User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Using Secure HotSpot
Chapter 13: Setting Your Security Policy 381
network. For example, Secure HotSpot can be used in public computer labs, educational
institutions, libraries, Internet cafés, and so on.
The Safe@Office appliance allows you to add guest users quickly and easily. By default,
guest users are given a username and password that expire in 24 hours and granted
HotSpot Access permissions only. For information on adding quick guest users, see
Adding Quick Guest Users on page 647.
You can choose to exclude specific network objects from
HotSpot enforcement. Excluded
network objects will be able to access the network without viewing the My HotSpot page.
Furthermore, users will be able to access the excluded network object without viewing the
My HotSpot page. For information on excluding network objects from HotSpot
enforcement, see Using Network Objects on page 185.
Important: SecuRemote/SecureClient VPN software users who are authenticated by
the Internal VPN Server are automatically exempt from HotSpot enforcement. This
allows, for example, authenticated employees to gain full access to the corporate
LAN, while guest users are permitted to access the Internet only.
Note: HotSpot enforcement can block traffic passing through the firewall; however, it
does not block local traffic on the same network segment (traffic that does not pass
through the firewall).
Setting Up Secure HotSpot
To set up Secure HotSpot
1. Enable Secure HotSpot for the desired networks.
See Enabling/Disabling Secure HotSpot on page 382.
2. Custom
i
ze Secure HotSpot as desired.
See Customizing Secure HotSpot on page 384.
3. Grant HotSpot Acces
s per
missions to users on the selected networks.
See Adding and Editing Users on page 643.