EasyManua.ls Logo

Check Point UTM-1 Edge - Page 367

Check Point UTM-1 Edge
707 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Using Secure HotSpot
Chapter 12: Setting Your Security Policy 353
Important: SecuRemote/SecureClient VPN software users who are authenticated by
the Internal VPN Server are automatically exempt from HotSpot enforcement. This
allows, for example, authenticated employees to gain full access to the corporate
LAN, while guest users are permitted to access the Internet only.
Note: HotSpot enforcement can block traffic passing through the firewall; however, it
does not block local traffic on the same network segment (traffic that does not pass
through the firewall).
Setting Up Secure HotSpot
To set up Secure HotSpot
1. Enable Secure HotSpot for the desired networks.
See Enabling/Disabling Secure HotSpot on page
354.
2. Customize Secure HotSpot as desired.
See Customizing Secure HotSpot on page
355.
3. Grant HotSpot Access permissions to users on the selected networks.
See Adding and Editing Users on page
546.
4. To exclude specific computers from Secure HotSpot enforcement, add or edit
their network objects.
See Adding and Editing Network Objects on page
189.
You must select Exclude this computer/network from HotSpot enforcement option.
5. Add quick guest users as needed.
See Adding Quick Guest Users on page
550.

Table of Contents

Related product manuals