The Check Point Next-Generation Firewall uses the identity information provided by the PPS for deciding the resource access. PPS serves as the provider of identity information (For example, user-ID, IP address, and roles) for Check Point Next-Generation Firewall. The policies are then defined based on user role information. The Check Point Next-Generation Firewall enables integration with directory sources (For example, AD or LDAP) to get user and group information. The Check Point Next-Generation Firewall controls the access to protected resources (for example, internet, CRM systems, Wikis and so on.) based on policy settings that defines the access. This section describes the integration of PPS with Check Point Next-Generation Firewall. Overview: Deploying PPS with Check Point Next-Generation Firewall This section describes how to integrate Check Point Next Generation Firewall with PPS to support Identity-based admission control in your network. ![]() Identity-Based Access Control with Check Point
0 Comments
Leave a Reply. |