{"id":57,"date":"2008-07-31T14:47:57","date_gmt":"2008-07-31T14:47:57","guid":{"rendered":"https:\/\/fir3netwp.gmsrrpobkbd.com\/2008\/07\/31\/authentication-in-checkpoint\/"},"modified":"2021-07-24T19:35:11","modified_gmt":"2021-07-24T19:35:11","slug":"authentication-in-checkpoint","status":"publish","type":"post","link":"https:\/\/www.fir3net.com\/Firewalls\/Check-Point\/authentication-in-checkpoint.html","title":{"rendered":"Check Point – Authentication"},"content":{"rendered":"

When adding an authentication action to a rule there are 3 types, <\/span><\/p>\n

    \n
  1. User <\/span><\/li>\n
  2. Session <\/span><\/li>\n
  3. Client <\/span><\/li>\n<\/ol>\n

    User<\/strong> authentication works by intercepting connects going through the FW-1 and prompting the user for authentication. To do this the firewall has to modify the traffic, so this authentication type can only be used with FTP, HTTP, Telnet and RLOGIN. <\/span><\/p>\n