Vaughn,

Using client authentication (IP restricted), you simply telnet to port 259
or http to port 900 on the firewall
(make sure that this rule is above your stealth rule in the rulebase).
User authentication also does not
need client software (although there is a limitation on the services -
telnet, ftp, http, rlogin...).  The only
type of authentication that requires client software is session
authentication.  AFAIK, there is no support
for W2K at this time for the session authentication client software...

Thanks!
Chris


Chris Hastings
Manager, Network Security
Network Computing Services
Vanderbilt University Medical Center
[EMAIL PROTECTED]


|--------+------------------------------------>
|        |          "Vaughn Pennington"       |
|        |          <vxpennin@worthingtonindus|
|        |          tries.com>                |
|        |          Sent by:                  |
|        |          [EMAIL PROTECTED]|
|        |          .NET                      |
|        |                                    |
|        |                                    |
|        |          03/13/2001 12:49 PM       |
|        |                                    |
|--------+------------------------------------>
  
>-----------------------------------------------------------------------------------------------------------|
  |                                                                                    
                       |
  |       To:     <[EMAIL PROTECTED]>                                           
                       |
  |       cc:                                                                          
                       |
  |       Subject:     Quick Checkpoint FW1 Question                                   
                       |
  
>-----------------------------------------------------------------------------------------------------------|


Can anyone tell me if the Checkpoint firewall requires any type of client
software to authenticate a W2K Pro machine?  Thanks.

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]




-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to