User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Using Port-Based Security
378 Check Point Safe@Office User Guide
Table 65: Port-Based Security Fields
In this field… Do this…
Assign to network Specify how the Safe@Office appliance should handle users who
authenticate successfully, by selecting one of the following:
• A network name. All users who authenticate to this port
successfully are assigned to the specified network.
• From RADIUS. Use dynamic VLAN assignment to assign users to
specific networks. This option is only relevant when using a
RADIUS server.
Authentication
Server
Specify which authentication server you are using, by selecting one of the
following:
• RADIUS. A RADIUS server.
• Internal User Database. The Safe@Office EAP authenticator.
Quarantine
Network
Specify which network should serve as the Quarantine network, by
selecting one of the following:
• A network name. All users for whom authentication to this port
fails are assigned to the specified network.
• None. No Quarantine network is selected.