Anna is a security administrator setting up User Authentication for the first time. She has correctly
configured her Authentication rule, but authentication still does not work. What is the Check Point
recommended way to troubleshoot this issue?
A.
Verify the properties of the user attempting authentication and the authentication method
selected in the Authentication Properties of your firewall object.
B.
Verify the firewall settings of your firewall object, and the properties for the user attempting
encryption and authentication.
C.
Verify the properties for the user attempting authentication and make sure that the file Stealth
Authentication method is selected in the Authentication properties of both the peer gateway object
and your firewall object.
D.
Verify both Client and User Authentication, and the authentication method selected in the
Authentication properties of your Firewall object.
E.
Re-import Schema from the VPN-1/FireWall-1 NG installation CD.
Explanation:
this is the best practice, you have to check both, the properties of the user, to see that the correct
authentication has been selected & the settings are correct and also the authentication properties
of the firewall object to see if that authentication method is enabled.
Incorrect Answers:
B: we are not talking about encryption, only authentication, the question does not talk about a user
performing encryption of traffic through any rule.
C: this is wrong because this option is not mandatory to achieve a successful authentication
process.
D: You don’t have to check client authentication, the question clearly talks only about user
authentication.
E: this is not an available option for this issue.