pc? This will probably only happen a few times a month, so access doesn’t have to be enabled permanently. I [...]
Answer Question | December 30, 2009 12:58 AM
Check Point, Firewalls, Network security, Networking, Switches, VLAN
I’d like your opinions, please, on the preferability of using the Packeteer solution for bandwidth management over CheckPoint’s Floodgate product. Current network uses Internet VPN’s over frac T1s to connect 15 remote offices worldwide to all servers and resources at my US HQ. Software is CP VP-1 NG AI, running on mostly Nokia IP120 or [...]
Answer Question | November 16, 2004 10:45 AM
Bandwidth, Check Point