User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Using Network Objects
186 Check Point Safe@Office User Guide
• Assign the network object's IP address to a MAC address
Normally, the Safe@Office DHCP server consistently assigns the same IP address to a
specific computer. However, if the Safe@Office DHCP server runs out of IP
addresses and the computer is down, then the DHCP server may reassign the IP
address to a different computer.
If you want to guarantee that a particular computer's IP address remains constant, you
can reserve the IP address for use by the computer's MAC address only. This is called
DHCP reservation, and it is useful if you are hosting a public Internet server on your
network.
• Web Filtering enforcement
You can specify whether or not to enforce the Web Filtering service and Web rules for
the network object. Network objects that are excluded from such enforcement will be
able to access the Internet without restriction. For information on Web Filtering, see
Web Filtering on page 537. For information on Web rules, see Using Web Rul
e
s on
page 529.
• Secure HotSpot enforcement
In Safe@Office 500 with Power Pack, you can specify whether or not to exclude the
network object from HotSpot enforcement. Excluded network objects will be able to
access the network without viewing the My HotSpot page. Furthermore, users on
HotSpot networks will be able to access the excluded network object without viewing
the My HotSpot page. For information on Secure HotSpot, see Configuring Secure
HotSpot on page 380.
• 80
2.1
x port-based security enforcement
In Safe@Office 500 with Power Pack, when DHCP reservation is used, you can
specify whether or not to exclude a computer from 802.1x port-based security
enforcement. Excluded computers will be able to connect to the Safe@Office
appliance's ports and access the network without authenticating. For information on
802.1x port-based security, see Using Port-Based Security on page 374.