When implementing client-encryption or any authentication scheme, where should the
stealth rule go? I remember something in training regarding that it cannot be used if
you are doing SecuRemote - but it may just be the location of it in the rulebase that
I may be looking for.
Also, does the stealth rule overrule the security policy properties for GUI client
access?
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================