User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Overview
272 Check Point Safe@Office User Guide
Security
Protocol
Description
WPA2 (802.11i) The WPA2 security method uses the more secure Advanced Encryption
Standard (AES) cipher, instead of the RC4 cipher used by WPA and WEP.
When using WPA-Enterprise or WPA-Personal security methods, the
Safe@Office appliance enables you to restrict access to the wireless network
to wireless stations that support the WPA2 security method. If this setting is
not selected, the Safe@Office appliance allows clients to connect using both
WPA and WPA2.
This security method is not supported for WDS links.
Note: For increased security, it is recommended to enable the Safe@Office internal
VPN Server for users connecting from your internal networks, and to install
SecuRemote/SecureClient on each computer in the wireless network. This ensures
that all connections from the wireless network to the LAN are encrypted and
authenticated. For information, see Internal VPN Server on page 566 and Setting
Up
Yo
ur Safe@Office Appliance as a VPN Server on page 567.